Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

29750 Full-Text Articles 28994 Authors 7500827 Downloads 264 Institutions

All Articles in Computer Sciences

Faceted Search

29750 full-text articles. Page 1 of 808.

Project Renew Worcester, Danni Yue, Amy Zhang, Jing Han, Omid Ashrafi, Yiming Xu 2018 Clark University

Project Renew Worcester, Danni Yue, Amy Zhang, Jing Han, Omid Ashrafi, Yiming Xu

School of Professional Studies

n The client for this capstone project is RENEW Worcester which is a fledgling solar power project whose main goals are to bring renewable energy in the form of solar power into local, primarily low-income communities and are committed to the mission of making the transition off of fossil fuels to clean, renewable power. Based in Worcester, Massachusetts, they are a local chapter of Co-op Power which is a consumer-owned sustainable energy cooperative (co-op) made up of numerous different local chapters all over the New England area as well as the state of New York. The problem that we will ...


A Model Of Competition Between Perpetual Software And Software As A Service, Zhiling GUO, Dan MA 2018 Singapore Management University

A Model Of Competition Between Perpetual Software And Software As A Service, Zhiling Guo, Dan Ma

Research Collection School Of Information Systems

Software as a service (SaaS) has grown to be a significant segment of many software product markets. SaaS vendors, which charge customers based on use and continuously improve the quality of their products, have put competitive pressure on traditional perpetual software vendors, which charge a licensing fee and periodically upgrade the quality of their software. We develop an analytical model to study the competitive pricing strategies of an incumbent perpetual software vendor in the presence of a SaaS competitor. We find that, depending on both the SaaS quality improvement rate and the network effect, the perpetual software vendor adopts one ...


A Model Of Competition Between Perpetual Software And Software As A Service, Zhiling GUO, Dan MA 2018 Singapore Management University

A Model Of Competition Between Perpetual Software And Software As A Service, Zhiling Guo, Dan Ma

Research Collection School Of Information Systems

Software as a service (SaaS) has grown to be a significant segment of many software product markets. SaaS vendors, which charge customers based on use and continuously improve the quality of their products, have put competitive pressure on traditional perpetual software vendors, which charge a licensing fee and periodically upgrade the quality of their software. We develop an analytical model to study the competitive pricing strategies of an incumbent perpetual software vendor in the presence of a SaaS competitor. We find that, depending on both the SaaS quality improvement rate and the network effect, the perpetual software vendor adopts one ...


User-Friendly Deniable Storage For Mobile Devices, Bing CHANG, Yao CHENG, Fengwei ZHANG, Wen-Tao ZHU, Yingjiu LI, Zhan WANG 2018 Singapore Management University

User-Friendly Deniable Storage For Mobile Devices, Bing Chang, Yao Cheng, Fengwei Zhang, Wen-Tao Zhu, Yingjiu Li, Zhan Wang

Research Collection School Of Information Systems

Mobile devices are prevalently used to process sensitive data, but traditional encryption may not work when an adversary is able to coerce the device owners to disclose the encryption keys. Plausibly Deniable Encryption (PDE) is thus designed to protect sensitive data against this powerful adversary. In this paper, we present MobiPluto, a user-friendly PDE scheme for denying the existence of sensitive data stored on mobile devices. A salient difference between MobiPluto and the existing PDE systems is that any block-based file systems can be deployed on top of it. To further improve usability and deniability of MobiPluto, we introduce a ...


Universality Of Egoless Behavior Of Software Engineering Students, Pradeep Waychal, Luiz Fernando Capretz 2018 Michigan University

Universality Of Egoless Behavior Of Software Engineering Students, Pradeep Waychal, Luiz Fernando Capretz

Electrical and Computer Engineering Publications

Software organizations have relied on process and technology initiatives to compete in a highly globalized world. Unfortunately, that has led to little or no success. We propose that the organizations start working on people initiatives, such as inspiring egoless behavior among software developers. This paper proposes a multi-stage approach to develop egoless behavior and discusses the universality of the egoless behavior by studying cohorts from three different countries, i.e., Japan, India, and Canada. The three stages in the approach are self-assessment, peer validation, and action plan development. The paper covers the first stage of self-assssment using an instrument based ...


Exploring The Differences Between Human And Machine Translation, Connor Freitas, Yudong Liu 2017 Western Washington University

Exploring The Differences Between Human And Machine Translation, Connor Freitas, Yudong Liu

WWU Honors Program Senior Projects

Chinese second language learners of English often use Machine Translators (MT) to translate personal and professional messages from their first language to English. MT’s are not perfect and have historically create messages that lack the cohesiveness and authenticity of natively written English. This paper describes our attempts to quantify the differences between human translation and machine translation in a specific scope with that hope that both MTs and post editing systems can be benefited through awareness of common error and differences between human and machine translations. In order to achieve this we implemented existing algorithms designed to identify common ...


A Study Of Repetitiveness Of Code Changes In Software Evolution, Hoan Anh Nguyen, Anh Tuan Nguyen, Tung Thanh Nguyen, Tien N. Nguyen, Hridesh Rajan 2017 Iowa State University

A Study Of Repetitiveness Of Code Changes In Software Evolution, Hoan Anh Nguyen, Anh Tuan Nguyen, Tung Thanh Nguyen, Tien N. Nguyen, Hridesh Rajan

Hridesh Rajan

In this paper, we present a large-scale study of repetitiveness of code changes in software evolution. We collected a large data set of 2,841 Java projects, with 1.7 billion source lines of code (SLOC) at the latest revisions, 1.8 million code change revisions (0.4 million fixes), 6.2 million changed files, and 2.5 billion changed SLOCs. A change is considered repeated within or cross-project if it matches another change having occurred in the history of the project or another project, respectively. We report the following important findings. First, repetitiveness of changes could be as high ...


Draps: Dynamic And Resource-Aware Placement Scheme For Docker Containers In A Heterogeneous Cluster, Ying Mao 2017 The College of New Jersey

Draps: Dynamic And Resource-Aware Placement Scheme For Docker Containers In A Heterogeneous Cluster, Ying Mao

Ying Mao

Virtualization is a promising technology that has facilitated cloud computing to become the next wave of the Internet revolution. Adopted by data centers, millions of applications that are powered by various virtual machines improve the quality of services. Although virtual machines are well-isolated among each other, they suffer from redundant boot volumes and slow provisioning time. To address limitations, containers were born to deploy and run distributed applications without launching entire virtual machines. As a dominant player, Docker is an open-source implementation of container technology. When managing a cluster of Docker containers, the management tool, Swarmkit, does not take the ...


Silence, Please!: Interrupting In-Car Phone Conversations, Soledad López Gambino, Casey Kennington, David Schlangen 2017 Bielefeld University

Silence, Please!: Interrupting In-Car Phone Conversations, Soledad López Gambino, Casey Kennington, David Schlangen

Casey R. Kennington

Holding phone conversations while driving is dangerous not only because it occupies the hands, but also because it requires attention. Where driver and passenger can adapt their conversational behavior to the demands of the situation, and e.g. interrupt themselves when more attention is needed, an interlocutor on the phone cannot adjust as easily. We present a dialogue assistant which acts as 'bystander' in phone conversations between a driver and an interlocutor, interrupting them and temporarily cutting the line during potentially dangerous situations. The assistant also informs both conversation partners when the line has been cut, as well as when ...


Use Of A Classroom Response System To Enhance Classroom Interactivity, Keng Siau, Hong Sheng, Fiona Fui-Hoon Nah 2017 Missouri University of Science and Technology

Use Of A Classroom Response System To Enhance Classroom Interactivity, Keng Siau, Hong Sheng, Fiona Fui-Hoon Nah

Fiona Fui-Hoon Nah

Classroom interactivity is a critical component of teaching and learning. This paper reports on the use of a classroom response system to enhance classroom interactivity in a systems analysis and design course. The success of the project was assessed using both quantitative and qualitative data. A pretest/posttest design was used to examine the effects of a classroom response system on interactivity. The results show that a classroom response system can significantly improve classroom interactivity. Qualitative data was also collected to identify the strengths and weaknesses of using a classroom response system to enhance classroom interaction. Based on the quantitative ...


Social Link, Samy Achour, Christina Berardi, Paul Harnack, Dylan Davis 2017 Chapman University

Social Link, Samy Achour, Christina Berardi, Paul Harnack, Dylan Davis

Student Research Day Abstracts and Posters

Employers often trawl applicants’ social media presences for objectionable behavior. We are creating a business facing application that streamlines the process, combining API data from LinkedIn with that of Twitter and cross referencing them. The difficulty comes down in aligning user profiles with different sets of attributes. For example, given an arbitrary applicant the LinkedIn API might give current city, university, and work history but Twitter might just have the current city. Being able to match these values and pinpoint specific profiles will take some time and a finely tuned algorithm. The final product will have a web-based UI that ...


Understanding Group Communication In Capacity Building In Cyberinfrastructure (Ci), Raizi Simons, Andrew Schrock, Kerk Kee 2017 Chapman University

Understanding Group Communication In Capacity Building In Cyberinfrastructure (Ci), Raizi Simons, Andrew Schrock, Kerk Kee

Student Research Day Abstracts and Posters

Cyberinfrastructure (CI) is composed of many characteristics and layers, in which individuals working with a network of supercomputers in the technological world, understand how to connect and communicate efficiently. In this poster, we will distinguish how group communication (i.e. education) among Cyberinfrastructure (CI) stakeholders helps build and grow an organization’s capacity, or the ability of an organization to accomplish its mission effectively (Eisinger, 2002, p. 128). “Stakeholders garner more capacity to develop better Cyberinfrastructure (CI) tools, improve complex analysis of big data, grow the size of their team, and produce stronger publication” (Kee & Schrock, 2017, p. 17). This ...


Constrained Sequence Alignment, Kyle Daling 2017 Western Washington University

Constrained Sequence Alignment, Kyle Daling

WWU Honors Program Senior Projects

Constrained Sequence Alignment: A new algorithm designed to help biologists produce better alignment for protein sequences.


Data Sets For User Reviews On Drugs, Dr. Muhammad Zubair Asghar 2017 ICIT, Gomal University, Dera Ismail Khan

Data Sets For User Reviews On Drugs, Dr. Muhammad Zubair Asghar

Dr. Muhammad Zubair Asghar

This document provides detail of datasets used by Maria Qasim during her MS-CS research under the supervision of Dr. Muhammad Zubair Asghar


Data Sets For User Reviews On Drugs, Dr. Muhammad Zubair Asghar, Maria Qasim 2017 Institute of Computing and Information Technology, Gomal University

Data Sets For User Reviews On Drugs, Dr. Muhammad Zubair Asghar, Maria Qasim

Dr. Muhammad Zubair Asghar

This document provides detail of data sets used by Maria Qasim during her MS-CS research under the supervision of Dr. Muhammad Zubair Asghar


Vkse-Mo: Verifiable Keyword Search Over Encrypted Data In Multi-Owner Settings, Yinbin MIAO, Jianfeng MA, Ximeng LIU, Junwei ZHANG, Zhiquan LIU 2017 Xidian University

Vkse-Mo: Verifiable Keyword Search Over Encrypted Data In Multi-Owner Settings, Yinbin Miao, Jianfeng Ma, Ximeng Liu, Junwei Zhang, Zhiquan Liu

Research Collection School Of Information Systems

Searchable encryption (SE) techniques allow cloud clients to easily store data and search encrypted data in a privacy-preserving manner, where most of SE schemes treat the cloud server as honest-but-curious. However, in practice, the cloud server is a semi-honest-but-curious third-party, which only executes a fraction of search operations and returns a fraction of false search results to save its computational and bandwidth resources. Thus, it is important to provide a results verification method to guarantee the correctness of the search results. Existing SE schemes allow multiple data owners to upload different records to the cloud server, but these schemes have ...


Extracting Implicit Suggestions From Students’ Comments – A Text Analytics Approach, Venky SHANKARARAMAN, Swapna GOTTIPATI, Jeff Rongsheng LIN 2017 Singapore Management University

Extracting Implicit Suggestions From Students’ Comments – A Text Analytics Approach, Venky Shankararaman, Swapna Gottipati, Jeff Rongsheng Lin

Research Collection School Of Information Systems

At theend of each course, students are required to give feedback on the course andinstructor. This feedback includes quantitative rating using Likert scale andqualitative feedback as comments. Such qualitative feedback can providevaluable insights in helping the instructor enhance the course content andteaching delivery. However, the main challenge in analysing the qualitativefeedback is the perceived increase in time and effort needed to manually processthe textual comments. In this paper, we provide an automated solution foranalysing comments, specifically extracting implicit suggestions from thestudents’ qualitative feedback comments. The implemented solution leveragesexisting text mining and data visualization techniques and comprises three stages namely datapre-processing ...


Using Data Analytics For Discovering Library Resource Insights – Case From Singapore Management University, Ning LU, Rui SONG, Dina HENG, Swapna GOTTIPATI, Chee Hsien Aaron (ZHENG Zhixian) TAY, Aaron TAY 2017 Singapore Management University

Using Data Analytics For Discovering Library Resource Insights – Case From Singapore Management University, Ning Lu, Rui Song, Dina Heng, Swapna Gottipati, Chee Hsien Aaron (Zheng Zhixian) Tay, Aaron Tay

Research Collection School Of Information Systems

Library resources are critical in supporting teaching, research and learning processes. Several universities have employed online platforms and infrastructure for enabling the online services to students, faculty and staff. To provide efficient services by understanding and predicting user needs libraries are looking into the area of data analytics. Library analytics in Singapore Management University is the project committed to provide an interface for data-intensive project collaboration, while supporting one of the library’s key pillars on its commitment to collaborate on initiatives with SMU Communities and external groups. In this paper, we study the transaction logs for user behavior analysis ...


Web Application For Graduate Course Advising System, Sanjay Karrolla 2017 California State University, San Bernardino

Web Application For Graduate Course Advising System, Sanjay Karrolla

Electronic Theses, Projects, and Dissertations

The main aim of the course recommendation system is to build a course recommendation path for students to help them plan courses to successfully graduate on time. The Model-View-Controller (MVC) architecture is used to isolate the user interface (UI) design from the business logic. The front-end of the application develops the UI using AngularJS. The front-end design is done by gathering the functionality system requirements -- input controls, navigational components, informational components and containers and usability testing. The back-end of the application involves setting up the database and server-side routing. Server-side routing is done using Express JS.


Web Application For Graduate Course Recommendation System, Sayali Dhumal 2017 California State University, San Bernardino

Web Application For Graduate Course Recommendation System, Sayali Dhumal

Electronic Theses, Projects, and Dissertations

The main aim of the course advising system is to build a course recommendation path for students to help them plan courses to successfully graduate on time. The recommendation path displays the list of courses a student can take in each quarter from the first quarter after admission until the graduation quarter. The courses are filtered as per the student’s interest obtained from a questionnaire asked to the student.

The business logic involves building the recommendation algorithm. Also, the application is functionality-tested end-to-end by using nightwatch.js which is built on top of node.js. Test cases are written ...


Digital Commons powered by bepress