Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

2015

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 2491 - 2510 of 2510

Full-Text Articles in Computer Sciences

Ciphercard: A Token-Based Approach Against Camera-Based Shoulder Surfing Attacks On Common Touchscreen Devices, Teddy Seyed, Xing-Dong Yang, Anthony Tang, Saul Greenberg, Jiawei Gu, Bin Zhu, Xiang Ciao Jan 2015

Ciphercard: A Token-Based Approach Against Camera-Based Shoulder Surfing Attacks On Common Touchscreen Devices, Teddy Seyed, Xing-Dong Yang, Anthony Tang, Saul Greenberg, Jiawei Gu, Bin Zhu, Xiang Ciao

Research Collection School Of Computing and Information Systems

We present CipherCard, a physical token that defends against shoulder-surfing attacks on user authentication on capacitive touchscreen devices. When CipherCard is placed over a touchscreen’s pin-pad, it remaps a user’s touch point on the physical token to a different location on the pin-pad. It hence translates a visible user password into a different system password received by a touchscreen, but is hidden from observers as well as the user. CipherCard enhances authentication security through Two-Factor Authentication (TFA), in that both the correct user password and a specific card are needed for successful authentication. We explore the design space of CipherCard, …


Toward Mobile Robots Reasoning Like Humans, Jean Oh, Arne Suppe, Felix Duvallet, Abdeslam Boularias, Luis Navarro-Serment, Martial Hebert, Anthony Stentz, Jerry Vinokurov, Oscar Romero, Christian Lebiere, Robert Dean Jan 2015

Toward Mobile Robots Reasoning Like Humans, Jean Oh, Arne Suppe, Felix Duvallet, Abdeslam Boularias, Luis Navarro-Serment, Martial Hebert, Anthony Stentz, Jerry Vinokurov, Oscar Romero, Christian Lebiere, Robert Dean

Research Collection School Of Computing and Information Systems

Robots are increasingly becoming key players in human-robot teams. To become effective teammates, robots must possess profound understanding of an environment, be able to reason about the desired commands and goals within a specific context, and be able to communicate with human teammates in a clear and natural way. To address these challenges, we have developed an intelligence architecture that combines cognitive components to carry out high-level cognitive tasks, semantic perception to label regions in the world, and a natural language component to reason about the command and its relationship to the objects in the world. This paper describes recent …


Integrated Intelligence For Human-Robot Teams, Jean Oh, Et. Al. Jan 2015

Integrated Intelligence For Human-Robot Teams, Jean Oh, Et. Al.

Research Collection School Of Computing and Information Systems

With recent advances in robotics technologies and autonomous systems, the idea of human-robot teams is gaining ever-increasing attention. In this context, our research focuses on developing an intelligent robot that can autonomously perform non-trivial, but specific tasks conveyed through natural language. Toward this goal, a consortium of researchers develop and integrate various types of intelligence into mobile robot platforms, including cognitive abilities to reason about high-level missions, perception to classify regions and detect relevant objects in an environment, and linguistic abilities to associate instructions with the robot’s world model and to communicate with human teammates in a natural way. This …


Cyberspace: A Venue For Terrorism, David Bieda, Leila Halawi Jan 2015

Cyberspace: A Venue For Terrorism, David Bieda, Leila Halawi

Publications

This paper discusses how cyberspace has become a venue for terrorists groups for recruiting and proliferating propaganda and terrorism. Moreover, this study explores how the low cost Internet infrastructure and social media sites (such as Facebook, Twitter, and YouTube) have contributed to their networking and operations due to the convenience, in terms of availability, accessibility, message redundancy, ease of use, and the inability to censor content. Concepts such as cyber-weapons, cyber-attacks, cyber-war, and cyber-terrorism are presented and explored to assess how terrorist groups are exploiting cyberspace.


Data Breach (Regulatory) Effects, David Thaw Jan 2015

Data Breach (Regulatory) Effects, David Thaw

Articles

No abstract provided.


Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo Jan 2015

Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo

Articles

In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private …


Voting Rules As Error Correcting Codes, Nisarg Shah, Ariel Procaccia, Yair Zick Dec 2014

Voting Rules As Error Correcting Codes, Nisarg Shah, Ariel Procaccia, Yair Zick

Yair Zick

No abstract provided.


Cepsim: A Simulator For Cloud-Based Complex Event Processing, Wilson Higashino, Miriam Capretz, Luiz Bittencourt Dec 2014

Cepsim: A Simulator For Cloud-Based Complex Event Processing, Wilson Higashino, Miriam Capretz, Luiz Bittencourt

Wilson A Higashino

As one of the Vs defining Big Data, data velocity brings many new challenges to traditional data processing approaches. The adoption of cloud environments in complex event processing (CEP) systems is a recent architectural style that aims to overcome these challenges. Validating cloud-based CEP systems at the required Big Data scale, however, is often a laborious, error-prone, and expensive task. This article presents CEPSim, a new simulator that has been developed to facilitate this validation process. CEPSim extends CloudSim, an existing cloud simulator, with an application model based on directed acyclic graphs that is used to represent continuous CEP queries. …


Computer Science, Ying Chen Dec 2014

Computer Science, Ying Chen

Ying Chen

This research guide includes lists and links for recommended databases, journals, and web resources on computer science. It also provides helpful information for citation and writing with emphasis on the science disciplines.


Non-Myopic Negotiators See What's Best, Yair Zick, Yoram Bachrach, Ian Kash, Peter Key Dec 2014

Non-Myopic Negotiators See What's Best, Yair Zick, Yoram Bachrach, Ian Kash, Peter Key

Yair Zick

No abstract provided.


Information Technology, Ying Chen Dec 2014

Information Technology, Ying Chen

Ying Chen

This research guide includes lists and links for recommended databases, journals, and web resources on Information Technology. It also provides helpful information for citation and writing with emphasis on the science disciplines.


Analyzing Latency-Aware Self-Adaptation Using Stochastic Games And Simulations, Javier Camara, Gabriel A. Moreno, David Garlan, Bradley Schmerl Dec 2014

Analyzing Latency-Aware Self-Adaptation Using Stochastic Games And Simulations, Javier Camara, Gabriel A. Moreno, David Garlan, Bradley Schmerl

Gabriel A. Moreno

Self-adaptive systems must decide which adaptations to apply and when. In reactive approaches, adaptations are chosen and executed after some issue in the system has been detected (e.g., unforeseen attacks or failures). In proactive approaches, predictions are used to prepare the system for some future event (e.g., traffic spikes during holidays). In both cases, the choice of adaptation is based on the estimated impact it will have on the system. Current decision-making approaches assume that the impact will be instantaneous, whereas it is common that adaptations take time to produce their impact. Ignoring this latency is problematic because adaptations may …


Proactive Self-Adaptation Under Uncertainty: A Probabilistic Model Checking Approach, Gabriel A. Moreno, Javier Camara, David Garlan, Bradley Schmerl Dec 2014

Proactive Self-Adaptation Under Uncertainty: A Probabilistic Model Checking Approach, Gabriel A. Moreno, Javier Camara, David Garlan, Bradley Schmerl

Gabriel A. Moreno

Self-adaptive systems tend to be reactive and myopic, adapting in response to changes without anticipating what the subsequent adaptation needs will be. Adapting reactively can result in inefficiencies due to the system performing a suboptimal sequence of adaptations. Furthermore, when adaptations have latency, and take some time to produce their effect, they have to be started with sufficient lead time so that they complete by the time their effect is needed. Proactive latency-aware adaptation addresses these issues by making adaptation decisions with a look-ahead horizon and taking adaptation latency into account. In this paper we present an approach for proactive …


Reasoning About Human Participation In Self-Adaptive Systems, Javier Camara, Gabriel A. Moreno, David Garlan Dec 2014

Reasoning About Human Participation In Self-Adaptive Systems, Javier Camara, Gabriel A. Moreno, David Garlan

Gabriel A. Moreno

Self-adaptive systems overcome many of the limitations of human supervision in complex software-intensive systems by endowing them with the ability to automatically adapt their structure and behavior in the presence of runtime changes. However, adaptation in some classes of systems (e.g., safety- critical) can benefit by receiving information from humans (e.g., acting as sophisticated sensors, decision-makers), or by involving them as system-level effectors to execute adaptations (e.g., when automation is not possible, or as a fallback mechanism). However, human participants are influenced by factors external to the system (e.g., training level, fatigue) that affect the likelihood of success when they …


Legal Issues: Security And Privacy With Mobile Devices, Brian Leonard, Maurice Dawson Dec 2014

Legal Issues: Security And Privacy With Mobile Devices, Brian Leonard, Maurice Dawson

Maurice Dawson

Privacy and security are two items being woven into the fabric of American law concerning mobile devices. This chapter will review and analyze the associated laws and policies that are currently in place or have been proposed to ensure proper execution of security measures for mobile and other devices while still protecting individual privacy. This chapter will address the fact that as the American society significantly uses mobile devices, it is imperative to understand the legal actions surrounding these technologies to include their associated uses. This chapter will also address the fact that with 9/11 in the not so distant …


Zespół Energii Odnawialnej I Zrównoważonego Rozwoju (Eozr), Wojciech M. Budzianowski Dec 2014

Zespół Energii Odnawialnej I Zrównoważonego Rozwoju (Eozr), Wojciech M. Budzianowski

Wojciech Budzianowski

No abstract provided.


Creating Computer Availability Maps, Scott Bacon Dec 2014

Creating Computer Availability Maps, Scott Bacon

Scott Bacon

During the fall semester of 2012, the Kimbel Library and Bryan Information Commons conducted a LibQUAL+ survey to gauge how patron needs were being met. Many survey respondents commented that there were not enough computers for use in the library buildings. This issue was remedied by the addition of over 70 percent more computer workstations in the new commons building, a move that was well received by patrons. However, these desktops still filled up quickly, especially during midterms and finals, so the library decided to create a dynamic system to show patrons which computers were available for use at any …


The Winograd Schema Challenge And Reasoning About Correlation, Dan Bailey, Amelia Harrison, Yuliya Lierler, Vladimir Lifschitz, Julian Michael Dec 2014

The Winograd Schema Challenge And Reasoning About Correlation, Dan Bailey, Amelia Harrison, Yuliya Lierler, Vladimir Lifschitz, Julian Michael

Yuliya Lierler

The Winograd Schema Challenge is an alternative to the Turing Test that may provide a more meaningful measure of machine intelligence. It poses a set of coreference resolution problems that cannot be solved without human-like reasoning. In this paper, we take the view that the solution to such problems lies in establishing discourse coherence. Specifically, we examine two types of rhetorical relations that can be used to establish discourse coherence: positive and negative correlation. We introduce a framework for reasoning about correlation between sentences, and show how this framework can be used to justify solutions to some Winograd Schema problems.


Constraint Answer Set Programming Versus Satisfiability Modulo Theories Or Constraints Versus Theories, Yuliya Lierler, Benjamin Susman Dec 2014

Constraint Answer Set Programming Versus Satisfiability Modulo Theories Or Constraints Versus Theories, Yuliya Lierler, Benjamin Susman

Yuliya Lierler

Constraint answer set programming is a promising research direction that integrates answer set programming with constraint processing. This research direction often informally relates itself to the field of Satisfiability Modulo Theory. Yet the exact formal link is obscured as the terminology and concepts used in these two research fields differ. The goal of this paper to make the link between these two fields precise.


Data, Analytics And Community-Based Organizations: Transforming Data To Decisions For Community Development, Michael P. Johnson Jr. Dec 2014

Data, Analytics And Community-Based Organizations: Transforming Data To Decisions For Community Development, Michael P. Johnson Jr.

Michael P. Johnson

The past ten years have seen a revolution in two disciplines related to operations and strategy design. “Big Data” has transformed the theory and practice of producing and selling goods and services through methods associated with computer science and information technology. “Analytics” has popularized primarily quantitative models and methods by which organizations and systems can measure multiple aspects of performance. As these fields rely on information technology to collect, store, process and share data, we refer to the collection of knowledge and applications associated with Big Data and analytics as “data analytics and information technology.” The impacts of data analytics …