Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

2005

Selected Works

Discipline
Keyword
Publication
File Type

Articles 1 - 30 of 40

Full-Text Articles in Computer Sciences

An Evaluation Of Decision Tree And Survival Analysis Techniques For Business Failure Prediction, Adrian Gepp Dec 2005

An Evaluation Of Decision Tree And Survival Analysis Techniques For Business Failure Prediction, Adrian Gepp

Adrian Gepp

Accurate business failure prediction models would be extremely valuable to many industry sectors, particularly in financial investment and lending. The potential value of such models has been recently emphasised by the extremely costly failure of high profile businesses in both Australia and overseas, such as HIH (Australia) and Enron (USA). Consequently, there has been a significant increase in interest in business failure prediction, from both industry and academia. Statistical models attempt to predict the failure or success of a business based on publicly available information about that business (or its industry and the overall economy), such as accounting ratios from …


The Centrality Of Awareness In The Formation Of User Behavioral Intention Toward Preventive Technologies In The Context Of Voluntary Use, Tamara Dinev, Qing Hu Nov 2005

The Centrality Of Awareness In The Formation Of User Behavioral Intention Toward Preventive Technologies In The Context Of Voluntary Use, Tamara Dinev, Qing Hu

Qing Hu

Little is known about user behavior toward what we call preventive computer technologies that have become increasingly important in the networked economy and society to secure data and systems from viruses, unauthorized access, disruptions, spyware, and similar harmful technologies. We present the results of a study of user behavior toward preventive technologies based on the frameworks of theory of planned behavior in the context of anti-spyware technologies. We find that the user awareness of the issues and threats from harmful technologies is a strong predictor of user behavioral intention toward the use of preventive technologies. In the presence of awareness, …


Online Teaching Practices (Both Best And Worst), Michael Nelson, Bhagyavati, Gail Miles, Amber Settle, Dale Shaffer, Jake Watts, Robert P. Webber Nov 2005

Online Teaching Practices (Both Best And Worst), Michael Nelson, Bhagyavati, Gail Miles, Amber Settle, Dale Shaffer, Jake Watts, Robert P. Webber

Amber Settle

Online teaching is a whole new world for many instructors. The level of support provided varies greatly from one institution to the next. Various online platforms are available, or things can be as simple as e-mailed assignments and exams. This panel will share their online teaching experiences, discussing both what has and has not worked for them. While they do not claim to have all the answers, they are working from a good deal of experience.


Building A Classification Cascade For Visual Identification From One Example, Andras Ferencz, Erik G. Learned-Miller, Jitendra Malik Sep 2005

Building A Classification Cascade For Visual Identification From One Example, Andras Ferencz, Erik G. Learned-Miller, Jitendra Malik

Erik G Learned-Miller

Object identification (OID) is specialized recognition where the category is known (e.g. cars) and the algorithm recognizes an object's exact identity (e.g. Bob's BMW). Two special challenges characterize OID. (1) Interclass variation is often small (many cars look alike) and may be dwarfed by illumination or pose changes. (2) There may be many classes but few or just one positive "training" examples per class. Due to (1), a solution must locate possibly subtle object-specific salient features (a door handle) while avoiding distracting ones (a specular highlight). However, (2) rules out direct techniques of feature selection. We describe an online algorithm …


Graduate Student Satisfaction With An Online Discrete Mathematics Course, Amber Settle, Chad Settle Sep 2005

Graduate Student Satisfaction With An Online Discrete Mathematics Course, Amber Settle, Chad Settle

Amber Settle

Student satisfaction with distance learning is impacted by a variety of factors, including interaction with the instructor and the structure of the course. We describe our experiences teaching discrete mathematics to graduate students using both a traditional classroom setting and two different types of distance learning formats. We then compare student evaluations between the traditional and distance-learning courses to determine if student satisfaction was affected by the course format.


Can A Divorced Mom/Dad Take Care Of The Child?, Vijay Dialani Sep 2005

Can A Divorced Mom/Dad Take Care Of The Child?, Vijay Dialani

Vijay Dialani

MOM – Message Oriented Middleware DAD – Direct Access to Data (DBMSs) CHILD – Correlating Historical or In-transit Large-scale Data-stream


The Future Of Journal Publishing, Gordon C. Tibbitts Sep 2005

The Future Of Journal Publishing, Gordon C. Tibbitts

Gordon C. Tibbitts III

The seminar helped publishing neophytes understand where they can add value. It also focused on the challenges of the day and likely challenges in the future. Some predictions include a complete move to e-journals, article-at-a-time publishing, an increase in "meta" articles, and the demise of general search engine prominence.


A Framework To Ensure Trustworthy Web Services, Jia Zhang, Liang-Jie Zhang Aug 2005

A Framework To Ensure Trustworthy Web Services, Jia Zhang, Liang-Jie Zhang

Jia Zhang

No abstract provided.


Root Causes Of Lost Time And User Stress In A Simple Dialog System, Nigel Ward, Anais Rivera, Karen Ward, David G. Novick Aug 2005

Root Causes Of Lost Time And User Stress In A Simple Dialog System, Nigel Ward, Anais Rivera, Karen Ward, David G. Novick

David G. Novick

As a priority-setting exercise, we compared interactions between users and a simple spoken dialog system to interactions between users and a human operator. We observed usability events, places in which system behavior differed from human behavior, and for each we noted the impact, root causes, and prospects for improvement. We suggest some priority issues for research, involving not only such core areas as speech recognition and synthesis and language understanding and generation, but also less-studied topics such as adaptive or flexible timeouts, turn-taking and speaking rate.


Co-Generation Of Text And Graphics, David G. Novick, Brian Lowe Aug 2005

Co-Generation Of Text And Graphics, David G. Novick, Brian Lowe

David G. Novick

content in documentation, it is possible to produce both text and graphics from a single common source. One approach to co-generation of text and graphics uses a single logical specification; a second approach starts with CAD-based representation and produces a corresponding textual account. This paper explores these two different approaches, reports the results of using prototypes embodying the approaches to represent simple figures, and discusses issues that were identified through use of the prototypes. While it appears feasible to co-generate text and graphics automatically, the process raises deep issues of design of communications, including the intent of the producer of …


Using Containers To Enforce Smart Constraints For Performance In Industrial Systems, Scott A. Hissam, Gabriel A. Moreno, Kurt C. Wallnau Jul 2005

Using Containers To Enforce Smart Constraints For Performance In Industrial Systems, Scott A. Hissam, Gabriel A. Moreno, Kurt C. Wallnau

Gabriel A. Moreno

Today, software engineering is concerned less with individual programs than with large-scale networks of interacting programs. For large-scale networks, engineering problems emerge that go well beyond functional correctness (the purview of programming) and encompass equally crucial nonfunctional qualities such as security, performance, availability, and fault tolerance. A pivotal challenge, then, is to provide techniques to routinely construct systems that have predictable nonfunctional quality. These techniques impose constraints on the problem being solved and on the form solutions can take. This technical note shows how smart constraints can be embedded in software infrastructure, so that systems conforming to those constraints are …


Criteria Analysis And Validation Of The Reliability Of Web Services-Oriented Systems,, Jia Zhang, Liang-Jie Zhang Jun 2005

Criteria Analysis And Validation Of The Reliability Of Web Services-Oriented Systems,, Jia Zhang, Liang-Jie Zhang

Jia Zhang

No abstract provided.


Bridging Units And Business Incubation In A Technology Research Lab, Arcot Desai Narasimhalu Jun 2005

Bridging Units And Business Incubation In A Technology Research Lab, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

This paper describes a new model of incubation practices at Singapore’s Kent Ridge Digital Labs from 1998 till 2002. The model deviates from previously known models where by research institutions including institutions of higher learning license their technologies to companies or entrepreneurs who wished to either productize the technology or start a new company using the technology. The model was successfully applied towards the creation of more than fifteen start ups. These start ups attracted significant investments from venture capitalists from Singapore and elsewhere. Several of these companies are still in business.


Testing First: Emphasizing Testing In Early Programming Courses, Will Marrero, Amber Settle Jun 2005

Testing First: Emphasizing Testing In Early Programming Courses, Will Marrero, Amber Settle

Amber Settle

The complexity of languages like Java and C++ can make introductory programming classes in these languages extremely challenging for many students. Part of the complexity comes from the large number of concepts and language features that students are expected to learn while having little time for adequate practice or examples. A second source of difficulty is the emphasis that object-oriented programming places on abstraction. We believe that by placing a larger emphasis on testing in programming assignments in these introductory courses, students have an opportunity for extra practice with the language, and this affords them a gentler transition into the …


A Case For Exhaustive Optimization, Sanza Kazadi, Michele Lee, Lauren Lee Jun 2005

A Case For Exhaustive Optimization, Sanza Kazadi, Michele Lee, Lauren Lee

Sanza Kazadi

Evolutionary algorithms have enjoyed a great success in a variety of different fields ranging from numerical optimization to general creative design. However, to date, the question of why this success is possible has never been adequately determined. In this paper, we examine two algorithms: a genetic algorithm and a pseudo-exhaustive search algorithm dubbed Directed Exhaustive Search. We examine the GA's apparent ability to compound individual mutations and its role in the GA's optimization. We then explore the use of the DES algorithm using a suitably altered mutation operator mimicking the GA's surreptitious compounding of the mutation operator. We find that …


Web Services Quality Testing, Jia Zhang, Liang-Jie Zhang May 2005

Web Services Quality Testing, Jia Zhang, Liang-Jie Zhang

Jia Zhang

No abstract provided.


Innovation Cube: Triggers, Drivers And Enablers For Successful Innovations, Arcot Desai Narasimhalu May 2005

Innovation Cube: Triggers, Drivers And Enablers For Successful Innovations, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

Research on innovation has explained the relationships between institutions of higher learning, companies and the markets from both market driven and resource driven perspectives. However, innovation still remains more of an art than a science. Key researchers have lamented that it is difficult for most companies to scan the market place to identify new innovation opportunities. This paper describes a framework called Innovation Cube that is the building block for helping companies identify new innovation opportunities. This cube is constructed using three attribute-pairs called drivers, triggers and enablers of innovation. The paper discusses examples of the types of innovations represented …


The Ames Mer Microscopic Imager Toolkit, Randy Sargent, Matt Deans, Clay Kunz, Ken Herkenhoff Feb 2005

The Ames Mer Microscopic Imager Toolkit, Randy Sargent, Matt Deans, Clay Kunz, Ken Herkenhoff

Randy Sargent

The Mars Exploration Rovers, spirit and opportunity, have spent several successful months on Mars, returning gigabytes of images and spectral data to scientists on Earth. One of the instruments on the MER rovers, the Athena microscopic imager (MI), is a fixed focus, megapixel camera providing a ±3mm depth of field and a 31×31 mm field of view at a working distance of 63 mm from the lens to the object being imaged. In order to maximize the science return from this instrument, we developed the Ames MI toolkit and supported its use during the primary mission. The MI toolkit is …


A Service-Oriented Multimedia Componentization Model, Jia Zhang, Liang-Jie Zhang, Francis Quek, Jen-Yao Chung Feb 2005

A Service-Oriented Multimedia Componentization Model, Jia Zhang, Liang-Jie Zhang, Francis Quek, Jen-Yao Chung

Jia Zhang

As Web services become more and more popular, how to manage multimedia Web services that can be composed as value-added service solutions remains challenging. This paper presents a service-oriented multimedia componentization model to support Quality of Service (QoS)-centered, device-independent multimedia Web services, which seamlessly incorporates cuttingedge technologies relating to Web services. A multimedia Web service is divided into control flow and data flow, each can be delivered via different infrastructures and channels. Enhancements are proposed to facilitate Simple Object Access Protocol (SOAP) and Composite Capability/Preference Profiles (CC/PP) protocols to improve their flexibility to serve multimedia Web services. We present a …


Trustworthy Web Services: Actions For Now, Jia Zhang Jan 2005

Trustworthy Web Services: Actions For Now, Jia Zhang

Jia Zhang

For Web services to grow as predicted, researchers must not wait to address the challenges of software trustworthiness


Recovering Digital Evidence From Linux Systems, Philip Craiger Jan 2005

Recovering Digital Evidence From Linux Systems, Philip Craiger

J. Philip Craiger, Ph.D.

As Linux-kernel-based operating systems proliferate there will be an inevitable increase in Linux systems that law enforcement agents must process in criminal investigations. The skills and expertise required to recover evidence from Microsoft-Windows-based systems do not necessarily translate to Linux systems. This paper discusses digital forensic procedures for recovering evidence from Linux systems. In particular, it presents methods for identifying and recovering deleted files from disk and volatile memory, identifying notable and Trojan files, finding hidden files, and finding files with renamed extensions. All the procedures are accomplished using Linux command line utilities and require no special or commercial tools.


Constraint Programming, John Hooker Dec 2004

Constraint Programming, John Hooker

John Hooker

No abstract provided.


Interaction Between The Dorsal And Ventral Pathways In Mental Rotation: An Fmri Study, Hideya Koshino, Patricia Carpenter, Timothy Keller, Marcel Just Dec 2004

Interaction Between The Dorsal And Ventral Pathways In Mental Rotation: An Fmri Study, Hideya Koshino, Patricia Carpenter, Timothy Keller, Marcel Just

Marcel Adam Just

No abstract provided.


Imagining Material Versus Geometric Properties Of Objects: An Fmri Study, Sharlene Newman, Roberta Klatzky, Susan Lederman, Marcel Just Dec 2004

Imagining Material Versus Geometric Properties Of Objects: An Fmri Study, Sharlene Newman, Roberta Klatzky, Susan Lederman, Marcel Just

Marcel Adam Just

No abstract provided.


Modeling Interaction Between Metacognition And Emotion In A Cognitive Architecture, Eva Hudlicka Dec 2004

Modeling Interaction Between Metacognition And Emotion In A Cognitive Architecture, Eva Hudlicka

Eva Hudlicka

While research in metacognition has grown significantly in the past 10 years, there has been a relative lack of research devoted to the focused study of the interactions between metacognition and affective processes. Computational models represent a useful tool which can help remedy this situation by constructing causal models of demonstrated correlational relationships, and by generating empirical hypotheses which can be verified experimentally. In this paper we describe enhancements to an existing cognitive–affective architecture that will enable it to perform a subset of metacognitive functions. We focus on modeling the role of a specific metacognitive factor, the feeling of confidence …


Platform Thinking In Embedded Systems, Robert Iannucci Dec 2004

Platform Thinking In Embedded Systems, Robert Iannucci

Robert A Iannucci

No abstract provided.


Functional Connectivity In An Fmri Working Memory Task In High-Functioning Autism, Hideya Koshino, Patricia Carpenter, Nancy Minshew, Vladimir Cherkassky, Timothy Keller, Marcel Just Dec 2004

Functional Connectivity In An Fmri Working Memory Task In High-Functioning Autism, Hideya Koshino, Patricia Carpenter, Nancy Minshew, Vladimir Cherkassky, Timothy Keller, Marcel Just

Marcel Adam Just

No abstract provided.


Joint Mri Bias Removal Using Entropy Minimization Across Images, Erik G. Learned-Miller, Parvez Ahammad Dec 2004

Joint Mri Bias Removal Using Entropy Minimization Across Images, Erik G. Learned-Miller, Parvez Ahammad

Erik G Learned-Miller

The correction of bias in magnetic resonance images is an important problem in medical image processing. Most previous approaches have used a maximum likelihood method to increase the likelihood of the pixels in a single image by adaptively estimating a correction to the unknown image bias field. The pixel likelihoods are defined either in terms of a pre-existing tissue model, or non-parametrically in terms of the image's own pixel values. In both cases, the specific location of a pixel in the image is not used to calculate the likelihoods. We suggest a new approach in which we simultaneously eliminate the …


Combining Text And Audio-Visual Features In Video Indexing, Shih-Fu Chang, R. Manmatha, Tat-Seng Chua Dec 2004

Combining Text And Audio-Visual Features In Video Indexing, Shih-Fu Chang, R. Manmatha, Tat-Seng Chua

R. Manmatha

We discuss the opportunities, state of the art, and open research issues in using multi-modal features in video indexing. Specifically, we focus on how imperfect text data obtained by automatic speech recognition (ASR) may be used to help solve challenging problems, such as story segmentation, concept detection, retrieval, and topic clustering. We review the frameworks and machine learning techniques that are used to fuse the text features with audio-visual features. Case studies showing promising performance will be described, primarily in the broadcast news video domain.


A Probabilistic Upper Bound On Differential Entropy, Joseph Destefano, Erik G. Learned-Miller Dec 2004

A Probabilistic Upper Bound On Differential Entropy, Joseph Destefano, Erik G. Learned-Miller

Erik G Learned-Miller

A novel probabilistic upper bound on the entropy of an unknown one-dimensional distribution, given the support of the distribution and a sample from that distribution, is presented. No knowledge beyond the support of the unknown distribution is required. Previous distribution-free bounds on the cumulative distribution function of a random variable given a sample of that variable are used to construct the bound. A simple, fast, and intuitive algorithm for computing the entropy bound from a sample is provided.