Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

Computer Sciences

2015

Articles 1 - 30 of 424

Full-Text Articles in Physical Sciences and Mathematics

Web Based Attendance Management System (Project Source Code In Php And Mysql), Dr. Muhammad Zubair Asghar Dec 2015

Web Based Attendance Management System (Project Source Code In Php And Mysql), Dr. Muhammad Zubair Asghar

Dr. Muhammad Zubair Asghar

This source code deals with the development of web based attendance management system using PHP and MYSQL. It is developed by one my BSCS student, namely sahar hassan under my supervision.


The Effect Of Latency On User Performance In Warcraft Iii, Nathan Sledon, Eric Girard, Seth Borg, Mark Claypool, Emmanuel Agu Dec 2015

The Effect Of Latency On User Performance In Warcraft Iii, Nathan Sledon, Eric Girard, Seth Borg, Mark Claypool, Emmanuel Agu

Emmanuel O. Agu

Variable latency on the Internet is a well-known problem for interactive applications. With the increase in interactive network games comes the increased importance of understanding the effects of latency on user performance. Classes of network games such as First Person Shooters (FPS) and Read Time Strategy (RTS) differ in their user interaction model and hence susceptibility to variable latency. While previous work has measured the effects of latency on FPS games, there has been no systematic investigation of the effects of latency on RTS games. In this work, we design and conduct user studies that measure the impact of latency …


Low Delay Marking For Tcp In Wireless Ad Hoc Networks, Choong-Soo Lee, Mingzhe Li, Emmanuel Agu, Mark Claypool, Robert Kinicki Dec 2015

Low Delay Marking For Tcp In Wireless Ad Hoc Networks, Choong-Soo Lee, Mingzhe Li, Emmanuel Agu, Mark Claypool, Robert Kinicki

Emmanuel O. Agu

End-hosts on wireless ad hoc networks typically use TCP as their transport layer protocol. Being designed for wired networks, TCP can perform poorly over wireless networks. Work that has proposed ways to improve TCP performance over wireless networks has concentrated primarily on improving TCP throughput only. Emerging applications, such as interactive multimedia and network games, require reduced delay at least as much as increased throughput. In this paper, we propose LDM1, an IP layer queue marking mechanism that estimates the number of hops and flows at each wireless node to computes the optimal marking probability. We present simulation results and …


Time-Partitioned Index Design For Adaptive Multi-Route Data Stream Systems Utilizing Heavy Hitter Algorithms, Karen Works, Elke Rundensteiner, Emmanuel Agu Dec 2015

Time-Partitioned Index Design For Adaptive Multi-Route Data Stream Systems Utilizing Heavy Hitter Algorithms, Karen Works, Elke Rundensteiner, Emmanuel Agu

Emmanuel O. Agu

Adaptive multi-route query processing (AMR) is a recently emerging paradigm for processing stream queries in highly fluctuating environments. AMR dynamically routes batches of tuples to operators in the query network based on routing criteria and up-to-date system statistics. In the context of AMR systems, indexing, a core technology for efficient stream processing, has received little attention. Indexing in AMR systems is demanding as indices must adapt to serve continuously evolving query paths while maintaining index content under high volumes of data. Our proposed Adaptive Multi-Route Index (AMRI) employs a bitmap time-partitioned design that while being versatile in serving a diverse …


Performance Enhancement Of Tfrc In Wireless Networks, Mingzhe Li, Emmanuel Agu, Mark Claypool, Robert Kinicki Dec 2015

Performance Enhancement Of Tfrc In Wireless Networks, Mingzhe Li, Emmanuel Agu, Mark Claypool, Robert Kinicki

Emmanuel O. Agu

The TCP-Friendly Rate Control (TFRC) is used as a streaming media transport protocol. Using the TCP congestion response function and current network conditions, TFRC adjusts its transmission rate to yield the maximum TCP-Friendly throughput when sharing capacity with TCP flows. Since TFRC was designed for wired networks, it does not achieve the maximum TCP-Friendly throughput in multihop ad hoc wireless networks. The reduced wireless spatial channel reuse due to hidden terminals in multihop wireless networks induces TFRC throughput reductions. Specifically, TFRC is unaware of MAC layer transmission delays due to collisions, retransmissions and MAC layer congestion. This paper illustrates that …


Discovering A Research Agenda For Using Design Rationale In Software Maintenance, Janet Burge, David Brown Dec 2015

Discovering A Research Agenda For Using Design Rationale In Software Maintenance, Janet Burge, David Brown

David C. Brown

Design Rationale consists of the reasons behind decisions made while designing. This information would be particularly useful during software maintenance. In this paper, we describe a study performed to investigate the content, structure, and use of design rationale during maintenance. The major goal of this study was to discover an agenda for further research into the use of design rationale for software maintenance.


Measuring The Performance Gains From Directional Antennas In An Unplanned 802.11b Mesh Network, Jason Wilson, Patrick Gemme, Emmanuel Agu Dec 2015

Measuring The Performance Gains From Directional Antennas In An Unplanned 802.11b Mesh Network, Jason Wilson, Patrick Gemme, Emmanuel Agu

Emmanuel O. Agu

Wireless mesh networks are becoming increasingly popular. Most proposed mesh algorithms are evaluated using simulation. Simulations frequently oversimplify real world scenarios and can lead to results that are significantly different. Thus, although it is more difficult to run controlled experiments in already deployed real-world networks, it is important to understand how proposed improvements perform under these realistic scenarios. Several authors have suggested the use of directional antennas, but their merits have only comprehensively evaluated in simulators. Roofnet is an unplanned 802.11b wireless mesh network deployed by MIT and is constructed primarily of omni-directional antennas. We use measurements to evaluate performance …


Inferring Unobservable Learning Variables From Students’ Help Seeking Behavior, Ivon Arroyo Dec 2015

Inferring Unobservable Learning Variables From Students’ Help Seeking Behavior, Ivon Arroyo

Ivon Arroyo

Results of an evaluation of students’ attitudes and their relationship to student behaviors within a tutoring system are presented. Starting from a correlation analysis that integrates survey-collected student attitudes, learning variables, and behaviors while using the tutor, we constructed a Bayesian Network that infers attitudes and perceptions towards help and the tutoring system.


Web-Based Intelligent Multimedia Tutoring For High Stakes Achievement Tests, Ivon Arroyo Dec 2015

Web-Based Intelligent Multimedia Tutoring For High Stakes Achievement Tests, Ivon Arroyo

Ivon Arroyo

We describe Wayang Outpost, a web-based ITS for the Math section of the Scholastic Aptitude Test (SAT). It has several distinctive features: help with multimedia animations and sound, problems embedded in narrative and fantasy contexts, alternative teaching strategies for students of different mental rotation abilities and memory retrieval speeds. Our work on adding intelligence for adaptivity is described. Evaluations prove that students learn with the tutor, but learning depends on the interaction of teaching strategies and cognitive abilities. A new adaptive tutor is being built based on evaluation results; surveys results and students’ log files analyses.


Reasoning With Design Rationale, Janet Burge, David Brown Dec 2015

Reasoning With Design Rationale, Janet Burge, David Brown

David C. Brown

Design Rationale (DR) consists of the decisions made during the design process and the reasons behind them. Because it offers more than just a “snapshot” of the final design decisions, DR is invaluable as an aid for revising, maintaining, documenting, evaluating, and learning the design. Much work has been performed on how DR can be captured and represented but not as much on how it can be used. In this paper, we investigate the use of DR by building InfoRat, a system that inferences over a design’s rationale in order to detect inconsistencies and to assess the impact of changes.


Tradeoffs Between Energy And Security In Wireless Networks, Fernando Colón Osorio, Emmanuel Agu, Kerry Mckay Dec 2015

Tradeoffs Between Energy And Security In Wireless Networks, Fernando Colón Osorio, Emmanuel Agu, Kerry Mckay

Emmanuel O. Agu

In recent years, several researchers have studied the vulnerabilities present in the encryption protocols and authentication mechanisms associated with 802.11-based networks. This research has led to the creation of protocol extensions and replacement proposals such as WPA, 802.11i, and 802.1X. In addition, Denial of Service attacks that can be launched against 802.11-based networks, with relative ease and impunity, have been studied. Simultaneously, researchers studying the limitations of wireless networks have turned their attention to one of the inherent limitation of wireless devices, namely, power consumption. Research in this area has been focused in understanding the impact of the network interface …


Characterizing The Performance And Behaviors Of Runners Using Twitter, Qian He, Emmanuel Agu, Diane Strong, Bengisu Tulu, Peder Pedersen Dec 2015

Characterizing The Performance And Behaviors Of Runners Using Twitter, Qian He, Emmanuel Agu, Diane Strong, Bengisu Tulu, Peder Pedersen

Emmanuel O. Agu

Running is a popular physical activity that improves physical and mental wellbeing. Unfortunately, up-to- date information about runners’ performance and psychological wellbeing is limited. Many questions remain unanswered, such as how far and how fast runners typically run, their preferred running times and frequencies, how long new runners persist before dropping out, and what factors cause runners to quit. Without hard data, establishing patterns of runner behavior and mitigating the challenges they face are difficult. Collecting data manually from large numbers of runners for research studies is costly and time consuming. Emerging Social Networking Services (SNS) and fitness tracking devices …


Mapping Nominal Values To Numbers For Effective Visualization, Geraldine Rosario, Elke Rundensteiner, David Brown, Matthew Ward Dec 2015

Mapping Nominal Values To Numbers For Effective Visualization, Geraldine Rosario, Elke Rundensteiner, David Brown, Matthew Ward

David C. Brown

Data sets with a large number of nominal variables, some with high cardinality, are becoming increasingly common and need to be explored. Unfortunately, most existing visual exploration displays are designed to handle numeric variables only. When importing data sets with nominal values into such visualization tools, most solutions to date are rather simplistic. Often, techniques that map nominal values to numbers do not assign order or spacing among the values in a manner that conveys semantic relationships. Moreover, displays designed for nominal variables usually cannot handle high cardinality variables well. This paper addresses the problem of how to display nominal …


Implicit Interest Indicators, Mark Claypool, Phong Le, Makoto Waseda, David Brown Dec 2015

Implicit Interest Indicators, Mark Claypool, Phong Le, Makoto Waseda, David Brown

David C. Brown

Recommender systems provide personalized suggestions about items that users will find interesting. Typically, recommender systems require a user interface that can "intelligently" determine the interest of a user and use this information to make suggestions. The common solution, "explicit ratings", where users tell the system what they think about a piece of information, is well-understood and fairly precise. However, having to stop to enter explicit ratings can alter normal patterns of browsing and reading. A more "intelligent" method is to use implicit ratings, where a rating is obtained by a method other than obtaining it directly from the users. These …


Expectation Formation In Multi-Agent Design Systems, Dan Grecu, David Brown Dec 2015

Expectation Formation In Multi-Agent Design Systems, Dan Grecu, David Brown

David C. Brown

No abstract provided.


Some Reactions To Presentations At The 2007 Computational Creativity Workshop, David Brown Dec 2015

Some Reactions To Presentations At The 2007 Computational Creativity Workshop, David Brown

David C. Brown

No abstract provided.


Detection Of Diabetic Foot Ulcers Using Svm Based Classification, Lei Wang, Peder Pedersen, Diane Strong, Bengisu Tulu, Emmanuel Agu, Qian He, Ronald Ignotz, Raymond Dunn, David Harlan, Sherry Pagoto Dec 2015

Detection Of Diabetic Foot Ulcers Using Svm Based Classification, Lei Wang, Peder Pedersen, Diane Strong, Bengisu Tulu, Emmanuel Agu, Qian He, Ronald Ignotz, Raymond Dunn, David Harlan, Sherry Pagoto

Emmanuel O. Agu

Diabetic foot ulcers represent a significant health issue, for both patients’ quality of life and healthcare system costs. Currently, wound care is mainly based on visual assessment of wound size, which suffers from lack of accuracy and consistency. Hence, a more quantitative and computer-based method is needed. Supervised machine learning based object recognition is an attractive option, using training sample images with boundaries labeled by experienced clinicians. We use forty sample images collected from the UMASS Wound Clinic by tracking 8 subjects over 6 months with a smartphone camera. To maintain a consistent imaging environment and facilitate the capture process …


A Context-Aware Activity Recommendation Smartphone Application To Mitigate Sedentary Lifestyles, Qian He, Emmanuel Agu Dec 2015

A Context-Aware Activity Recommendation Smartphone Application To Mitigate Sedentary Lifestyles, Qian He, Emmanuel Agu

Emmanuel O. Agu

A sedentary lifestyle involves irregular or no physical activity. In this kind of lifestyle, people’s activities do not increase their energy expenditure substantially above resting levels. Long periods of sitting, lying, watching television, playing video games, and using the computer are typical examples. Energy expenditures at 1.0-1.5 Metabolic Equivalent Units (METs) are considered sedentary behaviors. A recent study of sedentary lifestyles found that the length of sedentary times is associated with an increased risk of diabetes, cardiovascular disease, and cardiovascular and all-cause mortality. In this study, we developed a smartphone application called “On11”, which continuously tracks and informs the user …


The Effects Of Loss And Latency On User Performance In Unreal Tournament 2003, Tom Beigbeder, Rory Coughlan, Corey Lusher, John Plunkett, Emmanuel Agu, Mark Claypool Dec 2015

The Effects Of Loss And Latency On User Performance In Unreal Tournament 2003, Tom Beigbeder, Rory Coughlan, Corey Lusher, John Plunkett, Emmanuel Agu, Mark Claypool

Emmanuel O. Agu

With the growth in interactive network games comes an increased importance in a better understanding of the effects of latency on user performance. While previous work has studied the tolerance game players have for high latencies and has studied the effects of latency on user performance in real-time strategy games, to the best of our knowledge, there has been no systematic study of the effects of loss and latency on user performance. In this paper we study user performance for Unreal Tournament 2003 (UT2003), a popular FPS game, under varying amounts of latency and packet loss. First, we deduced typical …


New Potentials For Data-Driven Intelligent Tutoring System Development And Optimization, Kenneth Koedinger, Emma Brunskill, Ryan Baker, Elizabeth Mclaughlin, John Stamper Dec 2015

New Potentials For Data-Driven Intelligent Tutoring System Development And Optimization, Kenneth Koedinger, Emma Brunskill, Ryan Baker, Elizabeth Mclaughlin, John Stamper

Ryan S.J.d. Baker

Increasing widespread use of educational technologies is producing vast amounts of data. Such data can be used to help advance our understanding of student learning and enable more intelligent, interactive, engaging, and effective education. In this article, we discuss the status and prospects of this new and powerful opportunity for data-driven development and optimization of educational technologies, focusing on intelligent tutoring systems We provide examples of use of a variety of techniques to develop or optimize the select, evaluate, suggest, and update functions of intelligent tutors, including probabilistic grammar learning, rule induction, Markov decision process, classification, and integrations of symbolic …


Nfrs: Fact Or Fiction, Janet Burge, David Brown Dec 2015

Nfrs: Fact Or Fiction, Janet Burge, David Brown

David C. Brown

No abstract provided.


Robust Distributed Scheduling Via Time Period Aggregation, Shih-Fen Cheng, John Tajan, Hoong Chuin Lau Dec 2015

Robust Distributed Scheduling Via Time Period Aggregation, Shih-Fen Cheng, John Tajan, Hoong Chuin Lau

Shih-Fen Cheng

In this paper, we evaluate whether the robustness of a market mechanism that allocates complementary resources could be improved through the aggregation of time periods in which resources are consumed. In particular, we study a multi-round combinatorial auction that is built on a general equilibrium framework. We adopt the general equilibrium framework and the particular combinatorial auction design from the literature, and we investigate the benefits and the limitation of time-period aggregation when demand-side uncertainties are introduced. By using simulation experiments on a real-life resource allocation problem from a container port, we show that, under stochastic conditions, the performance variation …


Robust Distributed Scheduling Via Time Period Aggregation, Shih-Fen Cheng, John Tajan, Hoong Chuin Lau Dec 2015

Robust Distributed Scheduling Via Time Period Aggregation, Shih-Fen Cheng, John Tajan, Hoong Chuin Lau

Shih-Fen Cheng

In this paper, we evaluate whether the robustness of a market mechanism that allocates complementary resources could be improved through the aggregation of time periods in which resources are consumed. In particular, we study a multi-round combinatorial auction that is built on a general equilibrium framework. We adopt the general equilibrium framework and the particular combinatorial auction design from the literature, and we investigate the benefits and the limitation of time-period aggregation when demand-side uncertainties are introduced. By using simulation experiments on a real-life resource allocation problem from a container port, we show that, under stochastic conditions, the performance variation …


Robust Distributed Scheduling Via Time Period Aggregation, Shih-Fen Cheng, John Tajan, Hoong Chuin Lau Dec 2015

Robust Distributed Scheduling Via Time Period Aggregation, Shih-Fen Cheng, John Tajan, Hoong Chuin Lau

Shih-Fen CHENG

In this paper, we evaluate whether the robustness of a market mechanism that allocates complementary resources could be improved through the aggregation of time periods in which resources are consumed. In particular, we study a multi-round combinatorial auction that is built on a general equilibrium framework. We adopt the general equilibrium framework and the particular combinatorial auction design from the literature, and we investigate the benefits and the limitation of time-period aggregation when demand-side uncertainties are introduced. By using simulation experiments on a real-life resource allocation problem from a container port, we show that, under stochastic conditions, the performance variation …


Mapping The Organizational Relations Within Physical Security’S Body Of Knowledge: A Management Heuristic Of Sound Theory And Best Practice, Richard Coole, David J. Brooks Dec 2015

Mapping The Organizational Relations Within Physical Security’S Body Of Knowledge: A Management Heuristic Of Sound Theory And Best Practice, Richard Coole, David J. Brooks

David J Brooks Dr.

Security Science education at university levels is still in its infancy, with little agreement towards knowledge, curriculum and competency. Therefore, it is essential that educators draw on relevant literature highlighting means of efficient and effective knowledge transfer for tertiary students within the Security Science domain. Such knowledge transfer will reduce the gap between academic knowledge (explicit) and professional competency (tacit knowledge). This paper presents phase one of a multiphase study. A qualitative “systems based knowledge structure” of security domain categories has been conceptually mapped as a domain heuristic. The heuristic drew on research highlighting that experts have both richer depths …


Mapping The Organizational Relations Within Physical Security’S Body Of Knowledge: A Management Heuristic Of Sound Theory And Best Practice, Richard Coole, David J. Brooks Dec 2015

Mapping The Organizational Relations Within Physical Security’S Body Of Knowledge: A Management Heuristic Of Sound Theory And Best Practice, Richard Coole, David J. Brooks

David J Brooks Dr.

Security Science education at university levels is still in its infancy, with little agreement towards knowledge, curriculum and competency. Therefore, it is essential that educators draw on relevant literature highlighting means of efficient and effective knowledge transfer for tertiary students within the Security Science domain. Such knowledge transfer will reduce the gap between academic knowledge (explicit) and professional competency (tacit knowledge). This paper presents phase one of a multiphase study. A qualitative “systems based knowledge structure” of security domain categories has been conceptually mapped as a domain heuristic. The heuristic drew on research highlighting that experts have both richer depths …


Ramping Down Chinese Commercial Cyber Espionage, Emilio Iasiello Dec 2015

Ramping Down Chinese Commercial Cyber Espionage, Emilio Iasiello

Emilio Iasiello

While detractors believe that commercial cyber espionage hasn’t really stopped, recent Chinese efforts show a government trying to get a handle on its large spying apparatus that could include hired and independent contractors acting autonomously in addition to its other resources. While complete cessation may never occur, significant timely reduction demonstrates Beijing’s willingness to work with the United States as a partner and not a pariah, and provides a foundation from which the two governments can move forward on other cyber security areas where incongruity persists.


Designing For Positive Health Affect: Decoupling Negative Emotion And Health Monitoring Technologies, Tammy R. Toscos, Kay Connelly, Yvonne Rogers Dec 2015

Designing For Positive Health Affect: Decoupling Negative Emotion And Health Monitoring Technologies, Tammy R. Toscos, Kay Connelly, Yvonne Rogers

Tammy R Toscos

Through various health-focused technology projects, we discovered that the emotional response to technology was related to uptake and sustained use of health monitoring technologies. In this paper we present a case study of how we synthesized constructs of social cognitive theory, technology as experience, and diabetes management guidelines as a framework for making design recommendations for blood glucose monitoring technology that address the emotional response of users. We suggest applying this theoretical lens for design may help attend to emotional responses of users in an effort to decouple strong negative emotions that are paired to health monitoring technologies that provide …


Patient-Centered Appointment Scheduling Using Agent-Based Simulation, Tammy Toscos, Ayten Turkcan, Brad Doebbeling Dec 2015

Patient-Centered Appointment Scheduling Using Agent-Based Simulation, Tammy Toscos, Ayten Turkcan, Brad Doebbeling

Tammy R Toscos

Enhanced access and continuity are key components of patient-centered care. Existing studies show that several interventions such as providing same day appointments, walk-in services, after-hours care, and group appointments, have been used to redesign the healthcare systems for improved access to primary care. However, an intervention focusing on a single component of care delivery (i.e. improving access to acute care) might have a negative impact other components of the system (i.e. reduced continuity of care for chronic patients). Therefore, primary care clinics should consider implementing multiple interventions tailored for their patient population needs. We collected rapid ethnography and observations to …


Is It The Typeset Or The Type Of Statistics? Disfluent Font And Self-Disclosure, Rebecca Balebako, Eyal Peer, Laura Brandimarte, Lorrie Faith Cranor, Alessandro Acquisti Dec 2015

Is It The Typeset Or The Type Of Statistics? Disfluent Font And Self-Disclosure, Rebecca Balebako, Eyal Peer, Laura Brandimarte, Lorrie Faith Cranor, Alessandro Acquisti

Lorrie F Cranor

Background. The security and privacy communities have become increasingly interested in results from behavioral economics and psychology to help frame decisions so that users can make better privacy and security choices. One such result in the literature suggests that cognitive disfluency (presenting questions in a hard-to-read font) reduces self-disclosure. (A. L. Alter and D. M. Oppenheimer. Suppressing secrecy through metacognitive ease cognitive fluency encourages self-disclosure. Psychological science, 20(11):1414-1420, 2009) Aim. To examine the replicability and reliability of the effect of disfluency on self-disclosure, in order to test whether such approaches might be used to promote safer security and privacy behaviors. …