Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Software Engineering (5)
- Systems Architecture (3)
- Artificial Intelligence and Robotics (2)
- Business (2)
- Business Administration, Management, and Operations (2)
-
- Communication (2)
- Communication Technology and New Media (2)
- Defense and Security Studies (2)
- Health Policy (2)
- Health Services Administration (2)
- Law (2)
- Management Information Systems (2)
- Management Sciences and Quantitative Methods (2)
- Medicine and Health Sciences (2)
- Organizational Behavior and Theory (2)
- Other Computer Sciences (2)
- Policy Design, Analysis, and Evaluation (2)
- Public Affairs, Public Policy and Public Administration (2)
- Public Health (2)
- Science and Technology Law (2)
- Science and Technology Policy (2)
- Science and Technology Studies (2)
- Social Policy (2)
- Social and Behavioral Sciences (2)
- Technology and Innovation (2)
- Theory and Algorithms (1)
- Keyword
-
- Refereed papers (3)
- Anonymity (2)
- Adaptedness (1)
- Articles (1)
- Attention economy (1)
-
- Attention spans (1)
- Clustering (1)
- Component models variety; model choices; model selection; model comparative analysis (1)
- Denial of service (1)
- Dependable Systems (1)
- Distributed systems; leader-follower replication; membership; message ordering; software fault tolerance; strong replica consistency; virtual synchrony (1)
- E-learning; distance learning developement; instructional designers; subject-matter experts (1)
- Ecosystems (1)
- Environments (1)
- Evolution (1)
- Governance capability (1)
- Hidden Markov models (1)
- Information security (1)
- Information systems (1)
- Innovative Technologies (1)
- Intelligence (1)
- Knowledge ecosystems (1)
- Market (1)
- Movement detection (1)
- Onion routing (1)
- Operational capability (1)
- Organizational science (1)
- Performance improvement (1)
- Power-efficient (1)
- Publications (1)
Articles 1 - 14 of 14
Full-Text Articles in OS and Networks
Exposing Potential Privacy Issues With Ipv6 Address Construction, Clinton Carpene, Andrew Woodward
Exposing Potential Privacy Issues With Ipv6 Address Construction, Clinton Carpene, Andrew Woodward
Clinton Carpene
The usage of 128 bit addresses with hexadecimal representation in IPv6 poses significant potential privacy issues. This paper discusses the means of allocating IPv6 addresses, along with the implications each method may have upon privacy in different usage scenarios. The division of address space amongst the global registries in a hierarchal fashion can provide geographical information about the location of an address, and its originating device. Many IPv6 address configuration methods are available, including DHCPv6, SLAAC (with or without privacy extensions), and Manual assignment. These assignment techniques are dissected to expose the identifying characteristics of each technique. It is seen …
Simulation Of Circuit Creation In Tor: Preliminary Results, William Boyd, Norman Danner, Danny Krizanc
Simulation Of Circuit Creation In Tor: Preliminary Results, William Boyd, Norman Danner, Danny Krizanc
Norman Danner
We describe a methodology for simulating Tor relay up/down behavior over time and give some preliminary results.
Effectiveness And Detection Of Denial Of Service Attacks In Tor, Norman Danner, Samuel Defabbia-Kane, Danny Krizanc, Marc Liberatore
Effectiveness And Detection Of Denial Of Service Attacks In Tor, Norman Danner, Samuel Defabbia-Kane, Danny Krizanc, Marc Liberatore
Norman Danner
Tor is one of the more popular systems for anonymizing near-real-time communications on the Internet. Borisov et al. [2007] proposed a denial-of-service-based attack on Tor (and related systems) that significantly increases the probability of compromising the anonymity provided. In this article, we analyze the effectiveness of the attack using both an analytic model and simulation. We also describe two algorithms for detecting such attacks, one deterministic and proved correct, the other probabilistic and verified in simulation.
Automatic Defect Categorization, Ferdian Thung, David Lo, Lingxiao Jiang
Automatic Defect Categorization, Ferdian Thung, David Lo, Lingxiao Jiang
David LO
Defects are prevalent in software systems. In order to understand defects better, industry practitioners often categorize bugs into various types. One common kind of categorization is the IBM’s Orthogonal Defect Classification (ODC). ODC proposes various orthogonal classification of defects based on much information about the defects, such as the symptoms and semantics of the defects, the root cause analysis of the defects, and many more. With these category labels, developers can better perform post-mortem analysis to find out what the common characteristics of the defects that plague a particular software project are. Albeit the benefits of having these categories, for …
Low Latency Fault Tolerance System, Wenbing Zhao
Low Latency Fault Tolerance System, Wenbing Zhao
Wenbing Zhao
The Low Latency Fault Tolerance (LLFT) system provides fault tolerance for distributed applications within a local-area network, using a leader-follower replication strategy. LLFT provides application-transparent replication, with strong replica consistency, for applications that involve multiple interacting processes or threads. Its novel system model enables LLFT to maintain a single consistent infinite computation, despite faults and asynchronous communication. The LLFT Messaging Protocol provides reliable, totally-ordered message delivery by employing a group multicast, where the message ordering is determined by the primary replica in the destination group. The Leader-Determined Membership Protocol provides reconfiguration and recovery when a replica becomes faulty and when …
The Graph Neural Network Model, Franco Scarselli, Marco Gori, Ah Chung Tsoi, Markus Hagenbuchner, Gabriele Monfardini
The Graph Neural Network Model, Franco Scarselli, Marco Gori, Ah Chung Tsoi, Markus Hagenbuchner, Gabriele Monfardini
Dr Markus Hagenbuchner
Many underlying relationships among data in several areas of science and engineering, e.g. computer vision, molecular chemistry, molecular biology, pattern recognition, data mining, can be represented in terms of graphs. In this paper, we propose a new neural network model, called graph neural network (GNN) model, that extends existing neural network methods for processing the data represented in the graph domain. This GNN model, which can directly process most of the practically useful types of graphs, e.g. acyclic, cyclic, directed, un-directed, implements a transduction function $\tau(\BG,n)\in\R^m$ that maps a graph $\BG$ and one of its nodes $n$ into an m-dimensional …
Movement Detection For Power-Efficient Smartphone Wlan Localization, Mark Chang, Ilari Shafer
Movement Detection For Power-Efficient Smartphone Wlan Localization, Mark Chang, Ilari Shafer
Mark L. Chang
Mobile phone services based on the location of a user have increased in popularity and importance, particularly with the proliferation of feature-rich smartphones. One major obstacle to the widespread use of location-based services is the limited battery life of these mobile devices and the high power costs of many existing approaches. We demonstrate the effectiveness of a localization strategy that performs full localization only when it detects a user has finished moving. We characterize the power use of a smartphone, then verify our strategy using models of long-term walk behavior, recorded data, and device implementation. For the same sample period, …
Investigating Cognitive Task Difficulties And Expert Skills In E-Learning Storyboards Using A Cognitive Task Analysis Technique, Siti Salwah Salim
Investigating Cognitive Task Difficulties And Expert Skills In E-Learning Storyboards Using A Cognitive Task Analysis Technique, Siti Salwah Salim
Siti Salwah Salim Prof. Dr.
E-learning storyboards have been a useful approach in distance learning development to support interaction between instructional designers and subject-matter experts. Current works show that researchers are focusing on different approaches for use in storyboards, and there is less emphasis on the effect of design and process difficulties faced by instructional designers and subject-matter experts. This study explores problem aspects of the cognitive task and the skills required of subject-matter experts by applying a cognitive task analysis approach from the expert point of view. The result shows that subject-matter experts face difficulties in making decisions on three elements during e-learning course …
Structuring Persistent Chat Conversations: Experimental Results Of The Chatsistance Tool, Siti Salwah Salim
Structuring Persistent Chat Conversations: Experimental Results Of The Chatsistance Tool, Siti Salwah Salim
Siti Salwah Salim Prof. Dr.
Abstract This research targets persistency by introducing new features in ‘Chatsistance’, a persistent chat tool that employs speech act theory and an explicit referencing technique to structure the chat log, and by providing further options for retrieving information. Earlier theory is related to the linguistics and characteristics of user statements. The later technique shows the relation of artefacts in an interconnected context named ‘explicit referencing’. Although speech actswere previously used in the field of chat, it is the first time that this theory has been used for the purpose of enhancing persistency combined with an explicit referencing technique,which together provide …
Non-Redundant Sequential Rules,Theory And Algorithm, David Lo, Siau-Cheng Khoo, Limsoon Wong
Non-Redundant Sequential Rules,Theory And Algorithm, David Lo, Siau-Cheng Khoo, Limsoon Wong
David LO
A sequential rule expresses a relationship between two series of events happening one after another. Sequential rules are potentially useful for analyzing data in sequential format, ranging from purchase histories, network logs and program execution traces. In this work, we investigate and propose a syntactic characterization of a non-redundant set of sequential rules built upon past work on compact set of representative patterns. A rule is redundant if it can be inferred from another rule having the same support and confidence. When using the set of mined rules as a composite filter, replacing a full set of rules with a …
Properties For Component Model: The Definition Perspective, Siti Salwah Salim
Properties For Component Model: The Definition Perspective, Siti Salwah Salim
Siti Salwah Salim Prof. Dr.
The presence of a large number of component models to date should be able to offer software developers a wide variety of component models - which they can easily choose from - for their software development projects. However, the opposite situation is currently observed, where the presence of many component models has caused difficulties in making the selection. Lack of properties or characteristics that can be used as a basis to perform objective comparison between the existing models is believed to have caused the difficulties. In this paper, a list of component model properties is derived by thoroughly examining the …
Ssrn As An Initial Revolution In Academic Knowledge Aggregation And Dissemination, David Bray, Sascha Vitzthum, Benn Konsynski
Ssrn As An Initial Revolution In Academic Knowledge Aggregation And Dissemination, David Bray, Sascha Vitzthum, Benn Konsynski
Sascha Vitzthum
Within this paper we consider our results of using the Social Science Research Network (SSRN) over a period of 18 months to distribute our working papers to the research community. Our experiences have been quite positive, with SSRN serving as a platform both to inform our colleagues about our research as well as inform us about related research (through email and telephoned conversations of colleagues who discovered our paper on SSRN). We then discuss potential future directions for SSRN to consider, and how SSRN might well represent an initial revolution in 21st century academic knowledge aggregation and dissemination. Our paper …
Detecting Denial Of Service Attacks In Tor, Norman Danner, Danny Krizanc, Marc Liberatore
Detecting Denial Of Service Attacks In Tor, Norman Danner, Danny Krizanc, Marc Liberatore
Norman Danner
Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service based attack on Tor (and related systems) that significantly increases the probability of compromising the anonymity provided. In this paper, we propose an algorithm for detecting such attacks and examine the effectiveness of the obvious approach to evading such detection. We implement a simplified version of the detection algorithm and study whether the attack may be in progress on the current Tor network. Our preliminary measurements indicate that the attack was probably not implemented …
Towards Self-Organizing, Smart Business Networks: Let’S Create ‘Life’ From Inert Information, David Bray, Benn Konsynski
Towards Self-Organizing, Smart Business Networks: Let’S Create ‘Life’ From Inert Information, David Bray, Benn Konsynski
David A. Bray
We review three different theories that can inform how researchers can determine the performance of smart business networks, to include: (1) the Theory of Evolution, (2) the Knowledge-Based Theory of the Firm, and (3) research insights into computers and cognition. We suggest that each of these theories demonstrate that to be generally perceived as smart, an organism needs to be self-organizing, communicative, and tool-making. Consequentially, to determine the performance of a smart business network, we suggest that researchers need to determine the degree to which it is self-organizing, communicative, and tool-making. We then relate these findings to the Internet and …