Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Other Computer Sciences

PDF

2009

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 34

Full-Text Articles in Computer Sciences

An Evaluation Of Potential Technologies For A Web Based Development Environment For Cs1 Students, Manuel Garcia Dec 2009

An Evaluation Of Potential Technologies For A Web Based Development Environment For Cs1 Students, Manuel Garcia

Computer Science and Software Engineering

The goal of this senior project was to design a web-based integrated development environment that would incorporate Web-CAT. Web-CAT is an automated testing tool designed by Stephen Edwards at Virginia Tech University, to help beginning students learn test-driven development. This tool runs on a server where a professor assigns usernames and passwords to students so they can submit code. This program can assist professors in grading, and students in showing errors in code. The development environment design waskept simple to create less confusion for beginning programming students. This development environment will be online to give all students universal access and …


Mining Data From Multiple Software Development Projects, Huanjing Wang, Taghi M. Khoshgoftaar, Kehan Gao, Naeem Seliya Dec 2009

Mining Data From Multiple Software Development Projects, Huanjing Wang, Taghi M. Khoshgoftaar, Kehan Gao, Naeem Seliya

Dr. Huanjing Wang

A large system often goes through multiple software project development cycles, in part due to changes in operation and development environments. For example, rapid turnover of the development team between releases can influence software quality, making it important to mine software project data over multiple system releases when building defect predictors. Data collection of software attributes are often conducted independent of the quality improvement goals, leading to the availability of a large number of attributes for analysis. Given the problems associated with variations in development process, data collection, and quality goals from one release to another emphasizes the importance of …


Mining Data From Multiple Software Development Projects, Huanjing Wang, Taghi M. Khoshgoftaar, Kehan Gao, Naeem Seliya Dec 2009

Mining Data From Multiple Software Development Projects, Huanjing Wang, Taghi M. Khoshgoftaar, Kehan Gao, Naeem Seliya

Computer Science Faculty Publications

A large system often goes through multiple software project development cycles, in part due to changes in operation and development environments. For example, rapid turnover of the development team between releases can influence software quality, making it important to mine software project data over multiple system releases when building defect predictors. Data collection of software attributes are often conducted independent of the quality improvement goals, leading to the availability of a large number of attributes for analysis. Given the problems associated with variations in development process, data collection, and quality goals from one release to another emphasizes the importance of …


A Parallel Computing Test Bed For Performing An Unsupervised Fluoroscopic Analysis Of Knee Joint Kinematics, Renu Ramanatha Dec 2009

A Parallel Computing Test Bed For Performing An Unsupervised Fluoroscopic Analysis Of Knee Joint Kinematics, Renu Ramanatha

Boise State University Theses and Dissertations

Fluoroscopic analysis of knee joint kinematics involves accurately determining the position and orientation of bones in the knee joint. This data can be derived using the static 3-D CT scan images and 2-D video fluoroscopy images together. This involves generating hypothetical digitally reconstructed radiographs (DRR) from the CT scan image with known position and orientation and comparing them to the original fluoroscopic frame. This represents a search problem in which, among all the DRRs possible from a CT image, the image that most closely matches the target fluoroscopy frame of the knee joint has to be found.

Each image in …


High-Dimensional Software Engineering Data And Feature Selection, Huanjing Wang, Taghi M. Khoshgoftaar, Kehan Gao Nov 2009

High-Dimensional Software Engineering Data And Feature Selection, Huanjing Wang, Taghi M. Khoshgoftaar, Kehan Gao

Dr. Huanjing Wang

Software metrics collected during project development play a critical role in software quality assurance. A software practitioner is very keen on learning which software metrics to focus on for software quality prediction. While a concise set of software metrics is often desired, a typical project collects a very large number of metrics. Minimal attention has been devoted to finding the minimum set of software metrics that have the same predictive capability as a larger set of metrics – we strive to answer that question in this paper. We present a comprehensive comparison between seven commonly-used filter-based feature ranking techniques (FRT) …


High-Dimensional Software Engineering Data And Feature Selection, Huanjing Wang, Taghi M. Khoshgoftaar, Kehan Gao Nov 2009

High-Dimensional Software Engineering Data And Feature Selection, Huanjing Wang, Taghi M. Khoshgoftaar, Kehan Gao

Computer Science Faculty Publications

Software metrics collected during project development play a critical role in software quality assurance. A software practitioner is very keen on learning which software metrics to focus on for software quality prediction. While a concise set of software metrics is often desired, a typical project collects a very large number of metrics. Minimal attention has been devoted to finding the minimum set of software metrics that have the same predictive capability as a larger set of metrics – we strive to answer that question in this paper. We present a comprehensive comparison between seven commonly-used filter-based feature ranking techniques (FRT) …


Digital Audio In The Library, Richard Griscom Sep 2009

Digital Audio In The Library, Richard Griscom

Richard Griscom

An incomplete draft of a book intended to serve as a guide and reference for librarians who are responsible for implementing digital audio services in their libraries. The book is divided into two parts. Part 1, "Digital Audio Technology," covers the fundamentals of recorded sound and digital audio, including a description of digital audio formats, how digital audio is delivered to the listener, and how digital audio is created. Part 2, "Digital Audio in the Library," covers digitizing local collections, providing streaming audio reserves, and using digital audio to preserve analog recordings.


Temporal Data Classification Using Linear Classifiers, Peter Revesz, Thomas Triplet Sep 2009

Temporal Data Classification Using Linear Classifiers, Peter Revesz, Thomas Triplet

CSE Conference and Workshop Papers

Data classification is usually based on measurements recorded at the same time. This paper considers temporal data classification where the input is a temporal database that describes measurements over a period of time in history while the predicted class is expected to occur in the future. We describe a new temporal classification method that improves the accuracy of standard classification methods. The benefits of the method are tested on weather forecasting using the meteorological database from the Texas Commission on Environmental Quality.


Robust Lifetime Measurement In Large-Scale P2p Systems With Non-Stationary Arrivals, Xiaoming Wang, Zhongmei Yao, Yueping Zhang, Dmitri Loguinov Sep 2009

Robust Lifetime Measurement In Large-Scale P2p Systems With Non-Stationary Arrivals, Xiaoming Wang, Zhongmei Yao, Yueping Zhang, Dmitri Loguinov

Computer Science Faculty Publications

Characterizing user churn has become an important topic in studying P2P networks, both in theoretical analysis and system design. Recent work has shown that direct sampling of user lifetimes may lead to certain bias (arising from missed peers and round-off inconsistencies) and proposed a technique that estimates lifetimes based on sampled residuals. In this paper, however, we show that under non-stationary arrivals, which are often present in real systems, residual-based sampling does not correctly reconstruct user lifetimes and suffers a varying degree of bias, which in some cases makes estimation completely impossible. We overcome this problem using two contributions: a …


Computer Assisted Diagnoses For Red Eye (Cadre), Dr. Muhammad Zubair Asghar Aug 2009

Computer Assisted Diagnoses For Red Eye (Cadre), Dr. Muhammad Zubair Asghar

Dr. Muhammad Zubair Asghar

This paper introduces an expert System (ES) named as “CADRE-Computer Assisted Diagnoses for Red Eye. Mostly the remote areas of the population are deprived of the facilities of having experts in eye disease. So it is the need of the day to store the expertise of Eye specialists in computers through using ES technology. This ES is a rule-based Expert System that assists in red-eye diagnosis and treatment. The knowledge acquired from literature review and human experts of the specific domain was used as a base for analysis, diagnosis and recommendations. CADRE evaluates the risk factors of 20 eye diseases …


An Empirical Investigation Of Filter Attribute Selection Techniques For Software Quality Classification, Kehan Gao, Taghi M. Khoshgoftaar, Huanjing Wang Aug 2009

An Empirical Investigation Of Filter Attribute Selection Techniques For Software Quality Classification, Kehan Gao, Taghi M. Khoshgoftaar, Huanjing Wang

Dr. Huanjing Wang

Attribute selection is an important activity in data preprocessing for software quality modeling and other data mining problems. The software quality models have been used to improve the fault detection process. Finding faulty components in a software system during early stages of software development process can lead to a more reliable final product and can reduce development and maintenance costs. It has been shown in some studies that prediction accuracy of the models improves when irrelevant and redundant features are removed from the original data set. In this study, we investigated four filter attribute selection techniques, Automatic Hybrid Search (AHS), …


An Empirical Investigation Of Filter Attribute Selection Techniques For Software Quality Classification, Kehan Gao, Taghi M. Khoshgoftaar, Huanjing Wang Aug 2009

An Empirical Investigation Of Filter Attribute Selection Techniques For Software Quality Classification, Kehan Gao, Taghi M. Khoshgoftaar, Huanjing Wang

Computer Science Faculty Publications

Attribute selection is an important activity in data preprocessing for software quality modeling and other data mining problems. The software quality models have been used to improve the fault detection process. Finding faulty components in a software system during early stages of software development process can lead to a more reliable final product and can reduce development and maintenance costs. It has been shown in some studies that prediction accuracy of the models improves when irrelevant and redundant features are removed from the original data set. In this study, we investigated four filter attribute selection techniques, Automatic Hybrid Search (AHS), …


Cayley-Dixon Projection Operator For Multi-Univariate Composed Polynomials, Arthur Chtcherba, Deepak Kapur, Manfred Minimair Jul 2009

Cayley-Dixon Projection Operator For Multi-Univariate Composed Polynomials, Arthur Chtcherba, Deepak Kapur, Manfred Minimair

Manfred Minimair

The Cayley-Dixon formulation for multivariate projection operators (multiples of resultants of multivariate polynomials) has been shown to be efficient (both exper- imentally and theoretically) for simultaneously eliminating many variables from a polynomial system. In this paper, the behavior of the Cayley-Dixon projection op- erator and the structure of Dixon matrices are analyzed for composed polynomial systems constructed from a multivariate system in which each variable is substi- tuted by a univariate polynomial in a distinct variable. Under some conditions, it is shown that a Dixon projection operator of the composed system can be expressed as a power of the resultant …


Sound And The City: Multi-Layer Representation And Navigation Of Audio Scenarios, Luca A. Ludovico, Davide Andrea Mauro Phd Jul 2009

Sound And The City: Multi-Layer Representation And Navigation Of Audio Scenarios, Luca A. Ludovico, Davide Andrea Mauro Phd

Computer Sciences and Electrical Engineering Faculty Research

IEEE 1599-2008 is an XML-based standard originally intended for the multi-layer representation of music information. Nevertheless, it is versatile enough to describe also information different from traditional scores written according to the Common Western Notation (CWN) rules. This paper will discuss the application of IEEE 1599-2008 to the audio description of paths and scenarios from the urban life or other landscapes. The standard we adopt allows the multilayer integration of textual, symbolical, structural, graphical, audio and video contents within a unique synchronized environment. Besides, for each kind of media, a number of digital objects is supported. As a consequence, thanks …


Open Forum: The Future Of Library Systems, Maria Collins, Andrée J. Rathemacher Jul 2009

Open Forum: The Future Of Library Systems, Maria Collins, Andrée J. Rathemacher

Technical Services Department Faculty Publications

Moderated by Maria Collins of North Carolina State University, discussion at this open forum on the future of library systems touched on open-source library systems, cloud computing, new initiatives by the Open Library Environment (OLE) Project and OCLC, and desired characteristics of future integrated library systems. Most participants had limited experience with next-generation library systems and attended the open forum with the desire to broaden their understanding, although some were exposed to or had worked with the open-source discovery tool VuFind, the OLE Project, WorldCat Local, and the OCLC Web-scale service. A strong desire to customize library systems to meet …


Feeding Phishers, Nicholas J. Lynch Jul 2009

Feeding Phishers, Nicholas J. Lynch

Master's Theses

Phishing campaigns continue to deceive users into revealing their credentials, despite advancing spam filters, browser and toolbar warnings, and educational efforts. Recently, researchers have begun investigating how fake credentials --- or honeytokens --- can be used to detect phishing sites and protect users. BogusBiter, one such work, creates sets of honeytokens based on users' real credentials and sends them alongside real user submissions to phishing sites. In this paper, we present Phish Feeder, an anti-phishing tool which extends the BogusBiter honeytoken generation algorithm in order to create more realistic and authentic-looking credentials. Phish Feeder also employs a ``honeytoken repository'' which …


Residual-Based Estimation Of Peer And Link Lifetimes In P2p Networks, Xiaoming Wang, Zhongmei Yao, Dmitri Loguinov Jun 2009

Residual-Based Estimation Of Peer And Link Lifetimes In P2p Networks, Xiaoming Wang, Zhongmei Yao, Dmitri Loguinov

Computer Science Faculty Publications

Existing methods of measuring lifetimes in P2P systems usually rely on the so-called Create-BasedMethod (CBM), which divides a given observation window into two halves and samples users ldquocreatedrdquo in the first half every Delta time units until they die or the observation period ends. Despite its frequent use, this approach has no rigorous accuracy or overhead analysis in the literature. To shed more light on its performance, we first derive a model for CBM and show that small window size or large Delta may lead to highly inaccurate lifetime distributions. We then show that create-based sampling exhibits an inherent …


Puremx: Automatic Transcription Of Midi Live Music Performances Into Xml Format, Stefano Baldan, Luca A. Ludovico, Davide Andrea Mauro Phd May 2009

Puremx: Automatic Transcription Of Midi Live Music Performances Into Xml Format, Stefano Baldan, Luca A. Ludovico, Davide Andrea Mauro Phd

Computer Sciences and Electrical Engineering Faculty Research

This paper addresses the problem of the real-time automatic transcription of a live music performance into a symbolic format based on XML.

The source data are given by any music instrument or other device able to communicate with Pure Data by MIDI. Pure Data is a free, multi-platform, real-time programming environment for graphical, audio, and video processing. During a performance, music events are parsed and their parameters are evaluated thanks to rhythm and pitch detection algorithms. The final step is the creation of a well-formed XML document, validated against the new international standard known as IEEE 1599.

This work will …


Visualizing The Simulation Of 3-D Underwater Sensor Networks, Matthew T. Tran May 2009

Visualizing The Simulation Of 3-D Underwater Sensor Networks, Matthew T. Tran

Honors Scholar Theses

The majority of sensor network research deals with land-based networks, which are essentially two-dimensional, and thus the majority of simulation and animation tools also only handle such networks. Underwater sensor networks on the other hand, are essentially 3D networks because the depth at which a sensor node is located needs to be considered as well. Due to that additional dimension, specialized tools need to be used when conducting simulations for experimentation.

The School of Engineering’s Underwater Sensor Network (UWSN) lab is conducting research on underwater sensor networks and requires simulation tools for 3D networks. The lab has extended NS-2, a …


Alternative Task Bar: A Usability Study, Jordan Cote May 2009

Alternative Task Bar: A Usability Study, Jordan Cote

Honors Scholar Theses

An alternate approach to the task bar is proposed, one which makes use of modern computers' graphical abilities. This was accomplished with OpenGL, which is typically used in 3D scene generation. The application was integrated into the Desktop Environment in a novel way, in order to produce an arbitrary shaped window. The application was presented to survey participants, who were asked questions to reveal the feasibility of this type of task bar. Responses were positive, which encourages further development.


The Relationship Between Assistive Technology State Standards For Teachers, Assistive Technology Implementation, And Student Performance In The Context Of Evidence-Based Practice, Elizabeth M. Dalton May 2009

The Relationship Between Assistive Technology State Standards For Teachers, Assistive Technology Implementation, And Student Performance In The Context Of Evidence-Based Practice, Elizabeth M. Dalton

Master's Theses, Dissertations, Graduate Research and Major Papers Overview

Identifies, through a national survey, states' formally-adopted assistive technology standards for teachers, the evidence on which these standards were based, and the extent of state support for the implementation of these standards by teachers. Applies descriptive analysis to the data collected for these three areas of study and compares the results with national performance measures for students with disabilities via regression analysis.


Turn Constrained Path Planning Problems, Victor M. Roman May 2009

Turn Constrained Path Planning Problems, Victor M. Roman

UNLV Theses, Dissertations, Professional Papers, and Capstones

We consider the problem of constructing multiple disjoint paths connecting a source point s to a target point t in a geometric graph. We require that the paths do not have any sharp turn angles. We present a review of turn constrained path planning algorithms and also algorithms for constructing disjoint paths. We then combine these techniques and present an O(nlogn) time algorithm for constructing a pair of edge disjoint turn constrained paths connecting two nodes in a planar geometric graph. We also consider the development of a turn constrained shortest path map in the presence of …


Language Modeling Approaches To Information Retrieval, Protima Banerjee, Hyoil Han Apr 2009

Language Modeling Approaches To Information Retrieval, Protima Banerjee, Hyoil Han

Computer Sciences and Electrical Engineering Faculty Research

This article surveys recent research in the area of language modeling (sometimes called statistical language modeling) approaches to information retrieval. Language modeling is a formal probabilistic retrieval framework with roots in speech recognition and natural language processing. The underlying assumption of language modeling is that human language generation is a random process; the goal is to model that process via a generative statistical model.

In this article, we discuss current research in the application of language modeling to information retrieval, the role of semantics in the language modeling framework, cluster-based language models, use of language modeling for XML retrieval and …


Range Estimation Algorithm Comparison In 3-D Flash Ladar Data, Steven P. Jordan Mar 2009

Range Estimation Algorithm Comparison In 3-D Flash Ladar Data, Steven P. Jordan

Theses and Dissertations

Range estimation algorithms have been applied to Laser Detection and Ranging (LADAR) data to test for accuracy and precision. Data was acquired from Matlab® simulations and an experiment using the Advanced Scientific Concepts 3-D flash LADAR camera. Simulated LADAR data was based on a Gaussian pulse shape model with Poisson noise added. Simulations were performed to test range estimation algorithm performance with respect to waveform position within the range gate. The effectiveness of each algorithm is presented in terms of its average root mean square error and standard deviation in 1000 trials. The measured data experiment examined the effectiveness of …


A Hybrid Templated-Based Composite Classification System, Michael A. Turnbaugh Mar 2009

A Hybrid Templated-Based Composite Classification System, Michael A. Turnbaugh

Theses and Dissertations

An automatic target classification system contains a classifier which reads a feature as an input and outputs a class label. Typically, the feature is a vector of real numbers. Other features can be non-numeric, such as a string of symbols or alphabets. One method of improving the performance of an automatic classification system is through combining two or more independent classifiers that are complementary in nature. Complementary classifiers are observed by finding an optimal method for partitioning the problem space. For example, the individual classifiers may operate to identify specific objects. Another method may be to use classifiers that operate …


Node Isolation Model And Age-Based Neighbor Selection In Unstructured P2p Networks, Zhongmei Yao, Derek Leonard, Dmitri Loguinov Feb 2009

Node Isolation Model And Age-Based Neighbor Selection In Unstructured P2p Networks, Zhongmei Yao, Derek Leonard, Dmitri Loguinov

Computer Science Faculty Publications

Previous analytical studies of unstructured P2P resilience have assumed exponential user lifetimes and only considered age-independent neighbor replacement. In this paper, we overcome these limitations by introducing a general node-isolation model for heavy-tailed user lifetimes and arbitrary neighbor-selection algorithms. Using this model, we analyze two age-biased neighbor-selection strategies and show that they significantly improve the residual lifetimes of chosen users, which dramatically reduces the probability of user isolation and graph partitioning compared with uniform selection of neighbors. In fact, the second strategy based on random walks on age-proportional graphs demonstrates that, for lifetimes with infinite variance, the system monotonically increases …


Factors Leading To Success Or Abandonment Of Open Source Commons: An Empirical Analysis Of Sourceforge.Net Projects, Charles M. Schweik, Robert English, Sandra Haire Jan 2009

Factors Leading To Success Or Abandonment Of Open Source Commons: An Empirical Analysis Of Sourceforge.Net Projects, Charles M. Schweik, Robert English, Sandra Haire

Charles M. Schweik

Open source software is produced cooperatively by groups of people who work together via the Internet. The software produced usually becomes the “common property” of the group and is freely distributed to anyone in the world who wants to use it. Although it may seem unlikely, open source collaborations, or “commons,” have grown phenomenally to become economically and socially important. But what makes open source commons succeed at producing something useful, or alternatively, what makes them become abandoned before achieving success? This paper reviews the theoretical foundations for understanding open source commons and briefly describes our statistical analysis of over …


Simulations In 3d Tactics, Interdiction And Multi-Agent Modelling, A. R. Green, I. C. Piper, Daniel Keep, C. J. Flaherty Jan 2009

Simulations In 3d Tactics, Interdiction And Multi-Agent Modelling, A. R. Green, I. C. Piper, Daniel Keep, C. J. Flaherty

Faculty of Informatics - Papers (Archive)

The analysis of vulnerabilities in large complex spaces is fundamentally problematic. The lack of capacity to generate a threat assessment merely exacerbates this problem. Lacking as well, in current literature is a developed methodology. To overcome this problem, we propose an approach using multi-agent modelling, which is also melded with three dimensional (3D) tactical understandings. Our approach builds on a microsimulation decision support tool, which was developed for a behavioural simulation of CBRN events. Microsimulation is based on the individual; who as an individual has a number of attributes, and which are stochastic (when repeated within an attribute). This approach …


A Secure Group Communication Architecture For Autonomous Unmanned Aerial Vehicle, Adrian N. Phillips, Barry Mullins, Richard Raines, Rusty O. Baldwin Jan 2009

A Secure Group Communication Architecture For Autonomous Unmanned Aerial Vehicle, Adrian N. Phillips, Barry Mullins, Richard Raines, Rusty O. Baldwin

Computer Science Faculty Publications

This paper investigates the application of a secure group communication architecture to a swarm of autonomous unmanned aerial vehicles (UAVs). A multicast secure group communication architecture for the low earth orbit (LEO) satellite environment is evaluated to determine if it can be effectively adapted to a swarm of UAVs and provide secure, scalable, and efficient communications. The performance of the proposed security architecture is evaluated with two other commonly used architectures using a discrete event computer simulation developed using MATLAB. Performance is evaluated in terms of the scalability and efficiency of the group key distribution and management scheme when the …


Exploring Out-Of-Turn Interactions With Websites, Saverio Perugini, Naren Ramakrishnan, Manuel A. Pérez-Quiñones, Mary E. Pinney, Mary Beth Rosson Jan 2009

Exploring Out-Of-Turn Interactions With Websites, Saverio Perugini, Naren Ramakrishnan, Manuel A. Pérez-Quiñones, Mary E. Pinney, Mary Beth Rosson

Computer Science Faculty Publications

Hierarchies are ubiquitous on the web for structuring online catalogs and indexing multidimensional attributed data sets. They are a natural metaphor for information seeking if their levelwise structure mirrors the user's conception of the underlying domain. In other cases, they can be frustrating, especially if multiple drill‐downs are necessary to arrive at information of interest. To support a broad range of users, site designers often expose multiple faceted classifications or provide within‐page pruning mechanisms. We present a new technique, called out-of-turn interaction, that increases the richness of user interaction at hierarchical sites, without enumerating all possible completion paths in the …