Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Engineering (486)
- Databases and Information Systems (325)
- Computer Engineering (321)
- Social and Behavioral Sciences (248)
- Information Security (231)
-
- Software Engineering (228)
- Electrical and Computer Engineering (222)
- Numerical Analysis and Scientific Computing (156)
- Other Computer Sciences (133)
- Artificial Intelligence and Robotics (131)
- Theory and Algorithms (117)
- Mathematics (109)
- Graphics and Human Computer Interfaces (107)
- OS and Networks (102)
- Life Sciences (94)
- Business (84)
- Law (81)
- Education (77)
- Communication (76)
- Computer Law (70)
- Legal Studies (65)
- Forensic Science and Technology (64)
- Physics (63)
- Statistics and Probability (62)
- Systems Architecture (56)
- Medicine and Health Sciences (53)
- Programming Languages and Compilers (50)
- Operations Research, Systems Engineering and Industrial Engineering (45)
- Institution
-
- Singapore Management University (351)
- Selected Works (196)
- TÜBİTAK (121)
- Embry-Riddle Aeronautical University (71)
- Edith Cowan University (68)
-
- Purdue University (64)
- Missouri University of Science and Technology (63)
- Wright State University (50)
- SelectedWorks (48)
- University of Texas at El Paso (46)
- Old Dominion University (45)
- California Polytechnic State University, San Luis Obispo (41)
- City University of New York (CUNY) (41)
- San Jose State University (41)
- Marquette University (40)
- Western University (40)
- Clemson University (35)
- Nova Southeastern University (31)
- University of Massachusetts Amherst (31)
- University of Nebraska - Lincoln (26)
- Brigham Young University (24)
- Dartmouth College (24)
- University of Nebraska at Omaha (23)
- University for Business and Technology in Kosovo (22)
- University of Nevada, Las Vegas (21)
- Wayne State University (21)
- University of Wisconsin Milwaukee (20)
- Utah State University (20)
- Southwestern Oklahoma State University (18)
- Portland State University (15)
- Keyword
-
- Applied sciences (40)
- Security (35)
- Machine learning (31)
- Data mining (29)
- Privacy (23)
-
- Education (22)
- Social media (21)
- Algorithms (20)
- Digital forensics (19)
- Twitter (19)
- Big data (18)
- Classification (16)
- Optimization (16)
- Android (14)
- Cloud computing (14)
- Visualization (14)
- Clustering (13)
- Online learning (13)
- Authentication (12)
- Computer science (11)
- Evaluation (11)
- Machine Learning (11)
- Mobile (11)
- Social networks (11)
- [RSTDPub] (11)
- Design (10)
- Image processing (10)
- Small Spacecraft (10)
- Technology (10)
- Computer vision (9)
- Publication
-
- Research Collection School Of Computing and Information Systems (335)
- Turkish Journal of Electrical Engineering and Computer Sciences (121)
- Theses and Dissertations (66)
- Doctoral Dissertations (50)
- Journal of Digital Forensics, Security and Law (50)
-
- Open Access Theses (37)
- Master's Projects (36)
- Computer Science Faculty Publications (35)
- Departmental Technical Reports (CS) (33)
- Mathematics, Statistics and Computer Science Faculty Research and Publications (33)
- Electronic Thesis and Dissertation Repository (30)
- CCE Theses and Dissertations (29)
- Amy W. Apon (26)
- Electronic Theses and Dissertations (26)
- Research outputs 2014 to 2021 (25)
- Kno.e.sis Publications (24)
- Saverio Perugini (23)
- All Theses (22)
- Computer Science Technical Reports (22)
- Oleg Sokolsky (21)
- Dissertations, Theses, and Capstone Projects (20)
- Master's Theses (20)
- Physics Faculty Research & Creative Works (20)
- Jeremy Straub (19)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (19)
- Oklahoma Research Day Abstracts (18)
- Annual ADFSL Conference on Digital Forensics, Security and Law (17)
- David LO (17)
- Computer Science and Engineering Faculty Publications (16)
- Masters Theses (16)
Articles 1 - 30 of 2181
Full-Text Articles in Computer Sciences
Drip - Data Rich, Information Poor: A Concise Synopsis Of Data Mining, Muhammad Obeidat, Max North, Lloyd Burgess, Sarah North
Drip - Data Rich, Information Poor: A Concise Synopsis Of Data Mining, Muhammad Obeidat, Max North, Lloyd Burgess, Sarah North
Faculty Articles
As production of data is exponentially growing with a drastically lower cost, the importance of data mining required to extract and discover valuable information is becoming more paramount. To be functional in any business or industry, data must be capable of supporting sound decision-making and plausible prediction. The purpose of this paper is concisely but broadly to provide a synopsis of the technology and theory of data mining, providing an enhanced comprehension of the methods by which massive data can be transferred into meaningful information.
Gi Science, Not Giscience, Andreas Christoffer Hall
Gi Science, Not Giscience, Andreas Christoffer Hall
Journal of Spatial Information Science
Letter to editors
Spatial Mathematics: Theory And Practice Through Mapping By Sandra Lach Arlinghaus And Joseph J. Kerski, Azadeh Mousavi
Spatial Mathematics: Theory And Practice Through Mapping By Sandra Lach Arlinghaus And Joseph J. Kerski, Azadeh Mousavi
Journal of Spatial Information Science
Book review
Similarity Of Trajectories Taking Into Account Geographic Context, Maike Buchin, Somayeh Dodge, Bettina Speckmann
Similarity Of Trajectories Taking Into Account Geographic Context, Maike Buchin, Somayeh Dodge, Bettina Speckmann
Journal of Spatial Information Science
The movements of animals, people, and vehicles are embedded in a geographic context. This context influences the movement and may cause the formation of certain behavioral responses. Thus, it is essential to include context parameters in the study of movement and the development of movement pattern analytics. Advances in sensor technologies and positioning devices provide valuable data not only of moving agents but also of the circumstances embedding the movement in space and time. Developing knowledge discovery methods to investigate the relation between movement and its surrounding context is a major challenge in movement analysis today. In this paper we …
Geocoding Location Expressions In Twitter Messages: A Preference Learning Method, Wei Zhang, Judith Gelernter
Geocoding Location Expressions In Twitter Messages: A Preference Learning Method, Wei Zhang, Judith Gelernter
Journal of Spatial Information Science
Resolving location expressions in text to the correct physical location, also known as geocoding or grounding, is complicated by the fact that so many places around the world share the same name. Correct resolution is made even more difficult when there is little context to determine which place is intended, as in a 140-character Twitter message, or when location cues from different sources conflict, as may be the case among different metadata fields of a Twitter message. We used supervised machine learning to weigh the different fields of the Twitter message and the features of a world gazetteer to create …
Road Network Selection For Small-Scale Maps Using An Improved Centrality-Based Algorithm, Roy Weiss, Robert Weibel
Road Network Selection For Small-Scale Maps Using An Improved Centrality-Based Algorithm, Roy Weiss, Robert Weibel
Journal of Spatial Information Science
The road network is one of the key feature classes in topographic maps and databases. In the task of deriving road networks for products at smaller scales, road network selection forms a prerequisite for all other generalization operators, and is thus a fundamental operation in the overall process of topographic map and database production. The objective of this work was to develop an algorithm for automated road network selection from a large-scale (1:10,000) to a small-scale database (1:200,000). The project was pursued in collaboration with swisstopo, the national mapping agency of Switzerland, with generic mapping requirements in mind. Preliminary experiments …
Twitter Location (Sometimes) Matters: Exploring The Relationship Between Georeferenced Tweet Content And Nearby Feature Classes, Stefan Hahmann, Ross S. Purves, Dirk Burghardt
Twitter Location (Sometimes) Matters: Exploring The Relationship Between Georeferenced Tweet Content And Nearby Feature Classes, Stefan Hahmann, Ross S. Purves, Dirk Burghardt
Journal of Spatial Information Science
In this paper, we investigate whether microblogging texts (tweets) produced on mobile devices are related to the geographical locations where they were posted. For this purpose, we correlate tweet topics to areas. In doing so, classified points of interest from OpenStreetMap serve as validation points. We adopted the classification and geolocation of these points to correlate with tweet content by means of manual, supervised, and unsupervised machine learning approaches. Evaluation showed the manual classification approach to be highest quality, followed by the supervised method, and that the unsupervised classification was of low quality. We found that the degree to which …
Optimizing Data Movement In Hybrid Analytic Systems, Patrick Michael Leyshock
Optimizing Data Movement In Hybrid Analytic Systems, Patrick Michael Leyshock
Dissertations and Theses
Hybrid systems for analyzing big data integrate an analytic tool and a dedicated data-management platform, storing data and operating on the data at both components. While hybrid systems have benefits over alternative architectures, in order to be effective, data movement between the two hybrid components must be minimized. Extant hybrid systems either fail to address performance problems stemming from inter-component data movement, or else require the user to explicitly reason about and manage data movement. My work presents the design, implementation, and evaluation of a hybrid analytic system for array-structured data that automatically minimizes data movement between the hybrid components. …
Synthesis Of Irreversible Incompletely Specified Multi-Output Functions To Reversible Eosops Circuits With Pse Gates, Robert Adrian Fiszer
Synthesis Of Irreversible Incompletely Specified Multi-Output Functions To Reversible Eosops Circuits With Pse Gates, Robert Adrian Fiszer
Dissertations and Theses
As quantum computers edge closer to viability, it becomes necessary to create logic synthesis and minimization algorithms that take into account the particular aspects of quantum computers that differentiate them from classical computers. Since quantum computers can be functionally described as reversible computers with superposition and entanglement, both advances in reversible synthesis and increased utilization of superposition and entanglement in quantum algorithms will increase the power of quantum computing.
One necessary component of any practical quantum computer is the computation of irreversible functions. However, very little work has been done on algorithms that synthesize and minimize irreversible functions into a …
Masquerade Detection Using Singular Value Decomposition, Sweta Vikram Shah
Masquerade Detection Using Singular Value Decomposition, Sweta Vikram Shah
Master's Projects
Information systems and networks are highly susceptible to attacks in the form of intrusions. One such attack is by the masqueraders who impersonate legitimate users. Masqueraders can be detected in anomaly based intrusion detection by identifying the abnormalities in user behavior. This user behavior is logged in log files of different types. In our research we use the score based technique of Singular Value Decomposition to address the problem of masquerade detection on a unix based system. We have data collected in the form of sequential unix commands ran by 50 users. SVD is a linear algebraic technique, which has …
A Gis-Centric Approach For Modeling Vessel Management Behavior System Data To Determine Oyster Vessel Behavior On Public Oyster Grounds In Louisiana, David X. Gallegos
A Gis-Centric Approach For Modeling Vessel Management Behavior System Data To Determine Oyster Vessel Behavior On Public Oyster Grounds In Louisiana, David X. Gallegos
University of New Orleans Theses and Dissertations
The satellite communications system called the Vessel Management System was used to provide geospatial data on oyster fishing over the nearly 1.7 million acres of the public water bottoms in Louisiana. An algorithm to analyze the data was developed in order to model vessel behaviors including docked, gearing, fishing and traveling. Vessel speeds were calculated via the Haversine formula at small and large intervals and compared to derive a measure of linearity. The algorithm was implemented into software using Python and inserted into a PostgreSQL database supporting geospatial information. Queries were developed to obtain reports on vessel activities and daily …
An Empirical Study Of Semantic Similarity In Wordnet And Word2vec, Abram Handler
An Empirical Study Of Semantic Similarity In Wordnet And Word2vec, Abram Handler
University of New Orleans Theses and Dissertations
This thesis performs an empirical analysis of Word2Vec by comparing its output to WordNet, a well-known, human-curated lexical database. It finds that Word2Vec tends to uncover more of certain types of semantic relations than others -- with Word2Vec returning more hypernyms, synonomyns and hyponyms than hyponyms or holonyms. It also shows the probability that neighbors separated by a given cosine distance in Word2Vec are semantically related in WordNet. This result both adds to our understanding of the still-unknown Word2Vec and helps to benchmark new semantic tools built from word vectors.
Financial Ratio Analysis For Stock Price Movement Prediction Using Hybrid Clustering, Tom Tupe
Financial Ratio Analysis For Stock Price Movement Prediction Using Hybrid Clustering, Tom Tupe
Master's Projects
We have gathered over 3100 annual financial reports for 500 companies listed on the S&P 500 index, where the main goal was to select and give proper weights to the various pieces of quantitative data to maximize clustering results and improve prediction results over previous work by [Lin et al. 2011]. Various financial ratios, including earnings per share surprise percentages were gathered and analyzed. We proposed and used two types, correlation based ratios and causality based ratios. An extension to the classification scheme used by [Lin et al. 2011] was proposed to more accurately classify financial reports, together with a …
A Hash-Cash Based Music Streaming Payment System, Timothy Chen
A Hash-Cash Based Music Streaming Payment System, Timothy Chen
Master's Projects
This project develops a hash-cash based, streaming music payment system. In our system, musicians are paid based on how long their works are listened to. Artists can upload their works to our proof-of-concept service so that people can discover and listen to them. While their works are being listened to, a mining process is run in parallel. The mining process discovers a “listening coin” based on the hash-cash algorithm. Users of our service would pay a monthly fee to access the music library. The monthly fees are then distributed to all artists proportionate to the number of virtual coins they …
Computing Intersection Multiplicity Via Triangular Decomposition, Paul Vrbik
Computing Intersection Multiplicity Via Triangular Decomposition, Paul Vrbik
Electronic Thesis and Dissertation Repository
Fulton’s algorithm is used to calculate the intersection multiplicity of two plane curves about a rational point. This work extends Fulton’s algorithm first to algebraic points (encoded by triangular sets) and then, with some generic assumptions, to l many hypersurfaces.
Out of necessity, we give a standard-basis free method (i.e. practically efficient method) for calculating tangent cones at points on curves.
Spartan Web Application Firewall, Brian C. Lee
Spartan Web Application Firewall, Brian C. Lee
Master's Projects
Computer security is an ongoing issue and attacks are growing more sophisit- cated. One category of attack utilizes cross-site scripting (XSS) to extract confiden- tial data such as a user’s login credential’s without the knowledge of either the user nor the web server by utilizing vulnerabilities on web pages and internet browsers. Many people develop their own web applications without learning about or having good coding practices or security in mind. Web application firewalls are able to help but can be enhanced to be more effective than they currently are at detecting re- flected XSS attacks by analyzing the request …
Recommender Systems Research: A Connection-Centric Survey, Saverio Perugini, Marcos André Gonçalves, Edward A. Fox
Recommender Systems Research: A Connection-Centric Survey, Saverio Perugini, Marcos André Gonçalves, Edward A. Fox
Saverio Perugini
Recommender systems attempt to reduce information overload and retain customers by selecting a subset of items from a universal set based on user preferences. While research in recommender systems grew out of information retrieval and filtering, the topic has steadily advanced into a legitimate and challenging research area of its own. Recommender systems have traditionally been studied from a content-based filtering vs. collaborative design perspective. Recommendations, however, are not delivered within a vacuum, but rather cast within an informal community of users and social context. Therefore, ultimately all recommender systems make connections among people and thus should be surveyed from …
Automatically Generating Interfaces For Personalized Interaction With Digital Libraries, Saverio Perugini, Naren Ramakrishnan, Edward A. Fox
Automatically Generating Interfaces For Personalized Interaction With Digital Libraries, Saverio Perugini, Naren Ramakrishnan, Edward A. Fox
Saverio Perugini
We present an approach to automatically generate interfaces supporting personalized interaction with digital libraries; these interfaces augment the user-DL dialog by empowering the user to (optionally) supply out-of-turn information during an interaction, flatten or restructure the dialog, and inquire about dialog options. Interfaces generated using this approach for CITIDEL are described.
Symbolic Links In The Open Directory Project, Saverio Perugini
Symbolic Links In The Open Directory Project, Saverio Perugini
Saverio Perugini
We present a study to develop an improved understanding of symbolic links in web directories. A symbolic link is a hyperlink that makes a directed connection from a web page along one path through a directory to a page along another path. While symbolic links are ubiquitous in web directories such as Yahoo!, they are under-studied, and as a result, their uses are poorly understood. A cursory analysis of symbolic links reveals multiple uses: to provide navigational shortcuts deeper into a directory, backlinks to more general categories, and multiclassification. We investigated these uses in the Open Directory Project (ODP), the …
Interacting With Web Hierarchies, Saverio Perugini, Naren Ramakrishnan
Interacting With Web Hierarchies, Saverio Perugini, Naren Ramakrishnan
Saverio Perugini
Web site interfaces are a particularly good fit for hierarchies in the broadest sense of that idea, i.e. a classification with multiple attributes, not necessarily a tree structure. Several adaptive interface designs are emerging that support flexible navigation orders, exposing and exploring dependencies, and procedural information-seeking tasks. This paper provides a context and vocabulary for thinking about hierarchical Web sites and their design. The paper identifies three features that interface to information hierarchies. These are flexible navigation orders, the ability to expose and explore dependencies, and support for procedural tasks. A few examples of these features are also provided
The Partial Evaluation Approach To Information Personalization, Naren Ramakrishnan, Saverio Perugini
The Partial Evaluation Approach To Information Personalization, Naren Ramakrishnan, Saverio Perugini
Saverio Perugini
Information personalization refers to the automatic adjustment of information content, structure, and presentation tailored to an individual user. By reducing information overload and customizing information access, personalization systems have emerged as an important segment of the Internet economy. This paper presents a systematic modeling methodology— PIPE (‘Personalization is Partial Evaluation’) — for personalization. Personalization systems are designed and implemented in PIPE by modeling an information-seeking interaction in a programmatic representation. The representation supports the description of information-seeking activities as partial information and their subsequent realization by partial evaluation, a technique for specializing programs. We describe the modeling methodology at a …
The Staging Transformation Approach To Mixing Initiative, Robert Capra, Michael Narayan, Saverio Perugini, Naren Ramakrishnan, Manuel A. Pérez-Quiñones
The Staging Transformation Approach To Mixing Initiative, Robert Capra, Michael Narayan, Saverio Perugini, Naren Ramakrishnan, Manuel A. Pérez-Quiñones
Saverio Perugini
Mixed-initiative interaction is an important facet of many conversational interfaces, flexible planning architectures, intelligent tutoring systems, and interactive information retrieval systems. Software systems for mixed-initiative interaction must enable us to both operationalize the mixing of initiative (i.e., support the creation of practical dialogs) and to reason in real-time about how a flexible mode of interaction can be supported (e.g., from a meta-dialog standpoint). In this paper, we present the staging transformation approach to mixing initiative, where a dialog script captures the structure of the dialog and dialog control processes are realized through generous use of program transformation techniques (e.g., partial …
A Study Of Out-Of-Turn Interaction In Menu-Based, Ivr, Voicemail Systems, Saverio Perugini, Taylor J. Anderson, William F. Moroney
A Study Of Out-Of-Turn Interaction In Menu-Based, Ivr, Voicemail Systems, Saverio Perugini, Taylor J. Anderson, William F. Moroney
Saverio Perugini
We present the first user study of out-of-turn interaction in menu-based, interactive voice-response systems. Out-ofturn interaction is a technique which empowers the user (unable to respond to the current prompt) to take the conversational initiative by supplying information that is currently unsolicited, but expected later in the dialog. The technique permits the user to circumvent any flows of navigation hardwired into the design and navigate the menus in a manner which reflects their model of the task. We conducted a laboratory experiment to measure the effect of the use of outof- turn interaction on user performance and preference in a …
Exploring Out-Of-Turn Interactions With Websites, Saverio Perugini, Naren Ramakrishnan, Manuel A. Pérez-Quiñones, Mary E. Pinney, Mary Beth Rosson
Exploring Out-Of-Turn Interactions With Websites, Saverio Perugini, Naren Ramakrishnan, Manuel A. Pérez-Quiñones, Mary E. Pinney, Mary Beth Rosson
Saverio Perugini
Hierarchies are ubiquitous on the web for structuring online catalogs and indexing multidimensional attributed data sets. They are a natural metaphor for information seeking if their levelwise structure mirrors the user's conception of the underlying domain. In other cases, they can be frustrating, especially if multiple drill‐downs are necessary to arrive at information of interest. To support a broad range of users, site designers often expose multiple faceted classifications or provide within‐page pruning mechanisms. We present a new technique, called out-of-turn interaction, that increases the richness of user interaction at hierarchical sites, without enumerating all possible completion paths in the …
Pointing Devices For Wearable Computers, Saverio Perugini, Andres A. Calvo
Pointing Devices For Wearable Computers, Saverio Perugini, Andres A. Calvo
Saverio Perugini
We present a survey of pointing devices for wearable computers, which are body-mounted devices that users can access at any time. Since traditional pointing devices (i.e., mouse, touchpad, and trackpoint) were designed to be used on a steady and flat surface, they are inappropriate for wearable computers. Just as the advent of laptops resulted in the development of the touchpad and trackpoint, the emergence of wearable computers is leading to the development of pointing devices designed for them. However, unlike laptops, since wearable computers are operated from different body positions under different environmental conditions for different uses, researchers have developed …
Personalizing The Gams Cross-Index, Saverio Perugini, Priya Lakshminarayanan, Naren Ramakrishnan
Personalizing The Gams Cross-Index, Saverio Perugini, Priya Lakshminarayanan, Naren Ramakrishnan
Saverio Perugini
The NIST Guide to Available Mathematical Software (GAMS) system at http://gams.nist .gov serves as the gateway to thousands of scientific codes and modules for numerical computation. We describe the PIPE personalization facility for GAMS, whereby content from the cross-index is specialized for a user desiring software recommendations for a specific problem instance. The key idea is to (i) mine structure, and (ii) exploit it in a programmatic manner to generate personalized web pages. Our approach supports both content-based and collaborative personalization and enables information integration from multiple (and complementary) web resources. We present case studies for the domain of linear, …
Information Assurance Through Binary Vulnerability Auditing, William B. Kimball, Saverio Perugini
Information Assurance Through Binary Vulnerability Auditing, William B. Kimball, Saverio Perugini
Saverio Perugini
The goal of this research is to develop improved methods of discovering vulnerabilities in software. A large volume of software, from the most frequently used programs on a desktop computer, such as web browsers, e-mail programs, and word processing applications, to mission-critical services for the space shuttle, is unintentionally vulnerable to attacks and thus insecure. By seeking to improve the identification of vulnerabilities in software, the security community can save the time and money necessary to restore compromised computer systems. In addition, this research is imperative to activities of national security such as counterterrorism. The current approach involves a systematic …