Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

11,958 Full-Text Articles 10,963 Authors 2,654,364 Downloads 143 Institutions

All Articles in Computer Sciences

Faceted Search

11,958 full-text articles. Page 1 of 207.

Measuring Privacy Disclosures In Url Query Strings, Andrew G. West, Adam J. Aviv 2015 SelectedWorks

Measuring Privacy Disclosures In Url Query Strings, Andrew G. West, Adam J. Aviv

Andrew G. West

Publicly posted URLs may contain a wealth of information about the identities and activities of the users who share them. URLs often utilize query strings (i.e., key-value pairs appended to the URL path) as a means to pass session parameters and form data. While often benign and necessary to render the web page, query strings sometimes contain tracking mechanisms, user names, email addresses, and other information that users may not wish to publicly reveal. In isolation this is not particularly problematic, but the growth of Web 2.0 platforms such as social networks and micro-blogging means URLs (often copy-pasted ...


Joint Search By Social And Spatial Proximity, Kyriakos Mouratidis, Jing Li, Yu Tang, Nikos Mamoulis 2015 Singapore Management University

Joint Search By Social And Spatial Proximity, Kyriakos Mouratidis, Jing Li, Yu Tang, Nikos Mamoulis

Research Collection School Of Information Systems

The diffusion of social networks introduces new challenges and opportunities for advanced services, especially so with their ongoing addition of location-based features. We show how applications like company and friend recommendation could significantly benefit from incorporating social and spatial proximity, and study a query type that captures these two-fold semantics. We develop highly scalable algorithms for its processing, and enhance them with elaborate optimizations. Finally, we use real social network data to empirically verify the efficiency and efficacy of our solutions.


Scalable, Efficient And Optimal Discrete-Time Rebalancing Algorithms For Log-Optimal Investment Portfolio, Sujit Ranjan Das 2014 University of Wisconsin Milwaukee

Scalable, Efficient And Optimal Discrete-Time Rebalancing Algorithms For Log-Optimal Investment Portfolio, Sujit Ranjan Das

Theses and Dissertations

Portfolio rebalancing decisions are crucial to today's portfolio managers especially in high frequency algorithmic trading environment. These decisions must be made fast in dynamic market conditions. We develop computational algorithms to determine optimal rebalance frequency (ORF) of a class of investment portfolio for a finite investment horizon. We choose log-optimal investment portfolio which is deemed to be impractical and cost-prohibitive due to inherent need for continuous rebalancing and significant overhead of trading cost. Optimality of such portfolio is assured only when for very long term investor horizon. We study the question of how often a log-optimal portfolio be rebalanced ...


Chatter: Classifying Malware Families Using System Event Ordering, Aziz Mohaisen, Andrew G. West, Allison Mankin, Omar Alrawi 2014 SelectedWorks

Chatter: Classifying Malware Families Using System Event Ordering, Aziz Mohaisen, Andrew G. West, Allison Mankin, Omar Alrawi

Andrew G. West

Using runtime execution artifacts to identify malware and its associated "family" is an established technique in the security domain. Many papers in the literature rely on explicit features derived from network, file system, or registry interaction. While effective, use of these fine-granularity data points makes these techniques computationally expensive. Moreover, the signatures and heuristics this analysis produces are often circumvented by subsequent malware authors.

To this end we propose CHATTER, a system that is concerned only with the order in which high-level system events take place. Individual events are mapped onto an alphabet and execution traces are captured via terse ...


Lessons Learned In Customizing Hosted Contentdm 6, M Ryan Hess 2014 DePaul University

Lessons Learned In Customizing Hosted Contentdm 6, M Ryan Hess

M Ryan Hess

DePaul University Library will share its lessons learned and recommendations for hosted CONTENTdm 6 administrators wishing to customize CONTENTdm in a way that strikes the right balance between default CONTENTdm sites and sites that stand out and better serve our unique audiences. The DePaul University Library has learned many lessons from customizing its hosted instance of CONTENTdm 6, including the use of jQuery to add interface enhancements and remove some native CONTENTdm features. Unfortunately, this did not prove a long-term solution due to some limitations of CONTENTdm’s built-in customization tools, leading to content management issues and bugs that were ...


Improved Storm Data Processing Through Parallel Computing Approaches, Shauna Smith 2014 Minnesota State University, Mankato

Improved Storm Data Processing Through Parallel Computing Approaches, Shauna Smith

Journal of Undergraduate Research at Minnesota State University, Mankato

A previous research study conducted at Michigan Technological University by Dr. Deborah Nykanen and her colleague Dr. Daniel Harris analyzed storm data in order to develop algorithms that will allow coarse resolution rainfall forecasted by weather models to be optimally used in high resolution hydrology models with the goal of improving stream flow predictions and early detection algorithms that can be used to warn communities about potential flash floods. This research was performed by analyzing a series of independent radar images derived from Weather Surveillance Radar-1988 Doppler (WSR-88D) data obtained from Dr. James A. Smith at Princeton University using a ...


Data, Analytics And Community-Based Organizations: Transforming Data To Decisions For Community Development, Michael P. Johnson Jr. 2014 University of Massachusetts Boston

Data, Analytics And Community-Based Organizations: Transforming Data To Decisions For Community Development, Michael P. Johnson Jr.

Michael P. Johnson

The past ten years have seen a revolution in two disciplines related to operations and strategy design. “Big Data” has transformed the theory and practice of producing and selling goods and services through methods associated with computer science and information technology. “Analytics” has popularized primarily quantitative models and methods by which organizations and systems can measure multiple aspects of performance. As these fields rely on information technology to collect, store, process and share data, we refer to the collection of knowledge and applications associated with Big Data and analytics as “data analytics and information technology.” The impacts of data analytics ...


Morphological Operations Applied To Digital Art Restoration, M. Kirbie Dramdahl 2014 University of Minnesota Morris Digital Well

Morphological Operations Applied To Digital Art Restoration, M. Kirbie Dramdahl

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

This paper provides an overview of the processes involved in detecting and removing cracks from digitized works of art. Specific attention is given to the crack detection phase as completed through the use of morphological operations. Mathematical morphology is an area of set theory applicable to image processing, and therefore lends itself effectively to the digital art restoration process.


Applying Genetic Programming To Bytecode And Assembly, Eric Collom 2014 University of Minnesota Morris Digital Well

Applying Genetic Programming To Bytecode And Assembly, Eric Collom

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

Traditional genetic programming (GP) is typically not used to perform unrestricted evolution on entire programs at the source code level. Instead, only small sections within programs are usually evolved. Not being able to evolve whole programs is an issue since it limits the flexibility of what can be evolved. Evolving programs in either bytecode or assembly language is a method that has been used to perform unrestricted evolution. This paper provides an overview of applying genetic programming to Java bytecode and x86 assembly. Two examples of how this method has been implemented will be explored. We will also discuss experimental ...


An Overview Of The Current State Of The Test-First Vs. Test-Last Debate, Christopher M. Thomas 2014 University of Minnesota Morris Digital Well

An Overview Of The Current State Of The Test-First Vs. Test-Last Debate, Christopher M. Thomas

Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal

When it comes to software development, perhaps one of the most important and time consuming processes is that of software testing. In fact, early studies on software testing estimated that it could consume fifty percent or more of development costs for a product. Because of this, the ability to optimize testing to reduce testing costs can be very valuable. In this paper we compare two popular methods, test-last testing, often used in waterfall software development processes, and test-first testing, often used in Agile test driven software development methods, by reviewing recent studies on the subject. In this review we discuss ...


Mental Health Awareness Building Via Android Application, James Faraday, Joshua Martin 2014 Minnesota State University, Mankato

Mental Health Awareness Building Via Android Application, James Faraday, Joshua Martin

Journal of Undergraduate Research at Minnesota State University, Mankato

The goal of this project was to create a tool that provides students at Minnesota State University, Mankato with mental health information through a freely available smartphone application (App). Our approach used a software engineering design process that focused on who our customers are, what resources are available, and how we can best connect the two to improve student lives. We identified the stakeholders involved and worked with campus mental health professionals to help shape our App. While there is a broad range of mental health topics, we have focused on materials related to depression. The first process of the ...


Digital Scholarship: Applying Digital Tools To Undergraduate Student Research Papers, A Proposal For A Freshman Seminar. Part I: Definition Of Student Research Methodology, Charles W. Kann 2014 Gettysburg College

Digital Scholarship: Applying Digital Tools To Undergraduate Student Research Papers, A Proposal For A Freshman Seminar. Part I: Definition Of Student Research Methodology, Charles W. Kann

Computer Science Faculty Publications

There are many digital tools that can be used for research and presentation in nearly every college discipline, including the social sciences and humanities. These tools hold the promise to radically change both the process and products of research. But in their application these tools have failed miserably to live up to their promise.

This paper is based on the hypothesis that one reason these tools do reach their potential is that there is no systemic way to include them in research process, resulting in the tools being seen as ways to improve the final research product. This results in ...


Capsule-Oriented Programming In The Panini Language, Hridesh Rajan, Steven M. Kautz, Eric Lin, Sean L. Mooney, Yuheng Long, Ganesha Upadhayaya 2014 Iowa State University

Capsule-Oriented Programming In The Panini Language, Hridesh Rajan, Steven M. Kautz, Eric Lin, Sean L. Mooney, Yuheng Long, Ganesha Upadhayaya

Computer Science Technical Reports

Sequentially-trained programmers, i.e. programmers with little or no training in concurrent program design, remain an important subset of today's IT workforce. Inherent concurrency in modern software together with prevalence of multiple hardware threads due to multicore processors is increasing pressure on these programmers to become adept at concurrency, but they continue to find writing and reasoning about concurrent programs difficult. The difficulties originate from having to write and reason about programs that have a multitude of possible execution orders.

We present a novel implicitly-concurrent programming model called capsule-oriented programming that is designed for sequentially-trained programmers. Capsule-oriented programming solves ...


Is There Progress Toward Sustainability?: Despite The Inherent Human Resistance To Change., Jens Pohl 2014 California Polytechnic State University

Is There Progress Toward Sustainability?: Despite The Inherent Human Resistance To Change., Jens Pohl

Collaborative Agent Design (CAD) Research Center

The theme of this paper is to briefly survey the status of current efforts to maintain our natural environment and then discuss prospects for achieving future sustainability. The author finds that while there has been general recognition of the need for environmental sensitivity and conservation of natural resources, progress toward achieving sustainability goals has been slow. A principal reason for this lack of action is found in the reactive nature of the human species. Situated by biological design in our environment we typically respond to environmental changes only after they have occurred. Accordingly, while a number of revolutionary proposals have ...


Abstract Disjunctive Answer Set Solvers, Remi Brochenin, Yuliya Lierler, Marco Maratea 2014 University of Nebraska Omaha

Abstract Disjunctive Answer Set Solvers, Remi Brochenin, Yuliya Lierler, Marco Maratea

Computer Science Faculty Proceedings & Presentations

A fundamental task in answer set programming is to compute answer sets of logic programs. Answer set solvers are the programs that perform this task. The problem of deciding whether a disjunctive program has an answer set isΣP2 -complete. The high complexity of reasoning within disjunctive logic programming is responsible for few solvers capable of dealing with such programs, namely DLV, GNT, CMODELS and CLASP. We show that transition systems introduced by Nieuwenhuis, Oliveras, and Tinelli to model and analyze satisfiability solvers can be adapted for disjunctive answer set solvers. In particular, we present transition systems for CMODELS ...


Multi-Scale Modeling Of Microbial Defection In The Presence Of Antibiotics, Darshan Dilip Nahar 2014 Utah State University

Multi-Scale Modeling Of Microbial Defection In The Presence Of Antibiotics, Darshan Dilip Nahar

All Graduate Theses and Dissertations

Iterative competition between organisms for limited resources gives rise to different social strategies including cooperation. One specific problem in the cooperating but competing species in that cost associated in exhibiting cooperative traits provokes "cheating". Cheaters acquire relatively higher fitness by reaping the benefits of cooperation without contributing towards community beneficial goods. While the relatively fit cheaters can drive the contributors to extinction, the contributors exhibit different strategies to gain preferential benefits of cooperation. The facultative benefit of cooperation to cheaters drives the population to an equilibrium frequency of cooperators and cheaters. Here we develop a multi-scale modeling approach to simulate ...


A Comparative Study Of Underwater Robot Path Planning Algorithms For Adaptive Sampling In A Network Of Sensors, Sreeja Banerjee 2014 University of Nebraska - Lincoln

A Comparative Study Of Underwater Robot Path Planning Algorithms For Adaptive Sampling In A Network Of Sensors, Sreeja Banerjee

Computer Science and Engineering: Theses, Dissertations, and Student Research

Monitoring lakes, rivers, and oceans is critical to improving our understanding of complex large-scale ecosystems. We introduce a method of underwater monitoring using semi-mobile underwater sensor networks and mobile underwater robots in this thesis. The underwater robots can move freely in all dimension while the sensor nodes are anchored to the bottom of the water column and can move only up and down along the depth of the water column. We develop three different algorithms to optimize the path of the underwater robot and the positions of the sensors to improve the overall quality of sensing of an area of ...


Energy Evaluation For Applications With Different Thread Affinities On The Intel Xeon Phi, Gary Lawson, Masha Sosonkina, Yuzhong Shen 2014 Iowa State University

Energy Evaluation For Applications With Different Thread Affinities On The Intel Xeon Phi, Gary Lawson, Masha Sosonkina, Yuzhong Shen

Computer Science Technical Reports

The Intel Xeon Phi coprocessor offers high par- allelism on energy-efficient hardware to minimize energy con- sumption while maintaining performance. Dynamic frequency and voltage scaling is not accessible on the Intel Xeon Phi. Hence, saving energy relies mainly on tuning application performance. One general optimization technique is thread affinity, which is an important factor in multi-core architectures. This work investigates the effects of varying thread affinity modes and reducing core utilization on energy and execution time for the NASA Advanced Supercomputing Parallel Benchmarks (NPB). Energy measurements are captured using the micsmc utility tool available on Xeon Phi. The measurements are ...


User-Space Process Virtualization In The Context Of Checkpoint-Restart And Virtual Machines, Kapil Arya 2014 Northeastern University

User-Space Process Virtualization In The Context Of Checkpoint-Restart And Virtual Machines, Kapil Arya

Computer Science Dissertations

Checkpoint-Restart is the ability to save a set of running processes to a checkpoint image on disk, and to later restart them from the disk. In addition to its traditional use in fault tolerance, recovering from a system failure, it has numerous other uses, such as for application debugging and save/restore of the workspace of an interactive problem-solving environment. Transparent checkpointing operates without modifying the underlying application program, but it implicitly relies on a "Closed World Assumption" --- the world (including file system, network, etc.) will look the same upon restart as it did at the time of checkpoint. This ...


Using Remote Sensing Data To Predict The Spread Of Mosquito Borne Disease, Mary Ellen O'Donnell, Erika Podest 2014 California Polytechnic State University

Using Remote Sensing Data To Predict The Spread Of Mosquito Borne Disease, Mary Ellen O'Donnell, Erika Podest

STEM Teacher and Researcher (STAR) Program Posters

There is interest in how environmental variables derived from satellite data such as temperature, vegetation cover, and precipitation correlate to vector borne disease occurrence such as malaria and dengue fever. This study will be carried out using a decision tree based open source software called Random Forests to find correlations between the remote sensing variables and mosquito abundance. Software will be written in C# to take large amounts of data from the NASA satellite database and automatically format it for the Random Forest Software input. Correlations found, using Random Forests, between disease incidence and the variables can be used as ...


Digital Commons powered by bepress