Open Access. Powered by Scholars. Published by Universities.®

OS and Networks Commons

Open Access. Powered by Scholars. Published by Universities.®

1,755 Full-Text Articles 1,497 Authors 360,596 Downloads 87 Institutions

All Articles in OS and Networks

Faceted Search

1,755 full-text articles. Page 54 of 61.

Investigating Cognitive Task Difficulties And Expert Skills In E-Learning Storyboards Using A Cognitive Task Analysis Technique, Siti Salwah Salim 2011 University of Malaya

Investigating Cognitive Task Difficulties And Expert Skills In E-Learning Storyboards Using A Cognitive Task Analysis Technique, Siti Salwah Salim

Siti Salwah Salim Prof. Dr.

E-learning storyboards have been a useful approach in distance learning development to support interaction between instructional designers and subject-matter experts. Current works show that researchers are focusing on different approaches for use in storyboards, and there is less emphasis on the effect of design and process difficulties faced by instructional designers and subject-matter experts. This study explores problem aspects of the cognitive task and the skills required of subject-matter experts by applying a cognitive task analysis approach from the expert point of view. The result shows that subject-matter experts face difficulties in making decisions on three elements during e-learning course ...


Structuring Persistent Chat Conversations: Experimental Results Of The Chatsistance Tool, Siti Salwah Salim 2011 University of Malaya

Structuring Persistent Chat Conversations: Experimental Results Of The Chatsistance Tool, Siti Salwah Salim

Siti Salwah Salim Prof. Dr.

Abstract This research targets persistency by introducing new features in ‘Chatsistance’, a persistent chat tool that employs speech act theory and an explicit referencing technique to structure the chat log, and by providing further options for retrieving information. Earlier theory is related to the linguistics and characteristics of user statements. The later technique shows the relation of artefacts in an interconnected context named ‘explicit referencing’. Although speech actswere previously used in the field of chat, it is the first time that this theory has been used for the purpose of enhancing persistency combined with an explicit referencing technique,which together ...


Cyber Security And Mobile Threats: The Need For Antivirus Applications For Smart Phones, Jorja Wright, Maurice E. Dawson Jr., Marwan Omar 2011 University of Missouri - St Louis

Cyber Security And Mobile Threats: The Need For Antivirus Applications For Smart Phones, Jorja Wright, Maurice E. Dawson Jr., Marwan Omar

Maurice Dawson

Smartphones are becoming a vehicle to provide an efficient and convenient way toaccess, find and share information; however, the availability of this information hascaused an increase in cyber attacks. Currently, cyber threats range from Trojans andviruses to botnets and toolkits. Presently, 96% of smartphones do not have pre-installedsecurity software. This lack in security is an opportunity for malicious cyber attackers to hackinto the various devices that are popular (i.e. Android, iPhone and Blackberry). Traditionalsecurity software found in personal computers (PCs), such as firewalls, antivirus, andencryption, is not currently available in smartphones. Moreover, smartphones are even morevulnerable than personal computers ...


Effective Security By Obscurity, John Christian Smith 2011 Southern Methodist University

Effective Security By Obscurity, John Christian Smith

John Christian Smith

"Security by obscurity" is a bromide which is frequently applied to undermine the perceived value of a certain class of techniques in security. This usage initially stemmed from applications and experience in the areas of cryptographic theory, and the open vs. closed source debate. Through the perceived absence of true security, the field of security by obscurity has not coalesced into a viable or recognizable approach for security practitioners. Consequently, this has resulted in these techniques going under-used and under-appreciated by defenders, while they continue to provide value to attackers, which creates an unfortunate information asymmetry. Exploring effective methods for ...


Dirty Tricks Played By The Domain Registrars, Umakant Mishra 2011 SelectedWorks

Dirty Tricks Played By The Domain Registrars, Umakant Mishra

Umakant Mishra

With the popularity of Internet the number of websites are increasing in exponential rate. Everybody needs a website and every website needs a domain name and a hosting server. Domain names often represent a business organization or a commercial brand. Hence, changing domain names may affect business strategy and result in serious business loss. The domain registrars often take advantage of customers’ ignorance and weakness and trouble them to unduly extract more and more money.


Quantifying Computer Network Security, Ian Burchett 2011 Western Kentucky University

Quantifying Computer Network Security, Ian Burchett

Masters Theses & Specialist Projects

Simplifying network security data to the point that it is readily accessible and usable by a wider audience is increasingly becoming important, as networks become larger and security conditions and threats become more dynamic and complex, requiring a broader and more varied security staff makeup. With the need for a simple metric to quantify the security level on a network, this thesis proposes: simplify a network’s security risk level into a simple metric. Methods for this simplification of an entire network’s security level are conducted on several characteristic networks. Identification of computer network port vulnerabilities from NIST’s ...


Assessing Ipv6 Through Web Access - A Measurement Study And Its Findings, Mehdi Nikkhah, Roch A. Guérin, Yiu Lee, Richard Woundy 2011 University of Pennsylvania

Assessing Ipv6 Through Web Access - A Measurement Study And Its Findings, Mehdi Nikkhah, Roch A. Guérin, Yiu Lee, Richard Woundy

Departmental Papers (ESE)

Transitioning an infrastructure the size of the Internet is no small feat. We are in the midst of such a transition, \ie from IPv4 to IPv6. IPv6 was standardized 15~years ago, but until recently there were few incentives to adopt it. The allocation of the last large block of IPv4 addresses changed that, and migrating to an IPv6 Internet has become more urgent. This migration is, however, still rife with uncertainties and challenges. The goal of this paper is to provide insight into this transition, and possibly make it smoother. The focus is on the ``network,'' and the paper ...


Computing Inconsistency Measure Based On Paraconsistent Semantics, Pascal Hitzler, Yue Ma, Guilin Qi 2011 Wright State University - Main Campus

Computing Inconsistency Measure Based On Paraconsistent Semantics, Pascal Hitzler, Yue Ma, Guilin Qi

Computer Science and Engineering Faculty Publications

Measuring inconsistency in knowledge bases has been recognized as an important problem in several research areas. Many methods have been proposed to solve this problem and a main class of them is based on some kind of paraconsistent semantics. However, existing methods suffer from two limitations: (i) they are mostly restricted to propositional knowledge bases; (ii) very few of them discuss computational aspects of computing inconsistency measures. In this article, we try to solve these two limitations by exploring algorithms for computing an inconsistency measure of first-order knowledge bases. After introducing a four-valued semantics for first-order logic, we define an ...


Overview Of Contrast Data Mining As A Field And Preview Of An Upcoming Book, Guozhu Dong, James Bailey 2011 Wright State University - Main Campus

Overview Of Contrast Data Mining As A Field And Preview Of An Upcoming Book, Guozhu Dong, James Bailey

Kno.e.sis Publications

This report provides an overview of the field of contrast data mining and its applications, and offers a preview of an upcoming book on the topic. The importance of contrasting is discussed and a brief survey is given covering the following topics: general definitions and terminology for contrast patterns, representative contrast pattern mining algorithms, applications of contrast mining for fundamental data mining tasks such as classification and clustering, applications of contrast mining in bioinformatics, medicine, blog analysis, image analysis and subgroup mining, results on contrast based dataset similarity measure, and on analyzing item interaction in contrast patterns, and open research ...


Distributed Algorithms For Energy Savings In The Core Network, Lin Liu 2011 University of Nebraska-Lincoln

Distributed Algorithms For Energy Savings In The Core Network, Lin Liu

Computer Science and Engineering: Theses, Dissertations, and Student Research

Recently, many efforts have been undertaken to reduce the energy consumption of core networks. Bundle link is a commonly deployed technique in core networks to combine several high-speed physical sublinks into a virtual connection to achieve bandwidth upgrade flexibility and network reliability. The traffic passing through a bundle link can be carried fully over the first few sublinks (bin packing) or evenly distributed over all sublinks (load balancing). In the current network when a bundle link is on, all of its sublinks are on, thus, selectively shutting down a few sublinks during periods of low traffic could save a large ...


High-Performance Java Platform Computing, Thomas W. Christopher, George K. Thiruvathukal 2011 Loyola University Chicago

High-Performance Java Platform Computing, Thomas W. Christopher, George K. Thiruvathukal

George K. Thiruvathukal

Threading and concurrency are crucial to building high-performance Java applications -- but they have a reputation for complexity. High Performance Java Computing thoroughly demystifies these advanced development techniques. It delivers practical programming solutions, proven design patterns, and a rigorously-tested code library -- everything developers need to build optimized Java software for technical, business, and E-commerce applications. Start by understanding how threading and concurrency can be used to solve a wide variety of performance problems, enabling the construction of more powerful networked applications. Master the Java 2 Threads classes, including daemon threads, thread control, scheduling, and more. Review the key problems of parallelism ...


Trust-Based Service Selection, Zainab Aljazzaf 2011 The University of Western Ontario

Trust-Based Service Selection, Zainab Aljazzaf

Electronic Thesis and Dissertation Repository

Service Oriented Architecture (SOA) is an architectural style that builds enterprise solutions based on services. In SOA, the lack of trust between different parties affects the adoption of such architecture. Trust is as significant a factor for successful online interactions as it is in real life communities, and consequently, it is an important factor that is used as a criterion for service selection. In the context of online services and SOA, the literature shows that the field of trust is not mature. Trust definition and the consideration of the essentials of trust aspects do not reflect the true nature of ...


Non-Redundant Sequential Rules,Theory And Algorithm, David LO, Siau-Cheng Khoo, Limsoon Wong 2011 Singapore Management University

Non-Redundant Sequential Rules,Theory And Algorithm, David Lo, Siau-Cheng Khoo, Limsoon Wong

David LO

A sequential rule expresses a relationship between two series of events happening one after another. Sequential rules are potentially useful for analyzing data in sequential format, ranging from purchase histories, network logs and program execution traces. In this work, we investigate and propose a syntactic characterization of a non-redundant set of sequential rules built upon past work on compact set of representative patterns. A rule is redundant if it can be inferred from another rule having the same support and confidence. When using the set of mined rules as a composite filter, replacing a full set of rules with a ...


The Knowledge-Driven Exploration Of Integrated Biomedical Knowledge Sources Facilitates The Generation Of New Hypotheses, Vinh Nguyen, Olivier Bodenreider, Todd Minning, Amit P. Sheth 2011 Wright State University - Main Campus

The Knowledge-Driven Exploration Of Integrated Biomedical Knowledge Sources Facilitates The Generation Of New Hypotheses, Vinh Nguyen, Olivier Bodenreider, Todd Minning, Amit P. Sheth

Kno.e.sis Publications

Knowledge gained from the scientific literature can complement newly obtained experimental data in helping researchers understand the pathological processes underlying diseases. However, unless the scientific literature and experimental data are semantically integrated, it is generally difficult for scientists to exploit the two sources effectively. We argue that, in addition to the semantic integration of heterogeneous knowledge sources, the usability of the integrated resource by scientists is dependent upon the availability of knowledge visualization and exploration tools. Moreover, the integration techniques must be scalable and the exploration interfaces must be easy to use by bench scientists. The end goal of such ...


Demonstration: Secure - Semantics Empowered Rescue Environment, Pratikkumar Desai, Cory Andrew Henson, Pramod Anantharam, Amit P. Sheth 2011 Wright State University - Main Campus

Demonstration: Secure - Semantics Empowered Rescue Environment, Pratikkumar Desai, Cory Andrew Henson, Pramod Anantharam, Amit P. Sheth

Kno.e.sis Publications

This paper demonstrates a Semantic Web enabled system for collecting and processing sensor data within a rescue environment. The real-time system collects heterogeneous raw sensor data from rescue robots through a wireless sensor network. The raw sensor data is converted to RDF using the Semantic Sensor Network (SSN) ontology and further processed to generate abstractions used for event detection in emergency scenarios.


Demonstration: Real-Time Semantic Analysis Of Sensor Streams, Harshal Patni, Cory Andrew Henson, Michael Cooney, Amit P. Sheth, Krishnaprasad Thirunarayan 2011 Wright State University - Main Campus

Demonstration: Real-Time Semantic Analysis Of Sensor Streams, Harshal Patni, Cory Andrew Henson, Michael Cooney, Amit P. Sheth, Krishnaprasad Thirunarayan

Kno.e.sis Publications

The emergence of dynamic information sources – including sensor networks – has led to large streams of real-time data on the Web. Research studies suggest, these dynamic networks have created more data in the last three years than in the entire history of civilization, and this trend will only increase in the coming years [1]. With this coming data explosion, real-time analytics software must either adapt or die [2]. This paper focuses on the task of integrating and analyzing multiple heterogeneous streams of sensor data with the goal of creating meaningful abstractions, or features. These features are then temporally aggregated into feature ...


Personalized Filtering Of The Twitter Stream, Pavan Kapanipathi, Fabrizio Orlandi, Amit P. Sheth, Alexandre Passant 2011 Wright State University - Main Campus

Personalized Filtering Of The Twitter Stream, Pavan Kapanipathi, Fabrizio Orlandi, Amit P. Sheth, Alexandre Passant

Kno.e.sis Publications

With the rapid growth in users on social networks, there is a corresponding increase in user-generated content, in turn resulting in information overload. On Twitter, for example, users tend to receive uninterested information due to their non-overlapping interests from the people whom they follow. In this paper we present a Semantic Web approach to filter public tweets matching interests from personalized user profiles. Our approach includes automatic generation of multi-domain and personalized user profiles, filtering Twitter stream based on the generated profiles and delivering them in real-time. Given that users interests and personalization needs change with time, we also discuss ...


Sempush: Privacy-Aware And Scalable Broadcasting For Semantic Microblogging, Pavan Kapanipathi, Julia Anaya, Alexandre Passant 2011 Wright State University - Main Campus

Sempush: Privacy-Aware And Scalable Broadcasting For Semantic Microblogging, Pavan Kapanipathi, Julia Anaya, Alexandre Passant

Kno.e.sis Publications

Users of traditional microblogging platforms such as Twitter face drawbacks in terms of (1) Privacy of status updates as a followee - reaching undesired people (2) Information overload as a follower - receiving uninteresting microposts from followees. In this paper we demonstrate distributed and user-controlled dissemination of microposts using SMOB (semantic microblogging framework) and Semantic Hub (privacy-aware implementation of PuSH3 protocol) . The approach leverages users' Social Graph to dynamically create group of followers who are eligible to receive micropost. The restrictions to create the groups are provided by the followee based on the hastags in the micropost. Both SMOB and Semantic Hub ...


Semantic Annotation And Search For Resources In The Next Generation Web With Sa-Rest, Ajith H. Ranabahu, Amit P. Sheth, Maryam Panahiazar, Sanjaya Wijeratne 2011 Wright State University - Main Campus

Semantic Annotation And Search For Resources In The Next Generation Web With Sa-Rest, Ajith H. Ranabahu, Amit P. Sheth, Maryam Panahiazar, Sanjaya Wijeratne

Kno.e.sis Publications

SA-REST, the W3C member submission, can be used for supporting a wide variety of Plain Old Semantic HTML (POSH) annotation capabilities on any type of Web resource. Kino framework and tools provide support of capabilities to realize SA-RESTs promised value. These tools include (a) a browser-plugin to support annotation of a Web resource (including services) with respect to an ontology, domain model or vocabulary, (b) an annotation aware indexing engine and (c) faceted search and selection of the Web resources. At one end of the spectrum, we present KinoE (aka Kino for Enterprise) which uses NCBO formal ontologies and ...


A Domain Specific Language For Enterprise Grade Cloud-Mobile Hybrid Applications, Ajith H. Ranabahu, E. Michael Maximilien, Amit P. Sheth, Krishnaprasad Thirunarayan 2011 Wright State University - Main Campus

A Domain Specific Language For Enterprise Grade Cloud-Mobile Hybrid Applications, Ajith H. Ranabahu, E. Michael Maximilien, Amit P. Sheth, Krishnaprasad Thirunarayan

Kno.e.sis Publications

Cloud computing has changed the technology landscape by offering flexible and economical computing resources to the masses. However, vendor lock-in makes the migration of applications and data across clouds an expensive proposition. The lock-in is especially serious when considering the new technology trend of combining cloud with mobile devices.

In this paper, we present a domain specific language (DSL) that is purposely created for generating hybrid applications spanning across mobile devices as well as computing clouds. We propose a model-driven development process that makes use of a DSL to provide sufficient programming abstractions over both cloud and mobile features. We ...


Digital Commons powered by bepress