Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Anonymity (2)
- Computer science (2)
- Financial trading (2)
- Information systems (2)
- Innovation (2)
-
- Neural networks (2)
- Open Source Software and Virtualization (2)
- Refereed papers (2)
- Trading systems (2)
- A (1)
- Algorithms (1)
- Architecture (1)
- Artificial (1)
- Bayesian Networks (1)
- Biological (1)
- C& (1)
- Certification and accreditation (1)
- Cloud computing (1)
- Clustering (1)
- Common criteria (1)
- Comparison (1)
- Computer science education (1)
- Concurrency (1)
- Corporate governance (1)
- Cs1 (1)
- Cs2 (1)
- Cyber Security (1)
- Cyber security (1)
- Denial of service (1)
- Department of Defense (1)
- Publication
- File Type
Articles 1 - 15 of 15
Full-Text Articles in Computer Sciences
Spring11: Pdc In Cs1/2 And A Mobile/Cloud Intermediate Mobile/Cloud Intermediate Software Design Course, Joseph P. Kaylor, Konstantin Läufer, Chandra N. Sekharan, George K. Thiruvathukal
Spring11: Pdc In Cs1/2 And A Mobile/Cloud Intermediate Mobile/Cloud Intermediate Software Design Course, Joseph P. Kaylor, Konstantin Läufer, Chandra N. Sekharan, George K. Thiruvathukal
George K. Thiruvathukal
Recent changes in the environment of Loyola University Chicago’s Department of Computer Science include a better differentiation of our four undergraduate majors, growing interest in computing among science majors, and an increased demand for graduates with mobile and cloud skills. In our continued effort to incorporate parallel and distributed computing topics into the undergraduate curriculum, we are focusing on these three existing courses: CS1: In response to a request from the physics department, we started to offer a CS1 section aimed at majors in physics and other hard sciences this spring semester. This section includes some material on numerical methods …
Network Technologies Used To Aggregate Environmental Data, Paul Stasiuk, Konstantin Läufer, George K. Thiruvathukal
Network Technologies Used To Aggregate Environmental Data, Paul Stasiuk, Konstantin Läufer, George K. Thiruvathukal
George K. Thiruvathukal
The goal of the Loyola Weather Service (lws) project is to design and build a system of functioning environmental monitoring widgets that can intelligently and autonomously control the environment around them based on set thresholds and triggers. The widgets will also have the ability to aggregate their data and easily display this data in various ways: through a user interface in the room that the widget is placed, via a web application, and programmatically via a RESTful web service.
Building Capable, Energy-Efficient, Flexible Visualization And Sensing Clusters From Commodity Tablets, Thomas Delgado Dias, Xian Yan, Konstantin Läufer, George K. Thiruvathukal
Building Capable, Energy-Efficient, Flexible Visualization And Sensing Clusters From Commodity Tablets, Thomas Delgado Dias, Xian Yan, Konstantin Läufer, George K. Thiruvathukal
George K. Thiruvathukal
We explore the application of clusters of commodity tablet devices to problems spanning a “trilogy” of concerns: visualization, sensing, and computation. We conjecture that such clusters provide a low-cost, energy-efficient, flexible, and ultimately effective platform to tackle a wide range of problems within this trilogy. This is a work in progress, and we now elaborate our position and give a preliminary status report. A wide range of Android tablet devices are available in terms of price and capabilities. “You get what you pay for” w.r.t. display resolution, sensors, and chipset---corresponding to the trilogy. $200 gets one a 1280x800-pixel touch display, …
Simulation Of Circuit Creation In Tor: Preliminary Results, William Boyd, Norman Danner, Danny Krizanc
Simulation Of Circuit Creation In Tor: Preliminary Results, William Boyd, Norman Danner, Danny Krizanc
Norman Danner
We describe a methodology for simulating Tor relay up/down behavior over time and give some preliminary results.
Effectiveness And Detection Of Denial Of Service Attacks In Tor, Norman Danner, Samuel Defabbia-Kane, Danny Krizanc, Marc Liberatore
Effectiveness And Detection Of Denial Of Service Attacks In Tor, Norman Danner, Samuel Defabbia-Kane, Danny Krizanc, Marc Liberatore
Norman Danner
Tor is one of the more popular systems for anonymizing near-real-time communications on the Internet. Borisov et al. [2007] proposed a denial-of-service-based attack on Tor (and related systems) that significantly increases the probability of compromising the anonymity provided. In this article, we analyze the effectiveness of the attack using both an analytic model and simulation. We also describe two algorithms for detecting such attacks, one deterministic and proved correct, the other probabilistic and verified in simulation.
Mobile Computing: Challenges And Opportunities For Autonomy And Feedback, Ole J. Mengshoel, Bob Iannucci, Abe Ishihara
Mobile Computing: Challenges And Opportunities For Autonomy And Feedback, Ole J. Mengshoel, Bob Iannucci, Abe Ishihara
Ole J Mengshoel
An Extensible Framework For Selecting Incremental Innovations, Arcot Desai Narasimhalu
An Extensible Framework For Selecting Incremental Innovations, Arcot Desai Narasimhalu
Arcot Desai NARASIMHALU
There are several innovation methodologies reported in the literature starting from simple concepts such as technology push and market pull all the way to Disruptive innovation. Almost all these methods do not provide for customizability and extensibility. The method described in this paper is called Quick and Dirty Innovation Method or QaDIM in short to represent the fact that the method can be used rather easily to identify incremental innovation opportunities. The paper will first describe the basic concept, and then proceed to give a sample framework before proceeding to describe the extensibility. The method allows firms and individuals to …
Automatic Defect Categorization, Ferdian Thung, David Lo, Lingxiao Jiang
Automatic Defect Categorization, Ferdian Thung, David Lo, Lingxiao Jiang
David LO
Defects are prevalent in software systems. In order to understand defects better, industry practitioners often categorize bugs into various types. One common kind of categorization is the IBM’s Orthogonal Defect Classification (ODC). ODC proposes various orthogonal classification of defects based on much information about the defects, such as the symptoms and semantics of the defects, the root cause analysis of the defects, and many more. With these category labels, developers can better perform post-mortem analysis to find out what the common characteristics of the defects that plague a particular software project are. Albeit the benefits of having these categories, for …
Creating Trading Systems With Fundamental Variables And Neural Networks: The Aby Case Study, Bruce Vanstone, Gavin Finnie, Tobias Hahn
Creating Trading Systems With Fundamental Variables And Neural Networks: The Aby Case Study, Bruce Vanstone, Gavin Finnie, Tobias Hahn
Bruce Vanstone
No abstract provided.
Creating Trading Systems With Fundamental Variables And Neural Networks: The Aby Case Study, Bruce Vanstone, Gavin Finnie, Tobias Hahn
Creating Trading Systems With Fundamental Variables And Neural Networks: The Aby Case Study, Bruce Vanstone, Gavin Finnie, Tobias Hahn
Tobias Hahn
No abstract provided.
Comparative Study Of Biological And Artificial Neural Networks, O S. Eluyode, Dr. Dipo Theophilus Akomolafe Mbcs, Mncs, Mcpn,
Comparative Study Of Biological And Artificial Neural Networks, O S. Eluyode, Dr. Dipo Theophilus Akomolafe Mbcs, Mncs, Mcpn,
Dr. Dipo Theophilus Akomolafe MBCS, MNCS, MCPN,
In this research project, the features of biological and artificial neural networks were studied by reviewing the existing works of authorities in print and electronics on biological and artificial neural networks. The features were then assessed and evaluated and comparative analysis of the two networks was carried out. The metrics such as structures, layers, size and functional capabilities of neurons, learning capabilities, style of computation, processing elements, processing speed, connections, strength, information storage, information transmission, communication media selection, signal transduction and fault tolerance were used as basis for comparison. A major finding in the research showed that artificial neural networks …
Low Latency Fault Tolerance System, Wenbing Zhao
Low Latency Fault Tolerance System, Wenbing Zhao
Wenbing Zhao
The Low Latency Fault Tolerance (LLFT) system provides fault tolerance for distributed applications within a local-area network, using a leader-follower replication strategy. LLFT provides application-transparent replication, with strong replica consistency, for applications that involve multiple interacting processes or threads. Its novel system model enables LLFT to maintain a single consistent infinite computation, despite faults and asynchronous communication. The LLFT Messaging Protocol provides reliable, totally-ordered message delivery by employing a group multicast, where the message ordering is determined by the primary replica in the destination group. The Leader-Determined Membership Protocol provides reconfiguration and recovery when a replica becomes faulty and when …
Technology Enhanced Learning With Open Source Software For Scientists And Engineers, Maurice Dawson, Imad Al Saeed, Jorja Wright, Mrwan Omar
Technology Enhanced Learning With Open Source Software For Scientists And Engineers, Maurice Dawson, Imad Al Saeed, Jorja Wright, Mrwan Omar
Maurice Dawson
This paper represents the evaluation and integration of Open Source Software (OSS) technologies to enhance the learning of engineers and scientists within the university. The utilization of OSS is essential as costs around the world continue to rise for education, institutions must become innovative in the ways they teach and grow Science, Technology, Engineering, & Mathematics (STEM) majors. To do this effectively professors and administrative staff should push toward the utilization of OSS and other available tools to enhance or supplement currently available tools with minimal integration costs. The OSS applications would allow students the ability to learn critical technological …
Importance Of Integrating Information Technology Related Curriculum In American Inner City Schools, Jorja Wright, Maurice E. Dawson Jr.
Importance Of Integrating Information Technology Related Curriculum In American Inner City Schools, Jorja Wright, Maurice E. Dawson Jr.
Maurice Dawson
This paper examines the significance of integrating Information Technology (IT) into the inner city K - 12 educational curriculum. Educational curriculum reform is eminent due to the major breakthroughs in technology, including mobile internet, digital textbooks, and cloud computation. Currently, some educational systems are starting to utilize IT. Examples of this are seen with: Technology- based educational reform efforts such as Huntsville City Schools Laptop Initiative and Geospatial Information Technology (GIT); Software-focused initiatives such as Apple Textbook Initiative and Barnes and Noble e-book editions for Nook; finally, structured/standardized professional development workshops or courses such as the Library of Congress Teaching …
Dod Cyber Technology Policies To Secure Automated Information Systems, Maurice E. Dawson Jr., Miguel Crespo, Stephen Brewster
Dod Cyber Technology Policies To Secure Automated Information Systems, Maurice E. Dawson Jr., Miguel Crespo, Stephen Brewster
Maurice Dawson
Availability, integrity, and confidentiality (AIC) is a key theme everywhere as cyber security has become more than an emerging topic. The Department of Defense (DoD) has implemented multiple processes such as the Department of Defense information assurance certification and accreditation process (DIACAP), common criteria (CC), and created proven baselines to include information assurance (IA) controls to protect information system (IS) resources. The aim of this research study shall provide insight to the applicable processes, IA controls, and standards to include providing a method for selecting necessary government models and for system development.