Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

11,577 Full-Text Articles 10,665 Authors 2,654,364 Downloads 142 Institutions

All Articles in Computer Sciences

Faceted Search

11,577 full-text articles. Page 1 of 200.

Chatter: Classifying Malware Families Using System Event Ordering, Aziz Mohaisen, Andrew G. West, Allison Mankin, Omar Alrawi 2014 SelectedWorks

Chatter: Classifying Malware Families Using System Event Ordering, Aziz Mohaisen, Andrew G. West, Allison Mankin, Omar Alrawi

Andrew G. West

Using runtime execution artifacts to identify malware and its associated "family" is an established technique in the security domain. Many papers in the literature rely on explicit features derived from network, file system, or registry interaction. While effective, use of these fine-granularity data points makes these techniques computationally expensive. Moreover, the signatures and heuristics this analysis produces are often circumvented by subsequent malware authors.

To this end we propose CHATTER, a system that is concerned only with the order in which high-level system events take place. Individual events are mapped onto an alphabet and execution traces are captured via terse ...


Is There Progress Toward Sustainability?: Despite The Inherent Human Resistance To Change., Jens Pohl 2014 California Polytechnic State University

Is There Progress Toward Sustainability?: Despite The Inherent Human Resistance To Change., Jens Pohl

Collaborative Agent Design (CAD) Research Center

The theme of this paper is to briefly survey the status of current efforts to maintain our natural environment and then discuss prospects for achieving future sustainability. The author finds that while there has been general recognition of the need for environmental sensitivity and conservation of natural resources, progress toward achieving sustainability goals has been slow. A principal reason for this lack of action is found in the reactive nature of the human species. Situated by biological design in our environment we typically respond to environmental changes only after they have occurred. Accordingly, while a number of revolutionary proposals have ...


Abstract Disjunctive Answer Set Solvers, Remi Brochenin, Yuliya Lierler, Marco Maratea 2014 University of Nebraska Omaha

Abstract Disjunctive Answer Set Solvers, Remi Brochenin, Yuliya Lierler, Marco Maratea

Computer Science Faculty Proceedings & Presentations

A fundamental task in answer set programming is to compute answer sets of logic programs. Answer set solvers are the programs that perform this task. The problem of deciding whether a disjunctive program has an answer set isΣP2 -complete. The high complexity of reasoning within disjunctive logic programming is responsible for few solvers capable of dealing with such programs, namely DLV, GNT, CMODELS and CLASP. We show that transition systems introduced by Nieuwenhuis, Oliveras, and Tinelli to model and analyze satisfiability solvers can be adapted for disjunctive answer set solvers. In particular, we present transition systems for CMODELS ...


Multi-Scale Modeling Of Microbial Defection In The Presence Of Antibiotics, Darshan Dilip Nahar 2014 Utah State University

Multi-Scale Modeling Of Microbial Defection In The Presence Of Antibiotics, Darshan Dilip Nahar

All Graduate Theses and Dissertations

Iterative competition between organisms for limited resources gives rise to different social strategies including cooperation. One specific problem in the cooperating but competing species in that cost associated in exhibiting cooperative traits provokes "cheating". Cheaters acquire relatively higher fitness by reaping the benefits of cooperation without contributing towards community beneficial goods. While the relatively fit cheaters can drive the contributors to extinction, the contributors exhibit different strategies to gain preferential benefits of cooperation. The facultative benefit of cooperation to cheaters drives the population to an equilibrium frequency of cooperators and cheaters. Here we develop a multi-scale modeling approach to simulate ...


Data, Analytics And Community-Based Organizations: Transforming Data To Decisions For Community Development, Michael P. Johnson Jr. 2014 University of Massachusetts Boston

Data, Analytics And Community-Based Organizations: Transforming Data To Decisions For Community Development, Michael P. Johnson Jr.

Michael P. Johnson

The past ten years have seen a revolution in two disciplines related to operations and strategy design. ‘Big Data’ has transformed the theory and practice of producing and selling goods and services through methods associated with computer science and information technology. ‘Analytics’ has popularized primarily quantitative models and methods by which organizations and systems can measure about multiple measures of performance. As these disciplines rely on information technology to collect, store, process and share data, we refer to the collection of knowledge and applications associated with Big Data and analytics as ‘data analytics and information technology’. The impacts of data ...


Streets: Game-Theoretic Traffic Patrolling With Exploration And Exploitation, Matthew Brown, Sandhya Saisubramanian, Pradeep Reddy Varakantham, Milind Tambe 2014 Singapore Management University

Streets: Game-Theoretic Traffic Patrolling With Exploration And Exploitation, Matthew Brown, Sandhya Saisubramanian, Pradeep Reddy Varakantham, Milind Tambe

Research Collection School Of Information Systems

No abstract provided.


Metadata-Driven Threat Classification Of Network Endpoints Appearing In Malware, Andrew G. West, Aziz Mohaisen 2014 SelectedWorks

Metadata-Driven Threat Classification Of Network Endpoints Appearing In Malware, Andrew G. West, Aziz Mohaisen

Andrew G. West

Networked machines serving as binary distribution points, C&C channels, or drop sites are a ubiquitous aspect of malware infrastructure. By sandboxing malcode one can extract the network endpoints (i.e., domains and URL paths) contacted during execution. Some endpoints are benign, e.g., connectivity tests. Exclusively malicious destinations, however, can serve as signatures enabling network alarms. Often these behavioral distinctions are drawn by expert analysts, resulting in considerable cost and labeling latency.

Leveraging 28,000 expert-labeled endpoints derived from ~100k malware binaries this paper characterizes those domains/URLs towards prioritizing manual efforts and automatic signature generation. Our analysis focuses ...


Pathway Pioneer: Heterogenous Server Architecture For Scientific Visualization And Pathway Search In Metabolic Network Using Informed Search, Vipul Kantilal Oswal 2014 Utah State University

Pathway Pioneer: Heterogenous Server Architecture For Scientific Visualization And Pathway Search In Metabolic Network Using Informed Search, Vipul Kantilal Oswal

All Graduate Theses and Dissertations

There is a huge demand for analysis and visualization of the biological models. PathwayPioneer is a web-based tool to analyze and visually represent complex biological models. PathwayPioneer generates the initial layout of the model and allows users to customize it. It is developed using .net technologies (C#) and hosted on the Internet Information Service (IIS) server. At back-end it interacts with python-based COBRApy library for biological calculations like Flux Balance Analysis (FBA). We have developed a parallel processing architecture to accommodate processing of large models and enable message-based communication between the .net webserver and python engine. We compared the performance ...


Evaluation Of Ct Images Created Using A New Metal Artifact Reduction Reconstruction Algorithm For Radiation Therapy Treatment Planning, John Niemkiewicz, Andrew G. Palmiotti, Marc S. Miner, Lee E. Stunja, Jenelle Bergene 2014 Lehigh Valley Health Network

Evaluation Of Ct Images Created Using A New Metal Artifact Reduction Reconstruction Algorithm For Radiation Therapy Treatment Planning, John Niemkiewicz, Andrew G. Palmiotti, Marc S. Miner, Lee E. Stunja, Jenelle Bergene

Department of Radiation Oncology

No abstract provided.


Preliminary Test Of A Real-Time, Interactive Silent Speech Interface Based On Electromagnetic Articulograph, Jun Wang, Ashok Samal, Jordan R. Green 2014 University of Nebraska - Lincoln

Preliminary Test Of A Real-Time, Interactive Silent Speech Interface Based On Electromagnetic Articulograph, Jun Wang, Ashok Samal, Jordan R. Green

CSE Conference and Workshop Papers

A silent speech interface (SSI) maps articulatory movement data to speech output. Although still in experimental stages, silent speech interfaces hold significant potential for facilitating oral communication in persons after laryngectomy or with other severe voice impairments. Despite the recent efforts on silent speech recognition algorithm development using offline data analysis, online test of SSIs have rarely been conducted. In this paper, we present a preliminary, online test of a real-time, interactive SSI based on electromagnetic motion tracking. The SSI played back synthesized speech sounds in response to the user’s tongue and lip movements. Three English talkers participated in ...


Rockfall Detection From Terrestrial Lidar Point Clouds: A Clustering Approach Using R, Marj Tonini, Antonio Abellan 2014 The University of Maine

Rockfall Detection From Terrestrial Lidar Point Clouds: A Clustering Approach Using R, Marj Tonini, Antonio Abellan

Journal of Spatial Information Science

In this study we analyzed a series of terrestrial LiDAR point clouds acquired over a cliff in Puigcercos (Catalonia Spain). The objective was to detect and extract individual rockfall events that occurred during a time span of six months and to investigate their spatial distribution. To this end local and global cluster algorithms were applied. First we used the nearest neighbor clutter removal (NNCR) method in combination with the expectation-maximization (EM) algorithm to separate feature points from clutter; then a density based algorithm (DBSCAN) allowed us to isolate the single cluster features which represented the rockfall events. Finally we estimated ...


Dissemination And Geovisualization Of Territorial Entities' History, Christine Plumejeaud, Eric Grosso, Benjamin Parent 2014 The University of Maine

Dissemination And Geovisualization Of Territorial Entities' History, Christine Plumejeaud, Eric Grosso, Benjamin Parent

Journal of Spatial Information Science

This paper describes an innovative solution for geovisualization of the demographic and administrative history of French municipalities named "communes" in French. This solution allows for the open dissemination of such data. The challenge is to provide a web interface for unskilled users in order to help them understand complex information about the demographic evolution of French territories. Our approach combines interactive thematic spatial and temporal views. We describe our architecture based on open-source technologies and the organization of this imperfect geo-historical information in our spatiotemporal database. Our second contribution concerns the concept of an acquaintance graph that has been used ...


The Open Source Dynamics In Geospatial Research And Education, Olivier Ertz, Sergio J. Rey, Stéphane Joost 2014 The University of Maine

The Open Source Dynamics In Geospatial Research And Education, Olivier Ertz, Sergio J. Rey, Stéphane Joost

Journal of Spatial Information Science

No abstract provided.


Geo-Social Visual Analytics, Wei Luo, Alan M. MacEachren 2014 The University of Maine

Geo-Social Visual Analytics, Wei Luo, Alan M. Maceachren

Journal of Spatial Information Science

Spatial analysis and social network analysis typically consider social processes in their own specific contexts either geographical or network space. Both approaches demonstrate strong conceptual overlaps. For example actors close to each other tend to have greater similarity than those far apart; this phenomenon has different labels in geography (spatial autocorrelation) and in network science (homophily). In spite of those conceptual and observed overlaps the integration of geography and social network context has not received the attention needed in order to develop a comprehensive understanding of their interaction or their impact on outcomes of interest such as population health behaviors ...


Integrating Cross-Scale Analysis In The Spatial And Temporal Domains For Classification Of Behavioral Movement, Ali Soleymani, Jonathan Cachat, Kyle Robinson, Somayeh Dodge, Allan Kalueff, Robert Weibel 2014 The University of Maine

Integrating Cross-Scale Analysis In The Spatial And Temporal Domains For Classification Of Behavioral Movement, Ali Soleymani, Jonathan Cachat, Kyle Robinson, Somayeh Dodge, Allan Kalueff, Robert Weibel

Journal of Spatial Information Science

Since various behavioral movement patterns are likely to be valid within different unique ranges of spatial and temporal scales (e.g. instantaneous diurnal or seasonal) with the corresponding spatial extents a cross-scale approach is needed for accurate classification of behaviors expressed in movement. Here we introduce a methodology for the characterization and classification of behavioral movement data that relies on computing and analyzing movement features jointly in both the spatial and temporal domains. The proposed methodology consists of three stages. In the first stage focusing on the spatial domain the underlying movement space is partitioned into several zonings that correspond ...


Banner Document Management: Remarkable Improvements, Pat Maxwell, Patty Pfister 2014 The College at Brockport: State University of New York

Banner Document Management: Remarkable Improvements, Pat Maxwell, Patty Pfister

ITS Publications and Presentations

In 2013, The College at Brockport was presented with the Ellucian Inspire Award for achieving measurable improvements in the College’s admissions and student record/business processes through the application of Banner® Document Management (BDM) and EMC ApplicationXtender® along with local modifications that extended BDM functionality. Since 2010, the College at Brockport’s document imaging project team has worked closely with campus service departments to create a collaborative process of imaged document sharing based on best practices defined by the collective departments. Key desired improvements to the BDM product include Population Selection access to document index values from locally created ...


On The Applications Of Lifting Techniques, Esmaeil Mehrabi 2014 Western University

On The Applications Of Lifting Techniques, Esmaeil Mehrabi

University of Western Ontario - Electronic Thesis and Dissertation Repository

Lifting techniques are some of the main tools in solving a variety of different computational problems related to the field of computer algebra. In this thesis, we will consider two fundamental problems in the fields of computational algebraic geometry and number theory, trying to find more efficient algorithms to solve such problems.

The first problem, solving systems of polynomial equations, is one of the most fundamental problems in the field of computational algebraic geometry. In this thesis, We discuss how to solve bivariate polynomial systems over either k(T ) or Q using a combination of lifting and modular composition techniques ...


Simexplorer: A Testing Framework To Detect Elusive Software Faults, Tingting Yu 2014 University of Nebraska - Lincoln

Simexplorer: A Testing Framework To Detect Elusive Software Faults, Tingting Yu

Computer Science and Engineering: Theses, Dissertations, and Student Research

Modern computer software systems are prone to various classes of runtime faults due to their reliance on features such as concurrency and peripheral devices such as sensors. Testing remains a common method for uncovering faults in these systems. However, commonly used testing techniques that execute the program with test inputs and inspect program outputs to detect failures are often ineffective on these systems. In addition, existing testing techniques focus primarily on single applications, neglecting elusive faults that occur at the whole-system level due to complex system event interactions.

This research provides a framework, SIMEXPLORER, that allows engineers to effectively test ...


Power Management In The Cluster System, Leping Wang 2014 University of Nebraska - Lincoln

Power Management In The Cluster System, Leping Wang

Computer Science and Engineering: Theses, Dissertations, and Student Research

With growing cost of electricity, the power management of server clusters has become an important problem. However, most previous researchers have only addressed the challenge in traditional homogeneous environments. Considering the increasing popularity of heterogeneous and virtualized systems, this thesis develops a series of efficient algorithms respectively for power management of heterogeneous soft real-time clusters and a virtualized cluster system. It is built on simple but effective mathematical models. When deployed to a new platform, the software incurs low configuration cost because no extensive performance measurements and profiling are required. Built upon optimization, queuing theory and control theory techniques, our ...


Private Void Death / Death, Zack Hardy 2014 University of Massachusetts - Amherst

Private Void Death / Death, Zack Hardy

mOthertongue

No abstract provided.


Digital Commons powered by bepress