Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Graphics and Human Computer Interfaces (13)
- Engineering (11)
- Information Security (8)
- Computer Engineering (7)
- Databases and Information Systems (7)
-
- Artificial Intelligence and Robotics (3)
- Digital Communications and Networking (3)
- Numerical Analysis and Scientific Computing (3)
- Other Computer Sciences (3)
- Social and Behavioral Sciences (3)
- Software Engineering (3)
- Systems Architecture (3)
- Communication (2)
- Hardware Systems (2)
- Nanoscience and Nanotechnology (2)
- Accounting (1)
- Anthropology (1)
- Archaeological Anthropology (1)
- Business (1)
- Computer and Systems Architecture (1)
- Electrical and Computer Engineering (1)
- Industrial Engineering (1)
- Interpersonal and Small Group Communication (1)
- Management Information Systems (1)
- OS and Networks (1)
- Operational Research (1)
- Operations Research, Systems Engineering and Industrial Engineering (1)
- Other Computer Engineering (1)
Articles 31 - 36 of 36
Full-Text Articles in Computer Sciences
Extending The Hybridthread Smp Model For Distributed Memory Systems, Eugene Anthony Cartwright Iii
Extending The Hybridthread Smp Model For Distributed Memory Systems, Eugene Anthony Cartwright Iii
Graduate Theses and Dissertations
Memory Hierarchy is of growing importance in system design today. As Moore's Law allows system designers to include more processors within their designs, data locality becomes a priority. Traditional multiprocessor systems on chip (MPSoC) experience difficulty scaling as the quantity of processors increases. This challenge is common behavior of memory accesses in a shared memory environment and causes a decrease in memory bandwidth as processor numbers increase. In order to provide the necessary levels of scalability, the computer architecture community has sought to decentralize memory accesses by distributing memory throughout the system. Distributed memory offers greater bandwidth due to decoupled …
Mitigating Insider Threat In Relational Database Systems, Qussai Yaseen
Mitigating Insider Threat In Relational Database Systems, Qussai Yaseen
Graduate Theses and Dissertations
The dissertation concentrates on addressing the factors and capabilities that enable insiders to violate systems security. It focuses on modeling the accumulative knowledge that insiders get throughout legal accesses, and it concentrates on analyzing the dependencies and constraints among data items and represents them using graph-based methods. The dissertation proposes new types of Knowledge Graphs (KGs) to represent insiders' knowledgebases. Furthermore, it introduces the Neural Dependency and Inference Graph (NDIG) and Constraints and Dependencies Graph (CDG) to demonstrate the dependencies and constraints among data items. The dissertation discusses in detail how insiders use knowledgebases and dependencies and constraints to get …
Recognizing Patterns In Transmitted Signals For Identification Purposes, Baha' A. Alsaify
Recognizing Patterns In Transmitted Signals For Identification Purposes, Baha' A. Alsaify
Graduate Theses and Dissertations
The ability to identify and authenticate entities in cyberspace such as users, computers, cell phones, smart cards, and radio frequency identification (RFID) tags is usually accomplished by having the entity demonstrate knowledge of a secret key. When the entity is portable and physically accessible, like an RFID tag, it can be difficult to secure given the memory, processing, and economic constraints. This work proposes to use unique patterns in the transmitted signals caused by manufacturing differences to identify and authenticate a wireless device such as an RFID tag. Both manufacturer identification and tag identification are performed on a population of …
Defining, Executing And Visualizing Representative Workflows In A Retail Domain, May Zeineldin
Defining, Executing And Visualizing Representative Workflows In A Retail Domain, May Zeineldin
Graduate Theses and Dissertations
Our lives are filled with routine activities that we do more or less on auto-pilot such as driving to work and cooking. This thesis explores a workflow representation as a way to represent such activities of daily living. The domain of a retail store environment is used. Workflows are initially expressed in a structured English representation, then translated into a Petri net notation and implemented in mix of Petri nets, Lua, and C so that the resulting workflows can be displayed as the actions of collections of avatarbots (avatars controlled by programs) in a 3D virtual world, Second Life. One …
High Performance Geospatial Analysis On Emerging Parallel Architectures, Seth Warn
High Performance Geospatial Analysis On Emerging Parallel Architectures, Seth Warn
Graduate Theses and Dissertations
Geographic information systems (GIS) are performing increasingly sophisticated analyses on growing data sets. These analyses demand high performance. At the same time, modern computing platforms increasingly derive their performance from several forms of parallelism. This dissertation explores the available parallelism in several GIS-applied algorithms: viewshed calculation, image feature transform, and feature analysis. It presents implementations of these algorithms that exploit parallel processing to reduce execution time, and analyzes the effectiveness of the implementations in their use of parallel processing.
Two Essays On The Accounting Treatment For Information Technology Expenditures, Kimberly Swanson Church
Two Essays On The Accounting Treatment For Information Technology Expenditures, Kimberly Swanson Church
Graduate Theses and Dissertations
The current accounting measurement and reporting system is ill-equipped to provide intangible investment information that is decision useful for stakeholders in the information economy. Potentially relevant intangible items are not reported on the balance sheet, since current standards mandate the immediate expensing of these intangible items. Presumably FASB's uncertainty with the fundamental issues of extent and timing of future benefits to the firm has led to concerns with relevance, reliability, and objectivity of capitalizing some intangibles, which results in potential long term value generating expenditures being immediately expensed on the income statement. Prior research has demonstrated extent and timing of …