Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

1999

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 27 of 27

Full-Text Articles in Social and Behavioral Sciences

Grundlagenreflexionen Zur Thematik Anthropomorpher Schnittstellen, Rudolf Kaehr Dec 1999

Grundlagenreflexionen Zur Thematik Anthropomorpher Schnittstellen, Rudolf Kaehr

Rudolf Kaehr

Report for the EMBASSI Project


Characterizations Of Classes Of Programs By Three-Valued Operators, Anthony K. Seda, Pascal Hitzler Dec 1999

Characterizations Of Classes Of Programs By Three-Valued Operators, Anthony K. Seda, Pascal Hitzler

Computer Science and Engineering Faculty Publications

Several important classes of normal logic programs, including the classes of acyclic, acceptable, and locally hierarchical programs, have the property that every program in the class has a unique two-valued supported model. In this paper, we call such classes unique supported model classes. We analyse and characterize these classes by means of operators on three-valued logics. Our studies will motivate the definition of a larger unique supported model class which we call the class of Phi-accessible programs. Finally, we show that the class of Phi -accessible programs is computationally adequate in that every partial recursive function can be implemented by …


On-Line Bayesian Tree-Structured Transformation Of Hidden Markov Models For Speaker Adaptation, Shaojun Wang, Yunxin Zhao Dec 1999

On-Line Bayesian Tree-Structured Transformation Of Hidden Markov Models For Speaker Adaptation, Shaojun Wang, Yunxin Zhao

Kno.e.sis Publications

This paper presents a new recursive Bayesian learning approach for transformation parameter estimation in speaker adaptation. Our goal is to incrementally transform (or adapt) the entire set of HMM parameters for a new speaker or new acoustic enviroment from a small amount of adaptation data. By establishing a clustering tree of HMM Gaussian mixture components, the finest affine transformation parameters for individual HMM Gaussian mixture components can be dynamically searched. The on-line Bayesian learning technique proposed in our recent work is used for recursive maximum a posteriori estimation of affine transformation parameters. Speaker adaptation experiments using a 26-letter English alphabet …


Implementation Of Speech Recognition Software For Text Processing: An Exploratory Analysis, Sean P. Abell Dec 1999

Implementation Of Speech Recognition Software For Text Processing: An Exploratory Analysis, Sean P. Abell

Theses and Dissertations

The rationale behind implementing new information technologies is often to gain productivity improvements associated with the substitution of machinery for labor. However, the literature shows little direct evidence of a positive relationship between information technology investment and subsequent productivity benefits. This thesis reports on the examination into the productivity implications of implementing speech recognition software in a text processing environment. More specifically, research was conducted to compare text processing speeds and error rates using speech recognition software versus the keyboard and mouse. Of interest was the time required to input and proofread text processing tasks as well as the number …


What Is Y2k And How Did The University Of Nevada System Solve It?, Diane R. Dietrich Oct 1999

What Is Y2k And How Did The University Of Nevada System Solve It?, Diane R. Dietrich

UNLV Theses, Dissertations, Professional Papers, and Capstones

The turn of the century change from 1999 to 2000 will create chaos for the world's computer systems. This paper will discuss the causes of the Y2K problem, the reaction to this problem by the University of Nevada System Computer Services and possible repercussions of this problem for Nevada, the United States and the world.


Efficient Support For Decision Flows In E-Commerce Applications, Richard Hull, Francois Llirbat, Jianwen Su, Guozhu Dong, Bharat Kumar, Gang Zhou Oct 1999

Efficient Support For Decision Flows In E-Commerce Applications, Richard Hull, Francois Llirbat, Jianwen Su, Guozhu Dong, Bharat Kumar, Gang Zhou

Kno.e.sis Publications

In the coming era of segment-of-one marketing, decisions about business transactions will be quite intricate, so that customer treatments can be highly individualized, reflecting customer preferences, targeted business objectives, etc. This paper describes a paradigm called “decision flows” for specifying a form of incremental decision-making that can combine a myriad of diverse business factors and be executed in near-realtime. Starting with initial input, a decision flow will iteratively gather and derive additional information until a conclusion is reached. Decision flows can be specified in a rules-based manner that generalizes so-called “business rules” but provides more structure than traditional expert systems. …


Critical It Role In Healthcare: National Agenda, Applications, And Technologies, Jack Corley, Warren Karp, Amit P. Sheth Oct 1999

Critical It Role In Healthcare: National Agenda, Applications, And Technologies, Jack Corley, Warren Karp, Amit P. Sheth

Kno.e.sis Publications

We share a widely-held vision that tomorrow's health care will be delivered by a distributed team using a knowledge based process that is focused on prevention and wellness. Caregivers will be able to treat and monitor patients where and when needed, capturing data as a natural byproduct of care delivery. Clinical teams with a wide range of skills and expertise will deliver consistent, quality care based on timely, situation-specific knowledge and guidance derived from outcomes evidence. That same knowledge will support advances in healthcare research and education. Home care and remote medicine will increase, reducing the need for high-cost hospitalization. …


A Multilevel Secure Workflow Management System, Myong H. Kang, Judith N. Froscher, Amit P. Sheth, Krzysztof J. Kochut, John A. Miller Jun 1999

A Multilevel Secure Workflow Management System, Myong H. Kang, Judith N. Froscher, Amit P. Sheth, Krzysztof J. Kochut, John A. Miller

Kno.e.sis Publications

The Department of Defense (DoD) needs multilevel secure (MLS) workflow management systems to enable globally distributed users and applications to cooperate across classification levels to achieve mission critical goals. An MLS workflow management system that allows a user to program multilevel mission logic, to securely coordinate widely distributed tasks, and to monitor the progress of the workflow across classification levels is required. In this paper, we present a roadmap for implementing MLS workflows and focus on a workflow builder that is a graphical design tool for specifying such workflows.


Considerations For An Effective Telecommunications-Use Policy, Michael E. Whitman, Anthony M. Townsend, Robert J. Aalberts Jun 1999

Considerations For An Effective Telecommunications-Use Policy, Michael E. Whitman, Anthony M. Townsend, Robert J. Aalberts

Faculty and Research Publications

Recent changes in federal telecommunications legislation have underscored the importance of an up-to-date and effective telecommunications-use policy in business organizations. With the proliferation of the Internet, intranets, and email as commonplace business tools, the potential for misuse and subsequent liability has become an increasing concern. Even though the recent Supreme Court decision struck down the obscenity provisions of the Communications Decency Act (CDA), it left intact legislation that effectively mandates development of a sound telecommunications-use policy. In addition to potential liability for systems misuse, organizations have also had to address issues of individual employee privacy within the new systems.

This …


The Open Source Revolution: Transforming The Software Industry With Help From The Government, Mitchell L. Stoltz Apr 1999

The Open Source Revolution: Transforming The Software Industry With Help From The Government, Mitchell L. Stoltz

Pomona Senior Theses

A new method for making software is stealthily gaining ground in the computer industry, offering a promise of better, cheaper software and the empowerment of the user. The open source movement could revolutionize the software industry...if it succeeds. Open source means software that you are allowed to copy, modify, and give to friends. Source code , the lists of instructions which tell computers how to run, is readily available, allowing you to look inside the workings of a program and change it to suit your needs. A group of programmers, companies, users, and activists have gathered in support of this …


How Proteins Fold, Flex, And Bind Other Molecules, Leslie A. Kuhn, Volker Schnecke, Michael L. Raymer, Paul C. Sanschagrin Apr 1999

How Proteins Fold, Flex, And Bind Other Molecules, Leslie A. Kuhn, Volker Schnecke, Michael L. Raymer, Paul C. Sanschagrin

Kno.e.sis Publications

No abstract provided.


Data Integration By Describing Sources With Constraint Databases, Xun Cheng, Guozhu Dong, Tzekwan Lau, Jianwen Su Mar 1999

Data Integration By Describing Sources With Constraint Databases, Xun Cheng, Guozhu Dong, Tzekwan Lau, Jianwen Su

Kno.e.sis Publications

We develop a data integration approach for the efficient evaluation of queries over autonomous source databases. The approach is based on some novel applications and extensions of constraint database techniques. We assume the existence of a global database schema. The contents of each data source are described using a set of constraint tuples over the global schema; each such tuple indicates possible contributions from the source. The “source description catalog” (SDC) of a global relation consists of its associated constraint tuples. Such a method of description is advantageous since it is flexible to add new sources and to modify existing …


Efficient Mining Of Partial Periodic Patterns In Time Series Database, Jiawei Han, Guozhu Dong, Yiwen Yin Mar 1999

Efficient Mining Of Partial Periodic Patterns In Time Series Database, Jiawei Han, Guozhu Dong, Yiwen Yin

Kno.e.sis Publications

Partial periodicity search, i.e., search for partial periodic patterns in time-series databases, is an interesting data mining problem. Previous studies on periodicity search mainly consider finding full periodic patterns, where every point in time contributes (precisely or approximately) to the periodicity. However, partial periodicity is very common in practice since it is more likely that only some of the time episodes may exhibit periodic patterns.

We present several algorithms for efficient mining of partial periodic patterns, by exploring some interesting properties related to partial periodicity, such as the Apriori property and the max-subpattern hit set property, and by shared mining …


Object Oriented Enterprise Modeling And Distributed Cognition At A New University: Csu Monterey Bay, Armando A. Arias Jr., Beryl L. Bellman Jan 1999

Object Oriented Enterprise Modeling And Distributed Cognition At A New University: Csu Monterey Bay, Armando A. Arias Jr., Beryl L. Bellman

SSGS Faculty Publications and Presentations

No abstract provided.


Creating A New University Through Object Oriented Enterprise Modeling: A Study Of Communications Knowledge Management & Distributed Cognition, Armando A. Arias Jr., Beryl L. Bellman Jan 1999

Creating A New University Through Object Oriented Enterprise Modeling: A Study Of Communications Knowledge Management & Distributed Cognition, Armando A. Arias Jr., Beryl L. Bellman

SSGS Faculty Publications and Presentations

Enterprise based object oriented (OO) and Unified Modeling Language (UML) modeling makes it possible to build the needed visual environments to organize people, technologies and activities (Arias, 1999d). In our modeling approach, the focus is on "things and relationships between things" described in commonly used terms. The modeling software bridges the so-called "semantic gap" between the people and the computer language (Booch, Rumbaugh & Jacobson, 1999). An object can be a product, a process, a person, a team, a company, an application or the inter-relationship between other objects. Objects can be pictured on the screen as maps formed by personalized …


Multivalued Mappings, Fixed-Point Theorems And Disjunctive Databases, Pascal Hitzler, Anthony K. Seda Jan 1999

Multivalued Mappings, Fixed-Point Theorems And Disjunctive Databases, Pascal Hitzler, Anthony K. Seda

Computer Science and Engineering Faculty Publications

In this paper, we discuss the semantics of disjunctive programs and databases and show how multivalued mappings and their fixed points arise naturally within this context. A number of fixed-point theorems for multivalued mappings are considered, some of which are already known and some of which are new. The notion of a normal derivative of a disjunctive program is introduced. Normal derivatives are normal logic programs which are determined by the disjunctive program. Thus, the well-known single-step operator associated with a normal derivative is single-valued, and its fixed points can be found by well-established means. It is shown how fixed …


Multiple Stochastic Learning Automata For Vehicle Path Control In An Automated Highway System, Cem Unsal, Pushkin Kachroo, John S. Bay Jan 1999

Multiple Stochastic Learning Automata For Vehicle Path Control In An Automated Highway System, Cem Unsal, Pushkin Kachroo, John S. Bay

Electrical & Computer Engineering Faculty Research

This paper suggests an intelligent controller for an automated vehicle planning its own trajectory based on sensor and communication data. The intelligent controller is designed using the learning stochastic automata theory. Using the data received from on-board sensors, two automata (one for lateral actions, one for longitudinal actions) can learn the best possible action to avoid collisions. The system has the advantage of being able to work in unmodeled stochastic environments, unlike adaptive control methods or expert systems. Simulations for simultaneous lateral and longitudinal control of a vehicle provide encouraging results


Maintaining Transitive Closure Of Graphs In Sql, Guozhu Dong, Leonid Libkin, Jianwen Su, Limsoon Wong Jan 1999

Maintaining Transitive Closure Of Graphs In Sql, Guozhu Dong, Leonid Libkin, Jianwen Su, Limsoon Wong

Kno.e.sis Publications

It is common knowledge that relational calculus and even SQL are not expressive enough to express recursive queries such as the transitive closure. In a real database system, one can overcome this problem by storing a graph together with its transitive closure and maintaining the latter whenever updates to the former occur. This leads to the concept of an incremental evaluation system, or IES.

Much is already known about the theory of IES but very little has been translated into practice. The purpose of this paper is to fill in this gap by providing a gentle introduction to and …


Infoharness: Managing Distributed, Heterogeneous Information, Kshitij Shah, Amit P. Sheth Jan 1999

Infoharness: Managing Distributed, Heterogeneous Information, Kshitij Shah, Amit P. Sheth

Kno.e.sis Publications

Today, important information is scattered in so many places, formats, and media, that getting the right information at the right time and place is an extremely difficult task. Developing a single software product, for example, includes the creation of documents ranging from the requirements specification and project schedules to marketing presentations, multimedia tutorials, and more. Each document may be created by a different person using a different tool, and each may be stored in a different place. InfoHarness is an information integration system, platform, and tool set that addresses these problems, managing huge amounts of heterogeneous information in a distributed …


Processes Driving The Networked Economy, Amit P. Sheth, Will Van Der Aalst, I. Budak Arpinar Jan 1999

Processes Driving The Networked Economy, Amit P. Sheth, Will Van Der Aalst, I. Budak Arpinar

Kno.e.sis Publications

The authors propose that an organic workflow-process technology will power the evolution of information system architectures. The authors outline three likely stages of architectural evolution in the context of a networked economy and discuss critical gaps in the current technology with respect to their envisioned future.


Artificial Societies: A Computational Approach To Studying Combat, Rachel J. Moore Jan 1999

Artificial Societies: A Computational Approach To Studying Combat, Rachel J. Moore

Dissertations, Theses, and Masters Projects

No abstract provided.


Web-Based Interlibrary Loan System, Ee Peng Lim, Schubert Foo, Cheng Hai Tan, Kwang-Yong Tan Jan 1999

Web-Based Interlibrary Loan System, Ee Peng Lim, Schubert Foo, Cheng Hai Tan, Kwang-Yong Tan

Research Collection School Of Computing and Information Systems

Interlibrary loan (ILL) system is one of the important library services provided by most public libraries. Through ILL, public libraries share their collections of reading material and library users are able to access library resources beyond their affiliated libraries. However, the present manual ILL process is inconvenient, inefficient and error-prone. In this project, we developed a system that automated many tedious procedures in the existing ILL system. The new ILL system is realized by a number of Java applets customized for librarians and library users. The new ILL system allows library users to submit ILL requests at any time using …


Graded Functional Activation In The Visuo-Spatial System With The Amount Of Task Demand, Patricia Carpenter, Marcel Just, Timothy Keller, William Eddy, Keith Thulborn Dec 1998

Graded Functional Activation In The Visuo-Spatial System With The Amount Of Task Demand, Patricia Carpenter, Marcel Just, Timothy Keller, William Eddy, Keith Thulborn

Marcel Adam Just

No abstract provided.


Optimization Methods For Logical Inference, Vijay Chandru, John Hooker Dec 1998

Optimization Methods For Logical Inference, Vijay Chandru, John Hooker

John Hooker

No abstract provided.


Time Course Of Fmri-Activation In Language And Spatial Networks During Sentence Comprehension, Patricia A. Carpenter, Marcel Adam Just, Timothy A. Keller, William F. Eddy, Keith R. Thulborn Dec 1998

Time Course Of Fmri-Activation In Language And Spatial Networks During Sentence Comprehension, Patricia A. Carpenter, Marcel Adam Just, Timothy A. Keller, William F. Eddy, Keith R. Thulborn

Marcel Adam Just

No abstract provided.


Plasticity Of Language-Related Brain Function During Recovery From Strok, Keith R. Thulborn, Patricia A. Carpenter, Marcel Adam Just Dec 1998

Plasticity Of Language-Related Brain Function During Recovery From Strok, Keith R. Thulborn, Patricia A. Carpenter, Marcel Adam Just

Marcel Adam Just

No abstract provided.


Computational Modeling Of High-Level Cognition And Brain Function, Marcel Adam Just, Patricia A. Carpenter, Sashank Varma Dec 1998

Computational Modeling Of High-Level Cognition And Brain Function, Marcel Adam Just, Patricia A. Carpenter, Sashank Varma

Marcel Adam Just

No abstract provided.