A Right To Cyber Counter Strikes - The Risks Of Legalizing Hack Back, 2015 SelectedWorks
A Right To Cyber Counter Strikes - The Risks Of Legalizing Hack Back, Jan Kallberg
The idea to legalize hacking back has gained traction the last years and received several influential corporate and political proponents in the United States and Europe. The growing frustration with repeated cyberattacks and lack of credible law enforcement pushes for alternative ways to prevent future cyberattacks. As of today, counter cyberattacks are illegal in a majority of the nations because it constitutes another cybercrime independent from the initial attack. If cyber counter attacks were legalized it raises a set of questions. The first line of questions are linked to the underlying assumptions that the proposal to legalize counter cyberattacks are ...
Random Multipliers Numerically Stabilize Gaussian And Block Gaussian Elimination: Proofs And An Extension To Low-Rank Approximation, Victor Pan, Xiaodong Yan
We study two applications of standard Gaussian random multipliers. At first we prove that with a probability close to 1 such a multiplier is expected to numerically stabilize Gaussian elimination with no pivoting as well as block Gaussian elimination. Then, by extending our analysis, we prove that such a multiplier is also expected to support low-rank approximation of a matrix without customary oversampling. Our test results are in good accordance with this formal study. The results remain similar when we replace Gaussian multipliers with random circulant or Toeplitz multipliers, which involve fewer random parameters and enable faster multiplication. We formally ...
Joint Search By Social And Spatial Proximity, 2015 Singapore Management University
Joint Search By Social And Spatial Proximity, Kyriakos Mouratidis, Jing Li, Yu Tang, Nikos Mamoulis
Research Collection School Of Information Systems
The diffusion of social networks introduces new challenges and opportunities for advanced services, especially so with their ongoing addition of location-based features. We show how applications like company and friend recommendation could significantly benefit from incorporating social and spatial proximity, and study a query type that captures these two-fold semantics. We develop highly scalable algorithms for its processing, and enhance them with elaborate optimizations. Finally, we use real social network data to empirically verify the efficiency and efficacy of our solutions.
Automated Detection Of Puffing And Smoking With Wrist Accelerometers, 2015 Northeastern University
Automated Detection Of Puffing And Smoking With Wrist Accelerometers, Qu Tang
Electrical and Computer Engineering Master's Theses
Real-time, automatic detection of smoking behavior could lead to novel measurement tools for smoking research and "just-in-time" interventions that may help people quit, reducing preventable deaths. This paper discusses the use of machine learning with wrist accelerometer data for automatic puffing and smoking detection. A two-layer smoking detection model is proposed that incorporates both low-level time domain features and high-level smoking topography such as inter-puff intervals and puff frequency to detect puffing then smoking. On a pilot dataset of 6 individuals observed for 11.8 total hours in real-life settings performing complex tasks while smoking, the model obtains a cross ...
Resource Management In Enterprise Cluster And Storage Systems, 2015 Northeastern University
Resource Management In Enterprise Cluster And Storage Systems, Jianzhe Tai
Computer Engineering Dissertations
In this thesis, we present our works on resource management in large scale systems, especially for enterprise cluster and storage systems. Large-scale cluster systems become quite popular among a community of users by offering a variety of resources. Such systems require complex resource management schemes for multi-objective optimizations and should be specific to different system requirements. In addition, burstiness has often been found in enterprise workloads, being a key factor in performance degradation. Therefore, it is an extremely challenging problem of managing heterogeneous resources (e.g., computing, networking and storage) for such a large scale system under bursty conditions while ...
An Abstract View On Modularity In Knowledge Representation, 2015 University of Nebraska Omaha
An Abstract View On Modularity In Knowledge Representation, Yuliya Lierler, Miroslaw Truszczyński
Computer Science Faculty Proceedings & Presentations
Modularity is an essential aspect of knowledge representation and reasoning theory and practice. It has received substantial attention. We introduce model-based modular systems, an abstract framework for modular knowledge representation formalisms, similar in scope to multi-context systems but employing a simpler information-flow mechanism. We establish the precise relationship between the two frameworks, showing that they can simulate each other. We demonstrate that recently introduced modular knowledge representation formalisms integrating logic programming with satisfiability and, more generally, with constraint satisfaction can be cast as modular systems in our sense. These results show that our formalism offers a simple unifying framework for ...
High-Performance Power-Efficient Solutions For Embedded Vision Computing, 2015 Northeastern University
High-Performance Power-Efficient Solutions For Embedded Vision Computing, Hamed Tabkhivayghan
Computer Engineering Dissertations
Embedded vision is a top tier, rapidly growing market with a host of challenges and conflicting requirements. Complex algorithms can pose immense computation ( > 50GOPs) and communication ( > 8GB/s) demands, especially considering adaptive vision algorithms (which employ machine learning techniques and concurrently update a scene model). Yet at the same time, their embedded deployment demands low power operation consuming only a few Watts. Multiprocessor System-on-Chips (MPSoCs) have emerged as one main architecture approach to improve power efficiency while increasing computational performance. Still, current vision MPSoCs either shy away from supporting adaptive vision algorithms or operate at very limited resolutions due to ...
Using Cognitive Load Theory To Select An Environment For Teaching Mobile Apps Development, 2015 Southern Cross University
Using Cognitive Load Theory To Select An Environment For Teaching Mobile Apps Development, Raina Mason, Graham Cooper, Simon, Barry Wilks
After considering a number of environments for the development of apps for mobile devices, we have evaluated five in terms of their suitability for students early in their programming study. For some of the evaluation we devised an evaluation scheme based on the principles of cognitive load theory to assess the relative ease or difficulty of learning and using each environment. After briefly presenting the scheme, we discuss our results, including our findings about which mobile apps development environments appear to show most promise for early-level programming students.
Web-Based Comparative Patient-Reported Outcome Feedback To Support Quality Improvement And Comparative Effectiveness Research In Total Joint Replacement, Hua Zheng, Wenjun Li, Leslie Harrold, David C. Ayers, Patricia D. Franklin
eGEMs (Generating Evidence & Methods to improve patient outcomes)
Introduction: Patient-reported outcomes (PROs) are rarely included in quality monitoring systems, surgeon comparative feedback reports, or registries. We present the design and implementation of a secure website in a federally funded research program—Function and Outcomes Research for Comparative Effectiveness in Total Joint Replacement (FORCE-TJR)—to return comparative PRO reports to participating surgeons, in addition to including traditional quality measures, in order to monitor and improve quality and health outcomes.
Methods: The surgeon-specific comparative PRO reports were designed and structured based on user input for content, data elements, integration, and display. Three questions are addressed regarding the knee and hip ...
Bm3d Image Denoising Using Ssim Optimized Wiener Filter, 2014 Western University
Bm3d Image Denoising Using Ssim Optimized Wiener Filter, Mahmud Hasan
University of Western Ontario - Electronic Thesis and Dissertation Repository
Image denoising is considered as a salient pre-processing in sophisticated imaging applications. Over decades, numerous studies have been conducted in denoising. Recently proposed Block Matching and 3D (BM3D) Filtering added a new dimension to the study of denoising. BM3D is the current state-of-the-art of denoising and is capable of achieving better denoising as compared to any other existing method. However, the performance is not yet on the bound for image denoising. Therefore, there is scope to improve BM3D to achieve high quality denoising. In this thesis, to improve BM3D, we first attempted to improve Wiener filter (the core of BM3D ...
The Cadet Training Program Versus The Student Certification Program: A Study Of It- Support Training Programs At Western Kentucky University, Michael Courtney Moore
Masters Theses & Specialist Projects
Technology is a critical component of modern-day success. Advancements in technology have improved communication between individuals and companies. Technological advancements have allowed students to earn college degrees online. People who habitually use technology expect a high level of performance and support. As new technologies are implemented, such as complex web services or new operating systems, the dependence for information technology (IT) support grows in demand. Even learning curves can be cumbersome without proper assistance from IT professionals. Companies and institutions must accommodate user needs by implementing fast, efficient, and friendly support. In order to offer optimal customer support, representatives must ...
Reinforcement Learning Of Distributed Surveillance Plans, 2014 The University of Southern Mississippi
Reinforcement Learning Of Distributed Surveillance Plans, Madhavi Chittireddy
This thesis describes the design and implementation of a Reinforcement Learning algorithm on a camera surveillance model which is used to know the stackelberg strategies of attacker and defender. This reinforcement learning algorithm is compared with the uniform policy and hill climbing algorithms by executing them on a common set of different data files, generated programmatically with various combinations of problem size, location, and orientation transitions as well as rewards of attacker and defender. The comparison includes the time taken to obtain better stackelberg policy and the resulted final pay-off of the defender. This thesis shows that the reinforcement learning ...
The Application Of P-Bar Theory In Transformation-Based Error-Driven Learning, 2014 The University of Southern Mississippi
The Application Of P-Bar Theory In Transformation-Based Error-Driven Learning, Bryant Harold Walley
In P-bar Theory, Perkins et al. (2014) proposed a rule based method for determining the context of a partext (i.e., a part of a text document).
In Transformation-Based Error-Driven Learning and Natural Language Processing: A Case Study in Part-of-Speech Tagging Brill (1995) demonstrates a method of error-driven learning applied to individual words at the sentence level to determine the part of speech each word represents.
We combine these two concepts providing a transformation-based error-driven learning algorithm to improve the results obtained from the static rules Perkins proposed and determine if the rule order prediction will provide additional metadata.
Data Transport System, 2014 Washington University in St. Louis
Data Transport System, Rahav Dor
All Computer Science and Engineering Research
To facilitate the WU Smart Home research  we built a system that collects data from sensors and uploads the data to the cloud. The system supports data collection from multiple locations (typically apartments) that are independent from each other, endowing the system with two benefit: distributed data collection and alleviating privacy concerns. Each location is managed by a local micro-server (μServer) that is responsible for receiving data packets from sensors and managing their transient storage. Periodically the μServer triggers a data transport process that moves the data to a cloud server where it is stored in a centralized database ...
Fresh Bytes - Connected Hydroponics For Small-Scale Growing, 2014 California Polytechnic State University
Fresh Bytes - Connected Hydroponics For Small-Scale Growing, Jack Bowen
Liberal Arts and Engineering Studies
Many users are now transitioning to small-scale hydroponics and aquaponics at home. There can be a barrier to entry with these systems as there is a delicate balance of chemicals, pH, etc. that must be maintained. There are sensors for these various components but they are either aimed at commercial production or are un-automated. Fresh Bytes is a microcomputer with sensors to detect all of these unseen components in a hydroponic system. A prototype of this microcomputer is produced along with CAD plans for more professional versions of it. The sensors are verified and future development is contemplated.
Implementing Lensless Cameras In Autonomous Robotic Systems, 2014 St. Cloud State University
Implementing Lensless Cameras In Autonomous Robotic Systems, Aleksandar Tomović
Culminating Projects in Computer Science and Information Technology
The open-source Robot Operating System (ROS) is a mixed and scalable P2P network-based robotics framework. We examine lensless compressive imaging using a hardware apparatus assembly having an imaging sensor, but no lens. Cameras with lenses have been the standard, but several factors constrain their application. Lensless cameras may reduce the cost, size, and weight of image processing as we move away from use of expensive lenses in robot designs. Lensless cameras can be used also in applications such medicine, where apparatus size is very important.
To support our objective we show how ROS applications are developed and most importantly how ...
Replication And Knowledge Production In Empirical Software Engineering Research, 2014 Brigham Young University
Replication And Knowledge Production In Empirical Software Engineering Research, Jonathan L. Krein
All Theses and Dissertations
Although replication is considered an indispensable part of the scientific method in software engineering, few replication studies are published each year. The rate of replication, however, is not surprising given that replication theory in software engineering is immature. Not only are replication taxonomies varied and difficult to reconcile, but opinions on the role of replication contradict. In general, we have no clear sense of how to build knowledge via replication, particularly given the practical realities of our research field. Consequently, most replications in software engineering yield little useful information. In particular, the vast majority of external replications (i.e., replications ...
Exploring User-Provided Connectivity, 2014 Washington University in St. Louis
Exploring User-Provided Connectivity, Mohammad H. Afrasiabi, Roch Guerin
All Computer Science and Engineering Research
Network services often exhibit positive and negative externalities that affect users' adoption decisions. One such service is "user-provided connectivity" or UPC. The service offers an alternative to traditional infrastructure-based communication services by allowing users to share their "home base" connectivity with other users, thereby increasing their access to connectivity. More users mean more connectivity alternatives, i.e., a positive externality, but also greater odds of having to share one's own connectivity, i.e., a negative externality. The tug of war between positive and negative externalities together with the fact that they often depend not just on how many but ...
High-Resolution Digital 3d Models Of Algar Do Penico Chamber: Limitations, Challenges, And Potential, 2014 University of South Florida
High-Resolution Digital 3d Models Of Algar Do Penico Chamber: Limitations, Challenges, And Potential, Ivo Silvestre M.Sc., José I. Rodrigues Phd, Mauro Figueiredo Phd, Cristina Veiga-Pires Phd
International Journal of Speleology
The study of karst and its geomorphological structures is important for understanding the relationships between hydrology and climate over geological time. In that context, we conducted a terrestrial laser-scan survey to map geomorphological structures in the karst cave of Algar do Penico in southern Portugal. The point cloud data set obtained was used to generate 3D meshes with different levels of detail, allowing the limitations of mapping capabilities to be explored.
In addition to cave mapping, the study focuses on 3D-mesh analysis, including the development of two algorithms for determination of stalactite extremities and contour lines, and on the interactive ...
The Critical Role Of Cubesat Spacecraft In A Multi-Tier Mission For Mars Exploration, Jeremy Straub
A multi-tier architecture is under development (with similar craft heterogeneity to Fink's work on ‘tier scalable’ missions) which will facilitate autonomous local control of multiple heterogeneous craft. This mission architecture has been developed with a Mars mission in mind and has included CubeSats in a variety of critical mission roles.
Two concepts will be presented: the addition of CubeSats to a larger-scale multi-tier mission, where the CubeSats serve a supporting role and a mission driven by CubeSat orbital capabilities. In the first, CubeSats are utilized to augment the area of spatial coverage that can be obtained and the temporal ...