Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Science and Technology Studies

The Net Result: Enthusiasm For Exploring The Internet, Connie Foster, Cynthia Etkin, Sandra L. Staebell, Mary Margaret (Peggy) Wright Dec 1993

The Net Result: Enthusiasm For Exploring The Internet, Connie Foster, Cynthia Etkin, Sandra L. Staebell, Mary Margaret (Peggy) Wright

DLTS Faculty Publications

What began as a vision and committee charge from the dean of libraries at Western Kentucky University (WKU) ended as a successful faculty retreat focusing on the Internet. For the third year all University Libraries faculty from public and technical services, special collections, and the Kentucky Museum set aside one day before the beginning of the fall semester to retreat from their normal library responsibilities and environment to explore, in-depth, a single topic, and in 1993 the retreat focused on the Internet.


Semantics-Based Information Brokering: A Step Towards Realizing The Infocosm, Vipul Kashyap, Amit P. Sheth Oct 1993

Semantics-Based Information Brokering: A Step Towards Realizing The Infocosm, Vipul Kashyap, Amit P. Sheth

Kno.e.sis Publications

The rapid advances in computer and communication technologies, and their merger, is leading to a global information market place. It will consist of federations of very large number of information systems that will cooperate to varying extents to support the users' information needs. We propose an architecture which may facilitate meeting these needs. It consists of three main components: information providers, information brokers and information consumers. We also propose an approach to information brokering. We discuss two of it's tasks: information resource discovery, which identities relevant information sources for a given query, and query processing, which involves the generation of …


Specifying And Enforcing Intertask Dependencies, Paul Attie, Munindar Singh, Amit P. Sheth, Marek Rusinkiewicz Aug 1993

Specifying And Enforcing Intertask Dependencies, Paul Attie, Munindar Singh, Amit P. Sheth, Marek Rusinkiewicz

Kno.e.sis Publications

Extensions of the traditional atomic transaction model are needed to support the development of multi-system applications or workflows that access heterogeneous databases and legacy application systems. Most extended transaction models use conditions involving events or dependencies between transactions. Intertask dependencies can serve as a uniform framework for defining extended transaction models. In this paper we introduce event attributes needed to determine whether a dependency is enforceable and to properly schedule events in extended transaction models. Using these attributes and a formalization of a dependency into the temporal logic CTL, we can automatically synthesize an automaton that captures the computations that …


A Framework For Controlling Cooperative Agents, Kuo-Chu Lee, William H. Mansfield, Amit P. Sheth Jul 1993

A Framework For Controlling Cooperative Agents, Kuo-Chu Lee, William H. Mansfield, Amit P. Sheth

Kno.e.sis Publications

Presents an overview of the ITX (Interacting Transaction) system, which supports complex interactions among cooperating agents in the presence of user interventions that change application objectives and system failures. The system's components and its unique fixed-point criterion for feedback control of iterative interactions are described. An example of a simplified multimedia teleconferencing application is discussed to illustrate the features of the ITX system.


A Musical Retrieve Of Heidegger, Nietzsche, And Technology: Cadence, Concinnity, And Playing Brass, Babette Babich Jan 1993

A Musical Retrieve Of Heidegger, Nietzsche, And Technology: Cadence, Concinnity, And Playing Brass, Babette Babich

Articles and Chapters in Academic Book Collections

A discussion of Heidegger's analysis of the essence of modern technology as a version of what Heidegger names Nietzsche's highest will to power read together with Heidegger's understanding of Nietzsche's statement of the nihilism of our day. It is argued that Heidegger's philosophic questioning of technology is inevitably foreclosed by his stylized, hermetic reading of Nietzsche's expression of the will to power. Thus it is necessary to read Heidegger's critique of technology in the light of rather than against Nietzsche's critique of science and culture. This entails a reading of Heidegger's reading of Nietzsche against Heidegger's reading of Nietzsche. But …


Molecular Epidemiology Of Escherichia Coli 0157:H7 Strains By Bacteriophage A Restriction Fragment Length Polymorphism Analysis: Application To A Multistate Foodborne Outbreak And A Day-Care Center Cluster, Mansour Samadpour, Linda M. Grimm, B Desai, Dalia Alfi, Jerry E. Ongerth, Phillip I. Tarr Jan 1993

Molecular Epidemiology Of Escherichia Coli 0157:H7 Strains By Bacteriophage A Restriction Fragment Length Polymorphism Analysis: Application To A Multistate Foodborne Outbreak And A Day-Care Center Cluster, Mansour Samadpour, Linda M. Grimm, B Desai, Dalia Alfi, Jerry E. Ongerth, Phillip I. Tarr

Faculty of Engineering and Information Sciences - Papers: Part A

Genomic DNAs prepared from 168 isolates of Escherichia coli 0157:H7 were analyzed for restriction fragment length polymorphisms on Southern blots probed with bacteriophage A DNA. The isolates analyzed included strains from a recent large multistate outbreak of E. coli 0157:H7 infection associated with consumption of poorly cooked beef in restaurants, a day-care center cluster, and temporally and geographically unrelated isolates. E. coli 0157:H7 isolates recovered from the incriminated meat and from 61 (96.8%) of 63 patients from Washington and Nevada possessed identical A restriction fragment length patterns. The A restriction fragment length polymorphisms observed in 11 (91.7%) of 12 day-care …


Markov Pyramid Models In Image Analysis, Jennifer L. Davidson, Noel A. Cressie Jan 1993

Markov Pyramid Models In Image Analysis, Jennifer L. Davidson, Noel A. Cressie

Faculty of Engineering and Information Sciences - Papers: Part A

The use of statistical pattern recognition techniques in image processing has led to simplifying assumptions on the statistical interdependence of the pixel value of an image, which allow theoretical analysis and/or computational implementation to be achieved. For instance, the assumption of statistical independence of the values or that their joint distributions are multivariate normal, simplifies the analysis enormously. However, these results are very limiting in representing models for data, and do not allow for analysis of arbitrary spatial dependencies, in the data. One method for modeling two-dimensional data on a lattice array has been developed by Abend et al. called …


Systems Of Illative Combinatory Logic Complete For First Order Propositional And Predicate Calculus, Henk Barendregt, Martin Bunder, Wil Dekkers Jan 1993

Systems Of Illative Combinatory Logic Complete For First Order Propositional And Predicate Calculus, Henk Barendregt, Martin Bunder, Wil Dekkers

Faculty of Engineering and Information Sciences - Papers: Part A

Illative combinatory logic consists of the theory of combinators or lambda calculus extended by extra constants (and corresponding axioms and rules) intended to capture inference. The paper considers systems of illative combinatory logic that are sound for first-order propositional and predicate calculus. The interpretation from ordinary logic into the illative systems can be done in two ways: following the propositions-as-types paradigm, in which derivations become combinators or, in a more direct way, in which derivations are not translated. Both translations are closely related in a canonical way. The two direct translations turn out to be complete. The paper fulfills the …


Stochastic Recognition Of Closed Object Boundaries In Images, J Helterbrand, Noel A. Cressie Jan 1993

Stochastic Recognition Of Closed Object Boundaries In Images, J Helterbrand, Noel A. Cressie

Faculty of Engineering and Information Sciences - Papers: Part A

Engineering-based edge detection techniques generally use local intensity information to identify whether a pixel location is part of a boundary. Boundaries are presumed present where sharp transitions in the observed intensities occur. Unfortunately, these approaches are sensitive to error and hidden partial boundaries, which hinders the determination of closed object boundaries. In this research, a method to obtain statistically optimal closed object boundaries is presented.


So Far (Schematically) Yet So Near (Semantically), Amit P. Sheth, Vipul Kashyap Jan 1993

So Far (Schematically) Yet So Near (Semantically), Amit P. Sheth, Vipul Kashyap

Kno.e.sis Publications

In a multidatabase system, schematic conflicts between two objects are usually of interest only when the objects have some semantic affinity. In this paper we try to reconcile the two perspectives. We first define the concept of semantic proximity and provide a semantic taxonomy. We then enumerate and classify the schematic and data conflicts. We discuss possible semantic similarities between two objects that have various types of schematic and data conflicts. Issues of uncertain information and inconsistent information are also addressed.


On Transactional Workflows, Amit P. Sheth, Marek Rusinkiewicz Jan 1993

On Transactional Workflows, Amit P. Sheth, Marek Rusinkiewicz

Kno.e.sis Publications

The basic transaction model has evolved over time to incorporate more complex transactions structures and to take the advantage of semantics of higher-level operations that cannot be seen at the level of page reads and writes. Well known examples of such extended transaction models include nested and multi-level transactions. A number of relaxed transaction models have been defined in the last several years that permit a controlled relaxation of the transaction isolation and atomicity to better match the requirements of various database applications. Correctness criteria other than global serializability have also been proposed. Several examples of extended/relaxed transaction models are …