Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

14,115 Full-Text Articles 13,040 Authors 3,083,374 Downloads 163 Institutions

All Articles in Computer Sciences

Faceted Search

14,115 full-text articles. Page 1 of 253.

Gal: A Stepwise Model For Automated Cloud Shadow Detection In Hico Oceanic Imagery Utilizing Guided Filter, Pixel Assignment, And Geometric Linking, Jennerpher Renee Meyers 2015 University of Southern Mississippi

Gal: A Stepwise Model For Automated Cloud Shadow Detection In Hico Oceanic Imagery Utilizing Guided Filter, Pixel Assignment, And Geometric Linking, Jennerpher Renee Meyers

Dissertations

Detection of cloud shadow pixels is an important step in image processing in several remote sensing ocean-color application domains, such as obtaining chlorophyll content. While shadow detection algorithms do exist, the vast majority are for over land which leaves few options for detection over water.

The detection of cloud shadow over water in HICO imagery is a unique problem. As its name implies, HICO (Hyperspectral Imager for the Coastal Ocean) imagery is produced for coastal and oceanic regions. Since land based algorithms remove water before processing, these approaches would not be applicable. The only currently published HICO shadow pixel detection ...


Video Event Recognition And Prediction Based On Temporal Structure Analysis, Kang Li 2015 Northeastern University

Video Event Recognition And Prediction Based On Temporal Structure Analysis, Kang Li

Computer Engineering Dissertations

The increasing ubiquitousness of multimedia information in today's world has positioned video as a favored information vehicle, and given rise to an astonishing generation of social media and surveillance footage. Consumer-grade video is becoming abundant on the Internet, and it is now easier than ever to download multimedia material of any kind and quality. This raises a series of technological demands for automatic video understanding, which has motivated the research community to guide its steps towards a better attainment of such capabilities. As a result, current trends on cognitive vision promise to recognize complex events and self-adapt to different ...


A Right To Cyber Counter Strikes - The Risks Of Legalizing Hack Back, Jan Kallberg 2015 University of Texas at Dallas

A Right To Cyber Counter Strikes - The Risks Of Legalizing Hack Back, Jan Kallberg

Jan Kallberg

The idea to legalize hacking back has gained traction the last years and received several influential corporate and political proponents in the United States and Europe. The growing frustration with repeated cyberattacks and lack of credible law enforcement pushes for alternative ways to prevent future cyberattacks. As of today, counter cyberattacks are illegal in a majority of the nations because it constitutes another cybercrime independent from the initial attack. If cyber counter attacks were legalized it raises a set of questions. The first line of questions are linked to the underlying assumptions that the proposal to legalize counter cyberattacks are ...


Random Multipliers Numerically Stabilize Gaussian And Block Gaussian Elimination: Proofs And An Extension To Low-Rank Approximation, Victor Pan, Xiaodong Yan 2015 Lehman College and Graduate Center of CUNY

Random Multipliers Numerically Stabilize Gaussian And Block Gaussian Elimination: Proofs And An Extension To Low-Rank Approximation, Victor Pan, Xiaodong Yan

Faculty Works

We study two applications of standard Gaussian random multipliers. At first we prove that with a probability close to 1 such a multiplier is expected to numerically stabilize Gaussian elimination with no pivoting as well as block Gaussian elimination. Then, by extending our analysis, we prove that such a multiplier is also expected to support low-rank approximation of a matrix without customary oversampling. Our test results are in good accordance with this formal study. The results remain similar when we replace Gaussian multipliers with random circulant or Toeplitz multipliers, which involve fewer random parameters and enable faster multiplication. We formally ...


Grafalgo - A Library Of Graph Algorithms And Supporting Data Structures, Jonathan Turner 2015 Washington University in St Louis

Grafalgo - A Library Of Graph Algorithms And Supporting Data Structures, Jonathan Turner

All Computer Science and Engineering Research

This report provides an overview of Grafalgo, an open-source library of graph algorithms and the data structures used to implement them. The programs in this library were originally written to support a graduate class in advanced data structures and algorithms at Washington University. Because the code's primary purpose was pedagogical, it was written to be as straightforward as possible, while still being highly efficient. Grafalgo is implemented in C++ and incorporates some features of C++11.

The library is available on an open-source basis and may be downloaded from https://code.google.com/p/grafalgo/. Source code documentation is ...


Gathering The Requirements For A Mobile Device Tutorial For Older Adults, Michele A. Washington 2015 Nova Southeastern University

Gathering The Requirements For A Mobile Device Tutorial For Older Adults, Michele A. Washington

GSCIS ETDs

The United States, as well as other nations, is experiencing an increase in the older adult population. As a result of older adults living longer, mobile devices can be a major component in improving older adults' quality of life. However, older adults may encounter difficulties when using the mobile devices. This research examined the requirements in addressing the needs of older adults when using a mobile device. Specifically, the research focused on gathering the task and feature requirements for a mobile device tutorial for older adults. The approach was accomplished by the development of a mobile device questionnaire, which was ...


Advantages Of A Finite Extensible Nonlinear Elastic Potential In Lattice Boltzmann Simulations, Tai-Hsien Wu, Dewei Qi 2015 Western Michigan University

Advantages Of A Finite Extensible Nonlinear Elastic Potential In Lattice Boltzmann Simulations, Tai-Hsien Wu, Dewei Qi

The Hilltop Review

A new structure, generalized lattice nonlinear spring model (GLNSM), which adopts non-linear FENE-LJ potential instead of harmonic potential, has been coupled with lattice Boltzmann simulation for solving fluid-solid interaction problem. In this article, a significant work is the relationship between the GLNSM (FENE-LJ potential) and Young’s modulus has been described in detail. A validation has also been presented to prove that GLNSM is reliable.


Wi-Fi Location Determination For Semantic Locations, Keith J. Kelley 2015 Western Michigan University

Wi-Fi Location Determination For Semantic Locations, Keith J. Kelley

The Hilltop Review

In Wi-Fi location determination literature, little attention is paid to locations that do not have numeric, geometric coordinates, though many users prefer the convenience of non-coordinate locations (consider the ease of giving a street address as opposed to giving latitude and longitude). It is not often easy to tell from the title or abstract of a Wi-Fi location determination article whether or not it has applicability to semantic locations such as room-level names. This article surveys the literature through 2011 on Wi-Fi localization for symbolic locations.


Cloud Computing Technology For Education Applications, Zhi-Xue Xu 2015 San Jose State University

Cloud Computing Technology For Education Applications, Zhi-Xue Xu

Zhi-Xue Xu

Cloud Computing Technology and Big Data Applications have been connected strongly to our daily work and life. Some peoples think that Cloud Computing is fourth revolution in Information Technology. Cloud Computing Applications that like Utility Computing also have been applied, used and developed for education and Smart Virtual Cloud Campus creations. Cloud computing technology is changing IT application development method and format on campus, and challenge and reform to the current IT computer infrastructures and applications. The cloud computing technology for application development in education can build robust applications in a short time and lower cost. The Cloud Computing Technology ...


Automated Detection Of Puffing And Smoking With Wrist Accelerometers, Qu Tang 2015 Northeastern University

Automated Detection Of Puffing And Smoking With Wrist Accelerometers, Qu Tang

Electrical and Computer Engineering Master's Theses

Real-time, automatic detection of smoking behavior could lead to novel measurement tools for smoking research and "just-in-time" interventions that may help people quit, reducing preventable deaths. This paper discusses the use of machine learning with wrist accelerometer data for automatic puffing and smoking detection. A two-layer smoking detection model is proposed that incorporates both low-level time domain features and high-level smoking topography such as inter-puff intervals and puff frequency to detect puffing then smoking. On a pilot dataset of 6 individuals observed for 11.8 total hours in real-life settings performing complex tasks while smoking, the model obtains a cross ...


Resource Management In Enterprise Cluster And Storage Systems, Jianzhe Tai 2015 Northeastern University

Resource Management In Enterprise Cluster And Storage Systems, Jianzhe Tai

Computer Engineering Dissertations

In this thesis, we present our works on resource management in large scale systems, especially for enterprise cluster and storage systems. Large-scale cluster systems become quite popular among a community of users by offering a variety of resources. Such systems require complex resource management schemes for multi-objective optimizations and should be specific to different system requirements. In addition, burstiness has often been found in enterprise workloads, being a key factor in performance degradation. Therefore, it is an extremely challenging problem of managing heterogeneous resources (e.g., computing, networking and storage) for such a large scale system under bursty conditions while ...


An Abstract View On Modularity In Knowledge Representation, Yuliya Lierler, Miroslaw Truszczyński 2015 University of Kentucky

An Abstract View On Modularity In Knowledge Representation, Yuliya Lierler, Miroslaw Truszczyński

Computer Science Faculty Proceedings & Presentations

Modularity is an essential aspect of knowledge representation and reasoning theory and practice. It has received substantial attention. We introduce model-based modular systems, an abstract framework for modular knowledge representation formalisms, similar in scope to multi-context systems but employing a simpler information-flow mechanism. We establish the precise relationship between the two frameworks, showing that they can simulate each other. We demonstrate that recently introduced modular knowledge representation formalisms integrating logic programming with satisfiability and, more generally, with constraint satisfaction can be cast as modular systems in our sense. These results show that our formalism offers a simple unifying framework for ...


High-Performance Power-Efficient Solutions For Embedded Vision Computing, Hamed Tabkhivayghan 2015 Northeastern University

High-Performance Power-Efficient Solutions For Embedded Vision Computing, Hamed Tabkhivayghan

Computer Engineering Dissertations

Embedded vision is a top tier, rapidly growing market with a host of challenges and conflicting requirements. Complex algorithms can pose immense computation ( > 50GOPs) and communication ( > 8GB/s) demands, especially considering adaptive vision algorithms (which employ machine learning techniques and concurrently update a scene model). Yet at the same time, their embedded deployment demands low power operation consuming only a few Watts. Multiprocessor System-on-Chips (MPSoCs) have emerged as one main architecture approach to improve power efficiency while increasing computational performance. Still, current vision MPSoCs either shy away from supporting adaptive vision algorithms or operate at very limited resolutions due to ...


Using Cognitive Load Theory To Select An Environment For Teaching Mobile Apps Development, Raina Mason, Graham Cooper, Simon, Barry Wilks 2015 Southern Cross University

Using Cognitive Load Theory To Select An Environment For Teaching Mobile Apps Development, Raina Mason, Graham Cooper, Simon, Barry Wilks

Raina Mason

After considering a number of environments for the development of apps for mobile devices, we have evaluated five in terms of their suitability for students early in their programming study. For some of the evaluation we devised an evaluation scheme based on the principles of cognitive load theory to assess the relative ease or difficulty of learning and using each environment. After briefly presenting the scheme, we discuss our results, including our findings about which mobile apps development environments appear to show most promise for early-level programming students.


Joint Search By Social And Spatial Proximity, Kyriakos Mouratidis, Jing Li, Yu Tang, Nikos Mamoulis 2015 Singapore Management University

Joint Search By Social And Spatial Proximity, Kyriakos Mouratidis, Jing Li, Yu Tang, Nikos Mamoulis

Research Collection School Of Information Systems

The diffusion of social networks introduces new challenges and opportunities for advanced services, especially so with their ongoing addition of location-based features. We show how applications like company and friend recommendation could significantly benefit from incorporating social and spatial proximity, and study a query type that captures these two-fold semantics. We develop highly scalable algorithms for its processing, and enhance them with elaborate optimizations. Finally, we use real social network data to empirically verify the efficiency and efficacy of our solutions.


Automated Prediction Of Bug Report Priority Using Multi-Factor Analysis, Yuan Tian, David LO, Chengnian Sun 2015 Singapore Management University

Automated Prediction Of Bug Report Priority Using Multi-Factor Analysis, Yuan Tian, David Lo, Chengnian Sun

Research Collection School Of Information Systems

Bugs are prevalent. To improve software quality, developers often allow users to report bugs that they found using a bug tracking system such as Bugzilla. Users would specify among other things, a description of the bug, the component that is affected by the bug, and the severity of the bug. Based on this information, bug triagers would then assign a priority level to the reported bug. As resources are limited, bug reports would be investigated based on their priority levels. This priority assignment process however is a manual one. Could we do better? In this paper, we propose an automated ...


Automatic, High Accuracy Prediction Of Reopened Bugs, Xin Xia, David LO, Emad Shihab, Xinyu Wang, Bo Zhou 2015 Singapore Management University

Automatic, High Accuracy Prediction Of Reopened Bugs, Xin Xia, David Lo, Emad Shihab, Xinyu Wang, Bo Zhou

Research Collection School Of Information Systems

Bug fixing is one of the most time-consuming and costly activities of the software development life cycle. In general, bugs are reported in a bug tracking system, validated by a triage team, assigned for someone to fix, and finally verified and closed. However, in some cases bugs have to be reopened. Reopened bugs increase software maintenance cost, cause rework for already busy developers and in some cases even delay the future delivery of a software release. Therefore, a few recent studies focused on studying reopened bugs. However, these prior studies did not achieve high performance (in terms of precision and ...


To What Extent Could We Detect Field Defects? An Extended Empirical Study Of False Negatives In Static Bug Finding Tools, Ferdian Thung, - Lucia, David LO, Lingxiao JIANG, Foyzur Rahman, Premkumar Devanbu 2015 Singapore Management University

To What Extent Could We Detect Field Defects? An Extended Empirical Study Of False Negatives In Static Bug Finding Tools, Ferdian Thung, - Lucia, David Lo, Lingxiao Jiang, Foyzur Rahman, Premkumar Devanbu

Research Collection School Of Information Systems

Software defects can cause much loss. Static bug-finding tools are designed to detect and remove software defects and believed to be effective. However, do such tools in fact help prevent actual defects that occur in the field and reported by users? If these tools had been used, would they have detected these field defects, and generated warnings that would direct programmers to fix them? To answer these questions, we perform an empirical study that investigates the effectiveness of five state-of-the-art static bug-finding tools (FindBugs, JLint, PMD, CheckStyle, and JCSC) on hundreds of reported and fixed defects extracted from three open ...


Diversity Maximization Speedup For Localizing Faults In Single-Fault And Multi-Fault Programs, Xin Xia, Liang Gong, Tien-Duy B. Le, David LO, Lingxiao JIANG, Hongyu Zhang 2015 Singapore Management University

Diversity Maximization Speedup For Localizing Faults In Single-Fault And Multi-Fault Programs, Xin Xia, Liang Gong, Tien-Duy B. Le, David Lo, Lingxiao Jiang, Hongyu Zhang

Research Collection School Of Information Systems

Fault localization is useful for reducing debugging effort. Such techniques require test cases with oracles, which can determine whether a program behaves correctly for every test input. Although most fault localization techniques can localize faults relatively accurately even with a small number of test cases, choosing the right test cases and creating oracles for them are not easy. Test oracle creation is expensive because it can take much manual labeling effort (i.e., effort needed to decide whether the test cases pass or fail). Given a number of test cases to be executed, it is challenging to minimize the number ...


The Symbiotic Relationship Between Information Retrieval And Informetrics, Dietmar Wolfram 2015 University of Wisconsin - Milwaukee School of Information Studies

The Symbiotic Relationship Between Information Retrieval And Informetrics, Dietmar Wolfram

Dietmar Wolfram

Informetrics and information retrieval (IR) represent fundamental areas of study within information science. Historically, researchers have not fully capitalized on the potential research synergies that exist between these two areas. Data sources used in traditional informetrics studies have their analogues in IR, with similar types of empirical regularities found in IR system content and use. Methods for data collection and analysis used in informetrics can help to inform IR system development and evaluation. Areas of application have included automatic indexing, index term weighting and understanding user query and session patterns through the quantitative analysis of user transaction logs. Similarly, developments ...


Digital Commons powered by bepress