Automatic Domain Model Creation Using Pattern-Based Fact Extraction, 2011 Wright State University - Main Campus
Automatic Domain Model Creation Using Pattern-Based Fact Extraction, Christopher Thomas, Pankaj Mehra, Wenbo Wang, Amit P. Sheth, Gerhard Weikum, Victor Chan
Kno.e.sis Publications
This paper describes a minimally guided approach to automatic domain model creation. The first step is to carve an area of interest out of the Wikipedia hierarchy based on a simple query or other starting point. The second step is to connect the concepts in this domain hierarchy with named relationships. A starting point is provided by Linked Open Data, such as DBPedia. Based on these community-generated facts we train a pattern-based fact-extraction algorithm to augment a domain hierarchy with previously unknown relationship occurrences. Pattern vectors are learned that represent occurrences of relationships between concepts. The process described can be …
Privacy-By-Design In Federated Social Web Applications, 2011 Wright State University - Main Campus
Privacy-By-Design In Federated Social Web Applications, Alexandre Passant, Owen Sacco, Julia Anaya, Pavan Kapanipathi
Kno.e.sis Publications
No abstract provided.
What's Happening In Semantic Web ... And What Fca Could Have To Do With It, 2011 Wright State University - Main Campus
What's Happening In Semantic Web ... And What Fca Could Have To Do With It, Pascal Hitzler
Computer Science and Engineering Faculty Publications
The Semantic Web is gaining momentum. Driven by over 10 years of focused project funding in the US and the EU, Semantic Web Technologies are now entering application areas in industry, academia, government, and the open Web.
The Semantic Web is based on the idea of describing the meaning - or semantics - of data on the Web using metadata - data that describes other data - in the form of ontologies, which are represented using logic-based knowledge representation languages. Central to the transfer of Semantic Web into practice is the Linked Open Data effort, which has already resulted in …
Trust Networks: Interpersonal, Social, And Sensor, 2011 Wright State University - Main Campus
Trust Networks: Interpersonal, Social, And Sensor, Krishnaprasad Thirunarayan, Pramod Anantharam
Kno.e.sis Publications
Trust relationships occur naturally in many diverse contexts such as ecommerce, interpersonal interactions, social networks, sensor web, etc. As agents providing content and services become increasingly removed from the agents that consume them, the issue of robust trust inference and update become critical. Unfortunately, there is neither a universal notion of trust that is applicable to all domains nor a clear explication of its semantics or computation in many situations. In this beginner's level tutorial, we motivate the trust problem, explain the relevant concepts, summarize research in modeling trust and gleaning trustworthiness, and discuss challenges confronting us in this process.
Improving Data Freshness To Enhance The Quality Of Observations In Wireless Sensor Networks, 2011 Boise State University
Improving Data Freshness To Enhance The Quality Of Observations In Wireless Sensor Networks, Ramya Bala Ammu
Boise State University Theses and Dissertations
Wireless Sensor Networks (WSNs) are used to achieve either continuous monitoring or event-detection in the area of interest. In continuous monitoring applications, each sensor node transmits its sensed data to the sink node (base station) periodically; while in event-detection driven applications, nodes report to the sink node once an event occurs. Continuous monitoring applications require periodic refreshed data at the sink node. Data reaching the sink node after a certain threshold is not useful for processing or analysis because it is stale. Data freshness along with reliable data delivery is critical in such applications. Current protocols in this area measure …
Offline Optimization Of Advance Reservation Of Bandwidth Over Dynamic Circuit Networks, 2011 University of Nebraska-Lincoln
Offline Optimization Of Advance Reservation Of Bandwidth Over Dynamic Circuit Networks, Pragatheeswaran Angu
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
E-science projects require very high-speed and reliable networks to transfer data across various destinations in the world. Dynamic Circuit Network (DCN) is a networking service to make advance reservation of bandwidth between a source and a destination in a network. In this thesis we solve the problem of advance reservation of bandwidth in next-generation wavelength-division multiplexing (WDM) networks using a simulation based approach.
We implement a greedy algorithm and a genetic algorithm in parallel, in separate threads. The request for advance reservation is processed by both but the user gets the response only from the greedy algorithm. The genetic algorithm …
Capability Information: A Cost-Effective Information Model For Multi-Hop Routing Of Wireless Ad Hoc Networks In The Real Environment, 2011 West Chester University of Pennsylvania
Capability Information: A Cost-Effective Information Model For Multi-Hop Routing Of Wireless Ad Hoc Networks In The Real Environment, Zhen Jiang, Zhigang Li, Jie Wu, Nong Xiao
Computer Science Faculty Publications
No abstract provided.
Improving The Performance Of A Proxy Server Using Web Log Mining, 2011 San Jose State University
Improving The Performance Of A Proxy Server Using Web Log Mining, Akshay Shenoy
Master's Projects
Web caching techniques have been widely used with the objective of caching as many web pages and web objects in the proxy server cache as possible to improve network performance. Web pre-fetching schemes have also been widely discussed where web pages and web objects are pre-fetched into the proxy server cache. This paper presents an approach that integrates web caching and web pre-fetching approach to improve the performance of proxy server’s cache.
War Fighting In Cyberspace: Evolving Force Presentation And Command And Control, 2011 Air Intelligence Squadron
War Fighting In Cyberspace: Evolving Force Presentation And Command And Control, M. Bodine Birdwell, Robert F. Mills
Faculty Publications
The Department of Defense (DOD) is endeavoring to define war fighting in the global cyberspace domain. Creation of US Cyber Command (USCYBERCOM), a subunified functional combatant command (FCC) under US Strategic Command (USSTRATCOM), is a huge step in integrating and coordinating the defense, protection, and operation of DOD networks; however, this step does not mean that USCYBERCOM will perform or manage all cyberspace functions. In fact the vast majority of cyberspace functions conducted by the services and combatant commands (COCOM), although vital for maintaining access to the domain in support of their operations, are not of an active war-fighting nature. …
Evaluation Of Classical Inter-Process Communication Problems In Parallel Programming Languages, 2011 San Jose State University
Evaluation Of Classical Inter-Process Communication Problems In Parallel Programming Languages, Arunesh Joshi
Master's Projects
It is generally believed for the past several years that parallel programming is the future of computing technology due to its incredible speed and vastly superior performance as compared to classic linear programming. However, how sure are we that this is the case? Despite its aforesaid average superiority, usually parallel-program implementations run in single-processor machines, making the parallelism almost virtual. In this case, does parallel programming still remain superior?
The purpose of this document is to research and analyze the performance, in both storage and speed, of three parallel-programming language libraries: OpenMP, OpenMPI and PThreads, along with a few other …
Propeller: A Scalable Metadata Organization For A Versatile Searchable File System, 2011 University of Nebraska-Lincoln
Propeller: A Scalable Metadata Organization For A Versatile Searchable File System, Lei Xu, Hong Jiang, Xue Liu, Lei Tian, Yu Hua, Jian Hu
CSE Technical Reports
The exponentially increasing amount of data in file systems has made it increasingly important for users, administrators and applications to be able to fast retrieve files using file-search services, instead of replying on the standard file system API to traverse the hierarchical namespaces. The quality of the file-search services is significantly affected by the file-indexing overhead, the file-search performance and the accuracy of search results. Unfortunately, the existing file-search solutions either are so poorly scalable that their performance degrades unacceptably when the systems scale up, or incur so much crawling delays that they produce acceptably inaccurate results. We believe that …
Identifying And Implementing The Underlying Operators For Nuclear Magnetic Resonance Based Metabolomics Data Analysis, 2011 Wright State University - Main Campus
Identifying And Implementing The Underlying Operators For Nuclear Magnetic Resonance Based Metabolomics Data Analysis, Ashwin Manjunatha, Ajith H. Ranabahu, Paul E. Anderson, Amit P. Sheth
Kno.e.sis Publications
The science of metabolomics is a relatively young field that requires intensive signal processing and multivariate data analysis for interpretation of experimental results. The lack of integration and standardization for metabolomics compounded by the complexity of the experimental data has lead to a fragmented research community. While efforts have been undertaken to approach these problems, the efforts to develop a set of standards for reporting processing and analysis procedures has stalled.
In this paper, we propose a set of fundamental operators for nuclear magnetic resonance(NMR) based metabolomics. These operators are implementation independent, and can be used to easily and precisely …
Spear Phishing Attack Detection, 2011 Air Force Institute of Technology
Spear Phishing Attack Detection, David T. Merritt
Theses and Dissertations
This thesis addresses the problem of identifying email spear phishing attacks, which are indicative of cyber espionage. Spear phishing consists of targeted emails sent to entice a victim to open a malicious file attachment or click on a malicious link that leads to a compromise of their computer. Current detection methods fail to detect emails of this kind consistently. The SPEar phishing Attack Detection system (SPEAD) is developed to analyze all incoming emails on a network for the presence of spear phishing attacks. SPEAD analyzes the following file types: Windows Portable Executable and Common Object File Format (PE/COFF), Adobe Reader, …
Reactive Routing In Hidra Networks, 2011 California Polytechnic State University - San Luis Obispo
Reactive Routing In Hidra Networks, Scott Michael Marshall
Computer Engineering
In recent years, the Internet has grown so large that the future scalability of the Internet has become a major concern. The two primary scalability concerns are the size of the forwarding table and the ability for BGP to converge while distributing hundreds of thousands of routes.
HIDRA is a new Internet routing architecture that is backwards-compatible with existing routing technologies and protocols that focuses on feasibility-of-implementation. HIDRA remedies the first Internet scalability concern by proposing a means to reduce the number of entries in the default-free zone (DFZ) forwarding table.
This project extends HIDRA by designing a complete reactive …
Amid The Vipers: Establishing Malware's Position Within The Information Ecosystem, 2011 California Polytechnic State University - San Luis Obispo
Amid The Vipers: Establishing Malware's Position Within The Information Ecosystem, Shawn Louis Everett Robertson
Computer Science and Software Engineering
The paper consists of a detailed examination of malware broken down into three main sections.
- Introduction: Malware in the World Today. Begins with a definition of terms, examination of the types of malware, research into historical pieces of malicious code, a detailed analysis of the attackers, why malware is so prevalent, and why it is so hard to defend against. This section finishes with a comparison of reasons to create and not to create malware.
- Background: "Good" Pieces of Malware. Examination of what makes malware effective. Analysis of the existing CVSS standard and proposal of the alternative VIPERS classification system. …
Ipv6 Security Basics, 2011 Southern Methodist University
Ipv6 Security Basics, John Christian Smith
John Christian Smith
Overview of security considerations in adopting IPv6
Strategic Assessment Of Information Security Maturity, 2011 Singapore Management University
Strategic Assessment Of Information Security Maturity, Arcot Desai Narasimhalu, Dayasindhu Nagarajan, Raghavan Subramanian
Arcot Desai NARASIMHALU
CXOs are becoming increasingly interested in the information security maturity of their enterprises. This paper presents a CXO dashboard that will allow better management of the information security resources in an enterprise.
Infosemm: Infosys It Security Maturity Model: A Report, 2011 Singapore Management University
Infosemm: Infosys It Security Maturity Model: A Report, Arcot Desai Narasimhalu, N. Dayasindhu, Raghavan Subramanian
Arcot Desai NARASIMHALU
Businesses are faced with a continuing battle related to cyber security related issues ranging from cyber attacks all the way to cyber (information) war. These issues affect result in information, system, reputation, and revenue related risks. These risks arise because of vulnerabilities introduced in three major parts of the enterprise – infrastructure, intelligence and practices. This report provides a rating system for representing the security health of enterprises.
Privacy-Aware An Scalable Content Dissemination In Distributed Social Networks, 2011 Wright State University - Main Campus
Privacy-Aware An Scalable Content Dissemination In Distributed Social Networks, Pavan Kapanipathi, Julia Anaya, Amit P. Sheth, Brett Slatkin, Alexandre Passant
Kno.e.sis Publications
Centralized social networking websites raise scalability issues - due to the growing number of participants - and, as well as, policy concerns - such as control, privacy and ownership over the user's published data. Distributed Social Networks aim to solve this issue by enabling architecture where people own their data and share it their own way. However, the privacy and scalability challenge is still to be tackled. This paper presents a privacy-aware extension to Google's PubSubHubbub protocol, using Semantic Web technologies, solving both the scalability and the privacy issues in Distributed Social Networks. We enhanced the traditional feature of PubSubHubbub …
A Unified Framework Fro Managing Provenance Information In Translational Research, 2011 Wright State University - Main Campus
A Unified Framework Fro Managing Provenance Information In Translational Research, Satya S. Sahoo, Vinh Nguyen, Olivier Bodenreider, Priti Parikh, Todd Minning, Amit P. Sheth
Kno.e.sis Publications
Background
A critical aspect of the NIH Translational Research roadmap, which seeks to accelerate the delivery of "bench-side" discoveries to patient's "bedside," is the management of the provenance metadata that keeps track of the origin and history of data resources as they traverse the path from the bench to the bedside and back. A comprehensive provenance framework is essential for researchers to verify the quality of data, reproduce scientific results published in peer-reviewed literature, validate scientific process, and associate trust value with data and results. Traditional approaches to provenance management have focused on only partial sections of the translational research …