Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

6,567 Full-Text Articles 8,894 Authors 3,346,977 Downloads 209 Institutions

All Articles in Databases and Information Systems

Faceted Search

6,567 full-text articles. Page 136 of 248.

Ansi/Niso Z39.99-2017 Resourcesync Framework Specification, Kevin Ruthen, Jill Emery, Mark Doyle, Mark Needleman, Sue Baughman, Evan Owens, Oliver Pesch, Mike Dicus, Nassib Nassar, Tim Auger, Amy Kirchhoff, Sally McCallum, Diana Magnoni, Paul Swanson, Gregory Grazevich, Nara Newcomer, Gregory Grazevich, Juha Hakala, Barbara Rapp, Beverly Geckle, Carol Brent, Gary Van Overborg, Rick Burke, Kristin Antelman, Scott Bernier, Pascal Calarco, John Dove, Lucy Harrison, Peter Murray, Christine Stohn, Julie Zhu, Todd Carpenter, Bernhard Haslhofer, Richard Jones, Martin Klein, Graham Klyne, Carl Lagoze, Stuart Lewis, Peter Murray, Michael Nelson, Shlomo Sanders, Robert Sanderson, Herbert Van de Sompel, Paul Walk, Simeon Warner, Zhiwu Xie, Jeff Young 2017 Old Dominion University

Ansi/Niso Z39.99-2017 Resourcesync Framework Specification, Kevin Ruthen, Jill Emery, Mark Doyle, Mark Needleman, Sue Baughman, Evan Owens, Oliver Pesch, Mike Dicus, Nassib Nassar, Tim Auger, Amy Kirchhoff, Sally Mccallum, Diana Magnoni, Paul Swanson, Gregory Grazevich, Nara Newcomer, Gregory Grazevich, Juha Hakala, Barbara Rapp, Beverly Geckle, Carol Brent, Gary Van Overborg, Rick Burke, Kristin Antelman, Scott Bernier, Pascal Calarco, John Dove, Lucy Harrison, Peter Murray, Christine Stohn, Julie Zhu, Todd Carpenter, Bernhard Haslhofer, Richard Jones, Martin Klein, Graham Klyne, Carl Lagoze, Stuart Lewis, Peter Murray, Michael Nelson, Shlomo Sanders, Robert Sanderson, Herbert Van De Sompel, Paul Walk, Simeon Warner, Zhiwu Xie, Jeff Young

Computer Science Faculty Publications

This ResourceSync specification describes a synchronization framework for the web consisting of various capabilities that allow third-party systems to remain synchronized with a server’s evolving resources. The capabilities may be combined in a modular manner to meet local or community requirements. This specification also describes how a server should advertise the synchronization capabilities it supports and how third-party systems may discover this information. The specification repurposes the document formats defined by the Sitemap protocol and introduces extensions for them.


Easing Cross-Border Communication: Mobile-Mediated Communication And Its Framework, Kyungsub CHOI, Young Soo KIM 2017 Rhode Island College

Easing Cross-Border Communication: Mobile-Mediated Communication And Its Framework, Kyungsub Choi, Young Soo Kim

Research Collection School Of Computing and Information Systems

Communication is probably the most critical component of an organization engaged in a cross-border collaboration. Today’s smart devices substantially contribute to such communication. Combined with social media, mobile communication technologies are becoming the main platform for many core functions within organizations. In this paper, we identified seven media identifiable attributes: synchronicity (SYN), de-individuation and co-presence (DCP), accessibility readiness (ARD), cognizance of environment change (CEC), wearability-portability (WRB) modality-select (MDS) and visibility (VSB). These seven attributes significantly impact the course of mobile-mediated communication. We believe that development of a theoretical perspective that embraces the complexity of mobile-mediated communication is due in order …


Infodemiology For Syndromic Surveillance Of Dengue And Typhoid Fever In The Philippines, Ma. Regina Justina E. Estuar, Kennedy E. Espina 2017 Ateneo de Manila University

Infodemiology For Syndromic Surveillance Of Dengue And Typhoid Fever In The Philippines, Ma. Regina Justina E. Estuar, Kennedy E. Espina

Department of Information Systems & Computer Science Faculty Publications

Finding determinants of disease outbreaks before its occurrence is necessary in reducing its impact in populations. The supposed advantage of obtaining information brought by automated systems fall short because of the inability to access real-time data as well as interoperate fragmented systems, leading to longer transfer and processing of data. As such, this study presents the use of realtime latent data from social media, particularly from Twitter, to complement existing disease surveillance efforts. By being able to classify infodemiological (health-related) tweets, this study is able to produce a range of possible disease incidences of Dengue and Typhoid Fever within the …


A Multi-Model Approach In Developing An Intelligent Assistant For Diagnosis Recommendation In Clinical Health Systems, Christian E. Pulmano, Ma. Regina Justina E. Estuar 2017 Ateneo de Manila University

A Multi-Model Approach In Developing An Intelligent Assistant For Diagnosis Recommendation In Clinical Health Systems, Christian E. Pulmano, Ma. Regina Justina E. Estuar

Department of Information Systems & Computer Science Faculty Publications

Clinical health information systems capture massive amounts of unstructured data from various health and medical facilities. This study utilizes unstructured patient clinical text data to develop an intelligent assistant that can identify possible related diagnoses based on a given text input. The approach applies a one-vs-rest binary classification technique wherein given an input text data, it is identified whether it can be positively or negatively classified for a given diagnosis. Multi-layer Feed-Forward Neural Network models were developed for each individual diagnosis case. The task of the intelligent assistant is to iterate over all the different models and return those that …


Exploratory Analysis Of Discourses Between Students Engaged In A Debugging Task, Ma. Mercedes T. Rodrigo 2017 Ateneo de Manila University

Exploratory Analysis Of Discourses Between Students Engaged In A Debugging Task, Ma. Mercedes T. Rodrigo

Department of Information Systems & Computer Science Faculty Publications

This paper determined if and how high-performing and low-performing students differed in the language that they used as they collaborated on a debugging task. 180 students worked in pairs to debug 12 small programs with known errors. Students were segregated into high and low achievement levels based on the number of bugs they found. Chat transcripts from the pairs were analyzed using the Linguistic Inquiry and Word Count (LIWC) software. We found that high- and low-performing students only varied in terms of their use of words that implied discrepancy and sadness.


Special Issue: Neutrosophic Theories Applied In Engineering, Florentin Smarandache, Jun Ye 2017 University of New Mexico

Special Issue: Neutrosophic Theories Applied In Engineering, Florentin Smarandache, Jun Ye

Branch Mathematics and Statistics Faculty and Staff Publications

Neutrosophic sets and logic are generalizations of fuzzy and intuitionistic fuzzy sets and logic. Neutrosophic sets and logic are gaining significant attention in solving many real life decision making problems that involve uncertainty, impreciseness, vagueness, incompleteness, inconsistent, and indeterminacy. They have been applied in computational intelligence, multiple criteria decision making, image processing, medical diagnoses, etc. This Special Issue presents original research papers that report on state-of-the-art and recent advancements in neutrosophic sets and logic in soft computing, artificial intelligence, big and small data mining, decision making problems, and practical achievements.


Xic Clustering By Baseyian Network, Kyle J. Handy 2017 Computer Sciences

Xic Clustering By Baseyian Network, Kyle J. Handy

Graduate Student Theses, Dissertations, & Professional Papers

No abstract provided.


Viewed By Too Many Or Viewed Too Little: Using Information Dissemination For Audience Segmentation, Bernard J. JANSEN, Soon-Gyu JUNG, Joni SALMINEN, Jisun AN, Haewoon KWAK 2017 Singapore Management University

Viewed By Too Many Or Viewed Too Little: Using Information Dissemination For Audience Segmentation, Bernard J. Jansen, Soon-Gyu Jung, Joni Salminen, Jisun An, Haewoon Kwak

Research Collection School Of Computing and Information Systems

The identification of meaningful audience segments, such as groups of users, consumers, readers, audience, etc., has important applicability in a variety of domains, including for content publishing. In this research, we seek to develop a technique for determining both information dissemination and information discrimination of online content in order to isolate audience segments. The benefits of the technique include identification of the most impactful content for analysis. With 4,320 online videos from a major news organization, a set of audience attributes, and more than 58 million interactions from hundreds of thousands of users, we isolate the key pieces of content …


High Impact Bug Report Identification With Imbalanced Learning Strategies, Xinli YANG, David LO, Xin XIA, Qiao HUANG, Jianling SUN 2017 Zhejiang University

High Impact Bug Report Identification With Imbalanced Learning Strategies, Xinli Yang, David Lo, Xin Xia, Qiao Huang, Jianling Sun

Research Collection School Of Computing and Information Systems

In practice, some bugs have more impact than others and thus deserve more immediate attention. Due to tight schedule and limited human resources, developers may not have enough time to inspect all bugs. Thus, they often concentrate on bugs that are highly impactful. In the literature, high-impact bugs are used to refer to the bugs which appear at unexpected time or locations and bring more unexpected effects (i.e., surprise bugs), or break pre-existing functionalities and destroy the user experience (i.e., breakage bugs). Unfortunately, identifying high-impact bugs from thousands of bug reports in a bug tracking system is not an easy …


Safestack+: Enhanced Dual Stack To Combat Data-Flow Hijacking, Yan LIN, Xiaoxiao TANG, Debin GAO 2017 Singapore Management University

Safestack+: Enhanced Dual Stack To Combat Data-Flow Hijacking, Yan Lin, Xiaoxiao Tang, Debin Gao

Research Collection School Of Computing and Information Systems

SafeStack, initially proposed as a key component of Code Pointer Integrity (CPI), separates the program stack into two distinct regions to provide a safe region for sensitive code pointers. SafeStack can prevent buffer overflow attacks that overwrite sensitive code pointers, e.g., return addresses, to hijack control flow of the program, and has been incorporated into the Clang project of LLVM as a C-based language front-end. In this paper, we propose and implement SafeStack+, an enhanced dual stack LLVM plug-in that further protects programs from data-flow hijacking. SafeStack+ locates data flow sensitive variables on the unsafe stack that could potentially affect …


Geodesic Merging, Konstantinos Georgatos 2017 CUNY John Jay College

Geodesic Merging, Konstantinos Georgatos

Publications and Research

We pursue an account of merging through the use of geodesic semantics, the semantics based on the length of the shortest path on a graph. This approach has been fruitful in other areas of belief change such as revision and update. To this end, we introduce three binary merging operators of propositions defined on the graph of their valuations and we characterize them with a finite set of postulates. We also consider a revision operator defined in the extended language of pairs of propositions. This extension allows us to express all merging operators through the set of revision postulates.


Discovering Conversation Spaces In The Public Discourse Of Gender Violence: A Comparative Between Two Different Contexts, Meliza M. De La Paz, Ma. Regina Justina E. Estuar, John Noel C. Victorino 2017 Ateneo de Manila University

Discovering Conversation Spaces In The Public Discourse Of Gender Violence: A Comparative Between Two Different Contexts, Meliza M. De La Paz, Ma. Regina Justina E. Estuar, John Noel C. Victorino

Department of Information Systems & Computer Science Faculty Publications

A huge factor in gender-based violence is perception and stigma, revealed by public discourse. Topic modelling is useful for discourse analysis and reveals prevalent topics and actors. This study aims to find and compare examples of collectivist and individualist conversation spaces of gendered violence by applying Principal Component Analysis, NGram analysis and word association in two gender violence cases which occured in the different contexts of the Philippines and the United States. The data from the Philippines consist of 2010-2011 articles on the 1991 Vizconde Massacre and the data from the United States consist of 2016-2017 articles from the 2015 …


Designing An Intervention For Novice Programmers Based On Meaningful Gamification: An Expert Evaluation, Jenilyn L. Agapito, Ma. Mercedes T. Rodrigo 2017 Ateneo de Manila University

Designing An Intervention For Novice Programmers Based On Meaningful Gamification: An Expert Evaluation, Jenilyn L. Agapito, Ma. Mercedes T. Rodrigo

Department of Information Systems & Computer Science Faculty Publications

Gamification is defined as the addition of game-like elements and mechanics to non-game contexts to encourage certain desired behaviors. It is becoming a popular classroom intervention used in computer science instruction, including CS1, the first course computer science students take. It is being operationalized to enhance students' learning experience and achievement. However, existing studies have mostly implemented reward-based game elements which have resulted to contrasting behaviors among the students. Meaningful gamification, characterized as the use of game design elements to encourage users build internal motivation to behave in a certain way, is contended to be a more effective approach. The …


Oasis - Identifying The Core Attributes For Rdbms Alternatives, Benjamin P. McPherson 2017 Georgia Southern University

Oasis - Identifying The Core Attributes For Rdbms Alternatives, Benjamin P. Mcpherson

Electronic Theses and Dissertations

Since their introduction in the 1970s, relational database management systems have served as the dominate data storage technology. However, the demands of big data and Web 2.0 necessitated a change in the market, sparking the beginning of the NoSQL movement in the late 2000s. NoSQL databases exchanged the relational model and the guaranteed consistency of ACID transactions for improved performance and massive scalability [1]. While the benefits NoSQL provided proved useful, the lack of sufficient SQL functionality presented a major hurdle for organizations which require it to properly operate. It was clear that new RDBMS solutions which did not compromise …


Success Stories In Knowledge Management Systems, Leila Halawi, Richard McCarthy, Janine Aronson 2016 Embry-Riddle Aeronautical University

Success Stories In Knowledge Management Systems, Leila Halawi, Richard Mccarthy, Janine Aronson

Leila A. Halawi

Historically, information systems have focused on capturing, storing, managing, and reporting explicit knowledge.
Organizations today recognize the need to integrate both explicit and tacit knowledge in formal information systems. Knowledge management continues to be a critical strategy for an organization to achieve a sustainable competitive advantage, and consequently succeed in today's knowledge-based economy. Knowledge management systems (KMS) are a class of information systems that manage, store and distribute knowledge. Knowledge management systems have proliferated in practice. In turn, theoretical research on knowledge management and knowledge management systems has proliferated. Knowledge management systems have emerged as powerful sources of competitive advantage. …


Irresistible Bargains: Navigating The Surveillance Society, Robert M. Pallitto 2016 Seton Hall University

Irresistible Bargains: Navigating The Surveillance Society, Robert M. Pallitto

Robert M Pallitto

Agents in contemporary societies are faced continually with choices regarding engagement with technological artifacts. They can choose to engage or decline engagement after considering the costs and benefits in each case. However, certain aspects of the surveillance society may be irresistible in a number of ways, so that refusal to engage with them is not a realistic option. The proliferation of the Internet of Things (IoT), particularly as embedded in “smart city” initiatives, helps to make surveillance technologies potentially irresistible. After laying the conceptual groundwork for discussing irresistible bargains, this essay offers a two-part normative critique, focusing on the asymmetrical …


Investigating The Spatial Complexity Of Various Pke-Peks Schematics, Jacob Patterson 2016 Rose-Hulman Institute of Technology

Investigating The Spatial Complexity Of Various Pke-Peks Schematics, Jacob Patterson

Rose-Hulman Undergraduate Research Publications

With the advent of cloud storage, people upload all sorts of information to third party servers. However, uploading plaintext does not seem like a good idea for users who wish to keep their data private. Current solutions to this problem in literature involves integrating Public Key Encryption and Public key encryption with keyword search techniques. The intent of this paper is to analyze the spatial complexities of various PKE-PEKS schemes at various levels of security and discuss potential avenues for improvement.


Deep Data Analysis On The Web, Xuanyu Liu 2016 San Jose State University

Deep Data Analysis On The Web, Xuanyu Liu

Master's Projects

Search engines are well known to people all over the world. People prefer to use keywords searching to open websites or retrieve information rather than type typical URLs. Therefore, collecting finite sequences of keywords that represent important concepts within a set of authors is important, in other words, we need knowledge mining. We use a simplicial concept method to speed up concept mining. Previous CS 298 project has studied this approach under Dr. Lin. This method is very fast, for example, to mine the concept, FP-growth takes 876 seconds from a database with 1257 columns 65k rows, simplicial complex only …


Handling Relationships In A Wiki System, Yashi Kamboj 2016 San Jose State University

Handling Relationships In A Wiki System, Yashi Kamboj

Master's Projects

Wiki software enables users to manage content on the web, and create or edit web pages freely. Most wiki systems support the creation of hyperlinks on pages and have a simple text syntax for page formatting. A common, more advanced feature is to allow pages to be grouped together as categories. Currently, wiki systems support categorization of pages in a very traditional way by specifying whether a wiki page belongs to a category or not. Categorization represents unary relationship and is not sufficient to represent n-ary relationships, those involving links between multiple wiki pages.

In this project, we extend Yioop, …


Predicting User's Future Requests Using Frequent Patterns, Marc Nipuna Dominic Savio 2016 San Jose State University

Predicting User's Future Requests Using Frequent Patterns, Marc Nipuna Dominic Savio

Master's Projects

In this research, we predict User's Future Request using Data Mining Algorithm. Usage of the World Wide Web has resulted in a huge amount of data and handling of this data is getting hard day by day. All this data is stored as Web Logs and each web log is stored in a different format with different Field names like search string, URL with its corresponding timestamp, User ID’s that helps for session identification, Status code, etc. Whenever a user requests for a URL there is a delay in getting the page requested and sometimes the request is denied. Our …


Digital Commons powered by bepress