Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

26927 Full-Text Articles 25172 Authors 5838073 Downloads 238 Institutions

All Articles in Computer Sciences

Faceted Search

26927 full-text articles. Page 1 of 692.

Mixed-Initiative Personal Assistants, Joshua W. Buck 2017 University of Dayton

Mixed-Initiative Personal Assistants, Joshua W. Buck

Computer Science Faculty Publications

Specification and implementation of flexible human-computer dialogs is challenging because of the complexity involved in rendering the dialog responsive to a vast number of varied paths through which users might desire to complete the dialog. To address this problem, we developed a toolkit for modeling and implementing task-based, mixed-initiative dialogs based on metaphors from lambda calculus. Our toolkit can automatically operationalize a dialog that involves multiple prompts and/or sub-dialogs, given a high-level dialog specification of it. Our current research entails incorporating the use of natural language to make the flexibility in communicating user utterances commensurate with that in dialog ...


Malware Detection Using The Index Of Coincidence, Bhavna Gurnani 2017 San Jose State University

Malware Detection Using The Index Of Coincidence, Bhavna Gurnani

Master's Projects

In this research, we apply the Index of Coincidence (IC) to problems in malware analysis. The IC, which is often used in cryptanalysis of classic ciphers, is a technique for measuring the repeat rate in a string of symbols. A score based on the IC is applied to a variety of challenging malware families. We nd that this relatively simple IC score performs surprisingly well, with superior results in comparison to various machine learning based scores, at least in some cases.


Product Authentication Using Hash Chains And Printed Qr Codes, Harshith R. Keni 2017 South Dakota

Product Authentication Using Hash Chains And Printed Qr Codes, Harshith R. Keni

Harshith Keni

This thesis explores the usage of simple printed tags for authenticating products. Printed tags are a cheap alternative to RFID and other tag based systems and do not require specialized equipment. Due to the simplistic nature of such printed codes, many security issues like tag impersonation, server impersonation, reader impersonation, replay attacks and denial of service present in RFID based solutions need to be handled differently. An algorithm that utilizes hash chains to secure such simple tags while still keeping cost low is discussed. The security characteristics of this scheme as well as other product authentication schemes that use RFID ...


Let’S Try Something New: Service Learning In Boise State's Computer Science Department, Daniel Kondratyuk 2017 Boise State University

Let’S Try Something New: Service Learning In Boise State's Computer Science Department, Daniel Kondratyuk

International Journal of Undergraduate Community Engagement

In this article I explain how a group of Computer Science students at Boise State University participated in a new service learning project. I provide a few testimonials on the students’ experiences and describe the rewarding aspects of service learning in the greater Computer Science community.


Enabling Sustainable Bulk Transfer In Environmentally-Powered Wireless Sensor Networks, Alvin Cerdena VALERA, Wee-Seng SOH, Hwee-Pink TAN 2017 Singapore Management University

Enabling Sustainable Bulk Transfer In Environmentally-Powered Wireless Sensor Networks, Alvin Cerdena Valera, Wee-Seng Soh, Hwee-Pink Tan

Research Collection School Of Information Systems

We address the problem of transferring bulk data in environmentally-powered wireless sensor networks where duty cycle compliance is critical for their uninterrupted operation. We propose Pump-and-Nap, a packet train forwarding technique that maximizes throughput while simultaneously enforcing compliance to dynamic duty cycle limitations. A node using Pump-and-Nap operates by pumping a train of packets followed by a napping period where the node forgoes any transmission. Pump-and-Nap employs an adaptive controller to periodically compute the optimal capacity, that is, the maximum number of packets a node can receive and transmit in a train, given its duty cycle constraint. The controller uses ...


A New Frontier: But For Whom? An Analysis Of The Micro-Computer And Women’S Declining Participation In Computer Science, Eliana Keinan 2017 Claremont McKenna College

A New Frontier: But For Whom? An Analysis Of The Micro-Computer And Women’S Declining Participation In Computer Science, Eliana Keinan

CMC Senior Theses

Though women’s participation in science, technology, engineering, and mathematics (STEM) fields has greatly increased over the past 60 years, women’s participation in computer science peaked in the 1980s. The paper searches for key motivators for women entering computer science at the peak in order to isolate factors for the subsequent steep decline. A major finding of the paper is that having a computer at home is (weakly) statistically significant as a determinant for female students choosing to pursue computer science. This relationship is insignificant for students in other STEM and non-STEM fields. A final section of the paper ...


Health Portal Functionality And The Use Of Patient-Centered Technology, Anita Joyce Simmons 2017 Walden University

Health Portal Functionality And The Use Of Patient-Centered Technology, Anita Joyce Simmons

Walden Dissertations and Doctoral Studies

Health portals are dedicated web pages for medical practices to provide patients access to their electronic health records. The problem identified in this quality improvement project was that the health portal in the urgent care setting had not been available to staff nor patients. To provide leadership with information related to opening the portal, the first purpose of the project was to assess staff and patients' perceived use, ease of use, attitude toward using, and intention to use the portal. The second purpose was to evaluate the portal education materials for the top 5 urgent care diagnoses: diabetes, hypertension, asthma ...


Long And Short-Range Air Navigation On Spherical Earth, Nihad E. Daidzic 2017 AAR Aerospace Consulting, LLC

Long And Short-Range Air Navigation On Spherical Earth, Nihad E. Daidzic

International Journal of Aviation, Aeronautics, and Aerospace

Global range air navigation implies non-stop flight between any two airports on Earth. Such effort would require airplanes with the operational air range of at least 12,500 NM which is about 40-60% longer than anything existing in commercial air transport today. Air transportation economy requires flying shortest distance, which in the case of spherical Earth are Orthodrome arcs. Rhumb-line navigation has little practical use in long-range flights, but has been presented for historical reasons and for comparison. Database of about 50 major international airports from every corner of the world has been designed and used in testing and route ...


Abstract Template Resrb 2017, Wojciech M. Budzianowski 2016 Wroclaw University of Technology

Abstract Template Resrb 2017, Wojciech M. Budzianowski

Wojciech Budzianowski

No abstract provided.


Order Form Resrb 2017, Wojciech M. Budzianowski 2016 Wroclaw University of Technology

Order Form Resrb 2017, Wojciech M. Budzianowski

Wojciech Budzianowski

No abstract provided.


C.V., Wojciech M. Budzianowski 2016 Wroclaw University of Technology

C.V., Wojciech M. Budzianowski

Wojciech Budzianowski

-


Threats To Information Protection - Industry And Academic Perspectives: An Annotated Bibliography, Michael E. Whitman, Herbert J. Mattord 2016 Kennesaw State University

Threats To Information Protection - Industry And Academic Perspectives: An Annotated Bibliography, Michael E. Whitman, Herbert J. Mattord

Journal of Cybersecurity Education, Research and Practice

Threats to information assets have always been a concern to those responsible for making information useful and defending its value. The concepts of threat, threat agent, threat events and threat sources have evolved in recent years have very precise definitions. A summary of threat classification models used in academic research is provided along with a summary of recent industry threat assessment reports. Finally, the results from a recent study, 2015 SEC/CISE Threats to Information Protection Report Including a Current Snapshot of the State of the Industry, are given.


Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia 2016 University of North Georgia

Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia

Journal of Cybersecurity Education, Research and Practice

The GenCyber program is jointly sponsored by the National Security Agency (NSA) and the National Science Foundation (NSF) to help faculty and cybersecurity experts provide summer cybersecurity camp experiences for K-12 students and teachers. The main objective of the program is to attract, educate, and motivate a new generation of young men and women to help address the nationwide shortage of trained cybersecurity professionals. The curriculum is flexible and centers on ten cybersecurity first principles. Currently, GenCyber provides cyber camp options for three types of audiences: students, teachers, and a combination of both teachers and students. In 2016, over 120 ...


Towards An In-Depth Understanding Of Deep Packet Inspection Using A Suite Of Industrial Control Systems Protocol Packets, Guillermo A. Francia III, Xavier P. Francia, Anthony M. Pruitt 2016 Jacksonville State University

Towards An In-Depth Understanding Of Deep Packet Inspection Using A Suite Of Industrial Control Systems Protocol Packets, Guillermo A. Francia Iii, Xavier P. Francia, Anthony M. Pruitt

Journal of Cybersecurity Education, Research and Practice

Industrial control systems (ICS) are increasingly at risk and vulnerable to internal and external threats. These systems are integral part of our nation’s critical infrastructures. Consequently, a successful cyberattack on one of these could present disastrous consequences to human life and property as well. It is imperative that cybersecurity professionals gain a good understanding of these systems particularly in the area of communication protocols. Traditional Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are made to encapsulate some of these ICS protocols which may enable malicious payload to get through the network firewall and thus, gain entry into ...


From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth 2016 Kennesaw State University

From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth

Journal of Cybersecurity Education, Research and Practice

Welcome to the second issue of the Journal of Cybersecurity Education, Research and Practice (JCERP).


Mapping Neighborhood Scale Survey Responses With Uncertainty Metrics, Charles R. Ehlschlaeger, Yizhao Gao, James D. Westervelt, Robert C. Lozar, Marina V. Drigo, Jeffrey A. Burkhalter, Carey L. Baxter, Matthew D. Hiett, Natalie R. Myers, Ellen R. Hartman 2016 University of Illinois

Mapping Neighborhood Scale Survey Responses With Uncertainty Metrics, Charles R. Ehlschlaeger, Yizhao Gao, James D. Westervelt, Robert C. Lozar, Marina V. Drigo, Jeffrey A. Burkhalter, Carey L. Baxter, Matthew D. Hiett, Natalie R. Myers, Ellen R. Hartman

Journal of Spatial Information Science

This paper presents a methodology of mapping population-centric social, infrastructural, and environmental metrics at neighborhood scale. This methodology extends traditional survey analysis methods to create cartographic products useful in agent-based modeling and geographic information analysis. It utilizes and synthesizes survey microdata, sub-upazila attributes, land use information, and ground truth locations of attributes to create neighborhood scale multi-attribute maps. Monte Carlo methods are employed to combine any number of survey responses to stochastically weight survey cases and to simulate survey cases' locations in a study area. Through such Monte Carlo methods, known errors from each of the input sources can be ...


Provenance And Credibility In Spatial And Platial Data, Grant McKenzie, Martin Raubal, Krzysztof Janowicz, Andrew Flanagin 2016 University of Maryland

Provenance And Credibility In Spatial And Platial Data, Grant Mckenzie, Martin Raubal, Krzysztof Janowicz, Andrew Flanagin

Journal of Spatial Information Science

No abstract provided.


Trajectory Data Mining: A Review Of Methods And Applications, Jean Damascène Mazimpaka, Sabine Timpf 2016 University of Augsburg

Trajectory Data Mining: A Review Of Methods And Applications, Jean Damascène Mazimpaka, Sabine Timpf

Journal of Spatial Information Science

The increasing use of location-aware devices has led to an increasing availability of trajectory data. As a result, researchers devoted their efforts to developing analysis methods including different data mining methods for trajectories. However, the research in this direction has so far produced mostly isolated studies and we still lack an integrated view of problems in applications of trajectory mining that were solved, the methods used to solve them, and applications using the obtained solutions. In this paper, we first discuss generic methods of trajectory mining and the relationships between them. Then, we discuss and classify application problems that were ...


Enhancing Building Footprints With Squaring Operations, Imran Lokhat, Guillaume Touya 2016 IGN - COGIT team

Enhancing Building Footprints With Squaring Operations, Imran Lokhat, Guillaume Touya

Journal of Spatial Information Science

Whatever the data source, or the capture process, the creation of a building footprint in a geographical dataset is error prone. Building footprints are designed with square angles, but once in a geographical dataset, the angles may not be exactly square. The almost-square angles blur the legibility of the footprints when displayed on maps, but might also be propagated in further applications based on the footprints, e.g., 3D city model construction. This paper proposes two new methods to square such buildings: a simple one, and a more complex one based on nonlinear least squares. The latter squares right and ...


Mixed Map Labeling, Maarten Löffler, Martin Nöllenburg, Frank Staals 2016 Utrecht University

Mixed Map Labeling, Maarten Löffler, Martin Nöllenburg, Frank Staals

Journal of Spatial Information Science

Point feature map labeling is a geometric visualization problem, in which a set of input points must be labeled with a set of disjoint rectangles (the bounding boxes of the label texts). It is predominantly motivated by label placement in maps but it also has other visualization applications. Typically, labeling models either use internal labels, which must touch their feature point, or external (boundary) labels, which are placed outside the input image and which are connected to their feature points by crossing-free leader lines. In this paper we study polynomial-time algorithms for maximizing the number of internal labels in a ...


Digital Commons powered by bepress