Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

1999

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 436

Full-Text Articles in Computer Sciences

Experiments To Assess The Cost-Benefits Of Test-Suite Reduction, Gregg Rothermel, Mary Jean Harrold, Jeffery Von Ronne, Christie Hang, Jeffery Ostrin Dec 1999

Experiments To Assess The Cost-Benefits Of Test-Suite Reduction, Gregg Rothermel, Mary Jean Harrold, Jeffery Von Ronne, Christie Hang, Jeffery Ostrin

CSE Technical Reports

Test-suite reduction techniques attempt to reduce the cost of saving and reusing test cases during software maintenance by eliminating redundant test cases from test suites. A potential drawback of these techniques is that in reducing a test suite they might reduce the ability of that test suite to reveal faults in the software. Previous studies suggested that test-suite reduction techniques can reduce test suite size without significantly reducing the fault-detection capabilities of test suites. To further investigate this issue we performed experiments in which we examined the costs and benefits of reducing test suites of various sizes for several programs …


Grundlagenreflexionen Zur Thematik Anthropomorpher Schnittstellen, Rudolf Kaehr Dec 1999

Grundlagenreflexionen Zur Thematik Anthropomorpher Schnittstellen, Rudolf Kaehr

Rudolf Kaehr

Report for the EMBASSI Project


Characterizations Of Classes Of Programs By Three-Valued Operators, Anthony K. Seda, Pascal Hitzler Dec 1999

Characterizations Of Classes Of Programs By Three-Valued Operators, Anthony K. Seda, Pascal Hitzler

Computer Science and Engineering Faculty Publications

Several important classes of normal logic programs, including the classes of acyclic, acceptable, and locally hierarchical programs, have the property that every program in the class has a unique two-valued supported model. In this paper, we call such classes unique supported model classes. We analyse and characterize these classes by means of operators on three-valued logics. Our studies will motivate the definition of a larger unique supported model class which we call the class of Phi-accessible programs. Finally, we show that the class of Phi -accessible programs is computationally adequate in that every partial recursive function can be implemented by …


Towards The Evaluation Of Netcentric Scientific Applications, Shanhani Markus, Elias N. Houstis Dec 1999

Towards The Evaluation Of Netcentric Scientific Applications, Shanhani Markus, Elias N. Houstis

Department of Computer Science Technical Reports

No abstract provided.


Off-Line Compression By Greedy Textual Substitution, Alberto Apostolico, Stefano Lonardi Dec 1999

Off-Line Compression By Greedy Textual Substitution, Alberto Apostolico, Stefano Lonardi

Department of Computer Science Technical Reports

No abstract provided.


String Pattern Matching For A Deluge Survival Kit, Alberto Apostolico, Maxime Crochemore Dec 1999

String Pattern Matching For A Deluge Survival Kit, Alberto Apostolico, Maxime Crochemore

Department of Computer Science Technical Reports

No abstract provided.


Experimental Evaluation Of Design Tradeoff In Specialized Virtual Machine For Multimedia Traffic In Active Networks, Sheng-Yih Wang, Bharat Bhargava Dec 1999

Experimental Evaluation Of Design Tradeoff In Specialized Virtual Machine For Multimedia Traffic In Active Networks, Sheng-Yih Wang, Bharat Bhargava

Department of Computer Science Technical Reports

No abstract provided.


An Adaptable Network Architecture For Multimedia Traffic Management And Control, Sheng-Yih Wang, Bharat Bhargava Dec 1999

An Adaptable Network Architecture For Multimedia Traffic Management And Control, Sheng-Yih Wang, Bharat Bhargava

Department of Computer Science Technical Reports

No abstract provided.


A Hierarchy Of Maps Between Compacta, Paul Bankston Dec 1999

A Hierarchy Of Maps Between Compacta, Paul Bankston

Mathematics, Statistics and Computer Science Faculty Research and Publications

Let CH be the class of compacta (i.e., compact Hausdorff spaces), with BS the subclass of Boolean spaces. For each ordinal α and pair $\langle K,L\rangle$ of subclasses of CH, we define Lev≥α K,L), the class of maps of level at least α from spaces in K to spaces in L, in such a way that, for finite α, Lev≥α (BS,BS) consists of the Stone duals of Boolean lattice embeddings that preserve all prenex first-order formulas of quantifier rank α. Maps of level ≥ 0 are just the continuous surjections, and the maps of level ≥ 1 are …


A Model For Active Techniques For Compressed Video Transmission, Sheng-Yih Wang, Bharat Bhargava Dec 1999

A Model For Active Techniques For Compressed Video Transmission, Sheng-Yih Wang, Bharat Bhargava

Department of Computer Science Technical Reports

No abstract provided.


Network Security Versus Network Connectivity: A Framework For Addressing The Issues Facing The Air Force Medical Community, Franklin E. Cunningham Jr. Dec 1999

Network Security Versus Network Connectivity: A Framework For Addressing The Issues Facing The Air Force Medical Community, Franklin E. Cunningham Jr.

Theses and Dissertations

The Air Force has instituted Barrier Reef to protect its networks. The Air Force medical community operates network connections that are incompatible with Barrier Reef. To overcome this problem, OASD(HA) directed the Tri-Service Management Program Office (TIMPO) to develop an architecture that protects all military health systems and allows them to link with all three services and outside partners. This research studied the underlying networking issues and formed a framework based on data from network experts from the Air Force's medical centers and their base network organizations. The findings were compared TIMPO and a composite framework was developed that more …


Disclosure Detection In Multivariate Categorical Databases: Auditing Confidentiality Protection Through Two New Matrix Operators, Sumit Dutta Chowdhury, George T. Duncan, Ramayya Krishnan, Stephen F. Roehrig, Sumitra Mukherjee Dec 1999

Disclosure Detection In Multivariate Categorical Databases: Auditing Confidentiality Protection Through Two New Matrix Operators, Sumit Dutta Chowdhury, George T. Duncan, Ramayya Krishnan, Stephen F. Roehrig, Sumitra Mukherjee

CCE Faculty Articles

As databases grow more prevalent and comprehensive, database administrators seek to limit disclosure of confidential information while still providing access to data. Practical databases accommodate users with heterogeneous needs for access. Each class of data user is accorded access to only certain views. Other views are considered confidential, and hence to be protected. Using illustrations from health care and education, this article addresses inferential disclosure of confidential views in multidimensional categorical databases. It demonstrates that any structural, so data-value-independent method for detecting disclosure can fail. Consistent with previous work for two-way tables, it presents a data-value-dependent method to obtain tight …


Power, Performance, And Perception (P3): Integrating Usability Metrics And Technology Acceptance Determinants To Validate A New Model For Predicting System Usage, Alan P. Fiorello Dec 1999

Power, Performance, And Perception (P3): Integrating Usability Metrics And Technology Acceptance Determinants To Validate A New Model For Predicting System Usage, Alan P. Fiorello

Theses and Dissertations

Currently, there are two distinct approaches to assist information technology managers in the successful implementation of office automation software. The first approach resides within the field of usability engineering, while the second approach is derived from the discipline of management information systems (MIS). However, neither approach has successfully produced conclusive evidence that explains what characteristics facilitate system use as well as influence user acceptance of the system. This study reports on the validity of a new model, entitled the Power, Performance, Perception (P3) model, that links the constructs of usability engineering to user acceptance. Additionally, speech recognition software (SRS) was …


On-Line Bayesian Tree-Structured Transformation Of Hidden Markov Models For Speaker Adaptation, Shaojun Wang, Yunxin Zhao Dec 1999

On-Line Bayesian Tree-Structured Transformation Of Hidden Markov Models For Speaker Adaptation, Shaojun Wang, Yunxin Zhao

Kno.e.sis Publications

This paper presents a new recursive Bayesian learning approach for transformation parameter estimation in speaker adaptation. Our goal is to incrementally transform (or adapt) the entire set of HMM parameters for a new speaker or new acoustic enviroment from a small amount of adaptation data. By establishing a clustering tree of HMM Gaussian mixture components, the finest affine transformation parameters for individual HMM Gaussian mixture components can be dynamically searched. The on-line Bayesian learning technique proposed in our recent work is used for recursive maximum a posteriori estimation of affine transformation parameters. Speaker adaptation experiments using a 26-letter English alphabet …


Optimal Power Allocation In Cdma Forward Link Using Dependency Between Pilot And Traffic Channels, Seung Jong Park, Dongwoo Kim, Chang Yeon Kim Dec 1999

Optimal Power Allocation In Cdma Forward Link Using Dependency Between Pilot And Traffic Channels, Seung Jong Park, Dongwoo Kim, Chang Yeon Kim

Computer Science Faculty Research & Creative Works

This paper shows a new method for minimizing the transmit power on CDMA forward link channels. Different from previous works, the proposed method uses the dependency that exists between the respective signal qualities of the pilot channel and traffic channels. Since present CDMA forward link exploits coherent demodulation with continuously transmitting pilot signals, the stronger the pilot channel is, the less traffic power may be required while the same transmission quality is maintained. With laboratory tests, the dependency is graphed. And then an optimal pilot signal quality is found, which minimizes the total transmit power. Considering various mobile environments, -10 …


A Comparison Of Training Algorithms For Dhp Adaptive Critic Neuro-Control, George G. Lendaris, Thaddeus T. Shannon, Andres Rustan Dec 1999

A Comparison Of Training Algorithms For Dhp Adaptive Critic Neuro-Control, George G. Lendaris, Thaddeus T. Shannon, Andres Rustan

Systems Science Faculty Publications and Presentations

A variety of alternate training strategies for implementing the Dual Heuristic Programming (DHP) method of approximate dynamic programming in the neuro-control context are explored. The DHP method of controller training has been successfully demonstrated by a number of authors on a variety of control problems in recent years, but no unified view of the implementation details of the method has yet emerged. A number of options are here described for sequencing the training of the Controller and Critic networks in DHP implementations. Results are given about their relative efficiency and the quality of the resulting controllers for two benchmark control …


Information System Incidents: The Development Of A Damage Assessment Model, Mark D. Horony Dec 1999

Information System Incidents: The Development Of A Damage Assessment Model, Mark D. Horony

Theses and Dissertations

Information system (IS) incidents are on the rise. With low manning and undertrained information security specialists it is difficult for organizations to stop IS incidents from occurring. Once an incident has occurred it is the IS manager's responsibility to ensure that a full and accurate damage assessment has been accomplished. However, most IS managers lack the necessary tools to assess the damage from an incident. This exploratory thesis developed an IS incident damage assessment model (DAM) that can be part of the IS manager's tool kit. During the development of the model, it became apparent that the model was supported …


Towards A Game Theory Model Of Information Warfare, David A. Burke Dec 1999

Towards A Game Theory Model Of Information Warfare, David A. Burke

Theses and Dissertations

The repeated game of incomplete information model, a subclass of game theory models, was modified to include aspects of information warfare. The repeated game of incomplete information model was first developed to analyze nuclear weapons disarmament negotiations. The central role of information in this model suggested its applicability to IW, which focuses on the defense and acquisition of information. A randomized experimental design was utilized to determine how people behave in a laboratory IW setting and to test the IW game model's basic predictions. The impact of experience and learning on IW performance was also assessed during the experiment. IW …


Computational Geometry Column 36, Joseph O'Rourke Dec 1999

Computational Geometry Column 36, Joseph O'Rourke

Computer Science: Faculty Publications

Two results in "computational origami" are illustrated.


A Simplified Model Of Wound Healing - Ii: The Critical Size Defect In Two Dimensions, J. S. Arnold, John A. Adam Dec 1999

A Simplified Model Of Wound Healing - Ii: The Critical Size Defect In Two Dimensions, J. S. Arnold, John A. Adam

Mathematics & Statistics Faculty Publications

Recently, a one-dimensional model was developed which gives a reasonable explanation for the existence of a Critical Size Defect (CSD) in certain animals [1]. In this paper, we examine the more realistic two-dimensional model of a circular wound of uniform depth to see what modifications are to be found, as compared with the one-dimensional model, in studying the CSD phenomenon. It transpires that the range of CSD sizes for a reasonable estimate of parameter values is 1 mm-1 cm. More realistic estimates await the appropriate experimental data.


Implementation Of Speech Recognition Software For Text Processing: An Exploratory Analysis, Sean P. Abell Dec 1999

Implementation Of Speech Recognition Software For Text Processing: An Exploratory Analysis, Sean P. Abell

Theses and Dissertations

The rationale behind implementing new information technologies is often to gain productivity improvements associated with the substitution of machinery for labor. However, the literature shows little direct evidence of a positive relationship between information technology investment and subsequent productivity benefits. This thesis reports on the examination into the productivity implications of implementing speech recognition software in a text processing environment. More specifically, research was conducted to compare text processing speeds and error rates using speech recognition software versus the keyboard and mouse. Of interest was the time required to input and proofread text processing tasks as well as the number …


The Window Distribution Of Multiple Tcps With Random Loss Queues, Archan Misra, Teunis Ott, John Baras Dec 1999

The Window Distribution Of Multiple Tcps With Random Loss Queues, Archan Misra, Teunis Ott, John Baras

Research Collection School Of Computing and Information Systems

Two approximate techniques for analyzing the window size distribution of TCP flows sharing a RED-like bottleneck queue are presented. Both methods presented first use a fixed point algorithm to obtain the mean window sizes of the flows, and the mean queue length in the bottleneck buffer. The simpler of the two methods then uses the ‘square root formula’ for TCP; the other method is more complicated. More often than not, the simpler method is slightly more accurate; this is probably due to the fact that window sizes of the different flows are negatively correlated.


Work In Progress: Automating Proportion/Period Scheduling, David Steere, Jonathan Walpole, Calton Pu Dec 1999

Work In Progress: Automating Proportion/Period Scheduling, David Steere, Jonathan Walpole, Calton Pu

Computer Science Faculty Publications and Presentations

The recent effort to define middleware capable of supporting real-time applications creates the opportunity to raise the level of abstraction presented to the programmer. We propose that proportion/period is a better abstraction for specifying resource needs and allocation than priorities. We are currently investigating techniques to address some issues that are restricting use of proportion/period scheduling to research real-time prototypes. In particular, we are investigating techniques to automate the task of selecting proportion and period, and that allow proportion/period to incorporate job importance under overload conditions.


Rule-Mitigated Collaboration Technology, Carl Chang, Alexei Vorontsov, Jia Zhang, Francis Quek Nov 1999

Rule-Mitigated Collaboration Technology, Carl Chang, Alexei Vorontsov, Jia Zhang, Francis Quek

Jia Zhang

No abstract provided.


Fuzzy Neural Network Models For Supervised Classification: Multispectral Image Analysis, Arun D. Kulkarni, Kamlesh Lulla Nov 1999

Fuzzy Neural Network Models For Supervised Classification: Multispectral Image Analysis, Arun D. Kulkarni, Kamlesh Lulla

Arun Kulkarni

No abstract provided.


Pushpush Is Np-Hard In 3d, Joseph O'Rourke, The Smith Problem Solving Group Nov 1999

Pushpush Is Np-Hard In 3d, Joseph O'Rourke, The Smith Problem Solving Group

Computer Science: Faculty Publications

We prove that a particular pushing-blocks puzzle is intractable in 3D. The puzzle, inspired by the game PushPush, consists of unit square blocks on an integer lattice. An agent may push blocks (but never pull them) in attempting to move between given start and goal positions. In the PushPush version, the agent can only push one block at a time, and moreover, each block, when pushed, slides the maximal extent of its free range. We prove this version is NP-hard in 3D by reduction from SAT. The corresponding problem in 2D remains open.


Immaccs: A Military Decision-Support System, Jens G. Pohl, Anthony A. Wood, Kym Jason Pohl, Arthur J. Chapman Nov 1999

Immaccs: A Military Decision-Support System, Jens G. Pohl, Anthony A. Wood, Kym Jason Pohl, Arthur J. Chapman

Collaborative Agent Design (CAD) Research Center

The Integrated Marine Multi-Agent Command and Control System (IMMACCS) is a multi-agent, distributed system, designed to provide a ‘common tactical picture’ with integrated and meaningful decision-support facilities to authorized operators at any access node. IMMACCS has been implemented as a three-tier architecture that distinguishes between information, logic and presentation. It utilizes an object-serving communication facility with subscription and multi-casting capabilities that is based on the Common Object Request Broker Architecture (CORBA). With an emphasis on application, IMMACCS was designed and implemented in concert with its military users as an integral component of experiments conceived by the Marine Corps Warfighting Laboratory …


Evaluating Maximum Likelihood Estimation Methods To Determine The Hurst Coefficient, Christina Marie Kendziorski, J. B. Bassingthwaighte, Peter J. Tonellato Nov 1999

Evaluating Maximum Likelihood Estimation Methods To Determine The Hurst Coefficient, Christina Marie Kendziorski, J. B. Bassingthwaighte, Peter J. Tonellato

Mathematics, Statistics and Computer Science Faculty Research and Publications

A maximum likelihood estimation method implemented in S-PLUS (S-MLE) to estimate the Hurst coefficient (H) is evaluated. The Hurst coefficient, with 0.5<HS-MLE was developed to estimate H for fractionally differenced (fd) processes. However, in practice it is difficult to distinguish between fd processes and fractional Gaussian noise (fGn) processes. Thus, the method is evaluated for estimating H for both fd and fGn processes. S-MLE gave biased results of H for fGn processes of any length and for fd processes of lengths less than 210. A modified method is proposed to correct for …


Mental Models For Introductory Csc Concepts, Jennifer J. Wheeler, Erika Rogers Nov 1999

Mental Models For Introductory Csc Concepts, Jennifer J. Wheeler, Erika Rogers

Computer Science and Software Engineering

If is hypothesized that the development of mental models for a concept can lead to improved learning. The purpose of this paper is to identify, quantify, and analyze the mental models of students beginning to program in the UNIX environment. By focusing on 4 basic concept, this study abstracts current mental models from students and hypothesizes ways of improving these models. Ultimately, the results of the study will be incorporated into the design and implementation of a multimedia tutor. This tutor will attempt to teach people how to develop mental models in order to improve their learning.


To Host A Legacy System To The Web, Miguel Angel Bustamante Nov 1999

To Host A Legacy System To The Web, Miguel Angel Bustamante

Student Work

The dramatic improvements in global interconectivity due to intranets, extranets and the Internet has led to many enterprises to consider migrating legacy systems to a web based systems. While data remapping is relatively straightforward in most cases, greater challenges lie in adapting legacy application software. This research effort describes an experiment in which a legacy system is migrated to a web-client/server environment. First, this thesis reports on the difficulties and issues arising when porting a legacy system International Invoice (IIMM) to a web-client/server environment. Next, this research analyzes the underlying issues, and offer cautionary guidance to future migrators and finally …