Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

37,714 Full-Text Articles 39,574 Authors 10,216,521 Downloads 318 Institutions

All Articles in Computer Sciences

Faceted Search

37,714 full-text articles. Page 1165 of 1165.

Knoor: Knowledge Repository Open Network., S M. Shafi, Nadim Akhtar Khan, Rosy Jan 2009 university of Kashmir, Srinagar, INDIA, 190006

Knoor: Knowledge Repository Open Network., S M. Shafi, Nadim Akhtar Khan, Rosy Jan

NADIM AKHTAR KHAN

The paper discusses KNoor (Knowledge Repository Open Network) which aims at harvesting and aggregating the scholarly products emanating from research and scientific institutions of Jammu & Kashmir. The paper highlights genesis, significance, cooperation and various modules of access etc with screen shots as a unique cooperative, multilingual repository of research papers, ETDs and conference proceedings of three premier institutes of valley (University of Kashmir, Sher-e-Kashmir Institute of Medical sciences, Sher-e-Kashmir University of Agricultural Sciences) in the first phase. It also discusses challenges and lessons learnt in the process with a view to help other institutions to advance the mission of Open ...


Integrating Software Assurance Into The Software Development Life Cycle (Sdlc), Maurice Dawson, Darrell N. Burrell, Emad Rahim, Stephen Brewster 2009 Oklahoma State University - Main Campus

Integrating Software Assurance Into The Software Development Life Cycle (Sdlc), Maurice Dawson, Darrell N. Burrell, Emad Rahim, Stephen Brewster

Maurice Dawson

This article examines the integration of secure coding practices into the overall Software Development Life Cycle (SDLC). Also detailed is a proposed methodology for integrating software assurance into the Department of Defense Information Assurance Certification & Accreditation Process (DIACAP). This method for integrating software assurance helps in properly securing the application layer as that is where more than half of the vulnerabilities lie in a system.


Reverse Engineering For Mobile Systems Forensics With Ares, John Tuttle, Robert J. Walls, Erik G. Learned-Miller, Brian Neil Levine 2009 University of Massachusetts - Amherst

Reverse Engineering For Mobile Systems Forensics With Ares, John Tuttle, Robert J. Walls, Erik G. Learned-Miller, Brian Neil Levine

Erik G Learned-Miller

We present Ares ,areverseengineeringtechniqueforassist- ing in the analysis of data recovered for the investigation of mobile and embedded systems. The focus of investigations into insider activity is most often on the data stored on the insider’s computers and digital devices — call logs, email messaging, calendar entries, text messages, and browser his- tory — rather than on the status of the system’s security. Ares is novel in that it uses a data-driven approach that in- corporates natural language processing techniques to infer the layout of input data that has been created according to some unknown specification. While some other reverse ...


Reallocation Of Mesh Points In Fluid Problems Using Back-Propagation Algorithm, Philadelphia University 2009 Philadelphia University

Reallocation Of Mesh Points In Fluid Problems Using Back-Propagation Algorithm, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Development And Evaluation Of A Chemistry Educational Software For Learning Organic Reactions Using Qualitative Reasoning, Rukaini Abdullah 2009 University of Malaya

Development And Evaluation Of A Chemistry Educational Software For Learning Organic Reactions Using Qualitative Reasoning, Rukaini Abdullah

Rukaini Abdullah

In science education, it is believed that students should understand the qualitative principles that govern the subject including the cause-effect relationships in processes before they are immersed in complex problem solving. Traditional educational programs for teaching organic chemistry do not usually explain or justify an observed chemical phenomenon. These programs do not “explain” simply because the results are obtained through chaining the rules or by searching the reaction routes that have been pre-coded in software. This paper discusses the development techniques, simulation results, and student evaluation of a software tool that aimed to help chemistry students learn organic processes through ...


Diagnosing Intermittent And Persistent Faults Using Static Bayesian Networks, Ole J. Mengshoel, Brian Ricks 2009 Carnegie Mellon University

Diagnosing Intermittent And Persistent Faults Using Static Bayesian Networks, Ole J. Mengshoel, Brian Ricks

Ole J Mengshoel

Both intermittent and persistent faults may occur in a wide range of systems. We present in this paper the introduction of intermittent fault handling techniques into ProDiagnose, an algorithm that previously only handled persistent faults. We discuss novel algorithmic techniques as well as how our static Bayesian networks help diagnose, in an integrated manner, a range of intermittent and persistent faults. Through experiments with data from the ADAPT electrical power system test bed, generated as part of the Second International Diagnostic Competition (DXC-10), we show that this novel variant of ProDiagnose diagnoses intermittent faults accurately and quickly, while maintaining strong ...


Learning Class-Specific Image Transformations With Higher-Order Boltzmann Machines, Erik G. Learned-Miller, Gary Huang 2009 University of Massachusetts - Amherst

Learning Class-Specific Image Transformations With Higher-Order Boltzmann Machines, Erik G. Learned-Miller, Gary Huang

Erik G Learned-Miller

In this paper, we examine the problem of learning a rep- resentation of image transformations specific to a complex object class, such as faces. Learning such a representation for a specific object class would allow us to perform im- proved, pose-invariant visual verification, such as uncon- strained face verification. We build off of the method of using factored higher-order Boltzmann machines to model such image transformations. Using this approach will po- tentially enable us to use the model as one component of a larger deep architecture. This will allow us to use the fea- ture information in an ordinary deep ...


Revelations Of Adaptive Technology Hiding In Your Operating System, Kathleen P. King 2009 University of South Florida

Revelations Of Adaptive Technology Hiding In Your Operating System, Kathleen P. King

Kathleen P King

Pre-publication version of a chapter about the assistive technology tools and resources available for free in Windows OS and Mac OS. Introducing higher education faculty to free resources, features and programs which they can recommend to their students or perhaps use for themselves (for instance for fading eyesight or hearing). In addition, the chapter briefly shares strategies and examples of how they might be used. The book will have an entire chapter dedicated to assistive technology as well. This is a popularized assistive technology chapter for generalist, NON special education, faculty to become acquainted with readily available and free resources ...


A Neurosemantic Theory Of Concrete Noun Representation Based On The Underlying Brain Codes, Marcel Adam Just, Vladimir L. Cherkassky, Sandesh Aryal, Tom M. Mitchell 2009 Carnegie Mellon University

A Neurosemantic Theory Of Concrete Noun Representation Based On The Underlying Brain Codes, Marcel Adam Just, Vladimir L. Cherkassky, Sandesh Aryal, Tom M. Mitchell

Marcel Adam Just

No abstract provided.


An Interview With Edsger W. Dijkstra, Thomas J. Misa, Philip L. Frana 2009 James Madison University

An Interview With Edsger W. Dijkstra, Thomas J. Misa, Philip L. Frana

Philip L Frana

No abstract provided.


Digital Commons powered by bepress