Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

13,637 Full-Text Articles 12,520 Authors 2,988,162 Downloads 159 Institutions

All Articles in Computer Sciences

Faceted Search

13,637 full-text articles. Page 1 of 241.

A Right To Cyber Counter Strikes - The Risks Of Legalizing Hack Back, Jan Kallberg 2015 SelectedWorks

A Right To Cyber Counter Strikes - The Risks Of Legalizing Hack Back, Jan Kallberg

Jan Kallberg

The idea to legalize hacking back has gained traction the last years and received several influential corporate and political proponents in the United States and Europe. The growing frustration with repeated cyberattacks and lack of credible law enforcement pushes for alternative ways to prevent future cyberattacks. As of today, counter cyberattacks are illegal in a majority of the nations because it constitutes another cybercrime independent from the initial attack. If cyber counter attacks were legalized it raises a set of questions. The first line of questions are linked to the underlying assumptions that the proposal to legalize counter cyberattacks are ...


Joint Search By Social And Spatial Proximity, Kyriakos Mouratidis, Jing Li, Yu Tang, Nikos Mamoulis 2015 Singapore Management University

Joint Search By Social And Spatial Proximity, Kyriakos Mouratidis, Jing Li, Yu Tang, Nikos Mamoulis

Research Collection School Of Information Systems

The diffusion of social networks introduces new challenges and opportunities for advanced services, especially so with their ongoing addition of location-based features. We show how applications like company and friend recommendation could significantly benefit from incorporating social and spatial proximity, and study a query type that captures these two-fold semantics. We develop highly scalable algorithms for its processing, and enhance them with elaborate optimizations. Finally, we use real social network data to empirically verify the efficiency and efficacy of our solutions.


Automated Detection Of Puffing And Smoking With Wrist Accelerometers, Qu Tang 2015 Northeastern University

Automated Detection Of Puffing And Smoking With Wrist Accelerometers, Qu Tang

Electrical and Computer Engineering Master's Theses

Real-time, automatic detection of smoking behavior could lead to novel measurement tools for smoking research and "just-in-time" interventions that may help people quit, reducing preventable deaths. This paper discusses the use of machine learning with wrist accelerometer data for automatic puffing and smoking detection. A two-layer smoking detection model is proposed that incorporates both low-level time domain features and high-level smoking topography such as inter-puff intervals and puff frequency to detect puffing then smoking. On a pilot dataset of 6 individuals observed for 11.8 total hours in real-life settings performing complex tasks while smoking, the model obtains a cross ...


Resource Management In Enterprise Cluster And Storage Systems, Jianzhe Tai 2015 Northeastern University

Resource Management In Enterprise Cluster And Storage Systems, Jianzhe Tai

Computer Engineering Dissertations

In this thesis, we present our works on resource management in large scale systems, especially for enterprise cluster and storage systems. Large-scale cluster systems become quite popular among a community of users by offering a variety of resources. Such systems require complex resource management schemes for multi-objective optimizations and should be specific to different system requirements. In addition, burstiness has often been found in enterprise workloads, being a key factor in performance degradation. Therefore, it is an extremely challenging problem of managing heterogeneous resources (e.g., computing, networking and storage) for such a large scale system under bursty conditions while ...


High-Resolution Digital 3d Models Of Algar Do Penico Chamber: Limitations, Challenges, And Potential, Ivo Silvestre M.Sc., José I. Rodrigues PhD, Mauro Figueiredo PhD, Cristina Veiga-Pires PhD 2014 University of South Florida

High-Resolution Digital 3d Models Of Algar Do Penico Chamber: Limitations, Challenges, And Potential, Ivo Silvestre M.Sc., José I. Rodrigues Phd, Mauro Figueiredo Phd, Cristina Veiga-Pires Phd

International Journal of Speleology

The study of karst and its geomorphological structures is important for understanding the relationships between hydrology and climate over geological time. In that context, we conducted a terrestrial laser-scan survey to map geomorphological structures in the karst cave of Algar do Penico in southern Portugal. The point cloud data set obtained was used to generate 3D meshes with different levels of detail, allowing the limitations of mapping capabilities to be explored.

In addition to cave mapping, the study focuses on 3D-mesh analysis, including the development of two algorithms for determination of stalactite extremities and contour lines, and on the interactive ...


The Critical Role Of Cubesat Spacecraft In A Multi-Tier Mission For Mars Exploration, Jeremy Straub 2014 SelectedWorks

The Critical Role Of Cubesat Spacecraft In A Multi-Tier Mission For Mars Exploration, Jeremy Straub

Jeremy Straub

A multi-tier architecture is under development (with similar craft heterogeneity to Fink's work on ‘tier scalable’ missions) which will facilitate autonomous local control of multiple heterogeneous craft. This mission architecture has been developed with a Mars mission in mind and has included CubeSats in a variety of critical mission roles.

Two concepts will be presented: the addition of CubeSats to a larger-scale multi-tier mission, where the CubeSats serve a supporting role and a mission driven by CubeSat orbital capabilities. In the first, CubeSats are utilized to augment the area of spatial coverage that can be obtained and the temporal ...


Measuring Privacy Disclosures In Url Query Strings, Andrew G. West, Adam J. Aviv 2014 SelectedWorks

Measuring Privacy Disclosures In Url Query Strings, Andrew G. West, Adam J. Aviv

Andrew G. West

Publicly posted URLs may contain a wealth of information about the identities and activities of the users who share them. URLs often utilize query strings (i.e., key-value pairs appended to the URL path) as a means to pass session parameters and form data. While often benign and necessary to render the web page, query strings sometimes contain tracking mechanisms, user names, email addresses, and other information that users may not wish to publicly reveal. In isolation this is not particularly problematic, but the growth of Web 2.0 platforms such as social networks and micro-blogging means URLs (often copy-pasted ...


An Analysis Of Mayo Clinic Search Query Logs For Cardiovascular Diseases, Ashutosh Sopan Jadhav, Amit P. Sheth, Jyotishman Pathak 2014 Wright State University

An Analysis Of Mayo Clinic Search Query Logs For Cardiovascular Diseases, Ashutosh Sopan Jadhav, Amit P. Sheth, Jyotishman Pathak

Kno.e.sis Publications

Increasingly, individuals are taking active participation in learning and managing their health by leveraging online resources. Understanding online health information searching behavior can help us to study what health topics users search for and how search queries are formulated. In this work, we analyzed 10 million cardiovascular diseases (CVD) related search queries from MayoClinic.com. We performed semantic analysis on the queries using UMLS MetaMap and analyzed structural and textual properties as well as linguistic characteristics of the queries.


Online Information Searching For Cardiovascular Diseases: An Analysis Of Mayo Clinic Search Query Logs, Ashutosh Sopan Jadhav, Amit P. Sheth, Jyotishman Pathak 2014 Wright State University

Online Information Searching For Cardiovascular Diseases: An Analysis Of Mayo Clinic Search Query Logs, Ashutosh Sopan Jadhav, Amit P. Sheth, Jyotishman Pathak

Kno.e.sis Publications

Since the early 2000’s, Internet usage for health information searching has increased significantly. Studying search queries can help us to understand users “information need” and how do they formulate search queries (“expression of information need”). Although cardiovascular diseases (CVD) affect a large percentage of the population, few studies have investigated how and what users search for CVD. We address this knowledge gap in the community by analyzing a large corpus of 10 million CVD related search queries from MayoClinic.com. Using UMLS MetaMap and UMLS semantic types/concepts, we developed a rule-based approach to categorize the queries into 14 ...


"Be Our Guest:" Crafting A Magical Client Experience, Rebecca Klein, Kevin Steele 2014 Valparaiso University

"Be Our Guest:" Crafting A Magical Client Experience, Rebecca Klein, Kevin Steele

Information Technology Faculty and Staff Publications

The Client Services team of Valparaiso University’s IT department found inspiration in Disney’s guest service models and has been building a culture of superior service throughout IT. Come along on a magic carpet ride to discover how this new world is transforming delivery of technological services to the campus. From Help Desk to training to assessment, we are increasing satisfaction levels among campus constituents as we meet their needs. We will show how we created a guest service compass that guides our decision-making and service delivery. Further, we will share areas where we learned we were creating our ...


Historical Traffic-Tolerant Paths In Road Networks, Pui Hang Li, Man Lung Yiu, Kyriakos MOURATIDIS 2014 Singapore Management University

Historical Traffic-Tolerant Paths In Road Networks, Pui Hang Li, Man Lung Yiu, Kyriakos Mouratidis

Research Collection School Of Information Systems

No abstract provided.


A Parallel Genetic Algorithm For Tuning Neural Networks, Nathan Chadderdon, Ben Harsha, Steven Bogaerts 2014 DePauw University

A Parallel Genetic Algorithm For Tuning Neural Networks, Nathan Chadderdon, Ben Harsha, Steven Bogaerts

Science Research Fellows Posters

One challenge in using artificial neural networks is how to determine appropriate parameters for network structure and learning. Often parameters such as learning rate or number of hidden units are set arbitrarily or with a general "intuition" as to what would be most effective. The goal of this project is to use a genetic algorithm to tune a population of neural networks to determine the best structure and parameters. This paper considers a genetic algorithm to tune the number of hidden units, learning rate, momentum, and number of examples viewed per weight update. Experiments and results are discussed for two ...


Ironfox: Securing The Web, Stephen McMurtry, William Johnson, Khadija Stewart (Advisor) 2014 DePauw University

Ironfox: Securing The Web, Stephen Mcmurtry, William Johnson, Khadija Stewart (Advisor)

Science Research Fellows Posters

No abstract provided.


Using Malware Analysis To Tailor Square For Mobile Platforms, Gregory Paul Alice, Nancy R. Mead 2014 Carnegie Mellon University

Using Malware Analysis To Tailor Square For Mobile Platforms, Gregory Paul Alice, Nancy R. Mead

Software Engineering Institute

As the number of mobile-device software applications has grown, so has the amount of malware targeting them. More than 650,000 pieces of malware now target the Android plat-form. As mobile malware becomes more sophisticated and begins to approach threat levels seen on PC platforms, software development security practices for mobile applications will need to adopt the security practices for PC applications to reduce consumers’ exposure to financial and privacy breaches on mobile platforms. This technical note explores the development of security requirements for the K-9 Mail application, an open source email client for the Android operating system. The project ...


Infographics: The New 5-Paragraph Essay, Brittany Ann Kos, Elizabeth Sims 2014 University of Colorado, Boulder

Infographics: The New 5-Paragraph Essay, Brittany Ann Kos, Elizabeth Sims

ATLAS Institute Graduate Contributions

The STEM Career Infographic Project (SCIP) was a 5-week exploratory project deployed in an 8th grade classroom at Mountain Vista Middle School (MVMS) in the spring of 2014. Students were required to research a STEM career in-depth, then report on their careers using infographics, in lieu of a standard 5- paragraph essay. SCIP was broken down into 9 days of instruction: introduction, research, three days of design lecture, three work days, and a final presentation day. The students were in the lab working on their infographics every day. We observed that infographics were better suited than traditional essays in areas ...


Distributed Owl El Reasoning: The Story So Far, Raghava Mutharaju, Pascal Hitzler, Prabhaker Mateti 2014 Wright State University

Distributed Owl El Reasoning: The Story So Far, Raghava Mutharaju, Pascal Hitzler, Prabhaker Mateti

Computer Science and Engineering Faculty Publications

Automated generation of axioms from streaming data, such as traffic and text, can result in very large ontologies that single machine reasoners cannot handle. Reasoning with large ontologies requires distributed solutions. Scalable reasoning techniques for RDFS, OWL Horst and OWL 2 RL now exist. For OWL 2 EL, several distributed reasoning approaches have been tried, but are all perceived to be inefficient. We analyze this perception. We analyze completion rule based distributed approaches, using different characteristics, such as dependency among the rules, implementation optimizations, how axioms and rules are distributed. We also present a distributed queue approach for the classification ...


Fuzzy Mathematical Models For The Analysis Of Fuzzy Systems With Application To Liver Disorders, R.W. W. Hndoosh 2014 SelectedWorks

Fuzzy Mathematical Models For The Analysis Of Fuzzy Systems With Application To Liver Disorders, R.W. W. Hndoosh

R. W. Hndoosh

The main objective of this model is to focus on how to use the model of fuzzy system to solve fuzzy mathematics problems. Some mathematical models based on fuzzy set theory, fuzzy systems and neural network techniques seem very well suited for typical technical problems. We have proposed an extension model of a fuzzy system to N-dimension, using Mamdani's minimum implication, the minimum inference system, and the singleton fuzzifier with the center average defuzzifier. Here construct two different models namely a fuzzy inference system and an adaptive fuzzy system using neural network. We have extended the theorem for accuracy ...


Fuzzy Mathematical Models Of Type-1 And Type-2 For Computing The Parameters And Its Applications, R.W. W. Hndoosh 2014 SelectedWorks

Fuzzy Mathematical Models Of Type-1 And Type-2 For Computing The Parameters And Its Applications, R.W. W. Hndoosh

R. W. Hndoosh

This work provides mathematical formulas and algorithm in order to calculate the derivatives that being necessary to perform Steepest Descent models to make T1 and T2 FLSs much more accessible to FLS modelers. It provides derivative computations that are applied on different kind of MFs, and some computations which are then clarified for specific MFs. We have learned how to model T1 FLSs when a set of training data is available and provided an application to derive the Steepest Descent models that depend on trigonometric function (SDTFM). This work, also focused on an interval type-2 non-singleton type-2 FLS (IT2 NS-T2 ...


A Method For Aligning Acquisition Strategies And Software Architectures, Lisa Brownsword, Cecilia Albert, David J. Carney, Patrick R. Place 2014 Carnegie Mellon University

A Method For Aligning Acquisition Strategies And Software Architectures, Lisa Brownsword, Cecilia Albert, David J. Carney, Patrick R. Place

Software Engineering Institute

In the acquisition of a software-intensive system, the relationship between the software architecture and the acquisition strategy is typically not carefully examined. To remedy this lack, a research team at the Carnegie Mellon University Software Engineering Institute (SEI) has focused a multiyear effort to discover an initial set of failure patterns that result when these entities become misaligned and identify a set of desired relationships among the business and mission goals, system and software architectures, and the acquisition strategy. This report describes the result of the third year of the SEI’s research, where the team defined a method that ...


Agile Methods In Air Force Sustainment: Status And Outlook, Colleen Regan, Mary Ann Lapham, Eileen Wrubel, Stephen Beck, Michael S. Bandor 2014 Carnegie Mellon University

Agile Methods In Air Force Sustainment: Status And Outlook, Colleen Regan, Mary Ann Lapham, Eileen Wrubel, Stephen Beck, Michael S. Bandor

Software Engineering Institute

This paper examines using Agile techniques in the software sustainment arena—specifically Air Force programs. The Software Engineering Institute has researched the viability of Agile software development methods within Department of Defense programs and barriers to the adoption of those methods for several years. How software sustainers leverage Agile methods and avoid barriers to using Agile methods are addressed in this paper. In addition, the potential use of a construct called DevOps, a blending of development and operations, is discussed.


Digital Commons powered by bepress