Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

27694 Full-Text Articles 26188 Authors 6033315 Downloads 241 Institutions

All Articles in Computer Sciences

Faceted Search

27694 full-text articles. Page 1 of 722.

Cybercrime Deterrence And International Legislation: Evidence From Distributed Denial Of Service Attacks, Kai-Lung HUI, Seung Hyun KIM, QIU-HONG WANG 2017 Singapore Management University

Cybercrime Deterrence And International Legislation: Evidence From Distributed Denial Of Service Attacks, Kai-Lung Hui, Seung Hyun Kim, Qiu-Hong Wang

Research Collection School Of Information Systems

In this paper, we estimate the impact of enforcing the Convention on Cybercrime (COC) on deterring distributed denial of service (DDOS) attacks. Our data set comprises a sample of real, random spoof-source DDOS attacks recorded in 106 countries in 177 days in the period 2004-2008. We find that enforcing the COC decreases DDOS attacks by at least 11.8 percent, but a similar deterrence effect does not exist if the enforcing countries make a reservation on international cooperation. We also find evidence of network and displacement effects in COC enforcement. Our findings imply attackers in cyberspace are rational, motivated by ...


Extensible Energy Planning Framework For Preemptive Tasks, Jin Hyun Kim, Deepak Gangadharan, Oleg Sokolsky, Axel Legay, Insup Lee 2017 University of Pennsylvania

Extensible Energy Planning Framework For Preemptive Tasks, Jin Hyun Kim, Deepak Gangadharan, Oleg Sokolsky, Axel Legay, Insup Lee

Departmental Papers (CIS)

Cyber-physical systems (CSPs) are demanding energy-efficient design not only of hardware (HW), but also of software (SW). Dynamic Voltage and and Frequency Scaling (DVFS) and Dynamic Power Manage (DPM) are most popular techniques to improve the energy efficiency. However, contemporary complicated HW and SW designs requires more elaborate and sophisticated energy management and efficiency evaluation techniques. This paper is concerned about energy supply planning for real-time scheduling systems (units) of which tasks need to meet deadlines. This paper presents a modelbased compositional energy planning technique that computes a minimal ratio of processor frequency that preserves schedulability of independent and preemptive ...


Recommender Response To Diversity And Popularity Bias In User Profiles, Sushma Channamsetty, Michael D. Ekstrand 2017 Boise State University

Recommender Response To Diversity And Popularity Bias In User Profiles, Sushma Channamsetty, Michael D. Ekstrand

Michael D. Ekstrand

Recommender system evaluation usually focuses on the overall effectiveness of the algorithms, either in terms of measurable accuracy or ability to deliver user satisfaction or improve business metrics. When additional factors are considered, such as the diversity or novelty of the recommendations, the focus typically remains on the algorithm’s overall performance. We examine the relationship of the recommender’s output characteristics – accuracy, popularity (as an inverse of novelty), and diversity – to characteristics of the user’s rating profile. The aims of this analysis are twofold: (1) to probe the conditions under which common algorithms produce more or less diverse ...


Osspal: Finding And Evaluating Open Source Software, Anthony Wasserman 2017 Carnegie Mellon University

Osspal: Finding And Evaluating Open Source Software, Anthony Wasserman

Tony Wasserman

This paper describes the OSSpal project, which is aimed at helping companies, government agencies, and other organizations find high quality free and open source software (FOSS) that meets their needs. OSSpal is a successor to the Business Readiness Rating (BRR), combining quantitative and qualitative evaluation measures for software in various categories. Instead of a purely numeric calculated score OSSpal adds curation of high-quality FOSS projects and individual user reviews of these criteria. Unlike the BRR project, for which there was no automated support, OSSpal has an operational, publicly available website where users may search by project name or category, and ...


Eassistant: Cognitive Assistance For Identification And Auto-Triage Of Actionable Conversations, Hamid R. Motahari Nezhad, Kalpa Gunaratna, Juan Cappi 2017 Wright State University - Main Campus

Eassistant: Cognitive Assistance For Identification And Auto-Triage Of Actionable Conversations, Hamid R. Motahari Nezhad, Kalpa Gunaratna, Juan Cappi

Kno.e.sis Publications

The browser and screen have been the main user interfaces of the Web and mobile apps. The notification mechanism is an evolution in the user interaction paradigm by keeping users updated without checking applications. Conversational agents are posed to be the next revolution in user interaction paradigms. However, without intelligence on the triage of content served by the interaction and content differentiation in applications, interaction paradigms may still place the burden of information overload on users. In this paper, we focus on the problem of intelligent identification of actionable information in the content served by applications, and in particular in ...


Real-Time Vision-Based Lane Detection With 1d Haar Wavelet Transform On Raspberry Pi, Vikas Reddy Sudini 2017 Utah State University

Real-Time Vision-Based Lane Detection With 1d Haar Wavelet Transform On Raspberry Pi, Vikas Reddy Sudini

All Graduate Theses and Dissertations

Rapid progress is being made towards the realization of autonomous cars. Since the technology is in its early stages, human intervention is still necessary in order to ensure hazard-free operation of autonomous driving systems. Substantial research efforts are underway to enhance driver and passenger safety in autonomous cars. Toward that end GreedyHaarSpiker, a real-time vision-based lane detection algorithm is proposed for road lane detection in different weather conditions. The algorithm has been implemented in Python 2.7 with OpenCV 3.0 and tested on a Raspberry Pi 3 Model B ARMv8 1GB RAM coupled to a Raspberry Pi camera board ...


Identity-Based Data Outsourcing With Comprehensive Auditing In Clouds, Yujue WANG, Qianhong WU, Bo QIN, Wenchang SHI, DENG, Robert H., Jiankun HU 2017 Singapore Management University

Identity-Based Data Outsourcing With Comprehensive Auditing In Clouds, Yujue Wang, Qianhong Wu, Bo Qin, Wenchang Shi, Deng, Robert H., Jiankun Hu

Research Collection School Of Information Systems

Cloud storage system provides facilitative file storage and sharing services for distributed clients. To address integrity, controllable outsourcing, and origin auditing concerns on outsourced files, we propose an identity-based data outsourcing (IBDO) scheme equipped with desirable features advantageous over existing proposals in securing outsourced data. First, our IBDO scheme allows a user to authorize dedicated proxies to upload data to the cloud storage server on her behalf, e.g., a company may authorize some employees to upload files to the company's cloud account in a controlled way. The proxies are identified and authorized with their recognizable identities, which eliminates ...


Automatic Verification Of Finite Precision Implementations Of Linear Controllers, Junkil Park, Miroslav Pajic, Oleg Sokolsky, Insup Lee 2017 University of Pennsylvania

Automatic Verification Of Finite Precision Implementations Of Linear Controllers, Junkil Park, Miroslav Pajic, Oleg Sokolsky, Insup Lee

Departmental Papers (CIS)

We consider the problem of verifying finite precision implementation of linear time-invariant controllers against mathematical specifications. A specification may have multiple correct implementations which are different from each other in controller state representation, but equivalent from a perspective of input-output behavior (e.g., due to optimization in a code generator). The implementations may use finite precision computations (e.g. floating-point arithmetic) which cause quantization (i.e., roundoff) errors. To address these challenges, we first extract a controller's mathematical model from the implementation via symbolic execution and floating-point error analysis, and then check approximate input-output equivalence between the extracted model ...


Vcat: Dynamic Cache Management Using Cat Virtualization, Meng Xu, Linh T.X. Phan, Hyon-Young Choi, Insup Lee 2017 University of Pennsylvania

Vcat: Dynamic Cache Management Using Cat Virtualization, Meng Xu, Linh T.X. Phan, Hyon-Young Choi, Insup Lee

Departmental Papers (CIS)

This paper presents vCAT, a novel design for dynamic shared cache management on multicore virtualization platforms based on Intel’s Cache Allocation Technology (CAT). Our design achieves strong isolation at both task and VM levels through cache partition virtualization, which works in a similar way as memory virtualization, but has challenges that are unique to cache and CAT. To demonstrate the feasibility and benefits of our design, we provide a prototype implementation of vCAT, and we present an extensive set of microbenchmarks and performance evaluation results on the PARSEC benchmarks and synthetic workloads, for both static and dynamic allocations. The ...


Resilient Linear Classification: An Approach To Deal With Attacks On Training Data, Sangdon Park, James Weimer, Insup Lee 2017 University of Pennsylvania

Resilient Linear Classification: An Approach To Deal With Attacks On Training Data, Sangdon Park, James Weimer, Insup Lee

Departmental Papers (CIS)

Data-driven techniques are used in cyber-physical systems (CPS) for controlling autonomous vehicles, handling demand responses for energy management, and modeling human physiology for medical devices. These data-driven techniques extract models from training data, where their performance is often analyzed with respect to random errors in the training data. However, if the training data is maliciously altered by attackers, the effect of these attacks on the learning algorithms underpinning data-driven CPS have yet to be considered. In this paper, we analyze the resilience of classification algorithms to training data attacks. Specifically, a generic metric is proposed that is tailored to measure ...


The Impact Of Low Self-Control On Online Harassment: Interaction With Opportunity., Hyunin Baek, Michael M. Losavio, George E. Higgins 2017 University of Louisville, Kentucky, USA.

The Impact Of Low Self-Control On Online Harassment: Interaction With Opportunity., Hyunin Baek, Michael M. Losavio, George E. Higgins

Journal of Digital Forensics, Security and Law

Developing Internet technology has increased the rates of youth online harassment. This study examines online harassment from adolescents with low self-control and the moderating effect of opportunity. The data used in this study were collected by the Korea Institute of Criminology in 2009. The total sample size was 1,091. The results indicated that low self-control, opportunity, and gender have a significant influence on online harassment. However, these results differed according to gender; for males, low self-control significantly impacted online harassment; for females, however, only low self-control significantly impacted online harassment. Furthermore, the interaction between low self-control and opportunity did ...


Motion Planning For Educational Robots, Ronald I. Greenberg, Jeffery M. Karp 2017 Loyola University Chicago

Motion Planning For Educational Robots, Ronald I. Greenberg, Jeffery M. Karp

Computer Science: Faculty Publications and Other Works

This paper considers various simple ways of navigating in a 2-dimensional territory with a two-wheeled robot of a type typical in educational robotics. We determine shortest paths under various modes of operation and compare.


Designing Novel Nanostructured Permanent Magnets, Ali Al Kadhim 2017 University of Nebraska at Omaha

Designing Novel Nanostructured Permanent Magnets, Ali Al Kadhim

Student Research and Creative Activity Fair

Rare earth element based alloys have been the source of high performance magnetic alloys, and have played a paramount role in the development of various technologies, including: memory devices (such as credit cards, random-access memory), sensors, and various biomedical applications. However, there is a tremendous need to replace rare earth metals with material with powerful magnetic properties. Our group recently found CrTe-based materials that show very promising magnetic properties in nanostructured form. The magnetic modeling of such material in nanostructured form prior to their fabrication demonstrates their magnetic properties in bulk form. In this project, we investigate the behavior of ...


Vision-Based Mobile Robotic Platform For Autonomous Landing Of Quadcopters, Timothy R. Joe 2017 University of Nebraska at Omaha

Vision-Based Mobile Robotic Platform For Autonomous Landing Of Quadcopters, Timothy R. Joe

Student Research and Creative Activity Fair

This project deals with the development of a vision-based control algorithm to assist quadcopters in the landing process. For demonstration purposes, the approach has been implemented in a mobile robotic platform (turtlebot). In this project, the objective is to use the mobile robot as a landing platform. The camera on-board the mobile robot detects the quadcopter (AprilTag attached to the flying robot) and keeps track of it. Based on this idea, the proposed approach estimates in real-time the landing zone. Once this zone is calculated, the mobile robot moves towards this area, stops under the quadcopter, and acts as a ...


Passive Chemical Detection System For Uavs, John Hare 2185222 2017 University of Nebraska at Omaha

Passive Chemical Detection System For Uavs, John Hare 2185222

Student Research and Creative Activity Fair

In this project we address the problem of autonomously detecting airborne gas particles using gas sensors that are mobilized using unmanned aerial vehicles (UAVs). The main hypothesis we investigate is whether a commercially available, off-the-shelf gas sensor can be suitably integrated on a UAV platform to detect ambient gas particles. The main challenges in this problem include addressing the weight constraints of the UAV’s payload and registering a consistent reading on the gas sensor in the presence of the turbulence in the air caused by the UAV’s rotors. To verify our hypothesis, we designed a passive funneling mechanism ...


Optimizing Campus Mobility With A Focus On Sustainability: A Graph Theory Approach To Intra-Campus Transportation Networks, Quinn M. Nelson 2017 Quinn Nelson

Optimizing Campus Mobility With A Focus On Sustainability: A Graph Theory Approach To Intra-Campus Transportation Networks, Quinn M. Nelson

Student Research and Creative Activity Fair

The idea of public transportation is supported by most in theory but often heavily criticized by users when put into application. There are common tensions that are related to public transportation, as described by frequent users: unreliable, too crowded, and slow. The University of Nebraska-Omaha (UNO) is a growing metropolitan institution that uses a shuttle system to transport students among their three campuses daily. As of 2015, the current total student enrollment is approximately 16,000; UNO plans to enroll 20,000 students by 2020. The expected student growth is also reflected by the current construction of new buildings and ...


A Modular Robotic System For Assessment And Exercise Of Human Movement, Mohan Sai Ambati 2017 University of Nebraska at Omaha

A Modular Robotic System For Assessment And Exercise Of Human Movement, Mohan Sai Ambati

Student Research and Creative Activity Fair

This project targets the problem of developing a wearable modular robotic system, for assessing human movement and providing different types of exercises for the user. The system attempts to provide not only a variety of exercises (concentric, eccentric, assisted and resisted), but also to assess the change in variability of the movement as the subject shows functional improvement. The system will not only be useful for patients with sensorimotor problem such as stroke, Parkinson’s, cerebral palsy, but also for special populations such as astronauts who spend long periods of time in space and experience muscle atrophy. In this work ...


Mixed-Initiative Personal Assistants, Joshua W. Buck, Saverio Perugini 2017 University of Dayton

Mixed-Initiative Personal Assistants, Joshua W. Buck, Saverio Perugini

Computer Science Faculty Publications

Specification and implementation of flexible human-computer dialogs is challenging because of the complexity involved in rendering the dialog responsive to a vast number of varied paths through which users might desire to complete the dialog. To address this problem, we developed a toolkit for modeling and implementing task-based, mixed-initiative dialogs based on metaphors from lambda calculus. Our toolkit can automatically operationalize a dialog that involves multiple prompts and/or sub-dialogs, given a high-level dialog specification of it. Our current research entails incorporating the use of natural language to make the flexibility in communicating user utterances commensurate with that in dialog ...


Metric Similarity Joins Using Mapreduce, Yunjun GAO, Keyu YANG, Lu CHEN, Baihua ZHENG, Gang CHEN, Chun CHEN 2017 Zhejiang University

Metric Similarity Joins Using Mapreduce, Yunjun Gao, Keyu Yang, Lu Chen, Baihua Zheng, Gang Chen, Chun Chen

Research Collection School Of Information Systems

Given two object sets Q and O , a metric similarity join finds similar object pairs according to a certain criterion. This operation has a wide variety of applications in data cleaning, data mining, to name but a few. However, the rapidly growing volume of data nowadays challenges traditional metric similarity join methods, and thus, a distributed method is required. In this paper, we adopt a popular distributed framework, namely, MapReduce, to support scalable metric similarity joins. To ensure the load balancing, we present two sampling based partition methods. One utilizes the pivot and the space-filling curve mappings to cluster the ...


Using Supervised Learning To Compensate For High Latency In Planetary Exploration, Andrew Jones, Jeremy Straub 2017 North Dakota State University--Fargo

Using Supervised Learning To Compensate For High Latency In Planetary Exploration, Andrew Jones, Jeremy Straub

Jeremy Straub

Planetary exploration utilizes orbital, aerial, surface and potentially sub-surface vehicles at remote locations. At present, many of these vehicles must be teleoperated or commanded from Earth, requiring data to be transmitted over significant distances (taking several minutes or longer). This problem gets progressively more pronounced as vehicles are operated further and further from the Earth. While missions to send humans to deep space and increased autonomy both prospectively present partial solutions to this challenge, human controllers may wish to operate the vehicle with an experience more akin to in-situ exploration.

Typically, using remotely operated vehicles for exploring planets entails dealing ...


Digital Commons powered by bepress