Ansi/Niso Z39.99-2017 Resourcesync Framework Specification, 2017 Old Dominion University
Ansi/Niso Z39.99-2017 Resourcesync Framework Specification, Kevin Ruthen, Jill Emery, Mark Doyle, Mark Needleman, Sue Baughman, Evan Owens, Oliver Pesch, Mike Dicus, Nassib Nassar, Tim Auger, Amy Kirchhoff, Sally Mccallum, Diana Magnoni, Paul Swanson, Gregory Grazevich, Nara Newcomer, Gregory Grazevich, Juha Hakala, Barbara Rapp, Beverly Geckle, Carol Brent, Gary Van Overborg, Rick Burke, Kristin Antelman, Scott Bernier, Pascal Calarco, John Dove, Lucy Harrison, Peter Murray, Christine Stohn, Julie Zhu, Todd Carpenter, Bernhard Haslhofer, Richard Jones, Martin Klein, Graham Klyne, Carl Lagoze, Stuart Lewis, Peter Murray, Michael Nelson, Shlomo Sanders, Robert Sanderson, Herbert Van De Sompel, Paul Walk, Simeon Warner, Zhiwu Xie, Jeff Young
Computer Science Faculty Publications
This ResourceSync specification describes a synchronization framework for the web consisting of various capabilities that allow third-party systems to remain synchronized with a server’s evolving resources. The capabilities may be combined in a modular manner to meet local or community requirements. This specification also describes how a server should advertise the synchronization capabilities it supports and how third-party systems may discover this information. The specification repurposes the document formats defined by the Sitemap protocol and introduces extensions for them.
Easing Cross-Border Communication: Mobile-Mediated Communication And Its Framework, 2017 Rhode Island College
Easing Cross-Border Communication: Mobile-Mediated Communication And Its Framework, Kyungsub Choi, Young Soo Kim
Research Collection School Of Computing and Information Systems
Communication is probably the most critical component of an organization engaged in a cross-border collaboration. Today’s smart devices substantially contribute to such communication. Combined with social media, mobile communication technologies are becoming the main platform for many core functions within organizations. In this paper, we identified seven media identifiable attributes: synchronicity (SYN), de-individuation and co-presence (DCP), accessibility readiness (ARD), cognizance of environment change (CEC), wearability-portability (WRB) modality-select (MDS) and visibility (VSB). These seven attributes significantly impact the course of mobile-mediated communication. We believe that development of a theoretical perspective that embraces the complexity of mobile-mediated communication is due in order …
Infodemiology For Syndromic Surveillance Of Dengue And Typhoid Fever In The Philippines, 2017 Ateneo de Manila University
Infodemiology For Syndromic Surveillance Of Dengue And Typhoid Fever In The Philippines, Ma. Regina Justina E. Estuar, Kennedy E. Espina
Department of Information Systems & Computer Science Faculty Publications
Finding determinants of disease outbreaks before its occurrence is necessary in reducing its impact in populations. The supposed advantage of obtaining information brought by automated systems fall short because of the inability to access real-time data as well as interoperate fragmented systems, leading to longer transfer and processing of data. As such, this study presents the use of realtime latent data from social media, particularly from Twitter, to complement existing disease surveillance efforts. By being able to classify infodemiological (health-related) tweets, this study is able to produce a range of possible disease incidences of Dengue and Typhoid Fever within the …
A Multi-Model Approach In Developing An Intelligent Assistant For Diagnosis Recommendation In Clinical Health Systems, 2017 Ateneo de Manila University
A Multi-Model Approach In Developing An Intelligent Assistant For Diagnosis Recommendation In Clinical Health Systems, Christian E. Pulmano, Ma. Regina Justina E. Estuar
Department of Information Systems & Computer Science Faculty Publications
Clinical health information systems capture massive amounts of unstructured data from various health and medical facilities. This study utilizes unstructured patient clinical text data to develop an intelligent assistant that can identify possible related diagnoses based on a given text input. The approach applies a one-vs-rest binary classification technique wherein given an input text data, it is identified whether it can be positively or negatively classified for a given diagnosis. Multi-layer Feed-Forward Neural Network models were developed for each individual diagnosis case. The task of the intelligent assistant is to iterate over all the different models and return those that …
Exploratory Analysis Of Discourses Between Students Engaged In A Debugging Task, 2017 Ateneo de Manila University
Exploratory Analysis Of Discourses Between Students Engaged In A Debugging Task, Ma. Mercedes T. Rodrigo
Department of Information Systems & Computer Science Faculty Publications
This paper determined if and how high-performing and low-performing students differed in the language that they used as they collaborated on a debugging task. 180 students worked in pairs to debug 12 small programs with known errors. Students were segregated into high and low achievement levels based on the number of bugs they found. Chat transcripts from the pairs were analyzed using the Linguistic Inquiry and Word Count (LIWC) software. We found that high- and low-performing students only varied in terms of their use of words that implied discrepancy and sadness.
Special Issue: Neutrosophic Theories Applied In Engineering, 2017 University of New Mexico
Special Issue: Neutrosophic Theories Applied In Engineering, Florentin Smarandache, Jun Ye
Branch Mathematics and Statistics Faculty and Staff Publications
Neutrosophic sets and logic are generalizations of fuzzy and intuitionistic fuzzy sets and logic. Neutrosophic sets and logic are gaining significant attention in solving many real life decision making problems that involve uncertainty, impreciseness, vagueness, incompleteness, inconsistent, and indeterminacy. They have been applied in computational intelligence, multiple criteria decision making, image processing, medical diagnoses, etc. This Special Issue presents original research papers that report on state-of-the-art and recent advancements in neutrosophic sets and logic in soft computing, artificial intelligence, big and small data mining, decision making problems, and practical achievements.
Xic Clustering By Baseyian Network, 2017 Computer Sciences
Xic Clustering By Baseyian Network, Kyle J. Handy
Graduate Student Theses, Dissertations, & Professional Papers
No abstract provided.
Viewed By Too Many Or Viewed Too Little: Using Information Dissemination For Audience Segmentation, 2017 Singapore Management University
Viewed By Too Many Or Viewed Too Little: Using Information Dissemination For Audience Segmentation, Bernard J. Jansen, Soon-Gyu Jung, Joni Salminen, Jisun An, Haewoon Kwak
Research Collection School Of Computing and Information Systems
The identification of meaningful audience segments, such as groups of users, consumers, readers, audience, etc., has important applicability in a variety of domains, including for content publishing. In this research, we seek to develop a technique for determining both information dissemination and information discrimination of online content in order to isolate audience segments. The benefits of the technique include identification of the most impactful content for analysis. With 4,320 online videos from a major news organization, a set of audience attributes, and more than 58 million interactions from hundreds of thousands of users, we isolate the key pieces of content …
High Impact Bug Report Identification With Imbalanced Learning Strategies, 2017 Zhejiang University
High Impact Bug Report Identification With Imbalanced Learning Strategies, Xinli Yang, David Lo, Xin Xia, Qiao Huang, Jianling Sun
Research Collection School Of Computing and Information Systems
In practice, some bugs have more impact than others and thus deserve more immediate attention. Due to tight schedule and limited human resources, developers may not have enough time to inspect all bugs. Thus, they often concentrate on bugs that are highly impactful. In the literature, high-impact bugs are used to refer to the bugs which appear at unexpected time or locations and bring more unexpected effects (i.e., surprise bugs), or break pre-existing functionalities and destroy the user experience (i.e., breakage bugs). Unfortunately, identifying high-impact bugs from thousands of bug reports in a bug tracking system is not an easy …
Safestack+: Enhanced Dual Stack To Combat Data-Flow Hijacking, 2017 Singapore Management University
Safestack+: Enhanced Dual Stack To Combat Data-Flow Hijacking, Yan Lin, Xiaoxiao Tang, Debin Gao
Research Collection School Of Computing and Information Systems
SafeStack, initially proposed as a key component of Code Pointer Integrity (CPI), separates the program stack into two distinct regions to provide a safe region for sensitive code pointers. SafeStack can prevent buffer overflow attacks that overwrite sensitive code pointers, e.g., return addresses, to hijack control flow of the program, and has been incorporated into the Clang project of LLVM as a C-based language front-end. In this paper, we propose and implement SafeStack+, an enhanced dual stack LLVM plug-in that further protects programs from data-flow hijacking. SafeStack+ locates data flow sensitive variables on the unsafe stack that could potentially affect …
Geodesic Merging, 2017 CUNY John Jay College
Geodesic Merging, Konstantinos Georgatos
Publications and Research
We pursue an account of merging through the use of geodesic semantics, the semantics based on the length of the shortest path on a graph. This approach has been fruitful in other areas of belief change such as revision and update. To this end, we introduce three binary merging operators of propositions defined on the graph of their valuations and we characterize them with a finite set of postulates. We also consider a revision operator defined in the extended language of pairs of propositions. This extension allows us to express all merging operators through the set of revision postulates.
Discovering Conversation Spaces In The Public Discourse Of Gender Violence: A Comparative Between Two Different Contexts, 2017 Ateneo de Manila University
Discovering Conversation Spaces In The Public Discourse Of Gender Violence: A Comparative Between Two Different Contexts, Meliza M. De La Paz, Ma. Regina Justina E. Estuar, John Noel C. Victorino
Department of Information Systems & Computer Science Faculty Publications
A huge factor in gender-based violence is perception and stigma, revealed by public discourse. Topic modelling is useful for discourse analysis and reveals prevalent topics and actors. This study aims to find and compare examples of collectivist and individualist conversation spaces of gendered violence by applying Principal Component Analysis, NGram analysis and word association in two gender violence cases which occured in the different contexts of the Philippines and the United States. The data from the Philippines consist of 2010-2011 articles on the 1991 Vizconde Massacre and the data from the United States consist of 2016-2017 articles from the 2015 …
Designing An Intervention For Novice Programmers Based On Meaningful Gamification: An Expert Evaluation, 2017 Ateneo de Manila University
Designing An Intervention For Novice Programmers Based On Meaningful Gamification: An Expert Evaluation, Jenilyn L. Agapito, Ma. Mercedes T. Rodrigo
Department of Information Systems & Computer Science Faculty Publications
Gamification is defined as the addition of game-like elements and mechanics to non-game contexts to encourage certain desired behaviors. It is becoming a popular classroom intervention used in computer science instruction, including CS1, the first course computer science students take. It is being operationalized to enhance students' learning experience and achievement. However, existing studies have mostly implemented reward-based game elements which have resulted to contrasting behaviors among the students. Meaningful gamification, characterized as the use of game design elements to encourage users build internal motivation to behave in a certain way, is contended to be a more effective approach. The …
Oasis - Identifying The Core Attributes For Rdbms Alternatives, 2017 Georgia Southern University
Oasis - Identifying The Core Attributes For Rdbms Alternatives, Benjamin P. Mcpherson
Electronic Theses and Dissertations
Since their introduction in the 1970s, relational database management systems have served as the dominate data storage technology. However, the demands of big data and Web 2.0 necessitated a change in the market, sparking the beginning of the NoSQL movement in the late 2000s. NoSQL databases exchanged the relational model and the guaranteed consistency of ACID transactions for improved performance and massive scalability [1]. While the benefits NoSQL provided proved useful, the lack of sufficient SQL functionality presented a major hurdle for organizations which require it to properly operate. It was clear that new RDBMS solutions which did not compromise …
Success Stories In Knowledge Management Systems, 2016 Embry-Riddle Aeronautical University
Success Stories In Knowledge Management Systems, Leila Halawi, Richard Mccarthy, Janine Aronson
Leila A. Halawi
Irresistible Bargains: Navigating The Surveillance Society, 2016 Seton Hall University
Irresistible Bargains: Navigating The Surveillance Society, Robert M. Pallitto
Robert M Pallitto
Investigating The Spatial Complexity Of Various Pke-Peks Schematics, 2016 Rose-Hulman Institute of Technology
Investigating The Spatial Complexity Of Various Pke-Peks Schematics, Jacob Patterson
Rose-Hulman Undergraduate Research Publications
With the advent of cloud storage, people upload all sorts of information to third party servers. However, uploading plaintext does not seem like a good idea for users who wish to keep their data private. Current solutions to this problem in literature involves integrating Public Key Encryption and Public key encryption with keyword search techniques. The intent of this paper is to analyze the spatial complexities of various PKE-PEKS schemes at various levels of security and discuss potential avenues for improvement.
Deep Data Analysis On The Web, 2016 San Jose State University
Deep Data Analysis On The Web, Xuanyu Liu
Master's Projects
Search engines are well known to people all over the world. People prefer to use keywords searching to open websites or retrieve information rather than type typical URLs. Therefore, collecting finite sequences of keywords that represent important concepts within a set of authors is important, in other words, we need knowledge mining. We use a simplicial concept method to speed up concept mining. Previous CS 298 project has studied this approach under Dr. Lin. This method is very fast, for example, to mine the concept, FP-growth takes 876 seconds from a database with 1257 columns 65k rows, simplicial complex only …
Handling Relationships In A Wiki System, 2016 San Jose State University
Handling Relationships In A Wiki System, Yashi Kamboj
Master's Projects
Wiki software enables users to manage content on the web, and create or edit web pages freely. Most wiki systems support the creation of hyperlinks on pages and have a simple text syntax for page formatting. A common, more advanced feature is to allow pages to be grouped together as categories. Currently, wiki systems support categorization of pages in a very traditional way by specifying whether a wiki page belongs to a category or not. Categorization represents unary relationship and is not sufficient to represent n-ary relationships, those involving links between multiple wiki pages.
In this project, we extend Yioop, …
Predicting User's Future Requests Using Frequent Patterns, 2016 San Jose State University
Predicting User's Future Requests Using Frequent Patterns, Marc Nipuna Dominic Savio
Master's Projects
In this research, we predict User's Future Request using Data Mining Algorithm. Usage of the World Wide Web has resulted in a huge amount of data and handling of this data is getting hard day by day. All this data is stored as Web Logs and each web log is stored in a different format with different Field names like search string, URL with its corresponding timestamp, User ID’s that helps for session identification, Status code, etc. Whenever a user requests for a URL there is a delay in getting the page requested and sometimes the request is denied. Our …