Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Engineering (589)
- Databases and Information Systems (412)
- Computer Engineering (408)
- Electrical and Computer Engineering (279)
- Social and Behavioral Sciences (255)
-
- Information Security (236)
- Software Engineering (192)
- Artificial Intelligence and Robotics (172)
- Other Computer Sciences (129)
- Graphics and Human Computer Interfaces (127)
- Theory and Algorithms (120)
- Mathematics (118)
- Numerical Analysis and Scientific Computing (118)
- Business (113)
- Education (111)
- OS and Networks (104)
- Life Sciences (88)
- Communication (76)
- Law (72)
- Systems Architecture (68)
- Computer Law (63)
- Medicine and Health Sciences (62)
- Statistics and Probability (61)
- Legal Studies (58)
- Digital Communications and Networking (57)
- Higher Education (56)
- Arts and Humanities (54)
- Applied Mathematics (51)
- Institution
-
- Selected Works (376)
- Singapore Management University (342)
- TÜBİTAK (166)
- Missouri University of Science and Technology (68)
- San Jose State University (68)
-
- Nova Southeastern University (62)
- Embry-Riddle Aeronautical University (59)
- Edith Cowan University (56)
- University of Texas at El Paso (54)
- Wright State University (51)
- Old Dominion University (45)
- University for Business and Technology in Kosovo (45)
- SelectedWorks (44)
- Governors State University (40)
- Purdue University (40)
- Portland State University (35)
- Walden University (34)
- Western University (34)
- Marquette University (32)
- California Polytechnic State University, San Luis Obispo (29)
- University of Nebraska at Omaha (28)
- University of Dayton (26)
- Wayne State University (25)
- University of Massachusetts Amherst (24)
- University of Nebraska - Lincoln (24)
- Brigham Young University (23)
- Taylor University (23)
- University of South Florida (21)
- City University of New York (CUNY) (19)
- University of Central Florida (18)
- Keyword
-
- Security (35)
- Machine learning (29)
- Computer science (26)
- Information science (23)
- Information technology (23)
-
- Computer Science (19)
- Clustering (18)
- Data mining (18)
- Simulation (18)
- Artificial Intelligence & Robotic Control (17)
- Privacy (17)
- Small Spacecraft (17)
- Social media (17)
- Visualization (17)
- Artificial intelligence (15)
- Big Data (15)
- Classification (15)
- Department of Computer Science and Engineering (15)
- Twitter (15)
- CubeSat (14)
- Cybersecurity (14)
- Machine Learning (14)
- Social Media (14)
- Education (13)
- Algorithms (12)
- Android (12)
- Cloud computing (12)
- Data Mining (12)
- Information Technology (12)
- Modeling (12)
- Publication
-
- Research Collection School Of Computing and Information Systems (333)
- John R Rice (175)
- Turkish Journal of Electrical Engineering and Computer Sciences (166)
- Theses and Dissertations (67)
- Master's Projects (63)
-
- CCE Theses and Dissertations (61)
- Doctoral Dissertations (44)
- Computer Science Faculty Publications (42)
- Departmental Technical Reports (CS) (40)
- Journal of Digital Forensics, Security and Law (39)
- All Capstone Projects (38)
- Jeremy Straub (35)
- UBT International Conference (34)
- Walden Dissertations and Doctoral Studies (34)
- Electronic Theses and Dissertations (33)
- Computer Science Faculty Publications and Presentations (28)
- Kno.e.sis Publications (28)
- Mathematics, Statistics and Computer Science Faculty Research and Publications (27)
- Electronic Thesis and Dissertation Repository (24)
- ACMS Conference Proceedings 2015 (23)
- Dissertations (20)
- Browse all Theses and Dissertations (19)
- Masters Theses (19)
- USF Tampa Graduate Theses and Dissertations (18)
- Martin Masek (17)
- Annual ADFSL Conference on Digital Forensics, Security and Law (16)
- Australian Digital Forensics Conference (16)
- Open Access Dissertations (16)
- Ani Nenkova (15)
- Stephanie Weirich (15)
- Publication Type
Articles 2491 - 2510 of 2510
Full-Text Articles in Computer Sciences
Ciphercard: A Token-Based Approach Against Camera-Based Shoulder Surfing Attacks On Common Touchscreen Devices, Teddy Seyed, Xing-Dong Yang, Anthony Tang, Saul Greenberg, Jiawei Gu, Bin Zhu, Xiang Ciao
Ciphercard: A Token-Based Approach Against Camera-Based Shoulder Surfing Attacks On Common Touchscreen Devices, Teddy Seyed, Xing-Dong Yang, Anthony Tang, Saul Greenberg, Jiawei Gu, Bin Zhu, Xiang Ciao
Research Collection School Of Computing and Information Systems
We present CipherCard, a physical token that defends against shoulder-surfing attacks on user authentication on capacitive touchscreen devices. When CipherCard is placed over a touchscreen’s pin-pad, it remaps a user’s touch point on the physical token to a different location on the pin-pad. It hence translates a visible user password into a different system password received by a touchscreen, but is hidden from observers as well as the user. CipherCard enhances authentication security through Two-Factor Authentication (TFA), in that both the correct user password and a specific card are needed for successful authentication. We explore the design space of CipherCard, …
Toward Mobile Robots Reasoning Like Humans, Jean Oh, Arne Suppe, Felix Duvallet, Abdeslam Boularias, Luis Navarro-Serment, Martial Hebert, Anthony Stentz, Jerry Vinokurov, Oscar Romero, Christian Lebiere, Robert Dean
Toward Mobile Robots Reasoning Like Humans, Jean Oh, Arne Suppe, Felix Duvallet, Abdeslam Boularias, Luis Navarro-Serment, Martial Hebert, Anthony Stentz, Jerry Vinokurov, Oscar Romero, Christian Lebiere, Robert Dean
Research Collection School Of Computing and Information Systems
Robots are increasingly becoming key players in human-robot teams. To become effective teammates, robots must possess profound understanding of an environment, be able to reason about the desired commands and goals within a specific context, and be able to communicate with human teammates in a clear and natural way. To address these challenges, we have developed an intelligence architecture that combines cognitive components to carry out high-level cognitive tasks, semantic perception to label regions in the world, and a natural language component to reason about the command and its relationship to the objects in the world. This paper describes recent …
Integrated Intelligence For Human-Robot Teams, Jean Oh, Et. Al.
Integrated Intelligence For Human-Robot Teams, Jean Oh, Et. Al.
Research Collection School Of Computing and Information Systems
With recent advances in robotics technologies and autonomous systems, the idea of human-robot teams is gaining ever-increasing attention. In this context, our research focuses on developing an intelligent robot that can autonomously perform non-trivial, but specific tasks conveyed through natural language. Toward this goal, a consortium of researchers develop and integrate various types of intelligence into mobile robot platforms, including cognitive abilities to reason about high-level missions, perception to classify regions and detect relevant objects in an environment, and linguistic abilities to associate instructions with the robot’s world model and to communicate with human teammates in a natural way. This …
Cyberspace: A Venue For Terrorism, David Bieda, Leila Halawi
Cyberspace: A Venue For Terrorism, David Bieda, Leila Halawi
Publications
This paper discusses how cyberspace has become a venue for terrorists groups for recruiting and proliferating propaganda and terrorism. Moreover, this study explores how the low cost Internet infrastructure and social media sites (such as Facebook, Twitter, and YouTube) have contributed to their networking and operations due to the convenience, in terms of availability, accessibility, message redundancy, ease of use, and the inability to censor content. Concepts such as cyber-weapons, cyber-attacks, cyber-war, and cyber-terrorism are presented and explored to assess how terrorist groups are exploiting cyberspace.
Data Breach (Regulatory) Effects, David Thaw
Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo
Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo
Articles
In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private …
Voting Rules As Error Correcting Codes, Nisarg Shah, Ariel Procaccia, Yair Zick
Voting Rules As Error Correcting Codes, Nisarg Shah, Ariel Procaccia, Yair Zick
Yair Zick
No abstract provided.
Cepsim: A Simulator For Cloud-Based Complex Event Processing, Wilson Higashino, Miriam Capretz, Luiz Bittencourt
Cepsim: A Simulator For Cloud-Based Complex Event Processing, Wilson Higashino, Miriam Capretz, Luiz Bittencourt
Wilson A Higashino
As one of the Vs defining Big Data, data velocity brings many new challenges to traditional data processing approaches. The adoption of cloud environments in complex event processing (CEP) systems is a recent architectural style that aims to overcome these challenges. Validating cloud-based CEP systems at the required Big Data scale, however, is often a laborious, error-prone, and expensive task. This article presents CEPSim, a new simulator that has been developed to facilitate this validation process. CEPSim extends CloudSim, an existing cloud simulator, with an application model based on directed acyclic graphs that is used to represent continuous CEP queries. …
Computer Science, Ying Chen
Computer Science, Ying Chen
Ying Chen
This research guide includes lists and links for recommended databases, journals, and web resources on computer science. It also provides helpful information for citation and writing with emphasis on the science disciplines.
Non-Myopic Negotiators See What's Best, Yair Zick, Yoram Bachrach, Ian Kash, Peter Key
Non-Myopic Negotiators See What's Best, Yair Zick, Yoram Bachrach, Ian Kash, Peter Key
Yair Zick
No abstract provided.
Information Technology, Ying Chen
Information Technology, Ying Chen
Ying Chen
This research guide includes lists and links for recommended databases, journals, and web resources on Information Technology. It also provides helpful information for citation and writing with emphasis on the science disciplines.
Analyzing Latency-Aware Self-Adaptation Using Stochastic Games And Simulations, Javier Camara, Gabriel A. Moreno, David Garlan, Bradley Schmerl
Analyzing Latency-Aware Self-Adaptation Using Stochastic Games And Simulations, Javier Camara, Gabriel A. Moreno, David Garlan, Bradley Schmerl
Gabriel A. Moreno
Self-adaptive systems must decide which adaptations to apply and when. In reactive approaches, adaptations are chosen and executed after some issue in the system has been detected (e.g., unforeseen attacks or failures). In proactive approaches, predictions are used to prepare the system for some future event (e.g., traffic spikes during holidays). In both cases, the choice of adaptation is based on the estimated impact it will have on the system. Current decision-making approaches assume that the impact will be instantaneous, whereas it is common that adaptations take time to produce their impact. Ignoring this latency is problematic because adaptations may …
Proactive Self-Adaptation Under Uncertainty: A Probabilistic Model Checking Approach, Gabriel A. Moreno, Javier Camara, David Garlan, Bradley Schmerl
Proactive Self-Adaptation Under Uncertainty: A Probabilistic Model Checking Approach, Gabriel A. Moreno, Javier Camara, David Garlan, Bradley Schmerl
Gabriel A. Moreno
Self-adaptive systems tend to be reactive and myopic, adapting in response to changes without anticipating what the subsequent adaptation needs will be. Adapting reactively can result in inefficiencies due to the system performing a suboptimal sequence of adaptations. Furthermore, when adaptations have latency, and take some time to produce their effect, they have to be started with sufficient lead time so that they complete by the time their effect is needed. Proactive latency-aware adaptation addresses these issues by making adaptation decisions with a look-ahead horizon and taking adaptation latency into account. In this paper we present an approach for proactive …
Reasoning About Human Participation In Self-Adaptive Systems, Javier Camara, Gabriel A. Moreno, David Garlan
Reasoning About Human Participation In Self-Adaptive Systems, Javier Camara, Gabriel A. Moreno, David Garlan
Gabriel A. Moreno
Self-adaptive systems overcome many of the limitations of human supervision in complex software-intensive systems by endowing them with the ability to automatically adapt their structure and behavior in the presence of runtime changes. However, adaptation in some classes of systems (e.g., safety- critical) can benefit by receiving information from humans (e.g., acting as sophisticated sensors, decision-makers), or by involving them as system-level effectors to execute adaptations (e.g., when automation is not possible, or as a fallback mechanism). However, human participants are influenced by factors external to the system (e.g., training level, fatigue) that affect the likelihood of success when they …
Legal Issues: Security And Privacy With Mobile Devices, Brian Leonard, Maurice Dawson
Legal Issues: Security And Privacy With Mobile Devices, Brian Leonard, Maurice Dawson
Maurice Dawson
Privacy and security are two items being woven into the fabric of American law concerning mobile devices. This chapter will review and analyze the associated laws and policies that are currently in place or have been proposed to ensure proper execution of security measures for mobile and other devices while still protecting individual privacy. This chapter will address the fact that as the American society significantly uses mobile devices, it is imperative to understand the legal actions surrounding these technologies to include their associated uses. This chapter will also address the fact that with 9/11 in the not so distant …
Zespół Energii Odnawialnej I Zrównoważonego Rozwoju (Eozr), Wojciech M. Budzianowski
Zespół Energii Odnawialnej I Zrównoważonego Rozwoju (Eozr), Wojciech M. Budzianowski
Wojciech Budzianowski
No abstract provided.
Creating Computer Availability Maps, Scott Bacon
Creating Computer Availability Maps, Scott Bacon
Scott Bacon
The Winograd Schema Challenge And Reasoning About Correlation, Dan Bailey, Amelia Harrison, Yuliya Lierler, Vladimir Lifschitz, Julian Michael
The Winograd Schema Challenge And Reasoning About Correlation, Dan Bailey, Amelia Harrison, Yuliya Lierler, Vladimir Lifschitz, Julian Michael
Yuliya Lierler
Constraint Answer Set Programming Versus Satisfiability Modulo Theories Or Constraints Versus Theories, Yuliya Lierler, Benjamin Susman
Constraint Answer Set Programming Versus Satisfiability Modulo Theories Or Constraints Versus Theories, Yuliya Lierler, Benjamin Susman
Yuliya Lierler
Data, Analytics And Community-Based Organizations: Transforming Data To Decisions For Community Development, Michael P. Johnson Jr.
Data, Analytics And Community-Based Organizations: Transforming Data To Decisions For Community Development, Michael P. Johnson Jr.
Michael P. Johnson
The past ten years have seen a revolution in two disciplines related to operations and strategy design. “Big Data” has transformed the theory and practice of producing and selling goods and services through methods associated with computer science and information technology. “Analytics” has popularized primarily quantitative models and methods by which organizations and systems can measure multiple aspects of performance. As these fields rely on information technology to collect, store, process and share data, we refer to the collection of knowledge and applications associated with Big Data and analytics as “data analytics and information technology.” The impacts of data analytics …