Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

12,337 Full-Text Articles 11,223 Authors 2,741,130 Downloads 149 Institutions

All Articles in Computer Sciences

Faceted Search

12,337 full-text articles. Page 1 of 217.

Measuring Privacy Disclosures In Url Query Strings, Andrew G. West, Adam J. Aviv 2015 SelectedWorks

Measuring Privacy Disclosures In Url Query Strings, Andrew G. West, Adam J. Aviv

Andrew G. West

Publicly posted URLs may contain a wealth of information about the identities and activities of the users who share them. URLs often utilize query strings (i.e., key-value pairs appended to the URL path) as a means to pass session parameters and form data. While often benign and necessary to render the web page, query strings sometimes contain tracking mechanisms, user names, email addresses, and other information that users may not wish to publicly reveal. In isolation this is not particularly problematic, but the growth of Web 2.0 platforms such as social networks and micro-blogging means URLs (often copy-pasted ...


Joint Search By Social And Spatial Proximity, Kyriakos Mouratidis, Jing Li, Yu Tang, Nikos Mamoulis 2015 Singapore Management University

Joint Search By Social And Spatial Proximity, Kyriakos Mouratidis, Jing Li, Yu Tang, Nikos Mamoulis

Research Collection School Of Information Systems

The diffusion of social networks introduces new challenges and opportunities for advanced services, especially so with their ongoing addition of location-based features. We show how applications like company and friend recommendation could significantly benefit from incorporating social and spatial proximity, and study a query type that captures these two-fold semantics. We develop highly scalable algorithms for its processing, and enhance them with elaborate optimizations. Finally, we use real social network data to empirically verify the efficiency and efficacy of our solutions.


An Analysis Of Mayo Clinic Search Query Logs For Cardiovascular Diseases, Ashutosh Sopan Jadhav, Amit P. Sheth, Jyotishman Pathak 2014 Wright State University

An Analysis Of Mayo Clinic Search Query Logs For Cardiovascular Diseases, Ashutosh Sopan Jadhav, Amit P. Sheth, Jyotishman Pathak

Kno.e.sis Publications

Increasingly, individuals are taking active participation in learning and managing their health by leveraging online resources. Understanding online health information searching behavior can help us to study what health topics users search for and how search queries are formulated. In this work, we analyzed 10 million cardiovascular diseases (CVD) related search queries from MayoClinic.com. We performed semantic analysis on the queries using UMLS MetaMap and analyzed structural and textual properties as well as linguistic characteristics of the queries.


Online Information Searching For Cardiovascular Diseases: An Analysis Of Mayo Clinic Search Query Logs, Ashutosh Sopan Jadhav, Amit P. Sheth, Jyotishman Pathak 2014 Wright State University

Online Information Searching For Cardiovascular Diseases: An Analysis Of Mayo Clinic Search Query Logs, Ashutosh Sopan Jadhav, Amit P. Sheth, Jyotishman Pathak

Kno.e.sis Publications

Since the early 2000’s, Internet usage for health information searching has increased significantly. Studying search queries can help us to understand users “information need” and how do they formulate search queries (“expression of information need”). Although cardiovascular diseases (CVD) affect a large percentage of the population, few studies have investigated how and what users search for CVD. We address this knowledge gap in the community by analyzing a large corpus of 10 million CVD related search queries from MayoClinic.com. Using UMLS MetaMap and UMLS semantic types/concepts, we developed a rule-based approach to categorize the queries into 14 ...


"Be Our Guest:" Crafting A Magical Client Experience, Rebecca Klein, Kevin Steele 2014 Valparaiso University

"Be Our Guest:" Crafting A Magical Client Experience, Rebecca Klein, Kevin Steele

Information Technology Faculty and Staff Publications

The Client Services team of Valparaiso University’s IT department found inspiration in Disney’s guest service models and has been building a culture of superior service throughout IT. Come along on a magic carpet ride to discover how this new world is transforming delivery of technological services to the campus. From Help Desk to training to assessment, we are increasing satisfaction levels among campus constituents as we meet their needs. We will show how we created a guest service compass that guides our decision-making and service delivery. Further, we will share areas where we learned we were creating our ...


Chatter: Classifying Malware Families Using System Event Ordering, Aziz Mohaisen, Andrew G. West, Allison Mankin, Omar Alrawi 2014 SelectedWorks

Chatter: Classifying Malware Families Using System Event Ordering, Aziz Mohaisen, Andrew G. West, Allison Mankin, Omar Alrawi

Andrew G. West

Using runtime execution artifacts to identify malware and its associated "family" is an established technique in the security domain. Many papers in the literature rely on explicit features derived from network, file system, or registry interaction. While effective, use of these fine-granularity data points makes these techniques computationally expensive. Moreover, the signatures and heuristics this analysis produces are often circumvented by subsequent malware authors.

To this end we propose CHATTER, a system that is concerned only with the order in which high-level system events take place. Individual events are mapped onto an alphabet and execution traces are captured via terse ...


High Performance Computing Markov Models Using Hadoop Mapreduce, Matthew Shaffer 2014 Chapman University

High Performance Computing Markov Models Using Hadoop Mapreduce, Matthew Shaffer

e-Research: A Journal of Undergraduate Work

In this paper, I will explain how I used the probability modeling tool, Markov Models, in combination with Hadoop MapReduce parallel programming platform in order to quickly and efficiently analyses documents and create a probability model of them. I will explain what Markov Models are, give a brief overview of what MapReduce is, explain why Markov models can be used for document analysis, explain my code of the modeling program, and examine the performance of various MapReduce platforms and techniques in analyzing documents.


Computational Methods For Historical Research On Wikipedia’S Archives, Jonathan Cohen 2014 Chapman University

Computational Methods For Historical Research On Wikipedia’S Archives, Jonathan Cohen

e-Research: A Journal of Undergraduate Work

This paper presents a novel study of geographic information implicit in the English Wikipedia archive. This project demonstrates a method to extract data from the archive with data mining, map the global distribution of Wikipedia editors through geocoding in GIS, and proceed with a spatial analysis of Wikipedia use in metropolitan cities.


John Lilly, The Mind Of The Dolphin, And Communication Out Of Bounds, Bruce Clarke 2014 University of Massachusetts - Amherst

John Lilly, The Mind Of The Dolphin, And Communication Out Of Bounds, Bruce Clarke

communication +1

In this essay I develop a systems-theoretical observation of John Lilly’s cybernetics of communication in his 1967 work The Mind of the Dolphin. The eight-year-old project that The Mind of the Dolphin recounts for public consumption details his aspiration to achieve an unprecedented breakthrough beyond companionate communion to fully abstract linguistic communication across species boundaries. Between 1959 and 1968 Lilly wagered and lost his mainstream scientific career largely over this audacious, ultimately inconclusive bid to establish and document for scientific validation “communication with a nonhuman mind.” In that effort, however, he mobilized the best available tools, a cutting-edge array ...


Dynamic Discovery In Wireless Networks, Abhishek Samanta 2014 Northeastern University

Dynamic Discovery In Wireless Networks, Abhishek Samanta

Computer Science Dissertations

In today's world, wireless technology is widely employed because of its various benefits, such as mobility, low-cost deployment, scalability etc. But, at the same time, it suffers from a variety of issues ranging from speed and stability to security. In this thesis, we identify three major challenges and propose efficient solutions to mitigate them. First, the broadcast nature of wireless communication makes it inherently vulnerable to eavesdroppers. This makes it very difficult for a participant in a wireless network to discover and access services without also disclosing their identity and need for service. We develop a protocol based on ...


Intents-Based Service Discovery And Integration, Cheng Zheng 2014 Western University

Intents-Based Service Discovery And Integration, Cheng Zheng

University of Western Ontario - Electronic Thesis and Dissertation Repository

With the proliferation of Web services, when developing a new application, it makes sense to seek and leverage existing Web services rather than implementing the corresponding components from scratch. Therefore, significant research efforts have been devoted to the techniques for service discovery and integration. However, most of the existing techniques are based on the ternary participant classification of the Web service architecture which only takes into consideration the involvement of service providers, service brokers, and application developers. The activities of application end users are usually ignored.

This thesis presents an Intents-based service discovery and integration approach at the conceptual level ...


Educational Programmes For Spatial Information Sciences In The Dublin Institute Of Technology, William Prendergast, Eamonn Donnelly, Audrey A. Martin, Avril Behan 2014 Dublin Institute of Technology

Educational Programmes For Spatial Information Sciences In The Dublin Institute Of Technology, William Prendergast, Eamonn Donnelly, Audrey A. Martin, Avril Behan

Conference Papers

The ever increasing spatial information needs of society, the rapid development of new surveying technologies, and the global demand for appropriately qualified surveyors, have triggered a radical re-evaluation of geomatics education worldwide. Significant enhancements have been made to the educational programmes in the spatial information science discipline in the Dublin Institute of Technology’s (DIT) during the last decade including the provision of a BSc in Geomatics and various masters’ programmes to cater for the increasingly specialised needs of the Geographic Information sector in Ireland.


Comparison Of Optimization Techniques In Large Scale Transportation Problems, Tapojit Kumar 2014 Minnesota State University, Mankato

Comparison Of Optimization Techniques In Large Scale Transportation Problems, Tapojit Kumar

Journal of Undergraduate Research at Minnesota State University, Mankato

The Transportation Problem is a classic Operations Research problem where the objective is to determine the schedule for transporting goods from source to destination in a way that minimizes the shipping cost while satisfying supply and demand constraints. Although it can be solved as a Linear Programming problem, other methods exist. Linear Programming makes use of the Simplex Method, an algorithm invented to solve a linear program by progressing from one extreme point of the feasible polyhedron to an adjacent one. The algorithm contains tactics like pricing and pivoting. For a Transportation Problem, a simplified version of the regular Simplex ...


Comparison Of Sequence Alignment Algorithms, Tejas Gandhi 2014 Minnesota State University, Mankato

Comparison Of Sequence Alignment Algorithms, Tejas Gandhi

Journal of Undergraduate Research at Minnesota State University, Mankato

The fact that biological sequences can be represented as strings belonging to a finite alphabet (A, C, G, and T for DNA) plays an important role in connecting biology to computer science. String representation allows researchers to apply various string comparison techniques available in computer science. As a result, various applications have been developed that facilitate the task of sequence alignment. The problem of finding sequence alignments consists of finding the best match between two biological sequences. A best match can infer an evolutionary relationship and functional similarity. However, there is a lack of research on how reliable and efficient ...


Wireless Location Determination: Using Existing 802.11 Wireless Networks To Determine A Users Location, Travis Calvert 2014 Minnesota State University, Mankato

Wireless Location Determination: Using Existing 802.11 Wireless Networks To Determine A Users Location, Travis Calvert

Journal of Undergraduate Research at Minnesota State University, Mankato

The ability to determine a user’s location through an existing 802.11 wireless network has vast implications in the area of context-aware and pervasive computing. Such abilities have been developed mainly in the Linux environment to date. To maximize its usefulness, a location determination system was developed for the more dominant Windows operation system. While being able to operate outdoors as well as indoors, this system succeeds where traditional GPS (Global Positioning Systems) fail, namely indoor environments. This system could benefit the large number of existing wireless networks and requires no additional hardware; only a few simple software downloads ...


Computing Posterior Probabilities Of Ancestor Relations In Bayesian Networks, Yetian Chen, Jin Tian 2014 Iowa State University

Computing Posterior Probabilities Of Ancestor Relations In Bayesian Networks, Yetian Chen, Jin Tian

Computer Science Technical Reports

In this paper we develop a dynamic programming algorithm to compute the exact posterior probabilities of ancestor relations in Bayesian networks. Previous dynamic programming (DP) algorithm by (Parviainen and Koivisto, 2011) evaluates all possible ancestor relations in time O(n3n) and space O(3n) . However, their algorithm assumes an order-modular prior over DAGs that does not respect Markov equivalence. The resulting posteriors would bias towards DAGs consistent with more linear orders. To adhere to uniform prior, we develop a new DP algorithm that computes the exact posteriors of all possible ancestor relations in time O(n5n-1) and ...


Campus Paper Waste, Joshua E. Randall 2014 Minnesota State University, Mankato

Campus Paper Waste, Joshua E. Randall

Journal of Undergraduate Research at Minnesota State University, Mankato

The fall of 2004 at Minnesota State University, a new program called MavPrint was introduced. The user submits a document to be printed at a computer, the expense is deducted from their account, and then their document can be retrieved from any MavPrint station. In years past printing had been free, but seeing how according to Bryan Schneider, the director of Technical Services at Minnesota State University – Mankato, from the year 2003 to the year 2004 the printing costs for the University rose 200 percent, they felt it was time to make a change. MSU students printed out over 4 ...


Application Of Risk Metrics For Role Mining, Sharmin Ahmed 2014 Western University

Application Of Risk Metrics For Role Mining, Sharmin Ahmed

University of Western Ontario - Electronic Thesis and Dissertation Repository

Incorporating risk consideration in access control systems has recently become a popular research topic. Related to this is risk awareness which is needed to enable access control in an agile and dynamic way. While risk awareness is probably known for an established access control system, being aware of risk even before the access control system is defined can mean identification of users and permissions that are most likely to lead to dangerous or error-prone situations from an administration point of view. Having this information available during the role engineering phase allows data analysts and role engineers to highlight potentially risky ...


Developing Microsoft Word 2007 Add-On Applications, Peter L. Sonnek 2014 Minnesota State University, Mankato

Developing Microsoft Word 2007 Add-On Applications, Peter L. Sonnek

Journal of Undergraduate Research at Minnesota State University, Mankato

In 2007, Microsoft released a new version of MS Office that changed the file platform to a universal data format called Extensible Markup Language or XML. XML is meant to be simple, meaningful, and understood by all computer programs. Since Microsoft has moved its file format to XML, tremendous extendibility can be built by software professionals to link MS Office 2007 documents to data not held within the saved documents. This project tested the levels of interactive data between MS Word 2007 and several other XML data sources.


Lessons Learned In Customizing Hosted Contentdm 6, M Ryan Hess 2014 DePaul University

Lessons Learned In Customizing Hosted Contentdm 6, M Ryan Hess

M Ryan Hess

DePaul University Library will share its lessons learned and recommendations for hosted CONTENTdm 6 administrators wishing to customize CONTENTdm in a way that strikes the right balance between default CONTENTdm sites and sites that stand out and better serve our unique audiences. The DePaul University Library has learned many lessons from customizing its hosted instance of CONTENTdm 6, including the use of jQuery to add interface enhancements and remove some native CONTENTdm features. Unfortunately, this did not prove a long-term solution due to some limitations of CONTENTdm’s built-in customization tools, leading to content management issues and bugs that were ...


Digital Commons powered by bepress