Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

34,262 Full-Text Articles 34,387 Authors 10,216,521 Downloads 307 Institutions

All Articles in Computer Sciences

Faceted Search

34,262 full-text articles. Page 1018 of 1026.

An Interoperable And Secure Architecture For Internet-Scale Decentralized Personal Communication, David Alan Bryan 2010 College of William & Mary - Arts & Sciences

An Interoperable And Secure Architecture For Internet-Scale Decentralized Personal Communication, David Alan Bryan

Dissertations, Theses, and Masters Projects

Interpersonal network communications, including Voice over IP (VoIP) and Instant Messaging (IM), are increasingly popular communications tools. However, systems to date have generally adopted a client-server model, requiring complex centralized infrastructure, or have not adhered to any VoIP or IM standard. Many deployment scenarios either require no central equipment, or due to unique properties of the deployment, are limited or rendered unattractive by central servers. to address these scenarios, we present a solution based on the Session Initiation Protocol (SIP) standard, utilizing a decentralized Peer-to-Peer (P2P) mechanism to distribute data. Our new approach, P2PSIP, enables users to communicate with minimal ...


Application Of Information Theory And Statistical Learning To Anomaly Detection, Steven Gianvecchio 2010 College of William & Mary - Arts & Sciences

Application Of Information Theory And Statistical Learning To Anomaly Detection, Steven Gianvecchio

Dissertations, Theses, and Masters Projects

In today's highly networked world, computer intrusions and other attacks area constant threat. The detection of such attacks, especially attacks that are new or previously unknown, is important to secure networks and computers. A major focus of current research efforts in this area is on anomaly detection.;In this dissertation, we explore applications of information theory and statistical learning to anomaly detection. Specifically, we look at two difficult detection problems in network and system security, (1) detecting covert channels, and (2) determining if a user is a human or bot. We link both of these problems to entropy, a ...


Eliciting User Requirements Using Appreciative Inquiry, Carol Kernitzki Gonzales 2010 Claremont Graduate University

Eliciting User Requirements Using Appreciative Inquiry, Carol Kernitzki Gonzales

CGU Theses & Dissertations

Many software development projects fail because they do not meet the needs of users, are over-budget, and abandoned. To address this problem, the user requirements elicitation process was modified based on principles of Appreciative Inquiry. Appreciative Inquiry, commonly used in organizational development, aims to build organizations, processes, or systems based on success stories using a hopeful vision for an ideal future. Spanning five studies, Appreciative Inquiry was evaluated for its effectiveness with eliciting user requirements. In the first two cases, it was compared with traditional approaches with end-users and proxy-users. The third study was a quasi-experiment comparing the use of ...


Supporting Feature-Level Software Maintenance, Meghan Kathleen Revelle 2010 College of William & Mary - Arts & Sciences

Supporting Feature-Level Software Maintenance, Meghan Kathleen Revelle

Dissertations, Theses, and Masters Projects

Software maintenance is the process of modifying a software system to fix defects, improve performance, add new functionality, or adapt the system to a new environment. A maintenance task is often initiated by a bug report or a request for new functionality. Bug reports typically describe problems with incorrect behaviors or functionalities. These behaviors or functionalities are known as features. Even in very well-designed systems, the source code that implements features is often not completely modularized. The delocalized nature of features makes maintaining them challenging. Since maintenance tasks are expressed in terms of features, the goal of this dissertation is ...


Secure And Efficient Data Extraction For Ubiquitous Computing Applications, Chiu Chiang Tan 2010 College of William & Mary - Arts & Sciences

Secure And Efficient Data Extraction For Ubiquitous Computing Applications, Chiu Chiang Tan

Dissertations, Theses, and Masters Projects

Ubiquitous computing creates a world where computers have blended seamlessly into our physical environment. In this world, a "computer" is no longer a monitor-and-keyboard setup, but everyday objects such as our clothing and furniture. Unlike current computer systems, most ubiquitous computing systems are built using small, embedded devices with limited computational, storage and communication abilities. A common requirement for many ubiquitous computing applications is to utilize the data from these small devices to perform more complex tasks. For critical applications such as healthcare or medical related applications, there is a need to ensure that only authorized users have timely access ...


Enhancing Web Browsing Security, Chuan Yue 2010 College of William & Mary - Arts & Sciences

Enhancing Web Browsing Security, Chuan Yue

Dissertations, Theses, and Masters Projects

Web browsing has become an integral part of our lives, and we use browsers to perform many important activities almost everyday and everywhere. However, due to the vulnerabilities in Web browsers and Web applications and also due to Web users' lack of security knowledge, browser-based attacks are rampant over the Internet and have caused substantial damage to both Web users and service providers. Enhancing Web browsing security is therefore of great need and importance.;This dissertation concentrates on enhancing the Web browsing security through exploring and experimenting with new approaches and software systems. Specifically, we have systematically studied four challenging ...


Remote Access Forensics For Vnc And Rdp On Windows Platform, Paresh Kerai 2010 Edith Cowan University

Remote Access Forensics For Vnc And Rdp On Windows Platform, Paresh Kerai

Theses : Honours

There has been a greater implementation of remote access technologies in recent years. Many organisations are adapting remote technologies such as Virtual Network Computing (VNC) and remote desktop (RDP) applications as customer support application. They use these applications to remotely configure computers and solve computer and network issues of the client on spot. Therefore, the system administrator or the desktop technician does not have to sit on the client computer physically to solve a computer issue. This increase in adaptation of remote applications is of interest to forensic investigators; this is because illegal activities can be performed over the connection ...


Book Review: Digital Forensic Evidence Examination, Gary C. Kessler 2010 Gary Kessler Associates

Book Review: Digital Forensic Evidence Examination, Gary C. Kessler

Publications

This document is Dr. Kessler's review of the second edition of Digital Forensic Evidence Examination by Fred Cohen. ASP Press, 2010. ISBN: 978-1-878109-45-3


Website Accessibility Issues In Western Australian Public Libraries, Vivienne L. Conway 2010 Edith Cowan University

Website Accessibility Issues In Western Australian Public Libraries, Vivienne L. Conway

Theses : Honours

Website accessibility is a very real and pressing issue for public libraries internationally. Tim Berners-Lee credited with founding the Web, states "The power of the Web is in its universality. Access by everyone regardless of disability is an essential aspect." (Henry & McGee, 2010). There is wide-spread support for adherence to the Web Content Advisory Guidelines Version 1.0 and 2.0 (WCAG) throughout Federal, State and Local levels of government in Australia. The Guidelines have also been affirmed by the Australian Human Rights Commission, disability advocacy groups such as Vision Australia, and the Australian Library and Information Association. The Australian ...


Inside The Selection Box: Visualising Active Learning Selection Strategies, Brian Mac Namee, Rong Hu, Sarah Jane Delany 2010 Technological University Dublin

Inside The Selection Box: Visualising Active Learning Selection Strategies, Brian Mac Namee, Rong Hu, Sarah Jane Delany

Conference papers

Visualisations can be used to provide developers with insights into the inner workings of interactive machine learning techniques. In active learning, an inherently interactive machine learning technique, the design of selection strategies is the key research question and this paper demonstrates how spring model based visualisations can be used to provide insight into the precise operation of various selection strategies. Using sample datasets, this paper provides detailed examples of the differences between a range of selection strategies.


A Computational Analysis Of Cognitive Effort, Luca Longo, Stephen Barrett 2010 Technological University Dublin

A Computational Analysis Of Cognitive Effort, Luca Longo, Stephen Barrett

Books/Book Chapters

Cognitive effort is a concept of unquestionable utility in understanding human behaviour. However, cognitive effort has been defined in several ways in literature and in everyday life, suffering from a partial understanding. It is common to say “Pay more attention in studying that subject” or “How much effort did you spend in resolving that task?”, but what does it really mean? This contribution tries to clarify the concept of cognitive effort, by introducing its main influencing factors and by presenting a formalism which provides us with a tool for precise discussion. The formalism is implementable as a computational concept and ...


Enhancing 3d Lidar Data Handling, Debra Laefer, Michela Bertolotto, Bianca Schoen-Phelan 2010 University College Dublin

Enhancing 3d Lidar Data Handling, Debra Laefer, Michela Bertolotto, Bianca Schoen-Phelan

Articles

more evident than in the limited capabilities of Spatial Information Systems (SIS) to manipulate data from aerial Light Detection and Ranging (LiDAR). Currently, multiple software packages are needed to conduct three-dimensional (3D) analysis of LiDAR data. This workflow heavily relies on importing and exporting different file formats, thus potentially losing accuracy and increasing costs. Ideally, all required functionality would be available within a single system. New functionalities in Oracle Spatial combined with our enhanced 3D-indexing for hosting and analysing offer a critical breakthrough in this area.


Svm Based Active Learning With Exploration, Patrick Lindstrom, Rong Hu, Sarah Jane Delany, Brian Mac Namee 2010 Technological University Dublin

Svm Based Active Learning With Exploration, Patrick Lindstrom, Rong Hu, Sarah Jane Delany, Brian Mac Namee

Conference papers

No abstract provided.


Forensic Analysis Of A Playstation 3 Console, Scott Conrad, Greg Dorn, Philip Craiger 2010 University of Central Florida

Forensic Analysis Of A Playstation 3 Console, Scott Conrad, Greg Dorn, Philip Craiger

Publications

The Sony PlayStation 3 (PS3) is a powerful gaming console that supports Internet-related activities, local file storage and the playing of Blu-ray movies. The PS3 also allows users to partition and install a secondary operating system on the hard drive. This “desktop-like” functionality along with the encryption of the primary hard drive containing the gaming software raises significant issues related to the forensic analysis of PS3 systems. This paper discusses the PS3 architecture and behavior, and provides recommendations for conducting forensic investigations of PS3 systems.


Improving Parallel I/O Performance Using Interval I/O, Jeremy Logan 2010 The University of Maine

Improving Parallel I/O Performance Using Interval I/O, Jeremy Logan

Electronic Theses and Dissertations

Today's most advanced scientific applications run on large clusters consisting of hundreds of thousands of processing cores, access state of the art parallel file systems that allow files to be distributed across hundreds of storage targets, and utilize advanced interconnections systems that allow for theoretical I/O bandwidth of hundreds of gigabytes per second. Despite these advanced technologies, these applications often fail to obtain a reasonable proportion of available I/O bandwidth. The reasons for the poor performance of application I/O include the noncontiguous I/O access patterns used for scientific computing, contention due to false sharing, and ...


Cs 400-01: Data Structures And Software Design, Meilin Liu 2010 Wright State University - Main Campus

Cs 400-01: Data Structures And Software Design, Meilin Liu

Computer Science & Engineering Syllabi

This is a fundamental course for students majoring in Computer Science. Students will learn: basic algorithm analysis techniques; asymptotic complexity; big-0 and big-Omega notations; efficient algorithms for discrete structures including lists, trees, stacks, and graphs; fundamental computing algorithms including sorting, searching, and hashing techniques.


Cs 740-01: Algorithms, Complexity And The Theory Of Computability, Michael L. Raymer 2010 Wright State University - Main Campus

Cs 740-01: Algorithms, Complexity And The Theory Of Computability, Michael L. Raymer

Computer Science & Engineering Syllabi

No abstract provided.


Cs 415-01: Social Implications Of Computing, Leo Finkelstein 2010 Wright State University - Main Campus

Cs 415-01: Social Implications Of Computing, Leo Finkelstein

Computer Science & Engineering Syllabi

CS 415 is a communication skills course using as its subject matter current salient issues associated with the social implications of computing. In addition to the course text, you will need to use certain reading materials in the library and elsewhere, and you will be responsible for using concepts and theories provided in class lectures and discussions.


Ceg 460/660-01: Introduction To Software Computer Engineering, Prabhaker Mateti 2010 Wright State University - Main Campus

Ceg 460/660-01: Introduction To Software Computer Engineering, Prabhaker Mateti

Computer Science & Engineering Syllabi

[4 Credit Hours] Concepts of software engineering. Analysis, design, and implementation of software engineering concepts that comprise structured programming and design. Case studies serve as examples illustrating the software life-cycle model. Three hours lecture, two hours lab. 4.0 Credit hours. Prerequisites: Undergraduate level CS 400 Minimum Grade of D


Ceg 750: Microprocessor, Jack Jean 2010 Wright State University - Main Campus

Ceg 750: Microprocessor, Jack Jean

Computer Science & Engineering Syllabi

Design and implement an MC6812 computer system based on an Axiom CSM-12C32 board that allows the loading of a 6812 application program from a PC so as to reconfigure the system as both an analog waveform storage scope and a digital logic analyzer.


Digital Commons powered by bepress