Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Theory and Algorithms (9)
- Databases and Information Systems (8)
- Other Computer Sciences (7)
- Information Security (6)
- Graphics and Human Computer Interfaces (5)
-
- Software Engineering (5)
- Numerical Analysis and Scientific Computing (4)
- OS and Networks (4)
- Programming Languages and Compilers (4)
- Artificial Intelligence and Robotics (3)
- Engineering (3)
- Aerospace Engineering (2)
- Aeronautical Vehicles (1)
- Computer Engineering (1)
- Digital Communications and Networking (1)
- Earth Sciences (1)
- Education (1)
- Electrical and Computer Engineering (1)
- Environmental Monitoring (1)
- Environmental Sciences (1)
- Geophysics and Seismology (1)
- Hardware Systems (1)
- Higher Education (1)
- Multi-Vehicle Systems and Air Traffic Control (1)
- Online and Distance Education (1)
- Signal Processing (1)
- Space Vehicles (1)
- Institution
- Keyword
-
- Analytical models (2)
- Delay (2)
- Probability (2)
- Accuracy (1)
- Age-based selection (1)
-
- Age-proportional graphs (1)
- Algorithm design and analysis (1)
- Arbitrary age-biased neighbor-selection algorithm (1)
- Automated Telephone Services (ATS) (1)
- Automatic Query Optimization (1)
- Automatic Speech Recognition (ASR) (1)
- Autonomous (1)
- Autonomous UAV Control (1)
- Autonomous attack and defense (1)
- Big Data (1)
- Blackboard Architecture (1)
- Botnet proliferation (1)
- Bro (1)
- Chen-Stein theorem (1)
- Classification (1)
- Cloud computing (1)
- Clustering (1)
- Command and control (1)
- Complex Event Processing (1)
- Complex event processing (1)
- Computer network security (1)
- Computer science (1)
- Computer viruses (1)
- Control (1)
- CubeSat (1)
- Publication
- File Type
Articles 1 - 17 of 17
Full-Text Articles in Systems Architecture
Blackboard-Based Electronic Warfare System, Jeremy Straub
Blackboard-Based Electronic Warfare System, Jeremy Straub
Jeremy Straub
With internet-connected, SCADA and cyber-physical systems becoming the next battlefield for crime and warfare, technologies for defending and attacking these systems are growing in prevalence. For entities with significant asset collections that are prospectively vulnerable to this type of an attack, autonomous response, retaliation and attack capabilities are necessary to respond to a growing threat from numerous sectors. This paper presents a command and control technique for cyberwarfare based on the Blackboard Architecture. It discusses the utility of this approach and proposes a distributed command system that can run across multiple nodes of various types.
Metalogic Notes, Saverio Perugini
Metalogic Notes, Saverio Perugini
Saverio Perugini
A collection of notes, formulas, theorems, postulates and terminology in symbolic logic, syntactic notions, semantic notions, linkages between syntax and semantics, soundness and completeness, quantified logic, first-order theories, Goedel's First Incompleteness Theorem and more.
Statistics Notes, Saverio Perugini
Statistics Notes, Saverio Perugini
Saverio Perugini
A collection of terms, definitions, formulas and explanations about statistics.
Learning Cooperative Games, Maria-Florina Balcan, Ariel D. Procaccia, Yair Zick
Learning Cooperative Games, Maria-Florina Balcan, Ariel D. Procaccia, Yair Zick
Yair Zick
This paper explores a PAC (probably approximately correct) learning model in cooperative games. Specifically, we are given m random samples of coalitions and their values, taken from some unknown cooperative game; can we predict the values of unseen coalitions? We study the PAC learnability of several well-known classes of cooperative games, such as network flow games, threshold task games, and induced subgraph games. We also establish a novel connection between PAC learnability and core stability: for games that are efficiently learnable, it is possible to find payoff divisions that are likely to be stable using a polynomial number of samples
Query Analyzer And Manager For Complex Event Processing As A Service, Wilson Higashino, Cedric Eichler, Miriam A M Capretz, Thierry Monteil, M. Beatriz F. Toledo, Patricia Stolf
Query Analyzer And Manager For Complex Event Processing As A Service, Wilson Higashino, Cedric Eichler, Miriam A M Capretz, Thierry Monteil, M. Beatriz F. Toledo, Patricia Stolf
Wilson A Higashino
Complex Event Processing (CEP) is a set of tools and techniques that can be used to obtain insights from high-volume, high-velocity continuous streams of events. CEP-based systems have been adopted in many situations that require prompt establishment of system diagnostics and execution of reaction plans, such as in monitoring of complex systems. This article describes the Query Analyzer and Manager (QAM) module, a first effort toward the development of a CEP as a Service (CEPaaS) system. This module is responsible for analyzing user-defined CEP queries and for managing their execution in distributed cloud-based environments. Using a language-agnostic internal query representation, …
Evaluation Of Particle Swarm Optimization Applied To Grid Scheduling, Wilson Higashino, Miriam Capretz, M. Beatriz Toledo
Evaluation Of Particle Swarm Optimization Applied To Grid Scheduling, Wilson Higashino, Miriam Capretz, M. Beatriz Toledo
Wilson A Higashino
The problem of scheduling independent users’ jobs to resources in Grid Computing systems is of paramount importance. This problem is known to be NP-hard, and many techniques have been proposed to solve it, such as heuristics, genetic algorithms (GA), and, more recently, particle swarm optimization (PSO). This article aims to use PSO to solve grid scheduling problems, and compare it with other techniques. It is shown that many often-overlooked implementation details can have a huge impact on the performance of the method. In addition, experiments also show that the PSO has a tendency to stagnate around local minima in high-dimensional …
Service Evolution Patterns, Shuying Wang, Wilson Higashino, Michael Hayes, Miriam A M Capretz
Service Evolution Patterns, Shuying Wang, Wilson Higashino, Michael Hayes, Miriam A M Capretz
Wilson A Higashino
Service evolution is the process of maintaining and evolving existing Web services to cater for new requirements and technological changes. In this paper, a service evolution model is proposed to analyze service dependencies, identify changes on services and estimate impact on consumers that will use new versions of these services. Based on the proposed service evolution model, four service evolution patterns are described: compatibility, transition, split-map, and merge-map. These proposed patterns provide reusable templates to encourage well-defined service evolution while minimizing issues that arise otherwise. They can be applied in the service evolution scenario where a single service is used …
Autonomous Navigation And Control Of Unmanned Aerial Systems In The National Airspace, Michael Hlas, Jeremy Straub, Eunjin Kim
Autonomous Navigation And Control Of Unmanned Aerial Systems In The National Airspace, Michael Hlas, Jeremy Straub, Eunjin Kim
Jeremy Straub
Pilotless aircraft known as Unmanned Aerial Vehicles (UAVs) have been used extensively for military and intelligence purposes. This includes situations where the mission area is too dangerous for a pilot to fly, the length of the mission is longer than a pilot could stay awake or aircraft are used as cruise missiles that crash into their target. With the decreasing cost and miniaturization of computers, it has become possible to build UAVs that are small and inexpensive making them accessible to businesses, law enforcement, hobbyists and the general public.
Crowdsourced Earthquake Early Warning, Sarah Minson, Benjamin Brooks, Craig Glennie, Jessica Murray, John Langbein, Susan Owen, Thomas Heaton, Robert Iannucci, Darren Hauser
Crowdsourced Earthquake Early Warning, Sarah Minson, Benjamin Brooks, Craig Glennie, Jessica Murray, John Langbein, Susan Owen, Thomas Heaton, Robert Iannucci, Darren Hauser
Robert A Iannucci
Earthquake early warning (EEW) can reduce harm to people and infrastructure from earthquakes and tsunamis, but it has not been implemented in most high earthquake-risk regions because of prohibitive cost. Common consumer devices such as smartphones contain low-cost versions of the sensors used in EEW. Although less accurate than scientific-grade instruments, these sensors are globally ubiquitous. Through controlled tests of consumer devices, simulation of an Mw (moment magnitude) 7 earthquake on California’s Hayward fault, and real data from the Mw 9 Tohoku-oki earthquake, we demonstrate that EEW could be achieved via crowdsourcing.
Update On The Development Of A 1-U Cubesat At The University Of North Dakota, Jeremy Straub, Ronald Marsh
Update On The Development Of A 1-U Cubesat At The University Of North Dakota, Jeremy Straub, Ronald Marsh
Jeremy Straub
An overview of the progress on the development of the OpenOrbiter CubeSat is presented. This covers, at a high level, the work that has been performed during the past year and foundational work that occurred prior to this. This poster also discusses future plans for the Open Prototype for Educational NanoSats (OPEN) framework and the OpenOrbiter Small Spacecraft Development Initiative. Particular focus is given to the ongoing work to prepare for an orbital launch, which the program has been down-selected for through the NASA ELaNa CubeSat Launch Initiative program.
In addition to this discussion of the program’s origins, goals and …
A Study Of Out-Of-Turn Interaction In Menu-Based, Ivr, Voicemail Systems, Saverio Perugini, Taylor J. Anderson, William F. Moroney
A Study Of Out-Of-Turn Interaction In Menu-Based, Ivr, Voicemail Systems, Saverio Perugini, Taylor J. Anderson, William F. Moroney
William F. Moroney
We present the first user study of out-of-turn interaction in menu-based, interactive voice-response systems. Out-ofturn interaction is a technique which empowers the user (unable to respond to the current prompt) to take the conversational initiative by supplying information that is currently unsolicited, but expected later in the dialog. The technique permits the user to circumvent any flows of navigation hardwired into the design and navigate the menus in a manner which reflects their model of the task. We conducted a laboratory experiment to measure the effect of the use of outof- turn interaction on user performance and preference in a …
Modeling Heterogeneous User Churn And Local Resilience Of Unstructured P2p Networks, Zhongmei Yao, Derek Leonard, Dmitri Loguinov, Xiaoming Wang
Modeling Heterogeneous User Churn And Local Resilience Of Unstructured P2p Networks, Zhongmei Yao, Derek Leonard, Dmitri Loguinov, Xiaoming Wang
Zhongmei Yao
Previous analytical results on the resilience of unstructured P2P systems have not explicitly modeled heterogeneity of user churn (i.e., difference in online behavior) or the impact of in-degree on system resilience. To overcome these limitations, we introduce a generic model of heterogeneous user churn, derive the distribution of the various metrics observed in prior experimental studies (e.g., lifetime distribution of joining users, joint distribution of session time of alive peers, and residual lifetime of a randomly selected user), derive several closed-form results on the transient behavior of in-degree, and eventually obtain the joint in/out degree isolation probability as a simple …
Stochastic Analysis Of Horizontal Ip Scanning, Derek Leonard, Zhongmei Yao, Xiaoming Wang, Dmitri Loguinov
Stochastic Analysis Of Horizontal Ip Scanning, Derek Leonard, Zhongmei Yao, Xiaoming Wang, Dmitri Loguinov
Zhongmei Yao
Intrusion Detection Systems (IDS) have become ubiquitous in the defense against virus outbreaks, malicious exploits of OS vulnerabilities, and botnet proliferation. As attackers frequently rely on host scanning for reconnaissance leading to penetration, IDS is often tasked with detecting scans and preventing them. However, it is currently unknown how likely an IDS is to detect a given Internet-wide scan pattern and whether there exist sufficiently fast scan techniques that can remain virtually undetectable at large-scale. To address these questions, we propose a simple analytical model for the window-expiration rules of popular IDS tools (i.e., Snort and Bro) and utilize a …
Automatically Discovering The Number Of Clusters In Web Page Datasets, Zhongmei Yao
Automatically Discovering The Number Of Clusters In Web Page Datasets, Zhongmei Yao
Zhongmei Yao
Clustering is well-suited for Web mining by automatically organizing Web pages into categories, each of which contains Web pages having similar contents. However, one problem in clustering is the lack of general methods to automatically determine the number of categories or clusters. For the Web domain in particular, currently there is no such method suitable for Web page clustering. In an attempt to address this problem, we discover a constant factor that characterizes the Web domain, based on which we propose a new method for automatically determining the number of clusters in Web page data sets. We discover that the …
Node Isolation Model And Age-Based Neighbor Selection In Unstructured P2p Networks, Zhongmei Yao, Derek Leonard, Dmitri Loguinov
Node Isolation Model And Age-Based Neighbor Selection In Unstructured P2p Networks, Zhongmei Yao, Derek Leonard, Dmitri Loguinov
Zhongmei Yao
Previous analytical studies of unstructured P2P resilience have assumed exponential user lifetimes and only considered age-independent neighbor replacement. In this paper, we overcome these limitations by introducing a general node-isolation model for heavy-tailed user lifetimes and arbitrary neighbor-selection algorithms. Using this model, we analyze two age-biased neighbor-selection strategies and show that they significantly improve the residual lifetimes of chosen users, which dramatically reduces the probability of user isolation and graph partitioning compared with uniform selection of neighbors. In fact, the second strategy based on random walks on age-proportional graphs demonstrates that, for lifetimes with infinite variance, the system monotonically increases …
Cloud Computing Technology For Education Applications, Zhi-Xue Xu
Cloud Computing Technology For Education Applications, Zhi-Xue Xu
Zhi-Xue Xu
Cloud Computing Technology and Big Data Applications have been connected strongly to our daily work and life. Some peoples think that Cloud Computing is fourth revolution in Information Technology. Cloud Computing Applications that like Utility Computing also have been applied, used and developed for education and Smart Virtual Cloud Campus creations. Cloud computing technology is changing IT application development method and format on campus, and challenge and reform to the current IT computer infrastructures and applications. The cloud computing technology for application development in education can build robust applications in a short time and lower cost. The Cloud Computing Technology …
Cepsim: A Simulator For Cloud-Based Complex Event Processing, Wilson Higashino, Miriam Capretz, Luiz Bittencourt
Cepsim: A Simulator For Cloud-Based Complex Event Processing, Wilson Higashino, Miriam Capretz, Luiz Bittencourt
Wilson A Higashino
As one of the Vs defining Big Data, data velocity brings many new challenges to traditional data processing approaches. The adoption of cloud environments in complex event processing (CEP) systems is a recent architectural style that aims to overcome these challenges. Validating cloud-based CEP systems at the required Big Data scale, however, is often a laborious, error-prone, and expensive task. This article presents CEPSim, a new simulator that has been developed to facilitate this validation process. CEPSim extends CloudSim, an existing cloud simulator, with an application model based on directed acyclic graphs that is used to represent continuous CEP queries. …