Open Access. Powered by Scholars. Published by Universities.®

OS and Networks Commons

Open Access. Powered by Scholars. Published by Universities.®

1,713 Full-Text Articles 2,413 Authors 829,310 Downloads 111 Institutions

All Articles in OS and Networks

Faceted Search

1,713 full-text articles. Page 51 of 56.

Automatic Domain Model Creation Using Pattern-Based Fact Extraction, Christopher Thomas, Pankaj Mehra, Wenbo Wang, Amit P. Sheth, Gerhard Weikum, Victor Chan 2011 Wright State University - Main Campus

Automatic Domain Model Creation Using Pattern-Based Fact Extraction, Christopher Thomas, Pankaj Mehra, Wenbo Wang, Amit P. Sheth, Gerhard Weikum, Victor Chan

Kno.e.sis Publications

This paper describes a minimally guided approach to automatic domain model creation. The first step is to carve an area of interest out of the Wikipedia hierarchy based on a simple query or other starting point. The second step is to connect the concepts in this domain hierarchy with named relationships. A starting point is provided by Linked Open Data, such as DBPedia. Based on these community-generated facts we train a pattern-based fact-extraction algorithm to augment a domain hierarchy with previously unknown relationship occurrences. Pattern vectors are learned that represent occurrences of relationships between concepts. The process described can be …


Privacy-By-Design In Federated Social Web Applications, Alexandre Passant, Owen Sacco, Julia Anaya, Pavan Kapanipathi 2011 Wright State University - Main Campus

Privacy-By-Design In Federated Social Web Applications, Alexandre Passant, Owen Sacco, Julia Anaya, Pavan Kapanipathi

Kno.e.sis Publications

No abstract provided.


What's Happening In Semantic Web ... And What Fca Could Have To Do With It, Pascal Hitzler 2011 Wright State University - Main Campus

What's Happening In Semantic Web ... And What Fca Could Have To Do With It, Pascal Hitzler

Computer Science and Engineering Faculty Publications

The Semantic Web is gaining momentum. Driven by over 10 years of focused project funding in the US and the EU, Semantic Web Technologies are now entering application areas in industry, academia, government, and the open Web.

The Semantic Web is based on the idea of describing the meaning - or semantics - of data on the Web using metadata - data that describes other data - in the form of ontologies, which are represented using logic-based knowledge representation languages. Central to the transfer of Semantic Web into practice is the Linked Open Data effort, which has already resulted in …


Trust Networks: Interpersonal, Social, And Sensor, Krishnaprasad Thirunarayan, Pramod Anantharam 2011 Wright State University - Main Campus

Trust Networks: Interpersonal, Social, And Sensor, Krishnaprasad Thirunarayan, Pramod Anantharam

Kno.e.sis Publications

Trust relationships occur naturally in many diverse contexts such as ecommerce, interpersonal interactions, social networks, sensor web, etc. As agents providing content and services become increasingly removed from the agents that consume them, the issue of robust trust inference and update become critical. Unfortunately, there is neither a universal notion of trust that is applicable to all domains nor a clear explication of its semantics or computation in many situations. In this beginner's level tutorial, we motivate the trust problem, explain the relevant concepts, summarize research in modeling trust and gleaning trustworthiness, and discuss challenges confronting us in this process.


Improving Data Freshness To Enhance The Quality Of Observations In Wireless Sensor Networks, Ramya Bala Ammu 2011 Boise State University

Improving Data Freshness To Enhance The Quality Of Observations In Wireless Sensor Networks, Ramya Bala Ammu

Boise State University Theses and Dissertations

Wireless Sensor Networks (WSNs) are used to achieve either continuous monitoring or event-detection in the area of interest. In continuous monitoring applications, each sensor node transmits its sensed data to the sink node (base station) periodically; while in event-detection driven applications, nodes report to the sink node once an event occurs. Continuous monitoring applications require periodic refreshed data at the sink node. Data reaching the sink node after a certain threshold is not useful for processing or analysis because it is stale. Data freshness along with reliable data delivery is critical in such applications. Current protocols in this area measure …


Offline Optimization Of Advance Reservation Of Bandwidth Over Dynamic Circuit Networks, Pragatheeswaran Angu 2011 University of Nebraska-Lincoln

Offline Optimization Of Advance Reservation Of Bandwidth Over Dynamic Circuit Networks, Pragatheeswaran Angu

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

E-science projects require very high-speed and reliable networks to transfer data across various destinations in the world. Dynamic Circuit Network (DCN) is a networking service to make advance reservation of bandwidth between a source and a destination in a network. In this thesis we solve the problem of advance reservation of bandwidth in next-generation wavelength-division multiplexing (WDM) networks using a simulation based approach.
We implement a greedy algorithm and a genetic algorithm in parallel, in separate threads. The request for advance reservation is processed by both but the user gets the response only from the greedy algorithm. The genetic algorithm …


Capability Information: A Cost-Effective Information Model For Multi-Hop Routing Of Wireless Ad Hoc Networks In The Real Environment, Zhen Jiang, Zhigang Li, Jie Wu, Nong Xiao 2011 West Chester University of Pennsylvania

Capability Information: A Cost-Effective Information Model For Multi-Hop Routing Of Wireless Ad Hoc Networks In The Real Environment, Zhen Jiang, Zhigang Li, Jie Wu, Nong Xiao

Computer Science Faculty Publications

No abstract provided.


Improving The Performance Of A Proxy Server Using Web Log Mining, Akshay Shenoy 2011 San Jose State University

Improving The Performance Of A Proxy Server Using Web Log Mining, Akshay Shenoy

Master's Projects

Web caching techniques have been widely used with the objective of caching as many web pages and web objects in the proxy server cache as possible to improve network performance. Web pre-fetching schemes have also been widely discussed where web pages and web objects are pre-fetched into the proxy server cache. This paper presents an approach that integrates web caching and web pre-fetching approach to improve the performance of proxy server’s cache.


War Fighting In Cyberspace: Evolving Force Presentation And Command And Control, M. Bodine Birdwell, Robert F. Mills 2011 Air Intelligence Squadron

War Fighting In Cyberspace: Evolving Force Presentation And Command And Control, M. Bodine Birdwell, Robert F. Mills

Faculty Publications

The Department of Defense (DOD) is endeavoring to define war fighting in the global cyberspace domain. Creation of US Cyber Command (USCYBERCOM), a subunified functional combatant command (FCC) under US Strategic Command (USSTRATCOM), is a huge step in integrating and coordinating the defense, protection, and operation of DOD networks; however, this step does not mean that USCYBERCOM will perform or manage all cyberspace functions. In fact the vast majority of cyberspace functions conducted by the services and combatant commands (COCOM), although vital for maintaining access to the domain in support of their operations, are not of an active war-fighting nature. …


Evaluation Of Classical Inter-Process Communication Problems In Parallel Programming Languages, Arunesh Joshi 2011 San Jose State University

Evaluation Of Classical Inter-Process Communication Problems In Parallel Programming Languages, Arunesh Joshi

Master's Projects

It is generally believed for the past several years that parallel programming is the future of computing technology due to its incredible speed and vastly superior performance as compared to classic linear programming. However, how sure are we that this is the case? Despite its aforesaid average superiority, usually parallel-program implementations run in single-processor machines, making the parallelism almost virtual. In this case, does parallel programming still remain superior?
The purpose of this document is to research and analyze the performance, in both storage and speed, of three parallel-programming language libraries: OpenMP, OpenMPI and PThreads, along with a few other …


Propeller: A Scalable Metadata Organization For A Versatile Searchable File System, Lei Xu, Hong Jiang, Xue Liu, Lei Tian, Yu Hua, Jian Hu 2011 University of Nebraska-Lincoln

Propeller: A Scalable Metadata Organization For A Versatile Searchable File System, Lei Xu, Hong Jiang, Xue Liu, Lei Tian, Yu Hua, Jian Hu

CSE Technical Reports

The exponentially increasing amount of data in file systems has made it increasingly important for users, administrators and applications to be able to fast retrieve files using file-search services, instead of replying on the standard file system API to traverse the hierarchical namespaces. The quality of the file-search services is significantly affected by the file-indexing overhead, the file-search performance and the accuracy of search results. Unfortunately, the existing file-search solutions either are so poorly scalable that their performance degrades unacceptably when the systems scale up, or incur so much crawling delays that they produce acceptably inaccurate results. We believe that …


Identifying And Implementing The Underlying Operators For Nuclear Magnetic Resonance Based Metabolomics Data Analysis, Ashwin Manjunatha, Ajith H. Ranabahu, Paul E. Anderson, Amit P. Sheth 2011 Wright State University - Main Campus

Identifying And Implementing The Underlying Operators For Nuclear Magnetic Resonance Based Metabolomics Data Analysis, Ashwin Manjunatha, Ajith H. Ranabahu, Paul E. Anderson, Amit P. Sheth

Kno.e.sis Publications

The science of metabolomics is a relatively young field that requires intensive signal processing and multivariate data analysis for interpretation of experimental results. The lack of integration and standardization for metabolomics compounded by the complexity of the experimental data has lead to a fragmented research community. While efforts have been undertaken to approach these problems, the efforts to develop a set of standards for reporting processing and analysis procedures has stalled.

In this paper, we propose a set of fundamental operators for nuclear magnetic resonance(NMR) based metabolomics. These operators are implementation independent, and can be used to easily and precisely …


Spear Phishing Attack Detection, David T. Merritt 2011 Air Force Institute of Technology

Spear Phishing Attack Detection, David T. Merritt

Theses and Dissertations

This thesis addresses the problem of identifying email spear phishing attacks, which are indicative of cyber espionage. Spear phishing consists of targeted emails sent to entice a victim to open a malicious file attachment or click on a malicious link that leads to a compromise of their computer. Current detection methods fail to detect emails of this kind consistently. The SPEar phishing Attack Detection system (SPEAD) is developed to analyze all incoming emails on a network for the presence of spear phishing attacks. SPEAD analyzes the following file types: Windows Portable Executable and Common Object File Format (PE/COFF), Adobe Reader, …


Reactive Routing In Hidra Networks, Scott Michael Marshall 2011 California Polytechnic State University - San Luis Obispo

Reactive Routing In Hidra Networks, Scott Michael Marshall

Computer Engineering

In recent years, the Internet has grown so large that the future scalability of the Internet has become a major concern. The two primary scalability concerns are the size of the forwarding table and the ability for BGP to converge while distributing hundreds of thousands of routes.

HIDRA is a new Internet routing architecture that is backwards-compatible with existing routing technologies and protocols that focuses on feasibility-of-implementation. HIDRA remedies the first Internet scalability concern by proposing a means to reduce the number of entries in the default-free zone (DFZ) forwarding table.

This project extends HIDRA by designing a complete reactive …


Amid The Vipers: Establishing Malware's Position Within The Information Ecosystem, Shawn Louis Everett Robertson 2011 California Polytechnic State University - San Luis Obispo

Amid The Vipers: Establishing Malware's Position Within The Information Ecosystem, Shawn Louis Everett Robertson

Computer Science and Software Engineering

The paper consists of a detailed examination of malware broken down into three main sections.

  1. Introduction: Malware in the World Today. Begins with a definition of terms, examination of the types of malware, research into historical pieces of malicious code, a detailed analysis of the attackers, why malware is so prevalent, and why it is so hard to defend against. This section finishes with a comparison of reasons to create and not to create malware.
  2. Background: "Good" Pieces of Malware. Examination of what makes malware effective. Analysis of the existing CVSS standard and proposal of the alternative VIPERS classification system. …


Ipv6 Security Basics, John Christian Smith 2011 Southern Methodist University

Ipv6 Security Basics, John Christian Smith

John Christian Smith

Overview of security considerations in adopting IPv6


Strategic Assessment Of Information Security Maturity, Arcot Desai NARASIMHALU, Dayasindhu NAGARAJAN, Raghavan SUBRAMANIAN 2011 Singapore Management University

Strategic Assessment Of Information Security Maturity, Arcot Desai Narasimhalu, Dayasindhu Nagarajan, Raghavan Subramanian

Arcot Desai NARASIMHALU

CXOs are becoming increasingly interested in the information security maturity of their enterprises. This paper presents a CXO dashboard that will allow better management of the information security resources in an enterprise.


Infosemm: Infosys It Security Maturity Model: A Report, Arcot Desai NARASIMHALU, N. Dayasindhu, Raghavan Subramanian 2011 Singapore Management University

Infosemm: Infosys It Security Maturity Model: A Report, Arcot Desai Narasimhalu, N. Dayasindhu, Raghavan Subramanian

Arcot Desai NARASIMHALU

Businesses are faced with a continuing battle related to cyber security related issues ranging from cyber attacks all the way to cyber (information) war. These issues affect result in information, system, reputation, and revenue related risks. These risks arise because of vulnerabilities introduced in three major parts of the enterprise – infrastructure, intelligence and practices. This report provides a rating system for representing the security health of enterprises.


Privacy-Aware An Scalable Content Dissemination In Distributed Social Networks, Pavan Kapanipathi, Julia Anaya, Amit P. Sheth, Brett Slatkin, Alexandre Passant 2011 Wright State University - Main Campus

Privacy-Aware An Scalable Content Dissemination In Distributed Social Networks, Pavan Kapanipathi, Julia Anaya, Amit P. Sheth, Brett Slatkin, Alexandre Passant

Kno.e.sis Publications

Centralized social networking websites raise scalability issues - due to the growing number of participants - and, as well as, policy concerns - such as control, privacy and ownership over the user's published data. Distributed Social Networks aim to solve this issue by enabling architecture where people own their data and share it their own way. However, the privacy and scalability challenge is still to be tackled. This paper presents a privacy-aware extension to Google's PubSubHubbub protocol, using Semantic Web technologies, solving both the scalability and the privacy issues in Distributed Social Networks. We enhanced the traditional feature of PubSubHubbub …


A Unified Framework Fro Managing Provenance Information In Translational Research, Satya S. Sahoo, Vinh Nguyen, Olivier Bodenreider, Priti Parikh, Todd Minning, Amit P. Sheth 2011 Wright State University - Main Campus

A Unified Framework Fro Managing Provenance Information In Translational Research, Satya S. Sahoo, Vinh Nguyen, Olivier Bodenreider, Priti Parikh, Todd Minning, Amit P. Sheth

Kno.e.sis Publications

Background

A critical aspect of the NIH Translational Research roadmap, which seeks to accelerate the delivery of "bench-side" discoveries to patient's "bedside," is the management of the provenance metadata that keeps track of the origin and history of data resources as they traverse the path from the bench to the bedside and back. A comprehensive provenance framework is essential for researchers to verify the quality of data, reproduce scientific results published in peer-reviewed literature, validate scientific process, and associate trust value with data and results. Traditional approaches to provenance management have focused on only partial sections of the translational research …


Digital Commons powered by bepress