Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (29)
- Software Engineering (10)
- Social and Behavioral Sciences (6)
- Engineering (5)
- Administrative Law (3)
-
- Computer Engineering (3)
- Environmental Law (3)
- Environmental Policy (3)
- Environmental Sciences (3)
- Law (3)
- Natural Resources Law (3)
- Natural Resources Management and Policy (3)
- Natural Resources and Conservation (3)
- Oceanography and Atmospheric Sciences and Meteorology (3)
- Oil, Gas, and Energy (3)
- Oil, Gas, and Mineral Law (3)
- Public Affairs, Public Policy and Public Administration (3)
- State and Local Government Law (3)
- Civil and Environmental Engineering (2)
- Climate (2)
- Databases and Information Systems (2)
- Energy Policy (2)
- Energy and Utilities Law (2)
- Graphics and Human Computer Interfaces (2)
- Information Security (2)
- Library and Information Science (2)
- Life Sciences (2)
- Other Computer Sciences (2)
- Physics (2)
- Institution
-
- Singapore Management University (6)
- Brigham Young University (3)
- Syracuse University (3)
- The University of Akron (3)
- University of Colorado Law School (3)
-
- Bridgewater College (2)
- California Polytechnic State University, San Luis Obispo (2)
- Old Dominion University (2)
- Center for the Blue Economy (1)
- Clemson University (1)
- Grand Valley State University (1)
- Loyola University Chicago (1)
- Sacred Heart University (1)
- Selected Works (1)
- University for Business and Technology in Kosovo (1)
- Western Kentucky University (1)
- Western University (1)
- Zayed University (1)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (5)
- Northeast Parallel Architecture Center (3)
- Theses and Dissertations (3)
- Williams Honors College, Honors Research Projects (3)
- ASPIRE 2024 (1)
-
- All Theses (1)
- All Works (1)
- Benefits of Ocean Observing Catalog (BOOC) (1)
- Best Management Practices and Adaptive Management in Oil and Gas Development (May 12-13) (1)
- Computer Engineering (1)
- Computer Science Faculty Publications (1)
- Computer Science Theses & Dissertations (1)
- Computer Science and Software Engineering (1)
- Computer Science: Faculty Publications and Other Works (1)
- Culminating Experience Projects (1)
- Electronic Thesis and Dissertation Repository (1)
- Getting a Handle on Hazardous Waste Control (Summer Conference, June 9-10) (1)
- Honors Projects (1)
- Konstantin Läufer (1)
- Mahurin Honors College Capstone Experience/Thesis Projects (1)
- Opportunities and Obstacles to Reducing the Environmental Footprint of Natural Gas Development in Uintah Basin (October 14) (1)
- Research Collection Library (1)
- School of Computer Science & Engineering Undergraduate Publications (1)
- UBT International Conference (1)
- Publication Type
Articles 1 - 30 of 34
Full-Text Articles in Physical Sciences and Mathematics
The Social Pot: A Social Media Application, Reid Long
The Social Pot: A Social Media Application, Reid Long
Honors Projects
The Social Pot is a web application that allows a user to post to Instagram and X simultaneously from one place. The user creates a Social Pot Account and from there can set their Instagram username and password within the home page. Once the user attempts to post, it will redirect them to login to X which once successful will make the tweet. Used the API 'instagram-private-api'. User needed to give access to my X Project which in turn gave an Auth token (via X redirect URL). The auth token was then sent to my endpoint in order to get …
The Social Pot: A Social Media Application, Reid Long
The Social Pot: A Social Media Application, Reid Long
ASPIRE 2024
The Social Pot is a web application that allows a user to post to Instagram and X simultaneously from one place. The user creates a Social Pot Account and from there can set their Instagram username and password within the home page. Once the user attempts to post, it will redirect them to login to X which once successful will make the tweet. Used the API 'instagram-private-api'. User needed to give access to my X Project which in turn gave an Auth token (via X redirect URL). The auth token was then sent to my endpoint in order to get …
Booc Api Test, Anthony Castellletto
Booc Api Test, Anthony Castellletto
Benefits of Ocean Observing Catalog (BOOC)
This is just a test to see if I can read data from a published case through the Digital Commons API. Just ignore this case.
Tony Castelletto
Personalized Health Care In A Data-Driven Era: A Post–Covid-19 Retrospective, Arnob Zahid, Ravishankar Sharma
Personalized Health Care In A Data-Driven Era: A Post–Covid-19 Retrospective, Arnob Zahid, Ravishankar Sharma
All Works
No abstract provided.
Discord Api Wrapper, Joshua Brown
Discord Api Wrapper, Joshua Brown
Williams Honors College, Honors Research Projects
Discordwrap is a Python library that abstracts the Discord API so that developers can easily integrate their existing projects with Discord. This paper outlines Discordwrap's creation, from start to finish, including implementation as well as key design decisions, such as the decision to provide a functional library interface rather than an object-oriented one.
Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn
Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn
Culminating Experience Projects
This project applied software specification gathering, architecture, work planning, and development to a real-world development effort for a local business. This project began with a feasibility meeting with the owner of Zeal Aerial Fitness. After feasibility was assessed the intended users, needed functionality, and expected user restrictions were identified with the stakeholders. A hybrid software lifecycle was selected to allow a focus on base functionality up front followed by an iterative development of expectations of the stakeholders. I was able to create various specification diagrams that express the end projects goals to both developers and non-tech individuals using a standard …
Holistic Combination Of Structural And Textual Code Information For Context Based Api Recommendation, Chi Chen, Xin Peng, Zhengchang Xing, Jun Sun, Xin Wang, Yifan Zhao, Wenyun Zhao
Holistic Combination Of Structural And Textual Code Information For Context Based Api Recommendation, Chi Chen, Xin Peng, Zhengchang Xing, Jun Sun, Xin Wang, Yifan Zhao, Wenyun Zhao
Research Collection School Of Computing and Information Systems
Context based API recommendation is an important way to help developers find the needed APIs effectively and efficiently. For effective API recommendation, we need not only a joint view of both structural and textual code information, but also a holistic view of correlated API usage in control and data flow graph as a whole. Unfortunately, existing API recommendation methods exploit structural or textual code information separately. In this work, we propose a novel API recommendation approach called APIRec-CST (API Recommendation by Combining Structural and Textual code information). APIRec-CST is a deep learning model that combines the API usage with the …
On The Effectiveness Of Pretrained Models For Api Learning, Mohammad Abdul Hadi, Imam Nur Bani Yusuf, Thung Ferdian, Gia Kien Luong, Lingxiao Jiang, Fatemeh H. Fard, David Lo
On The Effectiveness Of Pretrained Models For Api Learning, Mohammad Abdul Hadi, Imam Nur Bani Yusuf, Thung Ferdian, Gia Kien Luong, Lingxiao Jiang, Fatemeh H. Fard, David Lo
Research Collection School Of Computing and Information Systems
Developers frequently use APIs to implement certain functionalities, such as parsing Excel Files, reading and writing text files line by line, etc. Developers can greatly benefit from automatic API usage sequence generation based on natural language queries for building applications in a faster and cleaner manner. Existing approaches utilize information retrieval models to search for matching API sequences given a query or use RNN-based encoder-decoder to generate API sequences. As it stands, the first approach treats queries and API names as bags of words. It lacks deep comprehension of the semantics of the queries. The latter approach adapts a neural …
Development Of Scent Detection And Categorization Algorithm Using Gas Chromatography And Machine Learning, Alex Driehaus
Development Of Scent Detection And Categorization Algorithm Using Gas Chromatography And Machine Learning, Alex Driehaus
Mahurin Honors College Capstone Experience/Thesis Projects
There are many looking to connect human senses to quantifiable data. Scents are categorized by their descriptions into scent families. These include citrus, floral, and woody. Similar descriptors designate similar families, while different descriptors correlate with different families. Dravnieks compiled an Atlas of chemical descriptors [1]. Such descriptors are cinnamon, fruity, and cadaverous. By analyzing the applicability of these descriptors, the chemicals will be sorted into their scent families.
Gas chromatography generates sample-specific signals of voltage over time. Chromatograms of known scents will serve as a basis for a convolutional neural network. This algorithm will be trained on these signals …
"More Than Deep Learning": Post-Processing For Api Sequence Recommendation, Chi Chen, Xin Peng, Bihuan Chen, Jun Sun, Zhenchang Xing, Xin Wang, Wenyun Zhao
"More Than Deep Learning": Post-Processing For Api Sequence Recommendation, Chi Chen, Xin Peng, Bihuan Chen, Jun Sun, Zhenchang Xing, Xin Wang, Wenyun Zhao
Research Collection School Of Computing and Information Systems
In the daily development process, developers often need assistance in finding a sequence of APIs to accomplish their development tasks. Existing deep learning models, which have recently been developed for recommending one single API, can be adapted by using encoder-decoder models together with beam search to generate API sequence recommendations. However, the generated API sequence recommendations heavily rely on the probabilities of API suggestions at each decoding step, which do not take into account other domain-specific factors (e.g., whether an API suggestion satisfies the program syntax and how diverse the API sequence recommendations are). Moreover, it is difficult for developers …
C2 Microservices Api: Ch4rl3sch4l3m4gn3, Thai H. Nguyễn
C2 Microservices Api: Ch4rl3sch4l3m4gn3, Thai H. Nguyễn
School of Computer Science & Engineering Undergraduate Publications
In the 21st century, cyber-based attackers such as advance persistent threats are leveraging bots in the form of botnets to conduct a plethora of cyber-attacks. While there are several social engineering techniques used to get targets to unknowingly download these bots, it is the command-and-control techniques advance persistent threats use to control their bots that is of critical interest to the author. In this research paper, the author aims to develop a command-and-control microservice application programming interface infrastructure to facilitate botnet command-and-control attack simulations. To achieve this the author will develop a simple bot skeletal framework, utilize the latest …
Symphas: A Modular Api For Phase-Field Modeling Using Compile-Time Symbolic Algebra, Steven A. Silber
Symphas: A Modular Api For Phase-Field Modeling Using Compile-Time Symbolic Algebra, Steven A. Silber
Electronic Thesis and Dissertation Repository
The phase-field method is a common approach to qualitative analysis of phase transitions. It allows visualizing the time evolution of a phase transition, providing valuable insight into the underlying microstructure and the dynamical processes that take place. Although the approach is applied in a diverse range of fields, from metal-forming to cardiac modelling, there are a limited number of software tools available that allow simulating any phase-field problem and that are highly accessible. To address this, a new open source API and software package called SymPhas is developed for simulating phase-field and phase-field crystal in 1-, 2- and 3-dimensions. Phase-field …
Secure Self-Checkout Kiosks Using Alma Api With Two-Factor Authentication, Ron Bulaon
Secure Self-Checkout Kiosks Using Alma Api With Two-Factor Authentication, Ron Bulaon
Research Collection Library
Self-checkout kiosks have become a staple feature of many modern and digitized libraries. These devices are used by library patrons for self-service item loans. Most implementations are not new, in fact many of these systems are simple, straight forward and work as intended. But behind this useful technology, there is a security concern on authentication that has to be addressed.
In my proposed presentation, I will discuss the risk factors of self-checkout kiosks and propose a solution using Alma APIs. I will address the technical shortcomings of the current implementations, compared to the proposed solution, and where the weakest link …
Online Marketplace, Devin Hopkins
Online Marketplace, Devin Hopkins
Williams Honors College, Honors Research Projects
The goal of this project was to create a website that helped a common person search for items from online marketplaces, such as eBay, Amazon, or Facebook Marketplace. The intention was to ease the burden of needing to search several different websites for the same product. Currently, if a person wants to look for a specific item on multiple different marketplaces, they must go to each marketplace individually and search for it. They must enter their specifications repeatedly and load virtually the same web page multiple times. This project’s goal was to condense that so the user would only have …
Oauth2.0 In Securing Apis, Olimpion Shurdi, Aleksander Biberaj, Igli Tafa, Genci Mesi
Oauth2.0 In Securing Apis, Olimpion Shurdi, Aleksander Biberaj, Igli Tafa, Genci Mesi
UBT International Conference
Today’s modern applications are mostly designed around API’s. API’s are used for a variety of things such as passing data to another webservice reading data from a database etc. The problem with this is that not all the API’s are secure. Most of the today’s API’s are old and rely only on an authentication token where the user data often had to share their credentials with the application to enable such an API call on their behalf or string them, which is often hardcoded. We will focus on OAUTH 2.0 as new protocol in securing our API’s. This is a …
Smartcitecon: Implicit Citation Context Extraction From Academic Literature Using Unsupervised Learning, Chenrui Gao, Haoran Cui, Li Zhang, Jiamin Wang, Wei Lu, Jian Wu
Smartcitecon: Implicit Citation Context Extraction From Academic Literature Using Unsupervised Learning, Chenrui Gao, Haoran Cui, Li Zhang, Jiamin Wang, Wei Lu, Jian Wu
Computer Science Faculty Publications
We introduce SmartCiteCon (SCC), a Java API for extracting both explicit and implicit citation context from academic literature in English. The tool is built on a Support Vector Machine (SVM) model trained on a set of 7,058 manually annotated citation context sentences, curated from 34,000 papers in the ACL Anthology. The model with 19 features achieves F1=85.6%. SCC supports PDF, XML, and JSON files out-of-box, provided that they are conformed to certain schemas. The API supports single document processing and batch processing in parallel. It takes about 12–45 seconds on average depending on the format to process a …
The Security Layer, Mark Thomas O'Neill
The Security Layer, Mark Thomas O'Neill
Theses and Dissertations
Transport Layer Security (TLS) is a vital component to the security ecosystem and the most popular security protocol used on the Internet today. Despite the strengths of the protocol, numerous vulnerabilities result from its improper use in practice. Some of these vulnerabilities arise from weaknesses in authentication, from the rigidity of the trusted authority system to the complexities of client certificates. Others result from the misuse of TLS by developers, who misuse complicated TLS libraries, improperly validate server certificates, employ outdated cipher suites, or deploy other features insecurely. To make matters worse, system administrators and users are powerless to fix …
A Large-Scale Analysis Of How Openssl Is Used In Open-Source Software, Scott Jared Heidbrink
A Large-Scale Analysis Of How Openssl Is Used In Open-Source Software, Scott Jared Heidbrink
Theses and Dissertations
As vulnerabilities become more common the security of applications are coming under increased scrutiny. In regards to Internet security, recent work discovers that many vulnerabilities are caused by TLS library misuse. This misuse is attributed to large and confusing APIs and developer misunderstanding of security generally. Due to these problems there is a desire for simplified TLS libraries and security handling. However, as of yet there is no analysis of how the existing APIs are used, beyond how incorrect usage motivates the need to replace them. We provide an analysis of contemporary usage of OpenSSL across 410 popular secure applications. …
Design And Implementation Of Triveni: A Process-Algebraic Api For Threads + Events, Christopher P. Colby, Lalita Jategaonkar Jagaeesan, Radhakrishnan Jagadeesan, Konstantin Laufer, Carlos Puchol
Design And Implementation Of Triveni: A Process-Algebraic Api For Threads + Events, Christopher P. Colby, Lalita Jategaonkar Jagaeesan, Radhakrishnan Jagadeesan, Konstantin Laufer, Carlos Puchol
Konstantin Läufer
We describe Triveni, a framework and API for integrating threads and events. The design of Triveni is based on an algebra, including preemption combinators, of processes. Triveni is compatible with existing threads standards, such as Pthreads and Java threads, and with the event models structured on the Observer pattern. We describe the software architecture and algorithms underlying a concrete implementation of Triveni in Java. This environment includes specification based testing of safety properties. The results described in the paper have been used to integrate process-algebraic methods into (concurrent) object orientated programming.
Iphone Swift 3 Development For “What’S Good?”, Cameron Reilly
Iphone Swift 3 Development For “What’S Good?”, Cameron Reilly
Williams Honors College, Honors Research Projects
Cameron Reilly
Major: Computer Science Management Track
Project Sponsor: Michael Collard
What’s Good?
“What’s Good?” is an iOS application that uses augmented reality to present information about nearby restaurants to the user in real time. Users can hold up their device and look through their camera to see information presented above the restaurant including it’s name, average cost, and average review rating. The user’s location is gathered and used in tandem with the Zomato API to select what data display as those dining locations are currently near the user. Using the gyroscope, compass, and accelerometer to tell the exact orientation …
Api Recommendation System For Software Development, Ferdian Thung
Api Recommendation System For Software Development, Ferdian Thung
Research Collection School Of Computing and Information Systems
Nowadays, software developers often utilize existing third party libraries and make use of Application Programming Interface (API) to develop a software. However, it is not always obvious which library to use or whether the chosen library will play well with other libraries in the system. Furthermore, developers need to spend some time to understand the API to the point that they can freely use the API methods and putting the right parameters inside them. In this work, I plan to automatically recommend relevant APIs to developers. This API recommendation can be divided into multiple stages. First, we can recommend relevant …
Simple Macro: Addon For World Of Warcraft, Yemane Gebreyesus
Simple Macro: Addon For World Of Warcraft, Yemane Gebreyesus
Computer Engineering
This senior project was started to try and solve a problem within World of Warcraft. That particular problem is the underdeveloped default macro interface, which Simple Macro aims to remedy by creating a more user-friendly interface that is accessible by a wider audience. It employs a click through method of accessing and editing data to reduce the amount of typing necessary. The addon also has a feature to specifically help players that want to change a target in certain groups of macros all at once. The project was developed in both Lua and XML.
Meshpotato: A C++/Python Api For Production Volumetric Rendering, Kevin Coley
Meshpotato: A C++/Python Api For Production Volumetric Rendering, Kevin Coley
All Theses
MeshPotato is a production volume rendering API written in C++. Its purpose is to simplify the creation of high quality volumetric effects such as fire, smoke, clouds and explosions. MeshPotato has been designed to be extensible and flexible for quick changes. Python bindings have been implemented with this library to allow for tools that are scripted and integrated within popular 3D modeling applications such as Maya and Houdini. The design of MeshPotato is discussed along with its plugin system, volume rendering API and some results from using the tool.
Web Archive Services Framework For Tighter Integration Between The Past And Present Web, Ahmed Alsum
Web Archive Services Framework For Tighter Integration Between The Past And Present Web, Ahmed Alsum
Computer Science Theses & Dissertations
Web archives have contained the cultural history of the web for many years, but they still have a limited capability for access. Most of the web archiving research has focused on crawling and preservation activities, with little focus on the delivery methods. The current access methods are tightly coupled with web archive infrastructure, hard to replicate or integrate with other web archives, and do not cover all the users' needs. In this dissertation, we focus on the access methods for archived web data to enable users, third-party developers, researchers, and others to gain knowledge from the web archives. We build …
Modeler: Web Api Modeling Tool, Yegor Pomortsev
Modeler: Web Api Modeling Tool, Yegor Pomortsev
Computer Science and Software Engineering
This report presents the API Modeler system, a tool for creating and modifying web APIs models, within the context of the API modeling problem, and how it serves to solve several common use-cases and scenarios for interacting with web API models. The report describes the motivation for Modeler, its design and implementation, related tools, and possible future improvements to the system.
Drop-In Concurrent Api Replacement For Exploration, Test, And Debug, Everett Allen Morse
Drop-In Concurrent Api Replacement For Exploration, Test, And Debug, Everett Allen Morse
Theses and Dissertations
Complex concurrent APIs are difficult to reason about annually due to the exponential growth in the number of feasible schedules. Testing against reference solutions of these APIs is equally difficult as reference solutions implement an unknown set of allowed behaviors, and programmers have no way to directly control schedules or API internals to expose or reproduce errors. The work in this paper mechanically generates a drop-in replacement for a concurrent API from a formal specification. The specification is a guarded command system with first-order logic that is compiled into a core calculus. The term rewriting system is connected to actual …
Slides: Drilling Waste, Blake Scott
Slides: Drilling Waste, Blake Scott
Opportunities and Obstacles to Reducing the Environmental Footprint of Natural Gas Development in Uintah Basin (October 14)
Presenter: Blake Scott, Scott Environmental Services, Inc.
24 slides
Innovation In The Programmable Web: Characterizing The Mashup Ecosystem, C. Jason Woodard, Shuli Yu
Innovation In The Programmable Web: Characterizing The Mashup Ecosystem, C. Jason Woodard, Shuli Yu
Research Collection School Of Computing and Information Systems
This paper investigates the structure and dynamics of the Web 2.0 software ecosystem by analyzing empirical data on web service APIs and mashups. Using network analysis tools to visualize the growth of the ecosystem from December 2005 to 2007, we find that the APIs are organized into three tiers, and that mashups are often formed by combining APIs across tiers. Plotting the cumulative distribution of mashups to APIs reveals a power-law relationship, although the tail is short compared to previously reported distributions of book and movie sales. While this finding highlights the dominant role played by the most popular APIs …
Slides: Nepa And Adaptive Management, Denise A. Dragoo
Slides: Nepa And Adaptive Management, Denise A. Dragoo
Best Management Practices and Adaptive Management in Oil and Gas Development (May 12-13)
Presenter: Denise A. Dragoo, Partner, Snell & Wilmer L.L.P., Salt Lake City, UT
22 slides
Mpijava: An Object-Oriented Java Interface To Mpi, Mark Baker, Bryan Carpenter, Geoffrey C. Fox, Sung Hoon Ko
Mpijava: An Object-Oriented Java Interface To Mpi, Mark Baker, Bryan Carpenter, Geoffrey C. Fox, Sung Hoon Ko
Northeast Parallel Architecture Center
A basic prerequisite for parallel programming is a good communication API. The recent interest in using Java for scientific and engineering application has led to several international efforts to produce a message passing interface to support parallel computation. In this paper we describe and then discuss the syntax, functionality and performance of one such interface, mpiJava, an object-oriented Java interface to MPI. We first discuss the design of the mpiJava API and the issues associated with its development. We then move on to briefly outline the steps necessary to 'port' mpiJava onto a range of operating systems, including Windows NT, …