Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

28622 Full-Text Articles 27491 Authors 6721768 Downloads 252 Institutions

All Articles in Computer Sciences

Faceted Search

28622 full-text articles. Page 1 of 760.

Cybercrime Deterrence And International Legislation: Evidence From Distributed Denial Of Service Attacks, Kai-Lung HUI, Seung Hyun KIM, QIU-HONG WANG 2017 Singapore Management University

Cybercrime Deterrence And International Legislation: Evidence From Distributed Denial Of Service Attacks, Kai-Lung Hui, Seung Hyun Kim, Qiu-Hong Wang

Research Collection School Of Information Systems

In this paper, we estimate the impact of enforcing the Convention on Cybercrime (COC) on deterring distributed denial of service (DDOS) attacks. Our data set comprises a sample of real, random spoof-source DDOS attacks recorded in 106 countries in 177 days in the period 2004-2008. We find that enforcing the COC decreases DDOS attacks by at least 11.8 percent, but a similar deterrence effect does not exist if the enforcing countries make a reservation on international cooperation. We also find evidence of network and displacement effects in COC enforcement. Our findings imply attackers in cyberspace are rational, motivated by ...


Developing Grounded Goals Through Instant Replay Learning, Lisa Meeden, Douglas S. Blank 2017 Swarthmore College

Developing Grounded Goals Through Instant Replay Learning, Lisa Meeden, Douglas S. Blank

Computer Science Faculty Research and Scholarship

This paper describes and tests a developmental architecture that enables a robot to explore its world, to find and remember interesting states, to associate these states with grounded goal representations, and to generate action sequences so that it can re-visit these states of interest. The model is composed of feed-forward neural networks that learn to make predictions at two levels through a dual mechanism of motor babbling for discovering the interesting goal states and instant replay learning for developing the grounded goal representations. We compare the performance of the model with grounded goal representations versus random goal representations, and find ...


Investigation Into The Formation Of Information Security Influence: Network Analysis Of An Emerging Organisation, Duy Dang-Pham, Siddhi Pittayachawan, Vince Bruno 2017 RMIT University

Investigation Into The Formation Of Information Security Influence: Network Analysis Of An Emerging Organisation, Duy Dang-Pham, Siddhi Pittayachawan, Vince Bruno

Siddhi Pittayachawan

While prior research has been examining information security behaviours in mature environments with formal policies and practices, there is less attention paid to new or transforming environments that lack security controls. It is crucial to understand what factors affect the formation of an emerging information security environment, so that security managers can make use of the forming mechanisms to improve the security environment without relying too much on enforcement. This research adopts exponential random graph modeling to predict the occurrence of information security influence among 114 employees in a recently established construction organisation. Our empirical findings show that physically co-locating ...


Comparison Of Visual Datasets For Machine Learning, Kent Gauen, Ryan Dailey, John Laiman, Yuxiang Zi, Nirmal Asokan, Yung-Hsiang Lu, George K. Thiruvathukal, Mei-Ling Shyu, Shu-Ching Chen 2017 Purdue University

Comparison Of Visual Datasets For Machine Learning, Kent Gauen, Ryan Dailey, John Laiman, Yuxiang Zi, Nirmal Asokan, Yung-Hsiang Lu, George K. Thiruvathukal, Mei-Ling Shyu, Shu-Ching Chen

Computer Science: Faculty Publications and Other Works

One of the greatest technological improvements in recent years is the rapid progress using machine learning for processing visual data. Among all factors that contribute to this development, datasets with labels play crucial roles. Several datasets are widely reused for investigating and analyzing different solutions in machine learning. Many systems, such as autonomous vehicles, rely on components using machine learning for recognizing objects. This paper compares different visual datasets and frameworks for machine learning. The comparison is both qualitative and quantitative and investigates object detection labels with respect to size, location, and contextual information. This paper also presents a new ...


Vertex Weighted Spectral Clustering, Mohammad Masum 2017 East Tennessee State University

Vertex Weighted Spectral Clustering, Mohammad Masum

Electronic Theses and Dissertations

Spectral clustering is often used to partition a data set into a specified number of clusters. Both the unweighted and the vertex-weighted approaches use eigenvectors of the Laplacian matrix of a graph. Our focus is on using vertex-weighted methods to refine clustering of observations. An eigenvector corresponding with the second smallest eigenvalue of the Laplacian matrix of a graph is called a Fiedler vector. Coefficients of a Fiedler vector are used to partition vertices of a given graph into two clusters. A vertex of a graph is classified as unassociated if the Fiedler coefficient of the vertex is close to ...


An Analysis Of The Application Of Simplified Silhouette To The Evaluation Of K-Means Clustering Validity, Hector-Hugo Franco-Penya, John D. Kelleher, John Pugh, Robert Ross 2017 Dublin Institute of Technology

An Analysis Of The Application Of Simplified Silhouette To The Evaluation Of K-Means Clustering Validity, Hector-Hugo Franco-Penya, John D. Kelleher, John Pugh, Robert Ross

Conference papers

Silhouette is one of the most popular and effective internal measures for the evaluation of clustering validity. Simplified Silhouette is a computationally simplified version of Silhouette. However, to date Simplified Silhouette has not been systematically analysed in a specific clustering algorithm. This paper analyses the application of Simplified Silhouette to the evaluation of k-means clustering validity and compares it with the k-means Cost Function and the original Silhouette from both theoretical and empirical perspectives. The theoretical analysis shows that Simplified Silhouette has a mathematical relationship with both the k-means Cost Function and the original Silhouette, while empirically, we show that ...


Returning Thermal Advantage Instrument’S Dsc 2920 And Sdt 2960 To Functioning Order, Ethan B. Haldeman 2017 Ursinus College

Returning Thermal Advantage Instrument’S Dsc 2920 And Sdt 2960 To Functioning Order, Ethan B. Haldeman

Physics and Astronomy Summer Fellows

Thermal Advantage (TA) Instruments DSC 2920 and SDT 2960 require a computer running Windows NT 2000 and an Industry Standard Architecture (ISA) expansion card to output and record data. Due to the lack of availability for this older software and hardware, a virtual machine running Windows NT 2000, using Oracle VM VirtualBox as the virtualization software, and a GPIB-USB-SH converter were used to allow a modern computer to interface with the DSC an SDT. The Windows NT virtual machine ran the necessary TA software to communicate with the DSC and SDT and USB pass-through was used to allow the virtual ...


Experiences With Scala Across The College-Level Curriculum, Konstantin Läufer, George K. Thiruvathukal, Mark C. Lewis 2017 Loyola University Chicago

Experiences With Scala Across The College-Level Curriculum, Konstantin Läufer, George K. Thiruvathukal, Mark C. Lewis

George K. Thiruvathukal

Various hybrid-functional languages, designed to balance compile-time error detection, conciseness, and performance, have emerged. Scala, e.g., is interoperable with Java and has become an early leader in adoption, especially in the start-up and open-source spaces. As educators, we have recognized Scala’s value as a teaching language across the CS curriculum. In CS1, the read-eval-print loop and simple, uniform syntax aid programming in the small. In CS2, higher-order methods allow concise, efficient manipulation of collections. In a programming languages course, advanced constructs facilitate the separation of concerns, program representation and interpretation, and concurrent programming. In advanced applied courses, language ...


A Distributed Graph Approach For Pre-Processing Linked Rdf Data Using Supercomputers, Michael J. Lewis, George K. Thiruvathukal, Venkatram Vishwanath, Michael J. Papka, Andrew Johnson 2017 The University of Illinois at Chicago

A Distributed Graph Approach For Pre-Processing Linked Rdf Data Using Supercomputers, Michael J. Lewis, George K. Thiruvathukal, Venkatram Vishwanath, Michael J. Papka, Andrew Johnson

George K. Thiruvathukal

Efficient RDF, graph based queries are becoming more pertinent based on the increased interest in data analytics and its intersection with large, unstructured but connected data. Many commercial systems have adopted distributed RDF graph systems in order to handle increasing dataset sizes and complex queries. This paper introduces a distribute graph approach to pre-processing linked data. Instead of traversing the memory graph, our system indexes pre-processed join elements that are organized in a graph structure. We analyze the Dbpedia data-set (derived from the Wikipedia corpus) and compare our access method to the graph traversal access approach which we also devise ...


Accuracy And Coverage Of Using The Assigned International Classification Of Diseases, 9th And 10th Revision, Clinical Modification Codes For Detecting Bleeding Events In Electronic Health Record, Victoria J. Wang, David D. McManus, Hong Yu 2017 University of Massachusetts Medical School

Accuracy And Coverage Of Using The Assigned International Classification Of Diseases, 9th And 10th Revision, Clinical Modification Codes For Detecting Bleeding Events In Electronic Health Record, Victoria J. Wang, David D. Mcmanus, Hong Yu

David D. McManus

Background: Hemorrhages are common events that confer significant risk for in-hospital and post-discharge morbidity and mortality among cardiovascular disease (CVD) patients treated with anticoagulation. International Classification of Diseases, 9th and 10th Revision, Clinical Modification (ICD-9-CM, ICD-10-CM) codes have been widely used in CVD research and managements. Objective: To determine the accuracy and coverage of assigned ICD-CM codes for reporting bleeding events. Methods: From the University of Massachusetts Medical School electronic health record (EHR) database we identified 21k patients on anticoagulation with high bleeding risks based on their ICD-9-CM or ICD-10-CM codes. Through manual chart review, we selected one unstructured note ...


Conflict-Free Vertex Coloring Of Planar Graphs, Shawn Seymour 2017 University of Minnesota, Morris

Conflict-Free Vertex Coloring Of Planar Graphs, Shawn Seymour

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

The conflict-free coloring problem is a variation of the vertex coloring problem, a classical NP-hard optimization problem. The conflict-free coloring problem aims to color a possibly proper subset of vertices such that there is a unique color within the closed neighborhood (a vertex and its neighbors) of every vertex. This paper presents recent findings and heuristics to solve the conflict-free coloring problem on both general graphs and planar graphs.


Touchscreen Smartphone User Interfaces For Older Adults, Ai Sano 2017 University of Minnesota, Morris

Touchscreen Smartphone User Interfaces For Older Adults, Ai Sano

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

Today the world is experiencing the rapid growth of the older population. The number of older adults who own digital devices such as smartphones is increasing as well. The current smartphone user interfaces, however, appear not optimized for older adults. When designing smartphone user interfaces for older adults, we must consider their age-related physical and cognitive changes, which most likely affect their user experience. The present paper explores smartphone user interface guidelines for older adults and heuristics for evaluating the usability of Android launchers for older adults as well as a research study that developed an Android launcher for older ...


Identifying Twitter Spam By Utilizing Random Forests, Humza S. Haider 2017 University of Minnesota, Morris

Identifying Twitter Spam By Utilizing Random Forests, Humza S. Haider

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

The use of Twitter has rapidly grown since the first tweet in 2006. The number of spammers on Twitter shows a similar increase. Classifying users into spammers and non-spammers has been heavily researched, and new methods for spam detection are developing rapidly. One of these classification techniques is known as random forests. We examine three studies that employ random forests using user based features, geo-tagged features, and time dependent features. Each study showed high accuracy rates and F-measures with the exception of one model that had a test set with a more realistic proportion of spam relative to typical testing ...


An Overview Of Modern Global Illumination, Skye A. Antinozzi 2017 University of Minnesota, Morris

An Overview Of Modern Global Illumination, Skye A. Antinozzi

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

Advancements in graphical hardware call for innovative solutions, which can improve the realism of computer generated lighting. These innovative solutions aim to generate state of the art computer generated lighting through a combination of intelligent global illumination models and the use of modern hardware. The solution described in this paper achieves global illumination by ray tracing over geometry within a 3D scene from distributed light field probes and proceeds to shade the scene with a deferred renderer. Such a solution provides the flexibility and robustness that many other global illumination models have previously lacked while still achieving realistic lighting that ...


Automated Bug Removal For Software-Defined Networks, Yang Wu, Andreas Haeberlen, Wenchao Zhou, Boon T. Loo, Ang Chen 2017 University of Pennsylvania

Automated Bug Removal For Software-Defined Networks, Yang Wu, Andreas Haeberlen, Wenchao Zhou, Boon T. Loo, Ang Chen

Technical Reports (CIS)

When debugging an SDN application, diagnosing the problem is merely the first step: the operator must still find a fix that solves the problem, without causing new problems elsewhere. However, most existing debuggers focus exclusively on diagnosis and offer the network operator little or no help with finding an effective fix. Finding a suitable fix is difficult because the number of candidates can be enormous. In this paper, we propose a step towards automated repair for SDN applications. Our approach consists of two elements. The first is a data structure that we call meta provenance, which can be used to ...


Knowledge Extraction From Metacognitive Reading Strategies Data Using Induction Trees, Christopher Taylor, Arun D. Kulkarni, Kouider Mokhtari 2017 University of Texas at Tyler

Knowledge Extraction From Metacognitive Reading Strategies Data Using Induction Trees, Christopher Taylor, Arun D. Kulkarni, Kouider Mokhtari

Arun Kulkarni

The assessment of students’ metacognitive knowledge and skills about reading is critical in determining their ability to read academic texts and do so with comprehension. In this paper, we used induction trees to extract metacognitive knowledge about reading from a reading strategies dataset obtained from a group of 1636 undergraduate college students. Using a C4.5 algorithm, we constructed decision trees, which helped us classify participants into three groups based on their metacognitive strategy awareness levels consisting of global, problem-solving and support reading strategies. We extracted rules from these decision trees, and in order to evaluate accuracy of the extracted ...


Signal Processing On Graphs Using Kron Reduction And Spline Interpolation, Michael Dennis, Enrico Au-Yeung 2017 University of Berkeley, California

Signal Processing On Graphs Using Kron Reduction And Spline Interpolation, Michael Dennis, Enrico Au-Yeung

DePaul Discoveries

In applications such as image processing, the data is given in a regular pattern with a known structure, such as a grid of pixels. However, it is becoming increasingly common for large datasets to have some irregular structure. In image recognition, one of the most successful methods is wavelet analysis, also commonly known as multi-resolution analysis. Our project is to develop and explore this powerful technique in the setting where the data is not stored in the form of a rectangular table with rows and columns of pixels. While the data sets will still have a lot of structure to ...


Multispectral Image Analysis Using Decision Trees, Arun D. Kulkarni, Anmol Shrestha 2017 University of Texas at Tyler

Multispectral Image Analysis Using Decision Trees, Arun D. Kulkarni, Anmol Shrestha

Computer Science Faculty Publications and Presentations

Many machine learning algorithms have been used to classify pixels in Landsat imagery. The maximum likelihood classifier is the widely-accepted classifier. Non-parametric methods of classification include neural networks and decision trees. In this research work, we implemented decision trees using the C4.5 algorithm to classify pixels of a scene from Juneau, Alaska area obtained with Landsat 8, Operation Land Imager (OLI). One of the concerns with decision trees is that they are often over fitted with training set data, which yields less accuracy in classifying unknown data. To study the effect of overfitting, we have considered noisy training set ...


Geometric Facility Location Problems On Uncertain Data, Jingru Zhang 2017 Utah State University

Geometric Facility Location Problems On Uncertain Data, Jingru Zhang

All Graduate Theses and Dissertations

Facility location, as an important topic in computer science and operations research, is concerned with placing facilities for "serving" demand points (each representing a customer) to minimize the (service) cost. In the real world, data is often associated with uncertainty because of measurement inaccuracy, sampling discrepancy, outdated data sources, resource limitation, etc. Hence, problems on uncertain data have attracted much attention.

In this dissertation, we mainly study a classical facility location problem: the k- center problem and several of its variations, on uncertain points each of which has multiple locations that follow a probability density function (pdf). We develop efficient ...


Systemic Vulnerabilities In Customer-Premises Equipment (Cpe) Routers, Joel Land 2017 Carnegie Mellon University

Systemic Vulnerabilities In Customer-Premises Equipment (Cpe) Routers, Joel Land

Software Engineering Institute

Customer-premises equipment (CPE)—specifically small office/home office (SOHO) routers—has become ubiquitous. CPE routers are notorious for their web interface vulnerabilities, old versions of software components with known vulnerabilities, default and hard-coded credentials, and other security issues.

This report describes a test framework that the CERT/CC developed to identify systemic and other vulnerabilities in CPE routers. It also describes the procedure the CERT/CC used in its analysis, and presents case studies and suggestions for tracking vulnerabilities in a way that encourages vendor responsiveness and increased customer awareness.


Digital Commons powered by bepress