Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

Computer Sciences

2015

Internet

Articles 1 - 4 of 4

Full-Text Articles in Physical Sciences and Mathematics

3d Virtual Worlds And The Metaverse: Current Status And Future Possibilities, John David N. Dionisio, William G. Burns Iii, Richard Gilbert Aug 2015

3d Virtual Worlds And The Metaverse: Current Status And Future Possibilities, John David N. Dionisio, William G. Burns Iii, Richard Gilbert

John David N. Dionisio

Moving from a set of independent virtual worlds to an integrated network of 3D virtual worlds or Metaverse rests on progress in four areas: immersive realism, ubiquity of access and identity, interoperability, and scalability. For each area, the current status and needed developments in order to achieve a functional Metaverse are described. Factors that support the formation of a viable Metaverse, such as institutional and popular interest and ongoing improvements in hardware performance, and factors that constrain the achievement of this goal, including limits in computational methods and unrealized collaboration among virtual world stakeholders and developers, are also considered.


Technology Professional Development: Long-Term Effects On Teacher Self-Efficacy, George Watson Jul 2015

Technology Professional Development: Long-Term Effects On Teacher Self-Efficacy, George Watson

George R Watson

The West Virginia K-12 RuralNet Project was an NSF funded program to train inservice teachers on integrating the Internet into science and mathematics curriculum. The program involved training inservice teachers through an intensive summer workshop and supplemental online courses. This study examines the effects of the project on the long-term self-efficacy of inservice teachers and their use of the Internet in the classroom. The specific research questions addressed are: Do professional development programs affect the long-term self-efficacy of inservice teachers? Did the addition of online courses and follow-up to the program affect self-efficacy levels? Finally, do certain external factors, specifically …


Robust Lifetime Measurement In Large-Scale P2p Systems With Non-Stationary Arrivals, Xiaoming Wang, Zhongmei Yao, Yueping Zhang, Dmitri Loguinov Jan 2015

Robust Lifetime Measurement In Large-Scale P2p Systems With Non-Stationary Arrivals, Xiaoming Wang, Zhongmei Yao, Yueping Zhang, Dmitri Loguinov

Zhongmei Yao

Characterizing user churn has become an important topic in studying P2P networks, both in theoretical analysis and system design. Recent work has shown that direct sampling of user lifetimes may lead to certain bias (arising from missed peers and round-off inconsistencies) and proposed a technique that estimates lifetimes based on sampled residuals. In this paper, however, we show that under non-stationary arrivals, which are often present in real systems, residual-based sampling does not correctly reconstruct user lifetimes and suffers a varying degree of bias, which in some cases makes estimation completely impossible. We overcome this problem using two contributions: a …


Stochastic Analysis Of Horizontal Ip Scanning, Derek Leonard, Zhongmei Yao, Xiaoming Wang, Dmitri Loguinov Jan 2015

Stochastic Analysis Of Horizontal Ip Scanning, Derek Leonard, Zhongmei Yao, Xiaoming Wang, Dmitri Loguinov

Zhongmei Yao

Intrusion Detection Systems (IDS) have become ubiquitous in the defense against virus outbreaks, malicious exploits of OS vulnerabilities, and botnet proliferation. As attackers frequently rely on host scanning for reconnaissance leading to penetration, IDS is often tasked with detecting scans and preventing them. However, it is currently unknown how likely an IDS is to detect a given Internet-wide scan pattern and whether there exist sufficiently fast scan techniques that can remain virtually undetectable at large-scale. To address these questions, we propose a simple analytical model for the window-expiration rules of popular IDS tools (i.e., Snort and Bro) and utilize a …