Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Computer Sciences

Spring­11: Pdc In Cs1/2 And A Mobile/Cloud Intermediate Mobile/Cloud Intermediate Software Design Course, Joseph P. Kaylor, Konstantin Läufer, Chandra N. Sekharan, George K. Thiruvathukal Jul 2013

Spring­11: Pdc In Cs1/2 And A Mobile/Cloud Intermediate Mobile/Cloud Intermediate Software Design Course, Joseph P. Kaylor, Konstantin Läufer, Chandra N. Sekharan, George K. Thiruvathukal

George K. Thiruvathukal

Recent changes in the environment of Loyola University Chicago’s Department of Computer Science include a better differentiation of our four undergraduate majors, growing interest in computing among science majors, and an increased demand for graduates with mobile and cloud skills. In our continued effort to incorporate parallel and distributed computing topics into the undergraduate curriculum, we are focusing on these three existing courses: CS1: In response to a request from the physics department, we started to offer a CS1 section aimed at majors in physics and other hard sciences this spring semester. This section includes some material on numerical methods …


Network Technologies Used To Aggregate Environmental Data, Paul Stasiuk, Konstantin Läufer, George K. Thiruvathukal Jul 2013

Network Technologies Used To Aggregate Environmental Data, Paul Stasiuk, Konstantin Läufer, George K. Thiruvathukal

George K. Thiruvathukal

The goal of the Loyola Weather Service (lws) project is to design and build a system of functioning environmental monitoring widgets that can intelligently and autonomously control the environment around them based on set thresholds and triggers. The widgets will also have the ability to aggregate their data and easily display this data in various ways: through a user interface in the room that the widget is placed, via a web application, and programmatically via a RESTful web service.


Building Capable, Energy-Efficient, Flexible Visualization And Sensing Clusters From Commodity Tablets, Thomas Delgado Dias, Xian Yan, Konstantin Läufer, George K. Thiruvathukal Jul 2013

Building Capable, Energy-Efficient, Flexible Visualization And Sensing Clusters From Commodity Tablets, Thomas Delgado Dias, Xian Yan, Konstantin Läufer, George K. Thiruvathukal

George K. Thiruvathukal

We explore the application of clusters of commodity tablet devices to problems spanning a “trilogy” of concerns: visualization, sensing, and computation. We conjecture that such clusters provide a low-cost, energy-efficient, flexible, and ultimately effective platform to tackle a wide range of problems within this trilogy. This is a work in progress, and we now elaborate our position and give a preliminary status report. A wide range of Android tablet devices are available in terms of price and capabilities. “You get what you pay for” w.r.t. display resolution, sensors, and chipset---corresponding to the trilogy. $200 gets one a 1280x800-pixel touch display, …


Simulation Of Circuit Creation In Tor: Preliminary Results, William Boyd, Norman Danner, Danny Krizanc Jul 2013

Simulation Of Circuit Creation In Tor: Preliminary Results, William Boyd, Norman Danner, Danny Krizanc

Norman Danner

We describe a methodology for simulating Tor relay up/down behavior over time and give some preliminary results.


Effectiveness And Detection Of Denial Of Service Attacks In Tor, Norman Danner, Samuel Defabbia-Kane, Danny Krizanc, Marc Liberatore Jul 2013

Effectiveness And Detection Of Denial Of Service Attacks In Tor, Norman Danner, Samuel Defabbia-Kane, Danny Krizanc, Marc Liberatore

Norman Danner

Tor is one of the more popular systems for anonymizing near-real-time communications on the Internet. Borisov et al. [2007] proposed a denial-of-service-based attack on Tor (and related systems) that significantly increases the probability of compromising the anonymity provided. In this article, we analyze the effectiveness of the attack using both an analytic model and simulation. We also describe two algorithms for detecting such attacks, one deterministic and proved correct, the other probabilistic and verified in simulation.


Mobile Computing: Challenges And Opportunities For Autonomy And Feedback, Ole J. Mengshoel, Bob Iannucci, Abe Ishihara May 2013

Mobile Computing: Challenges And Opportunities For Autonomy And Feedback, Ole J. Mengshoel, Bob Iannucci, Abe Ishihara

Ole J Mengshoel

Mobile devices have evolved to become computing platforms more similar to desktops and workstations than the cell phones and handsets of yesteryear. Unfortunately, today’s mobile infrastructures are mirrors of the wired past. Devices, apps, and networks impact one another, but a systematic approach for allowing them to cooperate is currently missing. We propose an approach that seeks to open key interfaces and to apply feedback and autonomic computing to improve both user experience and mobile system dynamics.


An Extensible Framework For Selecting Incremental Innovations, Arcot Desai Narasimhalu Apr 2013

An Extensible Framework For Selecting Incremental Innovations, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

There are several innovation methodologies reported in the literature starting from simple concepts such as technology push and market pull all the way to Disruptive innovation. Almost all these methods do not provide for customizability and extensibility. The method described in this paper is called Quick and Dirty Innovation Method or QaDIM in short to represent the fact that the method can be used rather easily to identify incremental innovation opportunities. The paper will first describe the basic concept, and then proceed to give a sample framework before proceeding to describe the extensibility. The method allows firms and individuals to …


Automatic Defect Categorization, Ferdian Thung, David Lo, Lingxiao Jiang Apr 2013

Automatic Defect Categorization, Ferdian Thung, David Lo, Lingxiao Jiang

David LO

Defects are prevalent in software systems. In order to understand defects better, industry practitioners often categorize bugs into various types. One common kind of categorization is the IBM’s Orthogonal Defect Classification (ODC). ODC proposes various orthogonal classification of defects based on much information about the defects, such as the symptoms and semantics of the defects, the root cause analysis of the defects, and many more. With these category labels, developers can better perform post-mortem analysis to find out what the common characteristics of the defects that plague a particular software project are. Albeit the benefits of having these categories, for …


Creating Trading Systems With Fundamental Variables And Neural Networks: The Aby Case Study, Bruce Vanstone, Gavin Finnie, Tobias Hahn Apr 2013

Creating Trading Systems With Fundamental Variables And Neural Networks: The Aby Case Study, Bruce Vanstone, Gavin Finnie, Tobias Hahn

Bruce Vanstone

No abstract provided.


Creating Trading Systems With Fundamental Variables And Neural Networks: The Aby Case Study, Bruce Vanstone, Gavin Finnie, Tobias Hahn Apr 2013

Creating Trading Systems With Fundamental Variables And Neural Networks: The Aby Case Study, Bruce Vanstone, Gavin Finnie, Tobias Hahn

Tobias Hahn

No abstract provided.


Comparative Study Of Biological And Artificial Neural Networks, O S. Eluyode, Dr. Dipo Theophilus Akomolafe Mbcs, Mncs, Mcpn, Jan 2013

Comparative Study Of Biological And Artificial Neural Networks, O S. Eluyode, Dr. Dipo Theophilus Akomolafe Mbcs, Mncs, Mcpn,

Dr. Dipo Theophilus Akomolafe MBCS, MNCS, MCPN,

In this research project, the features of biological and artificial neural networks were studied by reviewing the existing works of authorities in print and electronics on biological and artificial neural networks. The features were then assessed and evaluated and comparative analysis of the two networks was carried out. The metrics such as structures, layers, size and functional capabilities of neurons, learning capabilities, style of computation, processing elements, processing speed, connections, strength, information storage, information transmission, communication media selection, signal transduction and fault tolerance were used as basis for comparison. A major finding in the research showed that artificial neural networks …


Low Latency Fault Tolerance System, Wenbing Zhao Dec 2012

Low Latency Fault Tolerance System, Wenbing Zhao

Wenbing Zhao

The Low Latency Fault Tolerance (LLFT) system provides fault tolerance for distributed applications within a local-area network, using a leader-follower replication strategy. LLFT provides application-transparent replication, with strong replica consistency, for applications that involve multiple interacting processes or threads. Its novel system model enables LLFT to maintain a single consistent infinite computation, despite faults and asynchronous communication. The LLFT Messaging Protocol provides reliable, totally-ordered message delivery by employing a group multicast, where the message ordering is determined by the primary replica in the destination group. The Leader-Determined Membership Protocol provides reconfiguration and recovery when a replica becomes faulty and when …


Technology Enhanced Learning With Open Source Software For Scientists And Engineers, Maurice Dawson, Imad Al Saeed, Jorja Wright, Mrwan Omar Dec 2012

Technology Enhanced Learning With Open Source Software For Scientists And Engineers, Maurice Dawson, Imad Al Saeed, Jorja Wright, Mrwan Omar

Maurice Dawson

This paper represents the evaluation and integration of Open Source Software (OSS) technologies to enhance the learning of engineers and scientists within the university. The utilization of OSS is essential as costs around the world continue to rise for education, institutions must become innovative in the ways they teach and grow Science, Technology, Engineering, & Mathematics (STEM) majors. To do this effectively professors and administrative staff should push toward the utilization of OSS and other available tools to enhance or supplement currently available tools with minimal integration costs. The OSS applications would allow students the ability to learn critical technological …


Importance Of Integrating Information Technology Related Curriculum In American Inner City Schools, Jorja Wright, Maurice E. Dawson Jr. Dec 2012

Importance Of Integrating Information Technology Related Curriculum In American Inner City Schools, Jorja Wright, Maurice E. Dawson Jr.

Maurice Dawson

This paper examines the significance of integrating Information Technology (IT) into the inner city K - 12 educational curriculum. Educational curriculum reform is eminent due to the major breakthroughs in technology, including mobile internet, digital textbooks, and cloud computation. Currently, some educational systems are starting to utilize IT. Examples of this are seen with: Technology- based educational reform efforts such as Huntsville City Schools Laptop Initiative and Geospatial Information Technology (GIT); Software-focused initiatives such as Apple Textbook Initiative and Barnes and Noble e-book editions for Nook; finally, structured/standardized professional development workshops or courses such as the Library of Congress Teaching …


Dod Cyber Technology Policies To Secure Automated Information Systems, Maurice E. Dawson Jr., Miguel Crespo, Stephen Brewster Dec 2012

Dod Cyber Technology Policies To Secure Automated Information Systems, Maurice E. Dawson Jr., Miguel Crespo, Stephen Brewster

Maurice Dawson

Availability, integrity, and confidentiality (AIC) is a key theme everywhere as cyber security has become more than an emerging topic. The Department of Defense (DoD) has implemented multiple processes such as the Department of Defense information assurance certification and accreditation process (DIACAP), common criteria (CC), and created proven baselines to include information assurance (IA) controls to protect information system (IS) resources. The aim of this research study shall provide insight to the applicable processes, IA controls, and standards to include providing a method for selecting necessary government models and for system development.