Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2008

Selected Works

Computer Sciences

Institution
Keyword
Publication
File Type

Articles 1 - 30 of 153

Full-Text Articles in Physical Sciences and Mathematics

Ssrn As An Initial Revolution In Academic Knowledge Aggregation And Dissemination, David Bray, Sascha Vitzthum, Benn Konsynski Jan 2010

Ssrn As An Initial Revolution In Academic Knowledge Aggregation And Dissemination, David Bray, Sascha Vitzthum, Benn Konsynski

Sascha Vitzthum

Within this paper we consider our results of using the Social Science Research Network (SSRN) over a period of 18 months to distribute our working papers to the research community. Our experiences have been quite positive, with SSRN serving as a platform both to inform our colleagues about our research as well as inform us about related research (through email and telephoned conversations of colleagues who discovered our paper on SSRN). We then discuss potential future directions for SSRN to consider, and how SSRN might well represent an initial revolution in 21st century academic knowledge aggregation and dissemination. Our paper …


A Mobile Agent-Supported Web Services Testing Platform, Jia Zhang, Di Xu Nov 2008

A Mobile Agent-Supported Web Services Testing Platform, Jia Zhang, Di Xu

Jia Zhang

No abstract provided.


Towards Self-Organizing, Smart Business Networks: Let’S Create ‘Life’ From Inert Information, David Bray, Benn Konsynski Nov 2008

Towards Self-Organizing, Smart Business Networks: Let’S Create ‘Life’ From Inert Information, David Bray, Benn Konsynski

David A. Bray

We review three different theories that can inform how researchers can determine the performance of smart business networks, to include: (1) the Theory of Evolution, (2) the Knowledge-Based Theory of the Firm, and (3) research insights into computers and cognition. We suggest that each of these theories demonstrate that to be generally perceived as smart, an organism needs to be self-organizing, communicative, and tool-making. Consequentially, to determine the performance of a smart business network, we suggest that researchers need to determine the degree to which it is self-organizing, communicative, and tool-making. We then relate these findings to the Internet and …


Networking, William Osei-Poku Nov 2008

Networking, William Osei-Poku

William Osei-Poku

No abstract provided.


Player Guild Dynamics And Evolution In Massively Multiplayer Online Games, Chien Hsun Chen, J. L. Hsieh, C. T. Sun Nov 2008

Player Guild Dynamics And Evolution In Massively Multiplayer Online Games, Chien Hsun Chen, J. L. Hsieh, C. T. Sun

Chien Hsun Chen

In the latest versions of massively multiplayer online games (MMOGs), developers have purposefully made guilds part of game environments. Guilds represent a powerful method for giving players a sense of online community, but there is little quantitative data on guild dynamics. To address this topic, we took advantage of a feature found in one of today’s most popular MMOGs (World of Warcraft) to collect in-game data: user interfaces that players can modify and refine. In addition to collecting data on in-game player activities, we used this feature to observe and investigate how players join and leave guilds. Data were analyzed …


Leading Firms As Knowledge Gatekeepers In A Networked Environment, Deogratias Harorimana Mr Nov 2008

Leading Firms As Knowledge Gatekeepers In A Networked Environment, Deogratias Harorimana Mr

Dr Deogratias Harorimana

This chapter introduces the role of the knowledge gatekeeper as a mechanism by which knowledge is created and transferred in a networked environment. Knowledge creation and transfer are essential for building a knowledge based economy. The chapter considers obstacles that inhibit this process and argues that leading firms create a shared socio-cultural context that enables the condivision of tacit meanings and codification of knowledge. Leading firms act as gatekeepers of knowledge through the creation of shared virtual platforms. There will be a leading firm that connects several networks of clients and suppliers may not interact directly with one another, but …


Spatio-Temporal Efficiency In A Taxi Dispatch System, Darshan Santani, Rajesh Krishna Balan, C. Jason Woodard Sep 2008

Spatio-Temporal Efficiency In A Taxi Dispatch System, Darshan Santani, Rajesh Krishna Balan, C. Jason Woodard

C. Jason Woodard

In this paper, we present an empirical analysis of the GPS-enabled taxi dispatch system used by the world’s second largest land transportation company. We first summarize the collective dynamics of the more than 6,000 taxicabs in this fleet. Next, we propose a simple method for evaluating the efficiency of the system over a given period of time and geographic zone. Our method yields valuable insights into system performance—in particular, revealing significant inefficiencies that should command the attention of the fleet operator. For example, despite the state of the art dispatching system employed by the company, we find imbalances in supply …


Model-Driven Performance Analysis, Gabriel A. Moreno, Paulo Merson Sep 2008

Model-Driven Performance Analysis, Gabriel A. Moreno, Paulo Merson

Gabriel A. Moreno

Model-Driven Engineering (MDE) is an approach to develop software systems by creating models and applying automated transformations to them to ultimately generate the implementation for a target platform. Although the main focus of MDE is on the generation of code, it is also necessary to support the analysis of the designs with respect to quality attributes such as performance. To complement the model-to-implementation path of MDE approaches, an MDE tool infrastructure should provide what we call model-driven analysis. This paper describes an approach to model-driven analysis based on reasoning frameworks. In particular, it describes a performance reasoning framework that can …


Transcriptional Responses To Estrogen And Progesterone In Mammary Gland Identify Networks Regulating P53 Activity, Shaolei Lu, Klaus A. Becker, Mary J. Hagen, Haoheng Yan, Amy L. Roberts, Lesley A. Mathews, Sallie S. Schneider, Hava Siegelmann, Kyle J. Macbeth, Stephen M. Tirrell, Jeffrey L. Blanchard, D. Joseph Jerry Sep 2008

Transcriptional Responses To Estrogen And Progesterone In Mammary Gland Identify Networks Regulating P53 Activity, Shaolei Lu, Klaus A. Becker, Mary J. Hagen, Haoheng Yan, Amy L. Roberts, Lesley A. Mathews, Sallie S. Schneider, Hava Siegelmann, Kyle J. Macbeth, Stephen M. Tirrell, Jeffrey L. Blanchard, D. Joseph Jerry

Hava Siegelmann

Estrogen and progestins are essential for mammary growth and differentiation but also enhance the activity of the p53 tumor suppressor protein in the mammary epithelium. However, the pathways by which these hormones regulate p53 activity are unknown. Microarrays were used to profile the transcriptional changes within the mammary gland after administration of either vehicle, 17β-estradiol (E), or progesterone (P) individually and combined (EP). Treatment with EP yielded 1182 unique genes that were differentially expressed compared to the vehicle-treated group. Although 30% of genes were responsive to either E or P individually, combined treatment with both EP had a synergistic effect …


Word Sense Disambiguation In Biomedical Ontologies With Term Co-Occurrence Analysis And Document Clustering, Bill Andreopoulos, Dimitra Alexopoulou, Michael Schroeder Sep 2008

Word Sense Disambiguation In Biomedical Ontologies With Term Co-Occurrence Analysis And Document Clustering, Bill Andreopoulos, Dimitra Alexopoulou, Michael Schroeder

William B. Andreopoulos

With more and more genomes being sequenced, a lot of effort is devoted to their annotation with terms from controlled vocabularies such as the GeneOntology. Manual annotation based on relevant literature is tedious, but automation of this process is difficult. One particularly challenging problem is word sense disambiguation. Terms such as |development| can refer to developmental biology or to the more general sense. Here, we present two approaches to address this problem by using term co-occurrences and document clustering. To evaluate our method we defined a corpus of 331 documents on development and developmental biology. Term co-occurrence analysis achieves an …


Two-Phase Simulation Optimisation Procedure With Applications To Multi-Echelon Cyclic Planning, Galina Merkuryeva, Liana Napalkova Sep 2008

Two-Phase Simulation Optimisation Procedure With Applications To Multi-Echelon Cyclic Planning, Galina Merkuryeva, Liana Napalkova

Liana Napalkova

No abstract provided.


A Context-Driven Content Adaptation Planner For Improving Mobile Internet Accessibility, Stephen Yang, Jia Zhang, Angus Huang, Jeffrey Tsai, Philip Yu Aug 2008

A Context-Driven Content Adaptation Planner For Improving Mobile Internet Accessibility, Stephen Yang, Jia Zhang, Angus Huang, Jeffrey Tsai, Philip Yu

Jia Zhang

This paper presents our design and development of a context-driven content adaptation planner, which dynamically transforms requested Web content into a proper format conforming to receiving contexts (e.g., access condition, network connection, and receiving device). Aiming to establish a semantic foundation for content adaptation, we apply description logics (DLs) to formally define context profiles and requirements and automate content adaptation decision. In addition, the computational overhead caused by content adaptation can be moderately decreased through the reduction of the size of adapted content


Design And Development Of A University-Oriented Personalizable Web 2.0 Mashup Portal, Jia Zhang, Momtazul Karim, Karthik Akula, Raghu Ariga Aug 2008

Design And Development Of A University-Oriented Personalizable Web 2.0 Mashup Portal, Jia Zhang, Momtazul Karim, Karthik Akula, Raghu Ariga

Jia Zhang

This paper reports several key challenges and solutions when we apply Web 2.0 mashup technology to build a university-oriented services portal. A two-layer mashup service model is proposed as the underlying basis to support multiple granularities of services mashup. We explore a caching technique to facilitate personalizable services requests. We also report our preliminary practice of exploiting Facebook as a social relationship data source


A Heuristic Scheduling Scheme In Multiuser Ofdma Networks, Zheng Sun, Zhiqiang He, Ruochen Wang, Kai Niu Aug 2008

A Heuristic Scheduling Scheme In Multiuser Ofdma Networks, Zheng Sun, Zhiqiang He, Ruochen Wang, Kai Niu

Zheng Sun

Conventional heterogeneous-traffic scheduling schemes utilize zero-delay constraint for real-time services, which aims to minimize the average packet delay among real-time users. However, in light or moderate load networks this strategy is unnecessary and leads to low data throughput for non-real-time users. In this paper, we propose a heuristic scheduling scheme to solve this problem. The scheme measures and assigns scheduling priorities to both real-time and non-real-time users, and schedules the radio resources for the two user classes simultaneously. Simulation results show that the proposed scheme efficiently handles the heterogeneous-traffic scheduling with diverse QoS requirements and alleviates the unfairness between real-time …


Using Bayesian Networks For Candidate Generation In Consistency-Based Diagnosis, Sriram Narasimhan, Ole J. Mengshoel Aug 2008

Using Bayesian Networks For Candidate Generation In Consistency-Based Diagnosis, Sriram Narasimhan, Ole J. Mengshoel

Ole J Mengshoel

Consistency-based diagnosis relies on the computation of discrepancies between model predictions and sensor observations. The traditional assumption that these discrepancies can be detected accurately (by means of thresholding for example) is in many cases reasonable and leads to strong performance. However, in situations of substantial uncertainty (due, for example, to sensor noise or model abstraction), more robust schemes need to be designed to make a binary decision on whether predictions are consistent with observations or not. However, if an accurate binary decision is not made, there are risks of occurrence of false alarms and missed alarms. Moreover when multiple sensors …


Überveillance: 24/7 X 365 People Tracking & Monitoring, Mg. Michael, K. Michael Jul 2008

Überveillance: 24/7 X 365 People Tracking & Monitoring, Mg. Michael, K. Michael

Associate Professor Katina Michael

No abstract provided.


Australia And The New Technologies: Towards Evidence Based Policy In Public Administration, K. Michael, M. G. Michael Jul 2008

Australia And The New Technologies: Towards Evidence Based Policy In Public Administration, K. Michael, M. G. Michael

Professor Katina Michael

This workshop addresses the application of evidence based policy in public administration. It specifically focuses on the issue of new technologies in the form of product and process innovations rolled out in Australia since major international events (e.g. Sept 11, Boxing Day Tsunami, Avian Flu outbreak). These product and process innovations introduced for the ‘common good’ are usually mandated by government agencies, designed and implemented by private business, and obligatorily adopted by citizens in the name of national security. The workshop investigates how information is gathered, processed and disseminated to provide evidence toward policy making. What qualitative and quantitative methods …


Überveillance: 24/7 X 365 People Tracking & Monitoring, Mg. Michael, K. Michael Jul 2008

Überveillance: 24/7 X 365 People Tracking & Monitoring, Mg. Michael, K. Michael

M. G. Michael

No abstract provided.


Enhancing The Face Of Service-Oriented Capabilities, Kym J. Pohl, Jens G. Pohl Jul 2008

Enhancing The Face Of Service-Oriented Capabilities, Kym J. Pohl, Jens G. Pohl

Jens G. Pohl

With today’s focus toward discoverable web services, Service-Oriented Architectures (SOA) are becoming increasingly prevalent. To support an effective interaction between services and their clientele, the sophistication of the interface, or face, such services present is of critical importance. Without a rich, expressive nature, such services struggle to satisfy the industry promises of reuse, composability, and reduced inter-component dependencies. Especially relevant for domain-oriented applications, services must present sufficient levels of expression to allow for an effective exchange of relevant context. Further, such communication should be offered in an asynchronous manner to promote both work flow efficiency and limited coupling. This paper …


The Round Table Model: A Web-Oriented, Agent-Based Approach To Decision-Support Applications, Kym J. Pohl, Jens G. Pohl Jul 2008

The Round Table Model: A Web-Oriented, Agent-Based Approach To Decision-Support Applications, Kym J. Pohl, Jens G. Pohl

Jens G. Pohl

Not unlike King Arthur relying on the infamous Round Table as the setting for consultation with his most trusted experts, agent-based, decision-support systems provide human decision makers with a means of solving complex problems through collaboration with collections of both human and computer-based expert agents. The Round Table Framework provides a formalized architecture together with a set of development and execution tools which can be utilized to design, develop, and execute agent-based, decision-support applications. Based on a three-tier architecture, Round Table incorporates forefront technologies including distributed-object servers, inference engines, and web-based presentation to provide a framework for collaborative, agent-based decision …


Data, Information, And Knowledge In The Context Of Sils, Michael A. Zang, Jens G. Pohl Jul 2008

Data, Information, And Knowledge In The Context Of Sils, Michael A. Zang, Jens G. Pohl

Jens G. Pohl

Data, information, and knowledge are becoming increasingly common terms in the literature of the software industry. This terminology originated some time ago in the disciplines of cognitive science and artificial intelligence to reference three closely related but distinct concepts. Traditionally, mainstream software engineering has lumped all three concepts together as data and has only recently begun to distinguish between them. Unfortunately, the popular desire to distinguish between data, information, and knowledge within the mainstream has blurred the individual meanings of the words to the point where there is no longer a clear-cut distinction between them for most people. This problem …


The Value Of Ontology-Based, Service-Oriented, Distributed Systems In A High Bandwidth Environment, Steven J. Gollery, Jens G. Pohl Jul 2008

The Value Of Ontology-Based, Service-Oriented, Distributed Systems In A High Bandwidth Environment, Steven J. Gollery, Jens G. Pohl

Jens G. Pohl

No abstract provided.


The Paradigm Shift In Transnational Organised Crime, K. Michael Jul 2008

The Paradigm Shift In Transnational Organised Crime, K. Michael

Associate Professor Katina Michael

The definition of “organized crime” remains contentious because it has meant different things to different stakeholders over time. Does “organized crime” refer to illegal activities, relations between illegal organizations, how actors work together to engage in crimes, the infrastructure supporting crimes, or to the bricks and mortar of an illegal organization? Depending on the definition embraced by a stakeholder, their unit of analysis (eg crime group under investigation), and the particular time the study was conducted, an analyst may well be led to believe that some organized crime is really “disorganized” in nature. The two typologies of “organized” versus “disorganized” …


Unraveling Protein Networks With Power Graph Analysis, Loïc Royer, Matthias Reimann, Bill Andreopoulos, Michael Schroeder Jul 2008

Unraveling Protein Networks With Power Graph Analysis, Loïc Royer, Matthias Reimann, Bill Andreopoulos, Michael Schroeder

William B. Andreopoulos

Networks play a crucial role in computational biology, yet their analysis and representation is still an open problem. Power Graph Analysis is a lossless transformation of biological networks into a compact, less redundant representation, exploiting the abundance of cliques and bicliques as elementary topological motifs. We demonstrate with five examples the advantages of Power Graph Analysis. Investigating protein-protein interaction networks, we show how the catalytic subunits of the casein kinase II complex are distinguishable from the regulatory subunits, how interaction profiles and sequence phylogeny of SH3 domains correlate, and how false positive interactions among high-throughput interactions are spotted. Additionally, we …


Modeling Of Fermentation Processes Using Online Kernel Learning Algorithm, Yi Liu Jul 2008

Modeling Of Fermentation Processes Using Online Kernel Learning Algorithm, Yi Liu

Dr. Yi Liu

No abstract provided.


Adaptive Control Of A Class Of Nonlinear Discrete-Time Systems With Online Kernel Learning, Yi Liu Jul 2008

Adaptive Control Of A Class Of Nonlinear Discrete-Time Systems With Online Kernel Learning, Yi Liu

Dr. Yi Liu

No abstract provided.


Report Of The Commission To Assess The Threat To The United States From Emp Attack: Critical National Infrastructures, William R. Graham Jul 2008

Report Of The Commission To Assess The Threat To The United States From Emp Attack: Critical National Infrastructures, William R. Graham

George H Baker

The physical and social fabric of the United States is sustained by a system of systems; a complex and dynamic network of interlocking and interdependent infrastructures (“critical national infrastructures”) whose harmonious functioning enables the myriad actions, transactions, and information flow that undergird the orderly conduct of civil society in this country. The vulnerability of these frastructures to threats — deliberate, accidental, and acts of nature — is the focus of greatly heightened concern in the current era, a process accelerated by the events of 9/11 and recent hurricanes, including Katrina and Rita. This report presents the results of the Commission’s …


Modeling Of Fermentation Processes Using Online Kernel Learning Algorithm, Yi Liu, Haiqing Wang, Ping Li Jul 2008

Modeling Of Fermentation Processes Using Online Kernel Learning Algorithm, Yi Liu, Haiqing Wang, Ping Li

Dr. Yi Liu

A novel online identification method is developed for nonlinear multi-input multi-output process modeling issue, which is based on kernel learning framework and named as online kernel learning (OKL) algorithm in this paper. This proposed approach can adaptively control its complexity and thus acquire controlled generalization ability. The OKL algorithm performs first a forward increasing for incorporating a “new” online sample and then a backward decreasing for pruning an “old” one, both in a recursive manner. Furthermore, the prior knowledge about process can be easily integrated into the OKL scheme to improve its performance. Numerical simulations on a fed-batch penicillin fermentation …


Autonomous Geometric Precision Error Estimation In Low-Level Computer Vision Tasks, Andrés Corrada-Emmanuel, Howard Schultz Jul 2008

Autonomous Geometric Precision Error Estimation In Low-Level Computer Vision Tasks, Andrés Corrada-Emmanuel, Howard Schultz

Andrés Corrada-Emmanuel

Errors in map-making tasks using computer vision are sparse. We demonstrate this by considering the construction of digital elevation models that employ stereo matching algorithms to triangulate real-world points. This sparsity, coupled with a geometric theory of errors recently developed by the authors, allows for autonomous agents to calculate their own precision independently of ground truth. We connect these developments with recent advances in the mathematics of sparse signal reconstruction or compressed sensing. The theory presented here extends the autonomy of 3-D model reconstructions discovered in the 1990s to their errors.


Cyberspace Governance In The People’S Republic Of China, Kam C. Wong Jul 2008

Cyberspace Governance In The People’S Republic Of China, Kam C. Wong

Kam C. Wong

This project investigates into and reports upon computer related crime and control in China. Particularly, it investigates into the nature and extent of computer related crime in China and reports upon the effectiveness of legal measures addressing computer related crime. This research project is a first attempt to study cyberspace governance and Internet regulations in China with indigenous PRC data and from a China perspective