Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Science Faculty Publications

2015

Discipline
Institution
Keyword

Articles 1 - 30 of 42

Full-Text Articles in Computer Sciences

An Immersive Telepresence System Using Rgb-D Sensors And Head-Mounted Display, Xinzhong Lu, Ju Shen, Saverio Perugini, Jianjun Yang Dec 2015

An Immersive Telepresence System Using Rgb-D Sensors And Head-Mounted Display, Xinzhong Lu, Ju Shen, Saverio Perugini, Jianjun Yang

Computer Science Faculty Publications

We present a tele-immersive system that enables people to interact with each other in a virtual world using body gestures in addition to verbal communication. Beyond the obvious applications, including general online conversations and gaming, we hypothesize that our proposed system would be particularly beneficial to education by offering rich visual contents and interactivity. One distinct feature is the integration of egocentric pose recognition that allows participants to use their gestures to demonstrate and manipulate virtual objects simultaneously. This functionality enables the instructor to effectively and efficiently explain and illustrate complex concepts or sophisticated problems in an intuitive manner. The …


Salad: A Multimodal Approach For Contextual Video Advertising, Chen Xiang, Tam Nguyen, Mohan Kankanhalli Dec 2015

Salad: A Multimodal Approach For Contextual Video Advertising, Chen Xiang, Tam Nguyen, Mohan Kankanhalli

Computer Science Faculty Publications

The explosive growth of multimedia data on Internet has created huge opportunities for online video advertising. In this paper, we propose a novel advertising technique called SalAd, which utilizes textual information, visual content and the webpage saliency, to automatically associate the most suitable companion ads with online videos. Unlike most existing approaches that only focus on selecting the most relevant ads, SalAd further considers the saliency of selected ads to reduce intentional ignorance. SalAd consists of three basic steps. Given an online video and a set of advertisements, we first roughly identify a set of relevant ads based on the …


Smart Sensing And Mobile Computing, Guihai Chen, Dakshnamoorthy Manivannan, Chen Qian, Fangming Liu, Jinsong Han Nov 2015

Smart Sensing And Mobile Computing, Guihai Chen, Dakshnamoorthy Manivannan, Chen Qian, Fangming Liu, Jinsong Han

Computer Science Faculty Publications

No abstract provided.


Visualizing Fantasy Fiction: Design Of A Class In Digital Scholarship And Visualization, Including Research, Organization And Digital Visualization, That Does Not Require Programming Or It Support, Charles W. Kann Oct 2015

Visualizing Fantasy Fiction: Design Of A Class In Digital Scholarship And Visualization, Including Research, Organization And Digital Visualization, That Does Not Require Programming Or It Support, Charles W. Kann

Computer Science Faculty Publications

This paper outlines a course to integrate digital visualizations into undergraduate research. These visualizations will include mapping and timelines of events, and the ability to hyperlink the events, characters, and story lines in a fantasy fiction story such as Lord of the Rings or A Game of Thrones. The digital scholarship will involve the methodology for collecting, organizing, and representing the data for the visualizations.

The topic for the visualizations in this paper is fantasy fiction; however the methods to develop these visualizations will be applicable to many academic disciplines, including the humanities and social sciences.

The paper outlines …


Sense Beyond Expressions: Cuteness, Kang Wang, Tam Nguyen, Jiashi Feng, Jose Sepulveda Oct 2015

Sense Beyond Expressions: Cuteness, Kang Wang, Tam Nguyen, Jiashi Feng, Jose Sepulveda

Computer Science Faculty Publications

With the development of Internet culture, cute has become a popular concept. Many people are curious about what factors making a person look cute. However, there is rare research to answer this interesting question. In this work, we construct a dataset of personal images with comprehensively annotated cuteness scores and facial attributes to investigate this high-level concept in depth. Based on this dataset, through an automatic attributes mining process, we find several critical attributes determining the cuteness of a person.

We also develop a novel Continuous Latent Support Vector Machine (C-LSVM) method to predict the cuteness score of one person …


Adaptive Nonparametric Image Parsing, Tam Nguyen, Canyi Lu, Jose Sepulveda, Shuicheng Yan Oct 2015

Adaptive Nonparametric Image Parsing, Tam Nguyen, Canyi Lu, Jose Sepulveda, Shuicheng Yan

Computer Science Faculty Publications

In this paper, we present an adaptive nonparametric solution to the image parsing task, namely, annotating each image pixel with its corresponding category label. For a given test image, first, a locality-aware retrieval set is extracted from the training data based on superpixel matching similarities, which are augmented with feature extraction for better differentiation of local superpixels. Then, the category of each superpixel is initialized by the majority vote of the k -nearest-neighbor superpixels in the retrieval set. Instead of fixing k as in traditional nonparametric approaches, here, we propose a novel adaptive nonparametric approach that determines the sample-specific k …


Dynamics Of Thermally Induced Ice Streams Simulated With A Higher-Order Flow Model, Douglas Brinkerhoff, Jesse Johnson Sep 2015

Dynamics Of Thermally Induced Ice Streams Simulated With A Higher-Order Flow Model, Douglas Brinkerhoff, Jesse Johnson

Computer Science Faculty Publications

We use a new discretization technique to solve the higher-order thermomechanically coupled equations of glacier evolution. We find that under radially symmetric continuum equations, small perturbations in symmetry due to the discretization are sufficient to produce the initiation of non-symmetric thermomechanical instabilities which we interpret as ice streams, in good agreement with previous studies which have indicated a similar instability. We find that the inclusion of membrane stresses regularizes the size of predicted streams, eliminating the ill-posedness evident in previous investigations of ice stream generation through thermomechanical instability. Ice streams exhibit strongly irregular periodicity which is influenced by neighboring ice …


Near-Duplicate Image Retrieval Based On Contextual Descriptor, Jinliang Yao, Bing Yang, Qiuming Zhu Sep 2015

Near-Duplicate Image Retrieval Based On Contextual Descriptor, Jinliang Yao, Bing Yang, Qiuming Zhu

Computer Science Faculty Publications

The state of the art of technology for near-duplicate image retrieval is mostly based on the Bag-of-Visual-Words model. However, visual words are easy to result in mismatches because of quantization errors of the local features the words represent. In order to improve the precision of visual words matching, contextual descriptors are designed to strengthen their discriminative power and measure the contextual similarity of visual words. This paper presents a new contextual descriptor that measures the contextual similarity of visual words to immediately discard the mismatches and reduce the count of candidate images. The new contextual descriptor encodes the relationships of …


Haep: Hospital Assignment For Emergency Patients In A Big City, Peng Liu, Biao Xu, Zhen Jiang, Jie Wu Aug 2015

Haep: Hospital Assignment For Emergency Patients In A Big City, Peng Liu, Biao Xu, Zhen Jiang, Jie Wu

Computer Science Faculty Publications

No abstract provided.


Teaching Big Data By Three Levels Of Projects, Jianjun Yang, Ju Shen Jul 2015

Teaching Big Data By Three Levels Of Projects, Jianjun Yang, Ju Shen

Computer Science Faculty Publications

Big Data is a new topic and it is very hot nowadays. However, it is difficult to teach Big Data effectively by regular lecture. In this paper, we present a unique way to teach students Big Data by developing three levels of projects from easy to difficult. The three levels projects are initializing project, designing project, and comprehensive projects. They are developed to involve students in Big Data, train students' skills to analyze concrete problems of Big Data, and develop students' creative abilities and their abilities to solve real setting problems.


Between Worlds: Securing Mixed Javascript/Actionscript Multi-Party Web Content, Phu Huu Phung, Maliheh Monshizadeh, Meera Sridhar, Kevin W. Hamlen, V. N. Venkatakrishnan Jul 2015

Between Worlds: Securing Mixed Javascript/Actionscript Multi-Party Web Content, Phu Huu Phung, Maliheh Monshizadeh, Meera Sridhar, Kevin W. Hamlen, V. N. Venkatakrishnan

Computer Science Faculty Publications

Mixed Flash and JavaScript content has become increasingly prevalent; its purveyance of dynamic features unique to each platform has popularized it for myriad Web development projects. Although Flash and JavaScript security has been examined extensively, the security of untrusted content that combines both has received considerably less attention. This article considers this fusion in detail, outlining several practical scenarios that threaten the security of Web applications. The severity of these attacks warrants the development of new techniques that address the security of Flash-JavaScript content considered as a whole, in contrast to prior solutions that have examined Flash or JavaScript security …


Salient Object Detection Via Augmented Hypotheses, Tam Nguyen, Jose Sepulveda Jul 2015

Salient Object Detection Via Augmented Hypotheses, Tam Nguyen, Jose Sepulveda

Computer Science Faculty Publications

In this paper, we propose using augmented hypotheses which consider objectness, foreground, and compactness for salient object detection. Our algorithm consists of four basic steps. First, our method generates the objectness map via objectness hypotheses. Based on the objectness map, we estimate the foreground margin and compute the corresponding foreground map which prefers the foreground objects. From the objectness map and the foreground map, the compactness map is formed to favor the compact objects. We then derive a saliency measure that produces a pixel-accurate saliency map which uniformly covers the objects of interest and consistently separates foreground and background.

We …


Automatic Video Self Modeling For Voice Disorder, Ju Shen, Changpeng Ti, Anusha Raghunathan, Sen-Ching S. Cheung, Rita Patel Jul 2015

Automatic Video Self Modeling For Voice Disorder, Ju Shen, Changpeng Ti, Anusha Raghunathan, Sen-Ching S. Cheung, Rita Patel

Computer Science Faculty Publications

Video self modeling (VSM) is a behavioral intervention technique in which a learner models a target behavior by watching a video of him- or herself. In the field of speech language pathology, the approach of VSM has been successfully used for treatment of language in children with Autism and in individuals with fluency disorder of stuttering. Technical challenges remain in creating VSM contents that depict previously unseen behaviors. In this paper, we propose a novel system that synthesizes new video sequences for VSM treatment of patients with voice disorders. Starting with a video recording of a voice-disorder patient, the proposed …


Large-Scale Geo-Facial Image Analysis, Mohammed T. Islam, Connor Greenwell, Richard Souvenir, Nathan Jacobs Jun 2015

Large-Scale Geo-Facial Image Analysis, Mohammed T. Islam, Connor Greenwell, Richard Souvenir, Nathan Jacobs

Computer Science Faculty Publications

While face analysis from images is a well-studied area, little work has explored the dependence of facial appearance on the geographic location from which the image was captured. To fill this gap, we constructed GeoFaces, a large dataset of geotagged face images, and used it to examine the geo-dependence of facial features and attributes, such as ethnicity, gender, or the presence of facial hair. Our analysis illuminates the relationship between raw facial appearance, facial attributes, and geographic location, both globally and in selected major urban areas. Some of our experiments, and the resulting visualizations, confirm prior expectations, such as the …


Rechecking The Centrality-Lethality Rule In The Scope Of Protein Subcellular Localization Interaction Networks, Xiaoqing Peng, Jianxin Wang, Jun Wang, Fangxiang Wu, Yi Pan Jun 2015

Rechecking The Centrality-Lethality Rule In The Scope Of Protein Subcellular Localization Interaction Networks, Xiaoqing Peng, Jianxin Wang, Jun Wang, Fangxiang Wu, Yi Pan

Computer Science Faculty Publications

Essential proteins are indispensable for living organisms to maintain life activities and play important roles in the studies of pathology, synthetic biology, and drug design. Therefore, besides experiment methods, many computational methods are proposed to identify essential proteins. Based on the centrality-lethality rule, various centrality methods are employed to predict essential proteins in a Protein-protein Interaction Network (PIN). However, neglecting the temporal and spatial features of protein-protein interactions, the centrality scores calculated by centrality methods are not effective enough for measuring the essentiality of proteins in a PIN. Moreover, many methods, which overfit with the features of essential proteins for …


Isquest: Finding Insertion Sequences In Prokaryotic Sequence Fragment Data, Abhishek Biswas, David T. Gauthier, Desh Ranjan, Mohammad Zubair Jun 2015

Isquest: Finding Insertion Sequences In Prokaryotic Sequence Fragment Data, Abhishek Biswas, David T. Gauthier, Desh Ranjan, Mohammad Zubair

Computer Science Faculty Publications

Motivation: Insertion sequences (ISs) are transposable elements present in most bacterial and archaeal genomes that play an important role in genomic evolution. The increasing availability of sequenced prokaryotic genomes offers the opportunity to study ISs comprehensively, but development of efficient and accurate tools is required for discovery and annotation. Additionally, prokaryotic genomes are frequently deposited as incomplete, or draft stage because of the substantial cost and effort required to finish genome assembly projects. Development of methods to identify IS directly from raw sequence reads or draft genomes are therefore desirable. Software tools such as Optimized Annotation System for Insertion Sequences …


A Stabilized Finite Element Method For Calculating Balance Velocities In Ice Sheets, Douglas Brinkerhoff, Jesse Johnson May 2015

A Stabilized Finite Element Method For Calculating Balance Velocities In Ice Sheets, Douglas Brinkerhoff, Jesse Johnson

Computer Science Faculty Publications

We present a numerical method for calculating vertically averaged velocity fields using a mass conservation approach, commonly known as balance velocities. This allows for an unstructured grid, is not dependent on a heuristic flow routing algorithm, and is both parallelizable and efficient. We apply the method to calculate depth-averaged velocities of the Greenland Ice Sheet, and find that the method produces grid-independent velocity fields for a sufficient parameterization of horizontal plane stresses on flow directions. We show that balance velocity can be used as the forward model for a constrained optimization problem that can be used to fill gaps and …


Compression Of Video Tracking And Bandwidth Balancing Routing In Wireless Multimedia Sensor Networks, Yin Wang, Jianjun Yang, Ju Shen, Bryson Payne, Juan Guo, Kun Hua May 2015

Compression Of Video Tracking And Bandwidth Balancing Routing In Wireless Multimedia Sensor Networks, Yin Wang, Jianjun Yang, Ju Shen, Bryson Payne, Juan Guo, Kun Hua

Computer Science Faculty Publications

There has been a tremendous growth in multimedia applications over wireless networks. Wireless Multimedia Sensor Networks(WMSNs) have become the premier choice in many research communities and industry. Many state-of-art applications, such as surveillance, traffic monitoring, and remote heath care are essentially video tracking and transmission in WMSNs. The transmission speed is constrained by the big file size of video data and fixed bandwidth allocation in constant routing paths. In this paper, we present a CamShift based algorithm to compress the tracking of videos. Then we propose a bandwidth balancing strategy in which each sensor node is able to dynamically select …


Public Debate Format For The Development Of Soft Skill Competency In Computer Science Curricula, Christopher S. Stuetzle Apr 2015

Public Debate Format For The Development Of Soft Skill Competency In Computer Science Curricula, Christopher S. Stuetzle

Computer Science Faculty Publications

We present a method for incorporating soft skill development into a traditional computer science curriculum through the use of a public debate format. The debate format forces participants to practice public speaking, active listening, teamwork, research and preparation, and critical thinking, as well as having the less obvious benefit of contextualizing the material taught in the classroom by introducing contemporary, real-world debate topics. This work presents an example of the incorporation of public debates in an upper-level human-computer interaction class, including a discussion of student feedback, and suggestions for adopting the debate format to other upper-level courses and its perceived …


Public Debate Format For The Development Of Soft Skill Competency In Computer Science Curricula, Christopher S. Stuetzle Apr 2015

Public Debate Format For The Development Of Soft Skill Competency In Computer Science Curricula, Christopher S. Stuetzle

Computer Science Faculty Publications

We present a method for incorporating soft skill development into a traditional computer science curriculum through the use of a public debate format. The debate format forces participants to practice public speaking, active listening, teamwork, research and preparation, and critical thinking, as well as having the less obvious benefit of contextualizing the material taught in the classroom by introducing contemporary, real-world debate topics. This work presents an example of the incorporation of public debates in an upper-level human-computer interaction class, including a discussion of student feedback, and suggestions for adopting the debate format to other upper-level courses and its perceived …


Leading Undergraduate Students To Big Data Generation, Jianjun Yang, Ju Shen Mar 2015

Leading Undergraduate Students To Big Data Generation, Jianjun Yang, Ju Shen

Computer Science Faculty Publications

People are facing a flood of data today. Data are being collected at unprecedented scale in many areas, such as networking, image processing, virtualization, scientific computation, and algorithms. The huge data nowadays are called Big Data. Big data is an all encompassing term for any collection of data sets so large and complex that it becomes difficult to process them using traditional data processing applications. In this article, the authors present a unique way which uses network simulator and tools of image processing to train students abilities to learn, analyze, manipulate, and apply Big Data. Thus they develop students hands-on …


Hole Detection And Shape-Free Representation And Double Landmarks Based Geographic Routing In Wireless Sensor Networks, Jianjun Yang, Zongming Fei, Ju Shen Feb 2015

Hole Detection And Shape-Free Representation And Double Landmarks Based Geographic Routing In Wireless Sensor Networks, Jianjun Yang, Zongming Fei, Ju Shen

Computer Science Faculty Publications

In wireless sensor networks, an important issue of geographic routing is “local minimum” problem, which is caused by a “hole” that blocks the greedy forwarding process. Existing geographic routing algorithms use perimeter routing strategies to find a long detour path when such a situation occurs. To avoid the long detour path, recent research focuses on detecting the hole in advance, then the nodes located on the boundary of the hole advertise the hole information to the nodes near the hole. Hence the long detour path can be avoided in future routing. We propose a heuristic hole detecting algorithm which identifies …


Serve Or Skip: The Power Of Rejection In Online Bottleneck Matching, Barbara M. Anthony, Christine Chung Jan 2015

Serve Or Skip: The Power Of Rejection In Online Bottleneck Matching, Barbara M. Anthony, Christine Chung

Computer Science Faculty Publications

We consider the online matching problem, where n server-vertices lie in a metric space and n request-vertices that arrive over time each must immediately be permanently assigned to a server-vertex.We focus on the egalitarian bottleneck objective, where the goal is to minimize the maximum distance between any request and its server. It has been demonstrated that while there are effective algorithms for the utilitarian objective (minimizing total cost) in the resource augmentation setting where the offline adversary has half the resources, these are not effective for the egalitarian objective. Thus, we propose a new Serve-or-Skip bicriteria analysis model, where the …


Pedagogical Possibilities For The 2048 Puzzle Game, Todd W. Neller Jan 2015

Pedagogical Possibilities For The 2048 Puzzle Game, Todd W. Neller

Computer Science Faculty Publications

In this paper, we describe an engaging puzzle game called 2048 and outline a variety of exercises that can leverage the game’s popularity to engage student interest, reinforce core CS concepts, and excite student curiosity towards undergraduate research. Exercises range in difficulty from CS1-level exercises suitable for exercising and assessing 1D and 2D array skills to empirical undergraduate research in Monte Carlo Tree Search methods and skilled heuristic evaluation design.


Quick Git Setup, Joseph Lawrence, Seikyung Jung Jan 2015

Quick Git Setup, Joseph Lawrence, Seikyung Jung

Computer Science Faculty Publications

Version control is widely adopted in industry because it enables software development in groups, yet few students gain sufficient experience through their undergraduate courses. Even though version control is ideal for work submission, faculty may avoid it in favor of course management systems used only in academia. This tutorial introduces software to automate setting up version control with cloud project hosting services, and gives experience with version control as a side-effect of work submission and collection. This tutorial assumes no prior experience.


Clustering And Classification Of Email Contents, Izzat M. Alsmadi, I. Alhami Jan 2015

Clustering And Classification Of Email Contents, Izzat M. Alsmadi, I. Alhami

Computer Science Faculty Publications

Information users depend heavily on emails' system as one of the major sources of communication. Its importance and usage are continuously growing despite the evolution of mobile applications, social networks, etc. Emails are used on both the personal and professional levels. They can be considered as official documents in communication among users. Emails' data mining and analysis can be conducted for several purposes such as: Spam detection and classification, subject classification, etc. In this paper, a large set of personal emails is used for the purpose of folder and subject classifications. Algorithms are developed to perform clustering and classification for …


A Novel Root Based Arabic Stemmer, M. N. Al-Kabi, S. A. Kazakzeh, B. M. Abu Ata, S. A. Al-Rababah, Izzat M. Alsmadi Jan 2015

A Novel Root Based Arabic Stemmer, M. N. Al-Kabi, S. A. Kazakzeh, B. M. Abu Ata, S. A. Al-Rababah, Izzat M. Alsmadi

Computer Science Faculty Publications

Stemming algorithms are used in information retrieval systems, indexers, text mining, text classifiers etc., to extract stems or roots of different words, so that words derived from the same stem or root are grouped together. Many stemming algorithms were built in different natural languages. Khoja stemmer is one of the known and widely used Arabic stemmers. In this paper, we introduced a new light and heavy Arabic stemmer. This new stemmer is presented in this study and compared with two well-known Arabic stemmers. Results showed that accuracy of our stemmer is slightly better than the accuracy yielded by each one …


Evaluation Of Spam Impact On Arabic Websites Popularity, M. N. Al-Kabi, Izzat M. Alsmadi, H. A. Wahsheh Jan 2015

Evaluation Of Spam Impact On Arabic Websites Popularity, M. N. Al-Kabi, Izzat M. Alsmadi, H. A. Wahsheh

Computer Science Faculty Publications

The expansion of the Web and its information in all aspects of life raises the concern of how to trust information published on the Web especially in cases where publisher may not be known. Websites strive to be more popular and make themselves visible to search engines and eventually to users. Website popularity can be measured using several metrics such as the Web traffic (e.g. Website: visitors' number and visited page number). A link or page popularity refers to the total number of hyperlinks referring to a certain Web page. In this study, several top ranked Arabic Websites are selected …


Building An Islamic Financial Information System Based On Policy Managements, Izzat M. Alsmadi, M. Zarour Jan 2015

Building An Islamic Financial Information System Based On Policy Managements, Izzat M. Alsmadi, M. Zarour

Computer Science Faculty Publications

For many banks and customers in the Middle East and Islamic world, the availability and the ability to apply Islamic Shariah rules on financial activities is very important. In some cases, business and technical barriers can limit the ability to apply and offer financial services that are implemented according to Shariah rules.In this paper, we discuss enforcing Shariah rules from information technology viewpoint and show how such rules can be implemented and enforced in a financial establishment. Security authorization standard XACML is extended to consider Shariah rules. In this research XACML architecture, that is used and applied in many tools …


Salient Object Detection Via Objectness Proposals, Tam Nguyen Jan 2015

Salient Object Detection Via Objectness Proposals, Tam Nguyen

Computer Science Faculty Publications

Salient object detection has gradually become a popular topic in robotics and computer vision research. This paper presents a real-time system that detects salient objects by integrating objectness, foreground, and compactness measures. Our algorithm consists of four basic steps. First, our method generates the objectness map via object proposals. Based on the objectness map, we estimate the background margin and compute the corresponding foreground map which prefers the foreground objects. From the objectness map and the foreground map, the compactness map is formed to favor the compact objects. We then integrate those cues to form a pixel-accurate saliency map which …