Gal: A Stepwise Model For Automated Cloud Shadow Detection In Hico Oceanic Imagery Utilizing Guided Filter, Pixel Assignment, And Geometric Linking, 2015 University of Southern Mississippi
Gal: A Stepwise Model For Automated Cloud Shadow Detection In Hico Oceanic Imagery Utilizing Guided Filter, Pixel Assignment, And Geometric Linking, Jennerpher Renee Meyers
Detection of cloud shadow pixels is an important step in image processing in several remote sensing ocean-color application domains, such as obtaining chlorophyll content. While shadow detection algorithms do exist, the vast majority are for over land which leaves few options for detection over water.
The detection of cloud shadow over water in HICO imagery is a unique problem. As its name implies, HICO (Hyperspectral Imager for the Coastal Ocean) imagery is produced for coastal and oceanic regions. Since land based algorithms remove water before processing, these approaches would not be applicable. The only currently published HICO shadow pixel detection ...
Video Event Recognition And Prediction Based On Temporal Structure Analysis, 2015 Northeastern University
Video Event Recognition And Prediction Based On Temporal Structure Analysis, Kang Li
Computer Engineering Dissertations
The increasing ubiquitousness of multimedia information in today's world has positioned video as a favored information vehicle, and given rise to an astonishing generation of social media and surveillance footage. Consumer-grade video is becoming abundant on the Internet, and it is now easier than ever to download multimedia material of any kind and quality. This raises a series of technological demands for automatic video understanding, which has motivated the research community to guide its steps towards a better attainment of such capabilities. As a result, current trends on cognitive vision promise to recognize complex events and self-adapt to different ...
Prepositional Phrase Attachment Problem Revisited: How Verbnet Can Help, 2015 University of Nebraska at Omaha
Prepositional Phrase Attachment Problem Revisited: How Verbnet Can Help, Dan Bailey, Yuliya Lierler, Benjamin Susman
Resolving attachment ambiguities is a pervasive problem in syntactic analysis. We propose and investigate an approach to resolving prepositional phrase attachment that centers around the ways of incorporating semantic knowledge derived from the lexico-semantic ontologies such as VERBNET and WORDNET.
Random Multipliers Numerically Stabilize Gaussian And Block Gaussian Elimination: Proofs And An Extension To Low-Rank Approximation, 2015 Lehman College and Graduate Center of CUNY
Random Multipliers Numerically Stabilize Gaussian And Block Gaussian Elimination: Proofs And An Extension To Low-Rank Approximation, Victor Pan, Xiaodong Yan
We study two applications of standard Gaussian random multipliers. At first we prove that with a probability close to 1 such a multiplier is expected to numerically stabilize Gaussian elimination with no pivoting as well as block Gaussian elimination. Then, by extending our analysis, we prove that such a multiplier is also expected to support low-rank approximation of a matrix without customary oversampling. Our test results are in good accordance with this formal study. The results remain similar when we replace Gaussian multipliers with random circulant or Toeplitz multipliers, which involve fewer random parameters and enable faster multiplication. We formally ...
An Extensible Technology Framework For Cyber Security Education, 2015 Brigham Young University - Provo
An Extensible Technology Framework For Cyber Security Education, Frank Jordan Sheen
All Theses and Dissertations
Cyber security education has evolved over the last decade to include new methods of teaching and technology to prepare students. Instructors in this field of study often deal with a subject matter that has rigid principles, but changing ways of applying those principles. This makes maintaining courses difficult. This case study explored the kind of teaching methods, technology, and means used to explain these concepts. This study shows that generally, cyber security courses require more time to keep up to date. It also evaluates one effort, the NxSecLab, on how it attempted to relieve the administrative issues in teaching these ...
Authentication Melee: A Usability Analysis Of Seven Web Authentication Systems, 2015 Brigham Young University - Provo
Authentication Melee: A Usability Analysis Of Seven Web Authentication Systems, Scott Ruoti
All Theses and Dissertations
Passwords continue to dominate the authentication landscape in spite of numerous proposals to replace them. Even though usability is a key factor in replacing passwords, very few alternatives have been subjected to formal usability studies and even fewer have been analyzed using a standard metric. We report the results of four within-subjects usability studies for seven web authentication systems. These systems span federated, smartphone, paper tokens, and email-based approaches. Our results indicate that participants prefer single sign-on systems. We utilize the Systems Usability Scale (SUS) as a standard metric for empirical analysis and find that it produces reliable, replicable results ...
Inspirational Space As A Mechanism To Transform Departmental Culture, 2015 Montana State University - Bozeman
Inspirational Space As A Mechanism To Transform Departmental Culture, John Paxton
Academic Chairpersons Conference Proceedings
Montana State University’s Computer Science Department created a collaborative, informal, Japanese-themed Student Success Center. The goal of the space was to broaden participation and induce cultural change in computer science. The design philosophy behind the room now serves as a model for collaborative space at MSU.
A Catalog Of While Loop Specification Patterns, 2015 University of Texas at El Paso
A Catalog Of While Loop Specification Patterns, Aditi Barua, Yoonsik Cheon
Departmental Technical Reports (CS)
This document provides a catalog of while loop patterns along with their skeletal specifications. The specifications are written in a functional form known as intended functions. The catalog can be used to derive specifications of while loops by first matching the loops to the cataloged patterns and then instantiating the skeletal specifications of the matched patterns. Once their specifications are formulated and written, the correctness of while loops can be proved rigorously or formally using the functional program verification technique in which a program is viewed as a mathematical function from one program state to another.
Assessing Perceived Usability Of The Data Curation Profiles Toolkit Using The Technology Acceptance Model, Tao Zhang, Lisa Zilinski, D Scott Brandt, Jake Carlson
Presentation slides; The DCPT has been widely adopted and applied in various contexts but its usability as a tool has not been formally assessed. To address this need, we have conducted a survey of users of the DCPT. The survey included quantitative measures of potential influencing factors of using the DCPT and its perceived usability (its usefulness as a tool and its ease of use). Open-ended questions about users’ experiences with the DCPT were also included to better understand the strengths and weaknesses of the tool, as well as areas that could be improved. Factor analysis of the quantitative results ...
Identifying And Analyzing Rna Pseudoknots Based On Graph-Theoretical Properties Of Dual Graphs: A Partitioning Approach, 2015 CUNY College of Staten Island and CUNY Graduate Center
Identifying And Analyzing Rna Pseudoknots Based On Graph-Theoretical Properties Of Dual Graphs: A Partitioning Approach, Louis Petingi
In this paper we propose the study of properties of RNA secondary structures modeled as dual graphs, by partitioning these graphs into topological components denominated blocks. We give a full characterization of possible topological configurations of these blocks, and, in particular we show that an RNA secondary structure contains a pseudoknot if and only if its corresponding dual graph contains a block having a vertex of degree at least 3. Once a dual graph has been partitioned via computationally-efficient well-known graph-theoretical algorithms, this characterization allow us to identify these sub-topologies and physically isolate pseudoknots from RNA secondary structures and analyze ...
A Heuristic Evolutionary Method For The Complementary Cell Suppression Problem, 2015 Nova Southeastern University
A Heuristic Evolutionary Method For The Complementary Cell Suppression Problem, Hira B. Herrington
Cell suppression is a common method for disclosure avoidance used to protect sensitive information in two-dimensional tables where row and column totals are published along with non-sensitive data. In tables with only positive cell values, cell suppression has been demonstrated to be non-deterministic NP-hard. Therefore, finding more efficient methods for producing low-cost solutions is an area of active research.
Genetic algorithms (GA) have shown to be effective in finding good solutions to the cell suppression problem. However, these methods have the shortcoming that they tend to produce a large proportion of infeasible solutions. The primary goal of this research was ...
A Right To Cybercounter Strikes: The Risks Of Legalizing Hack Backs, 2015 University of Texas at Dallas
A Right To Cybercounter Strikes: The Risks Of Legalizing Hack Backs, Jan Kallberg
The idea to legalize hacking back has gained traction the last years and received several influential corporate and political proponents in the United States and Europe. The growing frustration with repeated cyberattacks and lack of credible law enforcement pushes for alternative ways to prevent future cyberattacks. As of today, counter cyberattacks are illegal in a majority of the nations because it constitutes another cybercrime independent from the initial attack. If cyber counter attacks were legalized it raises a set of questions. The first line of questions are linked to the underlying assumptions that the proposal to legalize counter cyberattacks are ...
Role-Based Access Control Administration Of Security Policies And Policy Conflict Resolution In Distributed Systems, 2015 Nova Southeastern University
Role-Based Access Control Administration Of Security Policies And Policy Conflict Resolution In Distributed Systems, Stephen Sakawa Kibwage
Security models using access control policies have over the years improved from Role-based access control (RBAC) to newer models which have added some features like support for distributed systems and solving problems in older security policy models such as identifying policy conflicts. Access control policies based on hierarchical roles provide more flexibility in controlling system resources for users. The policies allow for granularity when extended to have both allow and deny permissions as well as weighted priority attribute for the rules in the policies. Such flexibility allows administrators to succinctly specify access for their system resources but also prone to ...
Identifying Unethical Personally Identifiable Information (Pii) Privacy Violations Committed By Is/It Practitioners: A Comparison To Computing Moral Exemplars, Mark H. Rosenbaum
In some instances, Information Systems and Information Technology (IS/IT) practitioners have been noted to commit privacy violations to Personally Identifiable Information (PII). However, computing exemplars, due to their notable dispositional Hallmark Features of morality, understandings of ethical abstractions, and other components that comprise their virtuous makeups, are theoretically less likely to commit privacy violations to PII. This research attempted to verify if those IS/IT practitioners who identify with some of the Hallmark Features of moral and computing exemplar were less willing to commit privacy violations to PII than were those IS/IT practitioners that did not identify themselves ...
Fuzzy, Intuitionistic Fuzzy, What Next?, 2015 University of Texas at El Paso
Fuzzy, Intuitionistic Fuzzy, What Next?, Vladik Kreinovich, Bui Cong Cuong
Departmental Technical Reports (CS)
In the 1980s, Krassimir Atanassov proposed an important generalization of fuzzy sets, fuzzy logic, and fuzzy techniques -- intuitionistic fuzzy approach, which provides a more accurate description of expert knowledge. In this paper, we describe a natural way how the main ideas behind the intuitionistic fuzzy approach can be expanded even further, towards an even more accurate description of experts' knowledge.
A Proven Method For Meeting Export Control Objectives In Postal And Shipping Sectors, 2015 (U.S. Postal Inspection Service)
A Proven Method For Meeting Export Control Objectives In Postal And Shipping Sectors, Greg Crabb, Julia H. Allen, Pamela D. Curtis, Nader Mehravari
Software Engineering Institute
On a weekly basis, the U.S. Postal Service (USPS) processes over one million packages destined to overseas locations. All international shipments being sent from the United States are subject to federal export laws. The USPS has extensive export compliance policies and screening procedures to ensure that customers comply with federal export laws. Compliance policies and screening procedures are expensive and time consuming, and can negatively affect the efficiency of international mail delivery services. The U.S. Postal Inspection Service (USPIS) has defined, developed, and successfully implemented an innovative approach for export screening that has drastically improved its efficiency, effectiveness ...
Measuring What Matters Workshop Report, 2015 Carnegie Mellon University
Measuring What Matters Workshop Report, Katie C. Stewart, Julia H. Allen, Michelle A. Valdez, Lisa Young
Software Engineering Institute
This report describes the inaugural Measuring What Matters Workshop conducted in November 2014, and the team’s experiences in planning and executing the workshop and identifying improvements for future offerings. The Measuring What Matters Workshop introduces the Goal-Question-Indicator-Metric (GQIM) approach that enables users to derive meaningful metrics for managing cybersecurity risks from strategic and business objectives. This approach helps ensure that organizational leaders have better information to make decisions, take action, and change behaviors.
A Dynamic Model Of Sustainment Investment, 2015 Carnegie Mellon University
A Dynamic Model Of Sustainment Investment, Sarah Sheard, Robert W. Ferguson, Andrew P. Moore, D. Michael Phillips
Software Engineering Institute
This paper describes a dynamic sustainment model that shows how budgeting, allocation of resources, mission performance, and strategic planning are interrelated and how they affect each other over time. Each of these processes is owned by a different stakeholder, so a decision made by one stakeholder might affect performance in a different organization. Worse, delaying a decision to fund some work might result in much longer delays and much greater costs to several of the organizations.
The SEI developed and calibrated a systems dynamic model that shows interactions of various stakeholders over time and the results of four realistic scenarios ...
Commitment Without Regrets: Online Learning In Stackelberg Security Games, 2015 Carnegie Mellon University
Commitment Without Regrets: Online Learning In Stackelberg Security Games, Maria-Florina Balcan, Avrim Blum, Nika Haghtalab, Ariel D. Procaccia
Machine Learning Department
In a Stackelberg Security Game, a defender commits to a randomized deployment of security resources, and an attacker bestresponds by attacking a target that maximizes his utility. While algorithms for computing an optimal strategy for the defender to commit to have had a striking real-world impact, deployed applications require significant information about potential attackers, leading to inefficiencies. We address this problem via an online learning approach. We are interested in algorithms that prescribe a randomized strategy for the defender at each step against an adversarially chosen sequence of attackers, and obtain feedback on their choices (observing either the current attacker ...
Mapping Legume Roots Can Determine Best Performing Crops, 2015 Wilfrid Laurier University
Mapping Legume Roots Can Determine Best Performing Crops, Frédérique C. Guinel
Clear Language Summaries
Legume plants have a mutually beneficial relationship with bacteria. These beneficial bacteria live in nodules found on plant roots. Until recently there was no way to systematically measure the roots the nodules are found on and to place accurately the nodules on these roots. The research team created software and a method to measure multiple root parameters which were not available previously. This allows different plant varieties to be compared with precise measurements of the root structure in order to figure out which plants will grow better.