Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Computer Sciences

Hail Detection Using Dual Polarization Weather Radar, Alfonso Ladino Rincon Aug 2020

Hail Detection Using Dual Polarization Weather Radar, Alfonso Ladino Rincon

English Language Institute

This poster highlights how active remote sensors such as weather radar are completely useful for hail detection given its feature and the information they produce. Hail detection is already well studied by the atmospheric scientific community and dual polarimetric variables values for hail signature are presented according to those advances. Then, a supervised classification technique is showed to illustrated how machine learning can be integrated to radar information for automatic hail detection. However, this fuzzy logic algorithm has the capability to distinguish between meteorological and non-meteorological echoes. This automatic information might help forecasters from National Weather Services – NWS to …


Pinpoint: Efficient And Effective Resource Isolation For Mobile Security And Privacy, Paul Ratazzi, Ashok Bommisetti, Nian Ji, Wenliang Du May 2015

Pinpoint: Efficient And Effective Resource Isolation For Mobile Security And Privacy, Paul Ratazzi, Ashok Bommisetti, Nian Ji, Wenliang Du

Electrical Engineering and Computer Science - All Scholarship

Virtualization is frequently used to isolate untrusted processes and control their access to sensitive resources. However, isolation usually carries a price in terms of less resource sharing and reduced inter-process communication. In an open architecture such as Android, this price and its impact on performance, usability, and transparency must be carefully considered. Although previous efforts in developing general-purpose isolation solutions have shown that some of these negative sideeffects can be mitigated, doing so involves overcoming significant design challenges by incorporating numerous additional platform complexities not directly related to improved security. Thus, the general purpose solutions become inefficient and burdensome if …


A Systematic Security Evaluation Of Android’S Multi-User Framework, Edward Paul Ratazzi, Yousra Aafer, Amit Ahlawat, Hao Hao, Yifei Wang, Wenliang Du May 2014

A Systematic Security Evaluation Of Android’S Multi-User Framework, Edward Paul Ratazzi, Yousra Aafer, Amit Ahlawat, Hao Hao, Yifei Wang, Wenliang Du

Electrical Engineering and Computer Science - All Scholarship

Like many desktop operating systems in the 1990s, Android is now in the process of including support for multiuser scenarios. Because these scenarios introduce new threats to the system, we should have an understanding of how well the system design addresses them. Since the security implications of multi-user support are truly pervasive, we developed a systematic approach to studying the system and identifying problems. Unlike other approaches that focus on specific attacks or threat models, ours systematically identifies critical places where access controls are not present or do not properly identify the subject and object of a decision. Finding these …


Reference Set Metrics For Multi-Objective Algorithms, Chilukuri K. Mohan, Kishan Mehrotra Jan 2011

Reference Set Metrics For Multi-Objective Algorithms, Chilukuri K. Mohan, Kishan Mehrotra

Electrical Engineering and Computer Science - All Scholarship

Several metrics and indicators have been suggested in the past to evaluate multi-objective evolutionary and non-evolutionary algo- rithms. However, these metrics are known to have many problems that make their application sometimes unsound, and sometimes infeasible. This paper proposes a new approach, in which metrics are parameter- ized with respect to a reference set, on which depend the properties of any metric.


Time-Domain Electric-Field Integral Equation With Central Finite Difference, Baek Ho Jung, Tapan Kumar Sarkar Jan 2001

Time-Domain Electric-Field Integral Equation With Central Finite Difference, Baek Ho Jung, Tapan Kumar Sarkar

Electrical Engineering and Computer Science - All Scholarship

In this paper, we present a new formulation using the time-domain electric-field integral equation (TD-EFIE) to obtain a transient scattering response from arbitrarily shaped conducting bodies. The time derivative of the magnetic vector potential is approximated with a central finite difference, and the scalar potential is time averaged by dividing it into two terms. This approach with an implicit method using central-difference results in accurate and stable transient scattering responses from conducting objects. Detailed mathematical steps are included, and several numerical results are presented.


Scheduling Of Unstructured Communication On The Intel Ipsc/860, Jhy-Chun Wang, Sanjay Ranka Jan 1994

Scheduling Of Unstructured Communication On The Intel Ipsc/860, Jhy-Chun Wang, Sanjay Ranka

College of Engineering and Computer Science - Former Departments, Centers, Institutes and Projects

In this paper we present several algorithms for decomposing all-to-many personalized communication into a set of disjoint partial permutations. These partial permutations avoid node contention as well as link contention. We discuss the theoretical complexity of these algorithms and study their effectiveness both from the view of static scheduling and from runtime scheduling. Experimental results for our algorithms are presented on the iPSC/860.