Open Access. Powered by Scholars. Published by Universities.®

OS and Networks Commons

Open Access. Powered by Scholars. Published by Universities.®

1,712 Full-Text Articles 2,412 Authors 829,310 Downloads 111 Institutions

All Articles in OS and Networks

Faceted Search

1,712 full-text articles. Page 55 of 56.

What Goes Around Comes Around - Improving Linked Open Data Through On-Demand Model Creation, Christopher Thomas, Wenbo Wang, Pankaj Mehra, Delroy H. Cameron, Pablo N. Mendes, Amit P. Sheth 2010 Wright State University - Main Campus

What Goes Around Comes Around - Improving Linked Open Data Through On-Demand Model Creation, Christopher Thomas, Wenbo Wang, Pankaj Mehra, Delroy H. Cameron, Pablo N. Mendes, Amit P. Sheth

Kno.e.sis Publications

Web 2.0 has changed the way we share and keep up with information. We communicate through social media platforms and make the information we exchange to a large extent publicly available. Linked Open Data (LOD) follows the same paradigm of sharing information but also makes it machine accessible. LOD provides an abundance of structured information albeit in a less formally rigorous form than would be desirable for Semantic Web applications. Nevertheless, most of the LOD assertions are community reviewed and we can rely on their accuracy to a large extent. In this work we want to follow the Web 2.0 …


Dynamic Associative Relationships On The Linked Open Data Web, Pablo N. Mendes, Pavan Kapanipathi, Delroy H. Cameron, Amit P. Sheth 2010 Wright State University - Main Campus

Dynamic Associative Relationships On The Linked Open Data Web, Pablo N. Mendes, Pavan Kapanipathi, Delroy H. Cameron, Amit P. Sheth

Kno.e.sis Publications

We provide a definition of context based on theme, time and location, and propose a mixed retrieval/extraction model for the dynamic suggestion of trending relationships to LOD resources.


Performance Characteristics Of A Kernel-Space Packet Capture Module, Samuel W. Birch 2010 Air Force Institute of Technology

Performance Characteristics Of A Kernel-Space Packet Capture Module, Samuel W. Birch

Theses and Dissertations

Defending networks, network-connected assets, and the information they both carry and store is an operational challenge and a significant drain on resources. A plethora of historical and ongoing research efforts are focused on increasing the effectiveness of the defenses or reducing the costs of existing defenses. One valuable facet in defense is the ability to perform post mortem analysis of incidents that have occurred, and this tactic requires accurate storage and rapid retrieval of vast quantities of historical network data. This research improves the efficiency of capturing network packets to disk using commodity, general-purpose hardware and operating systems. It examines …


Visually Managing Ipsec, Peter J. Dell'Accio 2010 Air Force Institute of Technology

Visually Managing Ipsec, Peter J. Dell'accio

Theses and Dissertations

The United States Air Force relies heavily on computer networks to transmit vast amounts of information throughout its organizations and with agencies throughout the Department of Defense. The data take many forms, utilize different protocols, and originate from various platforms and applications. It is not practical to apply security measures specific to individual applications, platforms, and protocols. Internet Protocol Security (IPsec) is a set of protocols designed to secure data traveling over IP networks, including the Internet. By applying security at the network layer of communications, data packets can be secured regardless of what application generated the data or which …


Development Of A Methodology For Customizing Insider Threat Auditing On A Linux Operating System, William T. Bai 2010 Air Force Institute of Technology

Development Of A Methodology For Customizing Insider Threat Auditing On A Linux Operating System, William T. Bai

Theses and Dissertations

Insider threats can pose a great risk to organizations and by their very nature are difficult to protect against. Auditing and system logging are capabilities present in most operating systems and can be used for detecting insider activity. However, current auditing methods are typically applied in a haphazard way, if at all, and are not conducive to contributing to an effective insider threat security policy. This research develops a methodology for designing a customized auditing and logging template for a Linux operating system. An intent-based insider threat risk assessment methodology is presented to create use case scenarios tailored to address …


A Distributed Network Logging Topology, Nicholas E. Fritts 2010 Air Force Institute of Technology

A Distributed Network Logging Topology, Nicholas E. Fritts

Theses and Dissertations

Network logging is used to monitor computer systems for potential problems and threats by network administrators. Research has found that the more logging enabled, the more potential threats can be detected in the logs (Levoy, 2006). However, generally it is considered too costly to dedicate the manpower required to analyze the amount of logging data that it is possible to generate. Current research is working on different correlation and parsing techniques to help filter the data, but these methods function by having all of the data dumped in to a central repository. Central repositories are limited in the amount of …


A Self-Organizing Neural Architecture Integrating Desire, Intention And Reinforcement Learning, Ah-hwee TAN, Yu-Hong FENG, Yew-Soon ONG 2010 Singapore Management University

A Self-Organizing Neural Architecture Integrating Desire, Intention And Reinforcement Learning, Ah-Hwee Tan, Yu-Hong Feng, Yew-Soon Ong

Research Collection School Of Computing and Information Systems

This paper presents a self-organizing neural architecture that integrates the features of belief, desire, and intention (BDI) systems with reinforcement learning. Based on fusion Adaptive Resonance Theory (fusion ART), the proposed architecture provides a unified treatment for both intentional and reactive cognitive functionalities. Operating with a sense-act-learn paradigm, the low level reactive module is a fusion ART network that learns action and value policies across the sensory, motor, and feedback channels. During performance, the actions executed by the reactive module are tracked by a high level intention module (also a fusion ART network) that learns to associate sequences of actions …


Ssrn As An Initial Revolution In Academic Knowledge Aggregation And Dissemination, David Bray, Sascha Vitzthum, Benn Konsynski 2010 National Defense University

Ssrn As An Initial Revolution In Academic Knowledge Aggregation And Dissemination, David Bray, Sascha Vitzthum, Benn Konsynski

Sascha Vitzthum

Within this paper we consider our results of using the Social Science Research Network (SSRN) over a period of 18 months to distribute our working papers to the research community. Our experiences have been quite positive, with SSRN serving as a platform both to inform our colleagues about our research as well as inform us about related research (through email and telephoned conversations of colleagues who discovered our paper on SSRN). We then discuss potential future directions for SSRN to consider, and how SSRN might well represent an initial revolution in 21st century academic knowledge aggregation and dissemination. Our paper …


Linked Open Social Signals, Pablo N. Mendes, Alexandre Passant, Pavan Kapanipathi, Amit P. Sheth 2010 Wright State University - Main Campus

Linked Open Social Signals, Pablo N. Mendes, Alexandre Passant, Pavan Kapanipathi, Amit P. Sheth

Kno.e.sis Publications

In this paper we discuss the collection, semantic annotation and analysis of real-time social signals from micro-blogging data. We focus on users interested in analyzing social signals collectively for sensemaking. Our proposal enables flexibility in selecting subsets for analysis, alleviating information overload. We define an architecture that is based on state-of-the-art Semantic Web technologies and a distributed publish subscribe protocol for real time communication. In addition, we discuss our method and application in a scenario related to the health care reform in the United States.


Semantics Centric Solutions For Application And Data Portability In Cloud Computing, Ajith Harshana Ranabahu, Amit P. Sheth 2010 Wright State University - Main Campus

Semantics Centric Solutions For Application And Data Portability In Cloud Computing, Ajith Harshana Ranabahu, Amit P. Sheth

Kno.e.sis Publications

Cloud computing has become one of the key considerations both in academia and industry. Cheap, seemingly unlimited computing resources that can be allocated almost instantaneously and pay-as-you-go pricing schemes are some of the reasons for the success of Cloud computing. The Cloud computing landscape, however, is plagued by many issues hindering adoption. One such issue is vendor lock-in, forcing the Cloud users to adhere to one service provider in terms of data and application logic. Semantic Web has been an important research area that has seen significant attention from both academic and industrial researchers. One key property of Semantic Web …


A Reasonable Semantic Web, Pascal Hitzler, Frank van Harmelen 2010 Wright State University - Main Campus

A Reasonable Semantic Web, Pascal Hitzler, Frank Van Harmelen

Computer Science and Engineering Faculty Publications

The realization of Semantic Web reasoning is central to substantiating the Semantic Web vision. However, current mainstream research on this topic faces serious challenges, which forces us to question established lines of research and to rethink the underlying approaches. We argue that reasoning for the Semantic Web should be understood as "shared inference," which is not necessarily based on deductive methods. Model-theoretic semantics (and sound and complete reasoning based on it) functions as a gold standard, but applications dealing with large-scale and noisy data usually cannot afford the required runtimes. Approximate methods, including deductive ones, but also approaches based on …


Approximate Instance Retrieval On Ontologies, Tuvshintur Tserendorj, Stephan Grimm, Pascal Hitzler 2010 Wright State University - Main Campus

Approximate Instance Retrieval On Ontologies, Tuvshintur Tserendorj, Stephan Grimm, Pascal Hitzler

Computer Science and Engineering Faculty Publications

With the development of more expressive description logics (DLs) for the Web Ontology Language OWL the question arises how we can properly deal with the high computational complexity for efficient reasoning. In application cases that require scalable reasoning with expressive ontologies, non-standard reasoning solutions such as approximate reasoning are necessary to tackle the intractability of reasoning in expressive DLs. In this paper, we are concerned with the approximation of the reasoning task of instance retrieval on DL knowledge bases, trading correctness of retrieval results for gain of speed. We introduce our notion of an approximate concept extension and we provide …


Nominal Schemas For Integrating Rules And Ontologies, Frederick Maier, Adila A. Krisnadhi, Pascal Hitzler 2010 Wright State University - Main Campus

Nominal Schemas For Integrating Rules And Ontologies, Frederick Maier, Adila A. Krisnadhi, Pascal Hitzler

Computer Science and Engineering Faculty Publications

We propose a description-logic style extension of OWL DL, which includes DL-safe variable SWRL and seamlessly integrates datalog rules. Our language also sports a tractable fragment, which we call ELP 2, covering OWL EL, OWL RL, most of OWL QL, and variable restricted datalog.


Semantic Web – Interoperability, Usability, Applicability, Pascal Hitzler, Krzysztof Janowicz 2010 Wright State University - Main Campus

Semantic Web – Interoperability, Usability, Applicability, Pascal Hitzler, Krzysztof Janowicz

Computer Science and Engineering Faculty Publications

No abstract provided.


Sensor Data And Perception: Can Sensors Play 20 Questions, Cory Andrew Henson 2010 Wright State University - Main Campus

Sensor Data And Perception: Can Sensors Play 20 Questions, Cory Andrew Henson

Kno.e.sis Publications

Currently, there are many sensors collecting information about our environment, leading to an overwhelming number of observations that must be analyzed and explained in order to achieve situation awareness. As perceptual beings, we are also constantly inundated with sensory data, yet we are able to make sense of our environment with relative ease. Why is the task of perception so easy for us, and so hard for machines; and could this have anything to do with how we play the game 20 Questions?


Twitris 2.0 : Semantically Empowered System For Understanding Perceptions From Social Data, Ashutosh Sopan Jadhav, Hemant Purohit, Pavan Kapanipathi, Pramod Anantharam, Ajith H. Ranabahu, Vinh Nguyen, Pablo N. Mendes, Alan Gary Smith, Michael Cooney, Amit P. Sheth 2010 Wright State University - Main Campus

Twitris 2.0 : Semantically Empowered System For Understanding Perceptions From Social Data, Ashutosh Sopan Jadhav, Hemant Purohit, Pavan Kapanipathi, Pramod Anantharam, Ajith H. Ranabahu, Vinh Nguyen, Pablo N. Mendes, Alan Gary Smith, Michael Cooney, Amit P. Sheth

Kno.e.sis Publications

We present Twitris 2.0, a Semantic Web application that facilitates understanding of social perceptions by Semantics-based processing of massive amounts of event-centric data. Twitris 2.0 addresses challenges in large scale processing of social data, preserving spatio-temporal-thematic properties. Twitris 2.0 also covers context based semantic integration of multiple Web resources and expose semantically enriched social data to the public domain. Semantic Web technologies enable the systematic integration and analysis abilities.


Automated Isolation Of Translational Efficiency Bias That Resists The Confounding Effect Of Gc(At)-Content, Douglas W. Raiford, Dan E. Krane, Travis E. Doom, Michael L. Raymer 2010 Wright State University - Main Campus

Automated Isolation Of Translational Efficiency Bias That Resists The Confounding Effect Of Gc(At)-Content, Douglas W. Raiford, Dan E. Krane, Travis E. Doom, Michael L. Raymer

Kno.e.sis Publications

Genomic sequencing projects are an abundant source of information for biological studies ranging from the molecular to the ecological in scale; however, much of the information present may yet be hidden from casual analysis. One such information domain, trends in codon usage, can provide a wealth of information about an organism's genes and their expression. Degeneracy in the genetic code allows more than one triplet codon to code for the same amino acid, and usage of these codons is often biased such that one or more of these synonymous codons is preferred. Detection of this bias is an important tool …


Loqus: Linked Open Data Sparql Querying System, Prateek Jain, Kunal Verma, Peter Z. Yeh, Pascal Hitzler, Amit P. Sheth 2010 Wright State University - Main Campus

Loqus: Linked Open Data Sparql Querying System, Prateek Jain, Kunal Verma, Peter Z. Yeh, Pascal Hitzler, Amit P. Sheth

Kno.e.sis Publications

The LOD cloud is gathering a lot of momentum, with the number of contributors growing manifold. Many prominent data providers have submitted and linked their data to other dataset with the help of manual mappings. The potential of the LOD cloud is enormous ranging from challenging AI issues such as open domain question answering to automated knowledge discovery. We believe that there is not enough technology support available to effectively query the LOD cloud. To this effect, we present a system called Linked Open Data SPARQL Querying System (LOQUS), which automatically maps users queries written in terms of a conceptual …


Computing For The Human Experience: Semantics-Empowered Sensors, Services, And Social Computing On The Ubiquitous Web, Amit P. Sheth 2010 Wright State University - Main Campus

Computing For The Human Experience: Semantics-Empowered Sensors, Services, And Social Computing On The Ubiquitous Web, Amit P. Sheth

Kno.e.sis Publications

People are on the verge of an era in which the human experience can be enriched in ways they couldn't have imagined two decades ago. Rather than depending on a single technology, people progressed with several whose semantics-empowered convergence and integration will enable us to capture, understand, and reapply human knowledge and intellect. Such capabilities will consequently elevate our technological ability to deal with the abstractions, concepts, and actions that characterize human experiences. This will herald computing for human experience (CHE). The CHE vision is built on a suite of technologies that serves, assists, and cooperates with humans to nondestructively …


A Qualitative Examination Of Topical Tweet And Retweet Practices, Meenakshi Nagarajan, Hemant Purohit, Amit P. Sheth 2010 Wright State University - Main Campus

A Qualitative Examination Of Topical Tweet And Retweet Practices, Meenakshi Nagarajan, Hemant Purohit, Amit P. Sheth

Kno.e.sis Publications

This work contributes to the study of retweet behavior on Twitter surrounding real-world events. We analyze over a million tweets pertaining to three events, present general tweet properties in such topical datasets and qualitatively analyze the properties of the retweet behavior surrounding the most tweeted/viral content pieces. Findings include a clear relationship between sparse/dense retweet patterns and the content and type of a tweet itself; suggesting the need to study content properties in link-based diffusion models.


Digital Commons powered by bepress