Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 29 of 29

Full-Text Articles in Physical Sciences and Mathematics

An Algorithm For Clearing Combinatorial Markets, Josiane Domgang Nzouonta Dec 2003

An Algorithm For Clearing Combinatorial Markets, Josiane Domgang Nzouonta

Theses and Dissertations

It was recently shown possible to solve single item auctions without revealing any secret except for the solution. Namely, with vMB-share [4], the seller and the buyer only learn each other's identity and the selling price for a chosen M+1 pricing scheme. No trusted party was necessary. In this thesis, we show how vMB-share can be extended for the clearing of combinatorial negotiations with several items, buyers and sellers. We first show how the more general problem can be reduced to a virtual form, relatively similar to the single-item auctions. Then, some modifications in the cryptographic techniques of vMB-share are …


Schema Matching And Data Extraction Over Html Tables, Cui Tao Sep 2003

Schema Matching And Data Extraction Over Html Tables, Cui Tao

Theses and Dissertations

Data on the Web in HTML tables is mostly structured, but we usually do not know the structure in advance. Thus, we cannot directly query for data of interest. We propose a solution to this problem for the case of mostly structured data in the form of HTML tables, based on document-independent extraction ontologies. The solution entails elements of table location and table understanding, data integration, and wrapper creation. Table location and understanding allows us to locate the table of interest, recognize attributes and values, pair attributes with values, and form records. Data-integration techniques allow us to match source records …


Kiosk Engine: A Platform Independent Solution For Multimedia Kiosks, Manish Satish Shah May 2003

Kiosk Engine: A Platform Independent Solution For Multimedia Kiosks, Manish Satish Shah

Theses and Dissertations

In today's fast paced life saving time is the first priority of every business organization and presenting information visually is a highly desirable and the easiest way to impressively communicate to people. For that purpose, there are interactive devices called kiosks, which display multimedia data on a display and are quite often attached to other input/output hardware like keyboard, mouse, printer, etc. Most of today's kiosks are custom made and are designed for specific set of target platform. The task of creating a kiosk can turn out to be difficult and fairly time consuming. The aim of this thesis is …


Pair Programming To Facilitate The Training Of Newly-Hired Programmers, Mark Anthony Poff May 2003

Pair Programming To Facilitate The Training Of Newly-Hired Programmers, Mark Anthony Poff

Theses and Dissertations

Pair programming is touted by some software professionals as a style which allows developers to produce superior code in less time, and with fewer defects, than code produced by individuals. However, the acclaim for the pair methodology is not universal; some see it was a waste of effort which produces marginal improvements. Reported experiments which obtain quantitative results have typically been performed in an educational environment, and may not reflect actual workplace conditions. This thesis reports on an experiment using pair programing in an industrial setting. Its goal is to determine if this programming style can be used to increase …


A Taxonomy Of E-Commerce Risks And Failures, Giridharan Vilangadu Vijayaraghavan May 2003

A Taxonomy Of E-Commerce Risks And Failures, Giridharan Vilangadu Vijayaraghavan

Theses and Dissertations

Imagine being asked to test an e-commerce website. If you haven't tested one before, where would you start? What experience would you draw on? Where would you look for more information? Even very experienced testers have blind spots when they try to generate test ideas for an application that they have not tested. This thesis presents a simple outline that will help you generate test ideas and limit your blind spots. The outline is the result of about 18 months of research on classifying e-commerce related failures and risks. The result has 45 top-level categories and 700+ examples of errors …


Strategies For Testing Web Applications From The Client Side, Lawrence Thaddeus Prevatte Iii May 2003

Strategies For Testing Web Applications From The Client Side, Lawrence Thaddeus Prevatte Iii

Theses and Dissertations

This thesis is presented on the testing of computer software designed to operate over the World Wide Web. A fault model to guide Web software testing is developed, the components of Web software applications and their interfaces to each other are defined, and strategies to test Web software are discussed. The approach taken is to simplify the concepts of testing Web software to aid in a methodical treatment of the techniques required to conduct meaningful tests using a minimum amount of testing resources, conducting the tests from the client side of the Web application during the “ready for users” or …


Design And Implementation Of Exception Handling With Zero Overhead In Functional Languages, Ramon Zatarain Cabada May 2003

Design And Implementation Of Exception Handling With Zero Overhead In Functional Languages, Ramon Zatarain Cabada

Theses and Dissertations

This dissertation considers the implementation of exception handling specifically for functional languages. Some implementations incur overhead for using exception handling even when no exceptions are raised. We show the results of some experiments with the SML of New Jersey and OCAML compilers, two well-known compilers for functional languages. Imperative languages avoid this overhead by using tables, but the approach does not easily transfer to compilers using continuation passing style (CPS). This dissertation proposes an approach that works with CPS compilers like SML of New Jersey. We first present an experiment where programs in SML are written with and without exception …


A Machine Learning Approach To Detecting Attacks By Identifying Anomalies In Network Traffic, Matthew Vincent Mahoney May 2003

A Machine Learning Approach To Detecting Attacks By Identifying Anomalies In Network Traffic, Matthew Vincent Mahoney

Theses and Dissertations

The current approach to detecting novel attacks in network traffic is to model the normal frequency of session IP addresses and server port usage and to signal unusual combinations of these attributes as suspicious. We make four major contributions to the field of network anomaly detection. First, rather than just model user behavior, we also model network protocols from the data link through the application layer in order to detect attacks that exploit vulnerabilities in the implementation of these protocols. Second, we introduce a time-based model suitable for the bursty nature of network traffic: the probability of an event depends …


Migration From A Waterfall/Non Sei Cmm Compliant Process To A Rup/Sei Cmm Compliant Process, Chad Amos Chamberlin May 2003

Migration From A Waterfall/Non Sei Cmm Compliant Process To A Rup/Sei Cmm Compliant Process, Chad Amos Chamberlin

Theses and Dissertations

Software Life Cycle processes play a key role in the successful development of software products. Software processes continue to evolve as the field of software development progresses toward being a true engineering discipline. This theses has two objectives: (1) To apply software engineering knowledge gained during the pursuit of this degree toward the design and development of a complete, Software Engineering Institute (SEI) Capability Maturity Model (CMM) compliant process for the design phase of the software lifecycle. (2) To evaluate a Waterfall Lifecycle Model vs. an Iterative Lifecycle Model and compare SEI CM compliant processes to non-SEI CM compliant process …


Protecting Sensitive Credential Content During Trust Negotiation, Ryan D. Jarvis Apr 2003

Protecting Sensitive Credential Content During Trust Negotiation, Ryan D. Jarvis

Theses and Dissertations

Keeping sensitive information private in a public world is a common concern to users of digital credentials. A digital credential may contain sensitive attributes certifying characteristics about its owner. X.509v3, the most widely used certificate standard, includes support for certificate extensions that make it possible to bind multiple attributes to a public key contained in the certificate. This feature, although convenient, potentially exploits the certificate holder's private information contained in the certificate. There are currently no privacy considerations in place to protect the disclosure of attributes in a certificate. This thesis focuses on protecting sensitive credential content during trust negotiation …


Ontology-Based Extraction Of Rdf Data From The World Wide Web, Timothy Adam Chartrand Mar 2003

Ontology-Based Extraction Of Rdf Data From The World Wide Web, Timothy Adam Chartrand

Theses and Dissertations

The simplicity and proliferation of the World Wide Web (WWW) has taken the availability of information to an unprecedented level. The next generation of the Web, the Semantic Web, seeks to make information more usable by machines by introducing a more rigorous structure based on ontologies. One hinderance to the Semantic Web is the lack of existing semantically marked-up data. Until there is a critical mass of Semantic Web data, few people will develop and use Semantic Web applications. This project helps promote the Semantic Web by providing content. We apply existing information-extraction techniques, in particular, the BYU ontologybased data-extraction …


The Generalizability Of Private Sector Research On Software Project Management In Two Usaf Organizations: An Exploratory Study, Michael R. Garman Mar 2003

The Generalizability Of Private Sector Research On Software Project Management In Two Usaf Organizations: An Exploratory Study, Michael R. Garman

Theses and Dissertations

Project managers typically set three success criteria for their projects: meet specifications, be on time, and be on budget. However, software projects frequently fail to meet these criteria. Software engineers, acquisition officers, and project managers have all studied this issue and made recommendations for achieving success. But most of this research in peer reviewed journals has focused on the private sector. Researchers have also identified software acquisitions as one of the major differences between the private sector and public sector MIS. This indicates that the elements for a successful software project in the public sector may be different from the …


Implementing An Information Retrieval And Visualization Framework For Heterogeneous Data Types, Andrew J. Kowalchuk Mar 2003

Implementing An Information Retrieval And Visualization Framework For Heterogeneous Data Types, Andrew J. Kowalchuk

Theses and Dissertations

In today's information focused world, there is no lack of entities focused on information gathering. However, there is still a widespread epidemic of information starvation in the Department of Defense (DoD). This starvation is attributed to the lack of interoperability between information gatherers and information consumers. To alleviate this problem, the DoD has put forth a vision of a Joint Battlespace Infosphere (JBI). This research proposes a framework for sharing and finding resources in a JBI. The framework uses an extensible metadata specification, agent technology, and the Control of Agent Based Systems (CoABS). It provides several tools for publication and …


Distributed Control Of A Swarm Of Autonomous Unmanned Aerial Vehicles, James T. Lotspeich Mar 2003

Distributed Control Of A Swarm Of Autonomous Unmanned Aerial Vehicles, James T. Lotspeich

Theses and Dissertations

With the increasing use of Unmanned Aerial Vehicles (UAV)s military operations, there is a growing need to develop new methods of control and navigation for these vehicles. This investigation proposes the use of an adaptive swarming algorithm that utilizes local state information to influence the overall behavior of each individual agent in the swarm based upon the agent's current position in the battlespace. In order to investigate the ability of this algorithm to control UAVs in a cooperative manner, a swarm architecture is developed that allows for on-line modification of basic rules. Adaptation is achieved by using a set of …


Performance Evaluation And Analysis Of Effective Range And Data Throughput For Unmodified Bluetooth Communication Devices, Timothy F. Kneeland Mar 2003

Performance Evaluation And Analysis Of Effective Range And Data Throughput For Unmodified Bluetooth Communication Devices, Timothy F. Kneeland

Theses and Dissertations

The DoD and the Air Force continually seek to incorporate new technology in an effort to improve communication, work effectiveness, and efficiency. Office devices utilizing Bluetooth technology simplify device configuration and communication. They provide a means to communicate wirelessly over short distances thereby eliminating the need for different vendor specific cables and interfaces. One of the key concerns involved in incorporating new communication technology is security; the fundamental security concern of wireless communication is interception. Studies focusing on IEEE 802.11b have shown vulnerability zones around many DoD installations that reflect the ranges at which wireless communications using the 802.11b standard …


Antecedents And Outcomes Of End User Computing Competence, David A. Case Mar 2003

Antecedents And Outcomes Of End User Computing Competence, David A. Case

Theses and Dissertations

The tremendous proliferation of end user computing (EUC) in the workplace over the past few decades is cause for concern in public and private organizations. Computer use has moved from individuals working with "dumb" terminals in centralized networks to individuals operating personal computers, just as powerful as yesterday's mainframe. The end user has had to evolve and will continue evolving as well; from someone with low level technical skills to someone with a high level of technical knowledge and information managerial skills. Because EUC continues growing more sophisticated, end users must not only maintain a level of competence, but prepare …


Deterministic Intracellular Modeling, Jacqueline B. Young Mar 2003

Deterministic Intracellular Modeling, Jacqueline B. Young

Theses and Dissertations

The United States Air Force is interested in the potential side effects at the cellular level from exposure to mission-essential chemicals. Presently, Air Force toxicology studies are conducted to help shed light in identifying potential hazards to workers. However, it takes a considerable amount of money, resources, and time to obtain and analyze experimental results from toxicology studies. The necessity for innovative methods that enable researchers to more effectively generate and analyze data is apparent.


A Three-Dimensional Heads-Up Primary Navigation Reference Display For Paratroopers Performing High Altitude High Open Jumps, Brian A. Balazs Mar 2003

A Three-Dimensional Heads-Up Primary Navigation Reference Display For Paratroopers Performing High Altitude High Open Jumps, Brian A. Balazs

Theses and Dissertations

The Department of Defense (DoD) relies on the para-dropping of resources to meet different objectives in order to accomplish missions during peace-time, war-time, or military operations other than war. The resources dropped to the ground via parachute range from supplies and equipment to the most valued asset, people. Tactics have been developed to increase the safety of troops parachuting into areas of conflict. These tactics include high-altitude high-opening (HAHO) jumping and night jumping. HAHO jumping allows paratroopers to travel large distances in the air away from the path of the delivering aircraft. While night jumping, done with the aid of …


Explicit Building-Block Multiobjective Genetic Algorithms: Theory, Analysis, And Developing, Jesse B. Zydallis Mar 2003

Explicit Building-Block Multiobjective Genetic Algorithms: Theory, Analysis, And Developing, Jesse B. Zydallis

Theses and Dissertations

This dissertation research emphasizes explicit Building Block (BB) based MO EAs performance and detailed symbolic representation. An explicit BB-based MOEA for solving constrained and real-world MOPs is developed the Multiobjective Messy Genetic Algorithm II (MOMGA-II) which is designed to validate symbolic BB concepts. The MOMGA-II demonstrates that explicit BB-based MOEAs provide insight into solving difficult MOPs that is generally not realized through the use of implicit BB-based MOEA approaches. This insight is necessary to increase the effectiveness of all MOEA approaches. In order to increase MOEA computational efficiency parallelization of MOEAs is addressed. Communications between processors in a parallel MOEA …


Inquisitive Pattern Recognition, Amy L. Magnus Mar 2003

Inquisitive Pattern Recognition, Amy L. Magnus

Theses and Dissertations

The Department of Defense and the Department of the Air Force have funded automatic target recognition for several decades with varied success. The foundation of automatic target recognition is based upon pattern recognition. In this work, we present new pattern recognition concepts specifically in the area of classification and propose new techniques that will allow one to determine when a classifier is being arrogant. Clearly arrogance in classification is an undesirable attribute. A human is being arrogant when their expressed conviction in a decision overstates their actual experience in making similar decisions. Likewise given an input feature vector, we say …


A Visual Language For Composable Simulation Scenarios, Carolyn R. Bartley Mar 2003

A Visual Language For Composable Simulation Scenarios, Carolyn R. Bartley

Theses and Dissertations

Modeling and Simulation plays an important role in how the Air Force trains and fights, Scenarios are used in simulation to give users the ability to specify entities and behaviors that should be simulated by a model: however, building and understanding scenarios can be a difficult and time-consuming process, furthermore, as composable simulations become more prominent, the need for a common descriptor for simulation scenarios has become evident. In order to reduce the complexity of creating and understanding simulation scenarios, a visual language was created, The research on visual languages presented in this thesis examines methods of visually specifying the …


Reverse Geographic Location Of A Computer Node, Clinton G. Carr Iii Mar 2003

Reverse Geographic Location Of A Computer Node, Clinton G. Carr Iii

Theses and Dissertations

The determination of methods by which a user is able to locate his computer when that user does not know his current location, termed "homestation", will provide the Air Force an advantage over its adversaries. The methods are a combination of different mathematical techniques that enable the user to manipulate data to minimize the effects of delay caused by various factors on the network. The techniques use the smallest round trip time obtained from the ping utility. This time is then converted into miles and plotted on a map of the United States. The methods used to solve this problem …


Text Manipulation Judgment Accuracy: An Exploratory Study, Randy S. Wardak Mar 2003

Text Manipulation Judgment Accuracy: An Exploratory Study, Randy S. Wardak

Theses and Dissertations

Deception aims to affect a decision-making process in a way that somehow benefits the deceiver. More knowledge is desired in the area of purely text-based scenarios. Thirty-seven graduate students at the Air Force Institute of Technology participated in an experiment in order to gain an initial understanding of how people determine whether text has been manipulated, and to identify specific areas that may be more closely investigated in future research. Excerpts were drawn from editions of a current-events newsletter that the participants receive on a weekly basis as part of their enrollment in the graduate program. Some of the excerpts …


An Artificial Immune System Strategy For Robust Chemical Spectra Classification Via Distributed Heterogeneous Sensors, Mark A. Esslinger Mar 2003

An Artificial Immune System Strategy For Robust Chemical Spectra Classification Via Distributed Heterogeneous Sensors, Mark A. Esslinger

Theses and Dissertations

The timely detection and classification of chemical and biological agents in a wartime environment is a critical component of force protection in hostile areas. Moreover, the possibility of toxic agent use in heavily populated civilian areas has risen dramatically in recent months. This thesis effort proposes a strategy for identifying such agents vis distributed sensors in an Artificial Immune System (AIS) network. The system may be used to complement "electronic" nose ("E-nose") research being conducted in part by the Air Force Research Laboratory Sensors Directorate. In addition, the proposed strategy may facilitate fulfillment of a recent mandate by the President …


Searching System Call Information For Clues: The Effects Of Intrusions Of Processes, Mark G. Reith Mar 2003

Searching System Call Information For Clues: The Effects Of Intrusions Of Processes, Mark G. Reith

Theses and Dissertations

The United States Air Force extensively uses information systems as a tool managing and maintaining its information. The increased dependence on these systems in recent years has necessitated the need for protection front threats of information warfare and cyber terrorism. One type of protection utilizes intrusion detection systems to provide indications that intrusive behavior has occurred. Other types of protection may include packet filtering, cryptography and strong user authentication. Traditional approaches toward intrusion detection rely on features that are external to computer processes. By treating processes as black-boxes, intrusion detection systems may miss a wealth of information that could be …


Uml Assisted Visual Debugging For Distributed Systems, Benjamin R. Musial Mar 2003

Uml Assisted Visual Debugging For Distributed Systems, Benjamin R. Musial

Theses and Dissertations

The DOD is developing a Joint Battlespace Infosphere, linking a large number of data sources and user applications. To assist in this process, debugging and analysis tools are required. Software debugging is an extremely difficult cognitive process requiring comprehension of the overall application behavior, along with detailed understanding of specific application components. This is further complicated with distributed systems by the addition of other programs, their large size and synchronization issues. Typical debuggers provide inadequate support for this process, focusing primarily on the details accessible through source code. To overcome this deficiency, this research links the dynamic program execution state …


Using Sequence Analysis To Perform Application-Based Anomaly Detection Within An Artificial Immune System Framework, Larissa A. O'Brien Mar 2003

Using Sequence Analysis To Perform Application-Based Anomaly Detection Within An Artificial Immune System Framework, Larissa A. O'Brien

Theses and Dissertations

The Air Force and other Department of Defense (DoD) computer systems typically rely on traditional signature-based network IDSs to detect various types of attempted or successful attacks. Signature-based methods are limited to detecting known attacks or similar variants; anomaly-based systems, by contrast, alert on behaviors previously unseen. The development of an effective anomaly-detecting, application based IDS would increase the Air Force's ability to ward off attacks that are not detected by signature-based network IDSs, thus strengthening the layered defenses necessary to acquire and maintain safe, secure communication capability. This system follows the Artificial Immune System (AIS) framework, which relies on …


Adjusting Sensing Range To Maximize Throughput On Ad-Hoc Multi-Hop Wireless Networks, Christopher K. Roberts Mar 2003

Adjusting Sensing Range To Maximize Throughput On Ad-Hoc Multi-Hop Wireless Networks, Christopher K. Roberts

Theses and Dissertations

The use of ad-hoc wireless networks is becoming common within the United States Air Force. Such networks are able to be implemented where traditional wired networks are either impractical or too expensive. As the miniaturization of communication devices continues, it is becoming increasingly common for mobile devices to communicate directly with each other, eliminating the need for center access points. Such a network is referred to as a multi-hop ad-hoc network, or simply a multi-hop network. Most multi-hop network protocols use some form of carrier sensing to determine if the wireless channel is in use. A large sensing range can …


The Effect Of Interactivity And Instructional Exposure On Learning Effectiveness And Knowledge Retention: A Comparative Study Of Two U.S. Air Force Computer-Based Training (Cbt) Courses For Network User Licensing, Matthew J. Imperial Mar 2003

The Effect Of Interactivity And Instructional Exposure On Learning Effectiveness And Knowledge Retention: A Comparative Study Of Two U.S. Air Force Computer-Based Training (Cbt) Courses For Network User Licensing, Matthew J. Imperial

Theses and Dissertations

The United States Air Force (USAF) currently employs the use of computer-based training (CET) across a host of requirements. One such requirement is in the Information Assurance (IA) arena and involves the training/licensing of over one-million computer network end-users. USAF use of CETs has been shown to possess a potential for substantial fiscal savings. However, studies investigating the learning outcomes of learning effectiveness (initial learning) and knowledge retention (sustained learning) associated with USAF CETs are lacking.