Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

31220 Full-Text Articles 29695 Authors 7711165 Downloads 267 Institutions

All Articles in Computer Sciences

Faceted Search

31220 full-text articles. Page 1 of 874.

Project Renew Worcester, Danni Yue, Amy Zhang, Jing Han, Omid Ashrafi, Yiming Xu 2018 Clark University

Project Renew Worcester, Danni Yue, Amy Zhang, Jing Han, Omid Ashrafi, Yiming Xu

School of Professional Studies

n The client for this capstone project is RENEW Worcester which is a fledgling solar power project whose main goals are to bring renewable energy in the form of solar power into local, primarily low-income communities and are committed to the mission of making the transition off of fossil fuels to clean, renewable power. Based in Worcester, Massachusetts, they are a local chapter of Co-op Power which is a consumer-owned sustainable energy cooperative (co-op) made up of numerous different local chapters all over the New England area as well as the state of New York. The problem that we will ...


Proactive Empirical Assessment Of New Language Feature Adoption Via Automated Refactoring: The Case Of Java 8 Default Methods, Raffi T. Khatchadourian, Hidehiko Masuhara 2018 CUNY Hunter College

Proactive Empirical Assessment Of New Language Feature Adoption Via Automated Refactoring: The Case Of Java 8 Default Methods, Raffi T. Khatchadourian, Hidehiko Masuhara

Publications and Research

Programming languages and platforms improve over time, sometimes resulting in new language features that offer many benefits. However, despite these benefits, developers may not always be willing to adopt them in their projects for various reasons. In this paper, we describe an empirical study where we assess the adoption of a particular new language feature. Studying how developers use (or do not use) new language features is important in programming language research and engineering because it gives designers insight into the usability of the language to create meaning programs in that language. This knowledge, in turn, can drive future innovations ...


Wireless Security, Lei Li, Zhigang Li, Hossain Shahriar, Rebecca Rutherfoord, Svetana Peltsverger, Dawn Tatum 2018 Kennesaw State University

Wireless Security, Lei Li, Zhigang Li, Hossain Shahriar, Rebecca Rutherfoord, Svetana Peltsverger, Dawn Tatum

Computer Science and Information Technology Grants Collections

This Grants Collection for Wireless Security was created under a Round Eight ALG Textbook Transformation Grant.

Affordable Learning Georgia Grants Collections are intended to provide faculty with the frameworks to quickly implement or revise the same materials as a Textbook Transformation Grants team, along with the aims and lessons learned from project teams during the implementation process.

Documents are in .pdf format, with a separate .docx (Word) version available for download. Each collection contains the following materials:

  • Linked Syllabus
  • Initial Proposal
  • Final Report


Infrastructure Defense, Lei Li, Zhigang Li, Hossain Shahriar, Rebecca Rutherfoord, Svetana Peltsverger, Dawn Tatum 2018 Kennesaw State University

Infrastructure Defense, Lei Li, Zhigang Li, Hossain Shahriar, Rebecca Rutherfoord, Svetana Peltsverger, Dawn Tatum

Computer Science and Information Technology Grants Collections

This Grants Collection for Infrastructure Defense was created under a Round Eight ALG Textbook Transformation Grant.

Affordable Learning Georgia Grants Collections are intended to provide faculty with the frameworks to quickly implement or revise the same materials as a Textbook Transformation Grants team, along with the aims and lessons learned from project teams during the implementation process.

Documents are in .pdf format, with a separate .docx (Word) version available for download. Each collection contains the following materials:

  • Linked Syllabus
  • Initial Proposal
  • Final Report


Professional Practices And Ethics, Lei Li, Zhigang Li, Hossain Shahriar, Rebecca Rutherfoord, Svetana Peltsverger, Dawn Tatum 2018 Kennesaw State University

Professional Practices And Ethics, Lei Li, Zhigang Li, Hossain Shahriar, Rebecca Rutherfoord, Svetana Peltsverger, Dawn Tatum

Computer Science and Information Technology Grants Collections

This Grants Collection for Professional Practices and Ethics was created under a Round Eight ALG Textbook Transformation Grant.

Affordable Learning Georgia Grants Collections are intended to provide faculty with the frameworks to quickly implement or revise the same materials as a Textbook Transformation Grants team, along with the aims and lessons learned from project teams during the implementation process.

Documents are in .pdf format, with a separate .docx (Word) version available for download. Each collection contains the following materials:

  • Linked Syllabus
  • Initial Proposal
  • Final Report


Ethical Hacking For Effective Defense, Lei Li, Zhigang Li, Hossain Shahriar, Rebecca H. Rutherfoord, Svetana Peltsverger, Dawn Tatum 2018 Kennesaw State University

Ethical Hacking For Effective Defense, Lei Li, Zhigang Li, Hossain Shahriar, Rebecca H. Rutherfoord, Svetana Peltsverger, Dawn Tatum

Computer Science and Information Technology Grants Collections

This Grants Collection for Ethical Hacking for Effective Defense was created under a Round Eight ALG Textbook Transformation Grant.

Affordable Learning Georgia Grants Collections are intended to provide faculty with the frameworks to quickly implement or revise the same materials as a Textbook Transformation Grants team, along with the aims and lessons learned from project teams during the implementation process.

Documents are in .pdf format, with a separate .docx (Word) version available for download. Each collection contains the following materials:

  • Linked Syllabus
  • Initial Proposal
  • Final Report


Ethical Hacking: Network Security And Penetration Testing, Lei Li, Zhigang Li, Hossain Shahriar, Rebecca Rutherfoord, Svetana Peltsverger, Dawn Tatum 2018 Kennesaw State University

Ethical Hacking: Network Security And Penetration Testing, Lei Li, Zhigang Li, Hossain Shahriar, Rebecca Rutherfoord, Svetana Peltsverger, Dawn Tatum

Computer Science and Information Technology Grants Collections

This Grants Collection for Ethical Hacking: Network Security and Penetration Testing was created under a Round Eight ALG Textbook Transformation Grant.

Affordable Learning Georgia Grants Collections are intended to provide faculty with the frameworks to quickly implement or revise the same materials as a Textbook Transformation Grants team, along with the aims and lessons learned from project teams during the implementation process.

Documents are in .pdf format, with a separate .docx (Word) version available for download. Each collection contains the following materials:

  • Linked Syllabus
  • Initial Proposal
  • Final Report


Amazon Alexa: The Best Personal Assistant Or An Eavesdropping Witch, Alisa Bohac, Michael Keck 2018 University of Nebraska at Omaha

Amazon Alexa: The Best Personal Assistant Or An Eavesdropping Witch, Alisa Bohac, Michael Keck

Student Research and Creative Activity Fair

The prolific integration of Internet-of-Things (IoT) devices into our homes is continuously generating discussions surrounding the security and privacy of these devices. One device that has received particular attention in the past few years is the Amazon Alexa, a ‘personal assistant’ IoT device, which listens to user commands and performs certain actions. According to Amazon, “millions of Alexa devices” were sold in the 2017 Holiday period alone [1]. However, the continuous amalgamation of technology has prompted the idea that many digital devices, through their overall functionality, could be utilized by cybercriminals to digitally intrude into our personal lives [2]. Hence ...


Intelligent And Human-Aware Decision Making For Semi-Autonomous Human Rehabilitation Assistance Using Modular Robots, Anoop Mishra 2018 University of Nebraska at Omaha

Intelligent And Human-Aware Decision Making For Semi-Autonomous Human Rehabilitation Assistance Using Modular Robots, Anoop Mishra

Student Research and Creative Activity Fair

Modular Self-reconfigurable Robots (MSRs) are robots that can adapt their shape and mobility while performing their operations. We are developing an MSR called MARIO (Modular Robots for Assistance in Robust and Intelligent Operations) to assist patients with spinal cord injury in performing daily living tasks. In this research, we are investigating computational techniques that will enable MARIO to autonomously adapt its shape while performing an assistive task, and, while remaining aware of the human user’s satisfaction in receiving assistance from MARIO. We are developing semi-autonomous decision making techniques within a computational framework called shared autonomy that will adapt MARIO ...


Cora: Commingled Remains And Analytics – An Open Community Ecosystem, Nicole McElroy, Ryan Ernst 2018 University of Nebraska at Omaha

Cora: Commingled Remains And Analytics – An Open Community Ecosystem, Nicole Mcelroy, Ryan Ernst

Student Research and Creative Activity Fair

Anthropologists at organizations such as the DPAA (Defense POW/MIA Accounting Agency) have the tough job of sorting through commingled remains of fallen soldiers. Under the direction of Professor Pawaskar at the College of IS&T, Ryan Ernst and I are currently developing a web application for the DPAA that will help them inventory the bones and record all the appropriate associations. After the inventory web application is built we will begin the analysis process using graph theory and other mathematical algorithms. This will ultimately help organizations like the DPAA get closer to the end goal of identifying fallen soldiers ...


A Model Of Competition Between Perpetual Software And Software As A Service, Zhiling GUO, Dan MA 2018 Singapore Management University

A Model Of Competition Between Perpetual Software And Software As A Service, Zhiling Guo, Dan Ma

Research Collection School Of Information Systems

Software as a service (SaaS) has grown to be a significant segment of many software product markets. SaaS vendors, which charge customers based on use and continuously improve the quality of their products, have put competitive pressure on traditional perpetual software vendors, which charge a licensing fee and periodically upgrade the quality of their software. We develop an analytical model to study the competitive pricing strategies of an incumbent perpetual software vendor in the presence of a SaaS competitor. We find that, depending on both the SaaS quality improvement rate and the network effect, the perpetual software vendor adopts one ...


Virtualized Cloud Platform Management Using A Combined Neural Network And Wavelet Transform Strategy, Chunyu Liu 2018 California State University – San Bernardino

Virtualized Cloud Platform Management Using A Combined Neural Network And Wavelet Transform Strategy, Chunyu Liu

Electronic Theses, Projects, and Dissertations

This study focuses on implementing a log analysis strategy that combines a neural network algorithm and wavelet transform. Wavelet transform allows us to extract the important hidden information and features of the original time series log data and offers a precise framework for the analysis of input information. While neural network algorithm constitutes a powerfulnonlinear function approximation which can provide detection and prediction functions. The combination of the two techniques is based on the idea of using wavelet transform to denoise the log data by decomposing it into a set of coefficients, then feed the denoised data into a neural ...


A Model Of Competition Between Perpetual Software And Software As A Service, Zhiling GUO, Dan MA 2018 Singapore Management University

A Model Of Competition Between Perpetual Software And Software As A Service, Zhiling Guo, Dan Ma

Research Collection School Of Information Systems

Software as a service (SaaS) has grown to be a significant segment of many software product markets. SaaS vendors, which charge customers based on use and continuously improve the quality of their products, have put competitive pressure on traditional perpetual software vendors, which charge a licensing fee and periodically upgrade the quality of their software. We develop an analytical model to study the competitive pricing strategies of an incumbent perpetual software vendor in the presence of a SaaS competitor. We find that, depending on both the SaaS quality improvement rate and the network effect, the perpetual software vendor adopts one ...


Edos: Edge Assisted Offloading System For Mobile Devices, Hank H. Harvey, Ying Mao, Yantian Hou, Bo Sheng 2018 College of New Jersey

Edos: Edge Assisted Offloading System For Mobile Devices, Hank H. Harvey, Ying Mao, Yantian Hou, Bo Sheng

Yantian Hou

Offloading resource-intensive jobs to the cloud and nearby users is a promising approach to enhance mobile devices. This paper investigates a hybrid offloading system that takes both infrastructure-based networks and Ad-hoc networks into the scope. Specifically, we propose EDOS, an edge assisted offloading system that consists of two major components, an Edge Assistant (EA) and Offload Agent (OA). EA runs on the routers/towers to manage registered remote cloud servers and local service providers and OA operates on the users’ devices to discover the services in proximity. We present the system with a suite of protocols to collect the potential ...


A Graphical Digital Personal Assistant That Grounds And Learns Autonomously, Casey Kennington, Aprajita Shukla 2018 Boise State University

A Graphical Digital Personal Assistant That Grounds And Learns Autonomously, Casey Kennington, Aprajita Shukla

Casey R. Kennington

We present a speech-driven digital personal assistant that is robust despite little or no training data and autonomously improves as it interacts with users. The system is able to establish and build common ground between itself and users by signaling understanding and by learning a mapping via interaction between the words that users actually speak and the system actions. We evaluated our system with real users and found an overall positive response. We further show through objective measures that autonomous learning improves performance in a simple itinerary filling task.


Coms: Customer Oriented Migration Service, Kai Huang, Xing Gao, Fengwei Zhang, Jidong Xiao 2018 Boise State University

Coms: Customer Oriented Migration Service, Kai Huang, Xing Gao, Fengwei Zhang, Jidong Xiao

Jidong Xiao

Virtual machine live migration has been studied for more than a decade, and this technique has been implemented in various commercial hypervisors. However, currently in the cloud environment, virtual machine migration is initiated by system administrators. Cloud customers have no say on this: They can not initiate a migration, and they do not even know whether or not their virtual machines have been migrated. In this paper, we propose the COMS framework, which is short for "Customer Oriented Migration Service". COMS gives more control to cloud customers so that migration becomes a service option and customers are more aware of ...


The Threat Of Artificial Superintelligence, Joseph D. Ebhardt 2018 Lord Fairfax Community College

The Threat Of Artificial Superintelligence, Joseph D. Ebhardt

Exigence

This paper discusses the development of AI and the threat posed by the theoretical achievement of artificial superintelligence. AI is becoming an increasingly significant fixture in our lives and this will only continue in the future. The development of artificial general intelligence (AGI) would quickly lead to artificial superintelligence (ASI). AI researcher Steve Omohundro’s universal drives of rational systems demonstrate why ASI could behave in ways unanticipated by its designers. A technological singularity may occur if AI is allowed to undergo uncontrolled rapid self-improvement, which could pose an extinction-level risk to the human race. Two possible safety measures, AI ...


Use Of House Arrest In The Context Of The Respecting The Constitutional Rights Of An Individual In Russia, Svetlana Afanasieva 2365999, Irina Kilina 2018 Perm State University

Use Of House Arrest In The Context Of The Respecting The Constitutional Rights Of An Individual In Russia, Svetlana Afanasieva 2365999, Irina Kilina

Journal of Digital Forensics, Security and Law

The authors analyze the selection of preventive measures in the form of house arrest in Russian criminal procedures on the basis of universal and European standards of guaranteeing respect for individual rights. The article states that the application of preventive measures significantly restricts the right to protect the dignity of the individual, the right to freedom and personal inviolability, the right to free movement, choose the place of residence. The authors argue for the alternative method of applying the house arrest. as a form of prevention This preventive measure, unlike detention does not provide for the isolation of a person ...


Back Matter, ADFSL 2018 Embry-Riddle Aeronautical University

Back Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Front Matter, ADFSL 2018 Embry-Riddle Aeronautical University

Front Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Digital Commons powered by bepress