Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

2003

Series

Discipline
Institution
Keyword
Publication
File Type

Articles 1 - 30 of 453

Full-Text Articles in Computer Sciences

Experimenting With Tcpa/Tcg Hardware, Or: How I Learned To Stop Worrying And Love The Bear, John Marchesini, Sean Smith, Omen Wild, Rich Macdonald Dec 2003

Experimenting With Tcpa/Tcg Hardware, Or: How I Learned To Stop Worrying And Love The Bear, John Marchesini, Sean Smith, Omen Wild, Rich Macdonald

Computer Science Technical Reports

Over the last few years, our group has been working on applications of secure coprocessors---but has been frustrated by the limited computational environment and high expense of such devices. Over the last few years, the TCPA (now TCG) has produced a specification for a trusted platform module (TPM)---a small hardware addition intended to improve the overall security of a larger machine (and tied up with a still-murky vision of Windows-based trusted computing). Some commodity desktops now come up with these TPMs. Consequently, we began an experiment to see if (in the absence of a Non-Disclosure Agreement) we could use this …


Spatiotemporal Databases: Models For Attracting Students To Research, Ágnes Bércesné Novák, Peter Revesz, Zsolt Tuza Dec 2003

Spatiotemporal Databases: Models For Attracting Students To Research, Ágnes Bércesné Novák, Peter Revesz, Zsolt Tuza

CSE Conference and Workshop Papers

In higher education professors often make much effort to introduce their students to research. Unfortunately, the present standard database systems curriculum is composed of well-settled subjects that do not lead to research. The challenge is to bring the research frontier closer to students at beginner level. In this paper we describe how it can be done in the area of spatiotemporal databases. We propose a new database systems curriculum and illustrate its benefits by mentioning several highly succsesful student projects in some recent experimental introductory database systems courses that followed the new curriculum.


A Subgroup Algorithm To Identify Cross-Rotation Peaks Consistent With Non-Crystallographic Symmetry, Ryan H. Lilien, Chris Bailey-Kellogg, Amy C. Anderson, Bruce R. Donald Dec 2003

A Subgroup Algorithm To Identify Cross-Rotation Peaks Consistent With Non-Crystallographic Symmetry, Ryan H. Lilien, Chris Bailey-Kellogg, Amy C. Anderson, Bruce R. Donald

Computer Science Technical Reports

Molecular replacement (MR) often plays a prominent role in determining initial phase angles for structure determination by X-ray crystallography. In this paper, an efficient quaternion-based algorithm is presented for analyzing peaks from a cross-rotation function to identify model orientations consistent with non-crystallographic symmetry (NCS), and to generate NCS-consistent orientations missing from the list of cross-rotation peaks. Our algorithm, CRANS, analyzes the rotation differences between each pair of cross-rotation peaks to identify finite subgroups of NCS. Sets of rotation differences satisfying the subgroup axioms correspond to orientations compatible with the correct NCS. The CRANS algorithm was first tested using cross-rotation peaks …


A Study Of The Suitability Of Irobex For High-Speed Exchange Of Large Data Objects, Casey T. Deccio, Joseph Ekstrom, Charles D. Knutson, D. Ryan Partridge, Kevin B. Tew Dec 2003

A Study Of The Suitability Of Irobex For High-Speed Exchange Of Large Data Objects, Casey T. Deccio, Joseph Ekstrom, Charles D. Knutson, D. Ryan Partridge, Kevin B. Tew

Faculty Publications

This paper demonstrates that careful tuning of the OBEX and IrLAP negotiated parameters allows OBEX to scale well for use with large data objects and high transmission rates. Due to the substantial time overhead inherent in link turnarounds, minimizing turnarounds during the transmission of a large object helps to maximimize link efficiency. The IrLAP window size and OBEX packet size significantly impact the number of required turnarounds during the transmission of a large object. When these parameters are properly tuned, maximum throughput can be achieved, and OBEX performs efficiently at high data rates.


Efficient Customizable Middleware, Ravi Pratap Maddimsetty Dec 2003

Efficient Customizable Middleware, Ravi Pratap Maddimsetty

All Computer Science and Engineering Research

The rather large feature set of current Distributed Object Computing (DOC) middleware can be a liability for certain applications which have a need for only a certain subset of these features but have to suffer performance degradation and code bloat due to all the present features. To address this concern, a unique approach to building fully customizable middleware was undertaken in FACET, a CORBA event channel written using AspectJ. FACET consists of a small, essential core that represents the basic structure and functionality of an event channel into which additional features are woven using aspects so that the resulting event …


An Iterative Beam Search Algorithm For Degenerate Primer Selection, Richard Souvenir Dec 2003

An Iterative Beam Search Algorithm For Degenerate Primer Selection, Richard Souvenir

All Computer Science and Engineering Research

Single Nucleotide Polymorphism (SNP) Genotyping is an important molecular genetics process in the early stages of producing results that will be useful in the medical field. Due to inherent complexities in DNA manipulation and analysis, many different methods have been proposed for a standard assay. One of the proposed techniques for performing SNP Genotyping requires amplifying regions of DNA surrounding a large number of SNP loci. In order to automate a portion of this particular method, it is necessary to select a set of primers for the experiment. Selecting these primers can be formulated as the Multiple Degenerate Primer Design …


Resource Configuration And Network Design In Extensible Networks, Sumi Y. Choi Dec 2003

Resource Configuration And Network Design In Extensible Networks, Sumi Y. Choi

All Computer Science and Engineering Research

The goal of packet-switched networks has conventionally been delivering data to users. This concept is changing rapidly as current technologies make it possible to build network processing engines that apply intermediary services to data traffic. This trend introduces an extensive range of ways to develop and operate applications by allowing processing services customized for applications' needs at intermediate network users, as it can relieve individuals from the need to acquire, install, and maintain software in end systems to perform required functions. As such network services become more widely used, it will become increasingly important for service providers to have effective …


Flocking Over 3d Terrain, Joel Gompert Dec 2003

Flocking Over 3d Terrain, Joel Gompert

CSE Technical Reports

A method is presented for animating herds of animals that can follow terrain while being efficient enough to run in real-time. This method involves making simple modifications to Reynolds’ agent-based flocking algorithm. The modifications use only local properties of the terrain, and thus have low complexity. This method focuses on using terrain that can be described as an elevation grid, but it may be extendible to arbitrary terrain. The flocking algorithm with these modifications produces naturally behaving herds that follow the terrain. They will swerve around hills and attempt to follow paths that reduce energy expenditure. The terrain-following rule added …


Pyro: A Python-Based Versatile Programming Environment For Teaching Robotics, D. Blank, D. Kumar, Lisa A. Meeden, H. Yanco Dec 2003

Pyro: A Python-Based Versatile Programming Environment For Teaching Robotics, D. Blank, D. Kumar, Lisa A. Meeden, H. Yanco

Computer Science Faculty Works

In this article we describe a programming framework called Pyro, which provides a set of abstractions that allows students to write platform-independent robot programs. This project is unique because of its focus on the pedagogical implications of teaching mobile robotics via a top-down approach. We describe the background of the project, its novel abstractions, its library of objects, and the many learning modules that have been created from which curricula for different types of courses can be drawn. Finally, we explore Pyro from the students' perspective in a case study.


Viewer-Based Directional Querying For Mobile Applications, Keith Gardiner, James Carswell Dec 2003

Viewer-Based Directional Querying For Mobile Applications, Keith Gardiner, James Carswell

Conference papers

With the steady and fast advancements in the integration of geographic information systems and mobile location-based services, interest in exploiting this technology for Cultural Heritage (CH) data sharing has become apparent. In this area there has been an increasing need to integrate positional information with non-positional data and add a spatial dimension to the definition of a users “context”. In this paper we describe an implementation of a viewer-based directional query processor that operates on an Oracle Spatial database. The spatial position and orientation are taken from the viewer’s perspective. Using this frame of reference a view-port is defined in …


Multi-Phase Homework Assignments In Cs I And Cs Ii, James Huggins Dec 2003

Multi-Phase Homework Assignments In Cs I And Cs Ii, James Huggins

Computer Science Presentations And Conference Materials

ll of the panelists have used small sets of related programming assignments in introductory CS courses. These assignments are essentially larger programs which are developed during several separate phases. This approach has several advantages: • Students are able to develop more realistic and interesting programs. • Students are motivated to write better code as well as documentation. Those who don't are quickly confronted by the implications. • Student interest in completing the projects is better sustained, since there is continuity from one project to the next. • It models desirable techniques such as iterative development and encapsulation. • It demonstrates …


Rank-Aware Query Optimization, Ihab F. Ilyas, Rahul Shah, Walid G. Aref, Jeffrey S. Vitter, Ahmed K. Almagarmid Dec 2003

Rank-Aware Query Optimization, Ihab F. Ilyas, Rahul Shah, Walid G. Aref, Jeffrey S. Vitter, Ahmed K. Almagarmid

Department of Computer Science Technical Reports

No abstract provided.


Efficient Execution Of Sliding-Window Queries Over Data Streams, Moustafa A. Hammad, Walid G. Aref, Michael J. Franklin, Mohammed P. Mokbel, Ahmed K. Elmagarmid Dec 2003

Efficient Execution Of Sliding-Window Queries Over Data Streams, Moustafa A. Hammad, Walid G. Aref, Michael J. Franklin, Mohammed P. Mokbel, Ahmed K. Elmagarmid

Department of Computer Science Technical Reports

No abstract provided.


An Approach To Identifying Beneficial Collaboration Securely In Decentralized Logistics Systems, Richard Cho, Chris Clifton, Ananth V. Ilyer, Wei Jiang, Murat Kantarioglu Dec 2003

An Approach To Identifying Beneficial Collaboration Securely In Decentralized Logistics Systems, Richard Cho, Chris Clifton, Ananth V. Ilyer, Wei Jiang, Murat Kantarioglu

Department of Computer Science Technical Reports

No abstract provided.


Understanding The Impact Of Shill Bidding In Online English Auctions, Bharat Bhargava, Mamata Jenamani, Yuhui Zhong Dec 2003

Understanding The Impact Of Shill Bidding In Online English Auctions, Bharat Bhargava, Mamata Jenamani, Yuhui Zhong

Department of Computer Science Technical Reports

No abstract provided.


Xstamps: A Multiversion Timestamps Concurrency Control Protocol For Xml Data, Khin-Myo Win, Wee-Keong Ng, Ee Peng Lim Dec 2003

Xstamps: A Multiversion Timestamps Concurrency Control Protocol For Xml Data, Khin-Myo Win, Wee-Keong Ng, Ee Peng Lim

Research Collection School Of Computing and Information Systems

With the tremendous growth of XML data over the Web, efficient management of such data becomes a new challenge for database community. Several data management solutions, proposed in recent years, extend the capability of traditional database systems to meet the needs of XML data while alternative approaches introduce new generation databases, named as native XML database management systems. Although traditional databases have mature transaction management and concurrency control techniques, there is still a need to tailor techniques for native XML databases in order to deal with distinct characteristics of XML. In this paper, we propose XStamps, a multiversion timestamps concurrency …


Predicting Nonlinear Network Traffic Using Fuzzy Neural Network, Zhaoxia Wang, Tingzhu Hao, Zengqiang Chen, Zhuzhi Yuan Dec 2003

Predicting Nonlinear Network Traffic Using Fuzzy Neural Network, Zhaoxia Wang, Tingzhu Hao, Zengqiang Chen, Zhuzhi Yuan

Research Collection School Of Computing and Information Systems

Network traffic is a complex and nonlinear process, which is significantly affected by immeasurable parameters and variables. This paper addresses the use of the five-layer fuzzy neural network (FNN) for predicting the nonlinear network traffic. The structure of this system is introduced in detail. Through training the FNN using back-propagation algorithm with inertia] terms the traffic series can be well predicted by this FNN system. We analyze the performance of the FNN in terms of prediction ability as compared with solely neural network. The simulation demonstrates that the proposed FNN is superior to the solely neural network systems. In addition, …


Enabling Computer Decisions Based On Eeg Input, Benjamin J. Culpepper, Robert M. Keller Dec 2003

Enabling Computer Decisions Based On Eeg Input, Benjamin J. Culpepper, Robert M. Keller

All HMC Faculty Publications and Research

Multilayer neural networks were successfully trained to classify segments of 12-channel electroencephalogram (EEG) data into one of five classes corresponding to five cognitive tasks performed by a subject. Independent component analysis (ICA) was used to segregate obvious artifact EEG components from other sources, and a frequency-band representation was used to represent the sources computed by ICA. Examples of results include an 85% accuracy rate on differentiation between two tasks, using a segment of EEG only 0.05 s long and a 95% accuracy rate using a 0.5-s-long segment.


Semantic (Web) Technology In Action: Ontology Driven Information Systems For Search, Integration, And Analysis, Amit P. Sheth, Cartic Ramakrishnan Dec 2003

Semantic (Web) Technology In Action: Ontology Driven Information Systems For Search, Integration, And Analysis, Amit P. Sheth, Cartic Ramakrishnan

Kno.e.sis Publications

Semantics is seen as the key ingredient in the next phase of the Web infrastructure as well as the next generation of information systems applications. In this context, we review some of the reservations expressed about the viability of the Semantic Web. We respond to these by identifying a Semantic Technology that supports the key capabilities also needed to realize the Semantic Web vision, namely representing, acquiring and utilizing knowledge. Given that scalability is a key challenge, we briefly review our observations from developing three classes of real world applications and corresponding technology components: search/browsing, integration, and analytics. We distinguish …


Semantic Web Processes: Semantics Enabled Annotation, Discovery, Composition, And Orchestration Of Web Scale Processes, Jorge Cardoso, Amit P. Sheth Dec 2003

Semantic Web Processes: Semantics Enabled Annotation, Discovery, Composition, And Orchestration Of Web Scale Processes, Jorge Cardoso, Amit P. Sheth

Kno.e.sis Publications

This tutorial deals with the evolution of inter- Enterprise and Web scale process to support e-commerce and e-services. It taps into the promises of two of the hottest R&D and technology areas: Web services and the Semantic Web. It presents how applying semantics to each of the steps in the Semantic Web Process lifecycle can help address critical issues in reuse, integration and scalability.


Software Development Productivity And Cycle Time Reduction, Victor A. Clincy Dec 2003

Software Development Productivity And Cycle Time Reduction, Victor A. Clincy

Faculty and Research Publications

Increasing software developers' productivity and reducing the software development process' cycle time are key goals for organizations responsible for building software applications. This paper proposes four major areas impacting an organization's ability to increase developer productivity and reduce development cycle time. The four areas are (1) organizational structure and climate, (2) reward system, (3) software development process and (4) the use of software design and testing tools.


Structuring Lecture Videos For Distance Learning Applications, Chong-Wah Ngo, Feng Wang, Ting-Chuen Pong Dec 2003

Structuring Lecture Videos For Distance Learning Applications, Chong-Wah Ngo, Feng Wang, Ting-Chuen Pong

Research Collection School Of Computing and Information Systems

This paper presents an automatic and novel approach in structuring and indexing lecture videos for distance learning applications. By structuring video content, we can support both topic indexing and semantic querying of multimedia documents. In this paper, our aim is to link the discussion topics extracted from the electronic slides with their associated video and audio segments. Two major techniques in our proposed approach include video text analysis and speech recognition. Initially, a video is partitioned into shots based on slide transitions. For each shot, the embedded video texts are detected, reconstructed and segmented as high-resolution foreground texts for commercial …


Constraint Datalog In Trust Management, Scot Anderson Dec 2003

Constraint Datalog In Trust Management, Scot Anderson

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Constraint Datalog holds an increasing role in Trust Management. We discuss several Trust Management systems and give a description of the environment and requirements for Trust Management. Constraint Datalog using addition constraints and approximation theory provides an expressive semantic with which to describe security policies for credentials, delegations and authorizations. Approximation theory allows halting in Constraint Datalog over addition constraints. We use the decision problem of Diophantine equations to show that Constraint Datalog over addition constraints is complete. Combining these two concepts provides an approximately complete, safe language. The problem of constant additions to closed languages provides reasons for using …


Using Dynamic Optimization For Control Of Real Rate Cpu Resource Management Applications, Varin Vahia, Ashvin Goel, David Steere, Jonathan Walpole, Molly H. Shor Dec 2003

Using Dynamic Optimization For Control Of Real Rate Cpu Resource Management Applications, Varin Vahia, Ashvin Goel, David Steere, Jonathan Walpole, Molly H. Shor

Computer Science Faculty Publications and Presentations

In this paper we design a proportional-period optimal controller for allocating CPU to real rate multimedia applications on a general-purpose computer system. We model this computer system problem in to state space form. We design a controller based on dynamic optimization LQR tracking techniques to minimize short term and long term time deviation from the current time stamp and also CPU usage. Preliminary results on an experimental set up are encouraging.


Paper For An Educational Digital Library, Dion Hoe-Lian Goh, Yin-Leng Theng, Ming Yin, Ee Peng Lim Dec 2003

Paper For An Educational Digital Library, Dion Hoe-Lian Goh, Yin-Leng Theng, Ming Yin, Ee Peng Lim

Research Collection School Of Computing and Information Systems

GeogDL is a digital library of geography examination resources designed to assist students in revising for a national geography examination in Singapore. As part of an iterative design process, we carried out participatory design and brainstorming with student and teacher design partners. The first study involved prospective student design partners. In response to the first study, we describe in this paper an implementation of PAPER – Personalised Adaptive Pathways for Exam Resources – a new bundle of personalized, interactive services containing a mock exam and a personal coach. The mock exam provides a simulation of the actual geography examination while …


Hardware-Based Dynamic Storage Management For High-Performance And Real-Time Systems, Victor H. Lai Nov 2003

Hardware-Based Dynamic Storage Management For High-Performance And Real-Time Systems, Victor H. Lai

All Computer Science and Engineering Research

Most modern application programs depend on dynamic storage management to handle allocation and deallocation of memory. Unfortunately conventional software-based storage managers are relatively low performance due to the latency associated with accessing DRAM memory. Consequently, developers of programs with very specialized memory requirements, such a real-time systems, often choose to manage memory manually at the application-code level. This practice can greatly increase performance but it can also significantly complicate the development process. In this thesis we present the design, VHDL implementation and performance evaluation of hardware-based storage manager called the Optimized Hardware Estranged Buddy System (OHEBS). The OHEBS implements four …


Validating And Refining Clusters Via Visual Rendering, Keke Chen, Ling Liu Nov 2003

Validating And Refining Clusters Via Visual Rendering, Keke Chen, Ling Liu

Kno.e.sis Publications

The automatic clustering algorithms are known to work well in dealing with clusters of regular shapes, e.g. compact spherical/elongated shapes, but may incur higher error rates when dealing with arbitrarily shaped clusters. Although some efforts have been devoted to addressing the problem of skewed datasets, the problem of handling clusters with irregular shapes is still in its infancy, especially in terms of dimensionality of the datasets and the precision of the clustering results considered. Not surprisingly, the statistical indices works ineffective in validating clusters of irregular shapes, too. We address the problem of clustering and validating arbitrarily shaped clusters with …


Race, Place, And Information Technology, Karen Mossberger, Caroline J. Tolbert Nov 2003

Race, Place, And Information Technology, Karen Mossberger, Caroline J. Tolbert

National Center for Digital Government

What role does environment play in influencing information technology access and skills – over and above individual characteristics such as income, education, race, and ethnicity? One of the puzzles that emerged from our recent research on the “digital divide” was that African-Americans, and to a lesser extent, Latinos, had more positive attitudes toward information technology than similarly-situated whites. And yet, African-Americans and Latinos are less likely to have information technology access and skills, even when controlling for other factors such as income and education (Mossberger, Tolbert and Stansbury 2003). The research presented in this paper takes a first step toward …


When Plans Distinguish Bayes Nets, Alex Dekhtyar, Judy Goldsmith, Janice Pearce Nov 2003

When Plans Distinguish Bayes Nets, Alex Dekhtyar, Judy Goldsmith, Janice Pearce

Computer Science and Software Engineering

We consider the complexity of determining whether differing probability distributions for the same Bayes net result in different policies, significantly different policy outcomes or optimal value functions.


A Token-Based Model For Fraud Detection And Prevention, Yunhua Lu, Leszek T. Lilien, Bharat Bhargava Nov 2003

A Token-Based Model For Fraud Detection And Prevention, Yunhua Lu, Leszek T. Lilien, Bharat Bhargava

Department of Computer Science Technical Reports

No abstract provided.