Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

55,404 Full-Text Articles 72,345 Authors 23,183,657 Downloads 377 Institutions

All Articles in Computer Sciences

Faceted Search

55,404 full-text articles. Page 1987 of 2018.

A New Framework For Qos Provisioning In Wireless Lans Using The P-Persistent Mac Protocol, Kiran Babu Anna 2010 University of Central Florida

A New Framework For Qos Provisioning In Wireless Lans Using The P-Persistent Mac Protocol, Kiran Babu Anna

Electronic Theses and Dissertations

The support of multimedia traffic over IEEE 802.11 wireless local area networks (WLANs) has recently received considerable attention. This dissertation has proposed a new framework that provides efficient channel access, service differentiation and statistical QoS guarantees in the enhanced distributed channel access (EDCA) protocol of IEEE 802.11e. In the first part of the dissertation, the new framework to provide QoS support in IEEE 802.11e is presented. The framework uses three independent components, namely, a core MAC layer, a scheduler, and an admission control. The core MAC layer concentrates on the channel access mechanism to improve the overall system efficiency. The …


A Robust Wireless Mesh Access Environment For Mobile Video Users, Fei Xie 2010 University of Central Florida

A Robust Wireless Mesh Access Environment For Mobile Video Users, Fei Xie

Electronic Theses and Dissertations

The rapid advances in networking technology have enabled large-scale deployments of online video streaming services in today's Internet. In particular, wireless Internet access technology has been one of the most transforming and empowering technologies in recent years. We have witnessed a dramatic increase in the number of mobile users who access online video services through wireless access networks, such as wireless mesh networks and 3G cellular networks. Unlike in wired environment, using a dedicated stream for each video service request is very expensive for wireless networks. This simple strategy also has limited scalability when popular content is demanded by a …


Spatio-Temporal Maximum Average Correlation Height Templates In Action Recognition And Video Summarization, Mikel Rodriguez 2010 University of Central Florida

Spatio-Temporal Maximum Average Correlation Height Templates In Action Recognition And Video Summarization, Mikel Rodriguez

Electronic Theses and Dissertations

Action recognition represents one of the most difficult problems in computer vision given that it embodies the combination of several uncertain attributes, such as the subtle variability associated with individual human behavior and the challenges that come with viewpoint variations, scale changes and different temporal extents. Nevertheless, action recognition solutions are critical in a great number of domains, such video surveillance, assisted living environments, video search, interfaces, and virtual reality. In this dissertation, we investigate template-based action recognition algorithms that can incorporate the information contained in a set of training examples, and we explore how these algorithms perform in action …


High Accuracy Multiscale Multigrid Computation For Partial Differential Equations, Yin Wang 2010 University of Kentucky

High Accuracy Multiscale Multigrid Computation For Partial Differential Equations, Yin Wang

University of Kentucky Doctoral Dissertations

Scientific computing and computer simulation play an increasingly important role in scientific investigation and engineering designs, supplementing traditional experiments, such as in automotive crash studies, global climate change, ocean modeling, medical imaging, and nuclear weapons. The numerical simulation is much cheaper than experimentation for these application areas and it can be used as the third way of science discovery beyond the experimental and theoretical analysis. However, the increasing demand of high resolution solutions of the Partial Differential Equations (PDEs) with less computational time has increased the importance for researchers and engineers to come up with efficient and scalable computational techniques …


Unified Role Assignment Framework For Wireless Sensor Networks, Manish Mahendra Kumar Kochhal 2010 Wayne State University

Unified Role Assignment Framework For Wireless Sensor Networks, Manish Mahendra Kumar Kochhal

Wayne State University Dissertations

Wireless sensor networks are made possible by the continuing improvements in embedded sensor, VLSI, and wireless radio technologies. Currently, one of the important challenges in sensor networks is the design of a systematic network management framework that allows localized and collaborative resource control uniformly across all application services such as sensing, monitoring, tracking, data aggregation, and routing.

The research in wireless sensor networks is currently oriented toward a cross-layer network abstraction that supports appropriate fine or course grained resource controls for energy efficiency. In that regard, we have designed a unified role-based service paradigm for wireless sensor networks. We pursue …


Ranking Bias In Deep Web Size Estimation Using Capture Recapture Method, Jianguo Lu 2010 University of Windsor

Ranking Bias In Deep Web Size Estimation Using Capture Recapture Method, Jianguo Lu

Computer Science Publications

Many deep web data sources are ranked data sources, i.e., they rank the matched documents and return at most the top k number of results even though there are more than k documents matching the query. While estimating the size of such ranked deep web data source, it is well known that there is a ranking bias—the traditional methods tend to underestimate the size when queries overflow (match more documents than the return limit). Numerous estimation methods have been proposed to overcome the ranking bias, such as by avoiding overflowing queries during the sampling process, or by adjusting the initial …


Representing Synonymity In Causal Logic And In Logic Programming, Joohyung Lee, Yuliya Lierler, Vladimir Lifschitz, Fangkai Yang 2010 Arizona State University

Representing Synonymity In Causal Logic And In Logic Programming, Joohyung Lee, Yuliya Lierler, Vladimir Lifschitz, Fangkai Yang

Computer Science Faculty Proceedings & Presentations

We investigate the relationship between rules representing synonymity in nonmonotonic causal logic and in answer set programming. This question is of interest in connection with current work on modular languages for describing actions.


The Role Of An Effective It Intervention For Microenterprises, Changsoo Song, Sajda Qureshi 2010 University of Nebraska at Omaha

The Role Of An Effective It Intervention For Microenterprises, Changsoo Song, Sajda Qureshi

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

Information technology (IT) interventions for micro-enterprises are fragmented and their approach lacks theoretical foundations. While various researchers have conducted studies on the effects of IT adoption in micro-enterprises, little research has been conducted to explain critical aspects of an effective IT intervention for micro-enterprises from a theoretical perspective. This study aims to fill this gap and empirically investigate how IT interventions can effectively facilitate the process of IT adoption by micro-enterprises. This paper suggests that effective IT interventions may have considerable potential for facilitating IT adoption among micro-enterprises across the United States and the world. Following an analysis of four …


An Intelligent Data-Centric Approach Toward Identification Of Conserved Motifs In Protein Sequences, Kathryn Dempsey Cooper, Benjamin Currall, Richard Hallworth, Hesham Ali 2010 University of Nebraska at Omaha

An Intelligent Data-Centric Approach Toward Identification Of Conserved Motifs In Protein Sequences, Kathryn Dempsey Cooper, Benjamin Currall, Richard Hallworth, Hesham Ali

Interdisciplinary Informatics Faculty Proceedings & Presentations

The continued integration of the computational and biological sciences has revolutionized genomic and proteomic studies. However, efficient collaboration between these fields requires the creation of shared standards. A common problem arises when biological input does not properly fit the expectations of the algorithm, which can result in misinterpretation of the output. This potential confounding of input/output is a drawback especially when regarding motif finding software. Here we propose a method for improving output by selecting input based upon evolutionary distance, domain architecture, and known function. This method improved detection of both known and unknown motifs in two separate case studies. …


A Metric For Routing In Delay-Sensitive Wireless Sensor Networks, Zhen Jiang, Jie Wu, Risa Ito 2010 West Chester University of Pennsylvania

A Metric For Routing In Delay-Sensitive Wireless Sensor Networks, Zhen Jiang, Jie Wu, Risa Ito

Computer Science Faculty Publications

No abstract provided.


Cr: Capability Information For Routing Of Wireless Ad Hoc Networks In The Real Environment, Zhen Jiang, Zhigang Li, Nong Xiao, Jie Wu 2010 West Chester University of Pennsylvania

Cr: Capability Information For Routing Of Wireless Ad Hoc Networks In The Real Environment, Zhen Jiang, Zhigang Li, Nong Xiao, Jie Wu

Computer Science Faculty Publications

No abstract provided.


A Primer On Digital Object Identifiers For Law Librarians, Benjamin J. Keele 2010 Indiana University - Purdue University Indianapolis

A Primer On Digital Object Identifiers For Law Librarians, Benjamin J. Keele

Library Staff Publications

No abstract provided.


Updated Bus Routes And Text Messaging System For San Luis Obispo Public Transit System Web Application, Matthew Bojorquez 2010 California Polytechnic State University - San Luis Obispo

Updated Bus Routes And Text Messaging System For San Luis Obispo Public Transit System Web Application, Matthew Bojorquez

Computer Engineering

As gas prices continue to rise and people become more aware of their carbon footprint, public transportation becomes more economically, environmentally, and sustainably viable. Currently, bus route timetables are available inside buses and at the transit center, but many users have little knowledge of how to read them. Therefore, to entice more people into using public transportation, we must make riding the buses less of a hassle for users. The Efficient Deployment of Advanced Public Transportation Systems (EDAPTS) system attempts to accomplish this. Building upon a web application designed by Jeff Tikkanen, a former Cal Poly student, that places bus …


“Little Language” Project Modules, John Clements, Kathi Fisler 2010 California Polytechnic State University - San Luis Obispo

“Little Language” Project Modules, John Clements, Kathi Fisler

Computer Science and Software Engineering

Many computer science departments are debating the role of programming languages in the curriculum. These discussions often question the relevance and appeal of programming-languages content for today's students. In our experience, domain-specific, “little languages” projects provide a compelling illustration of the importance of programming-language concepts. This paper describes projects that prototype mainstream applications such as PowerPoint, TurboTax, and animation scripting. We have used these exercises as modules in non-programming languages courses, including courses for first year students. Such modules both encourage students to study linguistic topics in more depth and provide linguistic perspective to students who might not otherwise be …


Assessing Traceability Of Software Engineering Artifacts, Senthil Karthikeyan Sundaram, Jane Huffman Hayes, Alex Dekhtyar, E. Ashlee Holbrook 2010 Microsoft

Assessing Traceability Of Software Engineering Artifacts, Senthil Karthikeyan Sundaram, Jane Huffman Hayes, Alex Dekhtyar, E. Ashlee Holbrook

Computer Science and Software Engineering

The generation of traceability links or traceability matrices is vital to many software engineering activities. It is also person-power intensive, time-consuming, error-prone, and lacks tool support. The activities that require traceability information include, but are not limited to, risk analysis, impact analysis, criticality assessment, test coverage analysis, and verification and validation of software systems. Information Retrieval (IR) techniques have been shown to assist with the automated generation of traceability links by reducing the time it takes to generate the traceability mapping. Researchers have applied techniques such as Latent Semantic Indexing (LSI), vector space retrieval, and probabilistic IR and have enjoyed …


Partnering Enhanced-Nlp With Semantic Analysis In Support Of Information Extraction, Hisham Assal, John Seng, Franz J. Kurfess, Emily Schwarz, Kym Pohl 2010 California Polytechnic State University - San Luis Obispo

Partnering Enhanced-Nlp With Semantic Analysis In Support Of Information Extraction, Hisham Assal, John Seng, Franz J. Kurfess, Emily Schwarz, Kym Pohl

Computer Science and Software Engineering

Information extraction using Natural Language Processing (NLP) tools focuses on extracting explicitly stated information from textual material. This includes Named Entity Recognition (NER), which produces entities and some of the relationships that may exist among them. Intelligent analysis requires examining the entities in the context of the entire document. While some of the relationships among the recognized entities may be preserved during extraction, the overall context of a document may not be preserved. In order to perform intelligent analysis on the extracted information, we provide an ontology, which describes the domain of the extracted information, in addition to rules that …


Linked Open Social Signals, Pablo N. Mendes, Alexandre Passant, Pavan Kapanipathi, Amit P. Sheth 2010 Wright State University - Main Campus

Linked Open Social Signals, Pablo N. Mendes, Alexandre Passant, Pavan Kapanipathi, Amit P. Sheth

Kno.e.sis Publications

In this paper we discuss the collection, semantic annotation and analysis of real-time social signals from micro-blogging data. We focus on users interested in analyzing social signals collectively for sensemaking. Our proposal enables flexibility in selecting subsets for analysis, alleviating information overload. We define an architecture that is based on state-of-the-art Semantic Web technologies and a distributed publish subscribe protocol for real time communication. In addition, we discuss our method and application in a scenario related to the health care reform in the United States.


Mechanical Sensorless Maximum Power Tracking Control For Direct-Drive Pmsg Wind Turbines, Xu Yang, Xiang Gong, Wei Qiao 2010 University of Nebraska-Lincoln

Mechanical Sensorless Maximum Power Tracking Control For Direct-Drive Pmsg Wind Turbines, Xu Yang, Xiang Gong, Wei Qiao

Department of Electrical and Computer Engineering: Faculty Publications

Wind turbine generators (WTGs) are usually equipped with mechanical sensors to measure wind speed and rotor position for system control, monitoring, and protection. The use of mechanical sensors increases the cost and hardware complexity and reduces the reliability of the WTG systems. This paper proposes a mechanical sensorless maximum power tracking control for wind turbines directly driving permanent magnetic synchronous generators (PMSGs). In the proposed algorithm, the PMSG rotor position is estimated from the measured stator voltages and currents by using a sliding mode observer (SMO). The wind turbine shaft speed is estimated from the PMSG back electromotive force (EMF) …


Communication With Aboveground Devices In Wireless Underground Sensor Networks: An Empirical Study, Agnelo R. Silva, Mehmet C. Vuran 2010 University of Nebraska-Lincoln

Communication With Aboveground Devices In Wireless Underground Sensor Networks: An Empirical Study, Agnelo R. Silva, Mehmet C. Vuran

CSE Conference and Workshop Papers

Wireless Underground Sensor Networks (WUSNs) consist of wirelessly connected underground sensor nodes that communicate untethered through soil. WUSNs have the potential to impact a wide variety of novel applications including intelligent irrigation, environment monitoring, border patrol, and assisted navigation. Although its deployment is mainly based on underground sensor nodes, a WUSN still requires aboveground devices for data retrieval, management, and relay functionalities. Therefore, the characterization of the bi-directional communication between a buried node and an aboveground device is essential for the realization of WUSNs. In this work, empirical evaluations of underground-to-aboveground (UG2AG) and aboveground-to-underground (AG2UG) communication are presented. More specifically, …


A First Practical Algorithm For High Levels Of Relational Consistency, Shant Karakashian, Robert J. Woodward, Christopher Reeson, Berthe Y. Choueiry, Christian Bessiere 2010 University of Nebraska-Lincoln

A First Practical Algorithm For High Levels Of Relational Consistency, Shant Karakashian, Robert J. Woodward, Christopher Reeson, Berthe Y. Choueiry, Christian Bessiere

CSE Conference and Workshop Papers

•Introduction

•Relational Consistency R(*,m)C :

–Definition, Naïve algorithm, Properties

•Preliminaries: Dual CSP

•Our Approach

–Algorithm

–Index-Tree Data Structure

–Advantages

•A weakened version of R(*,m)C: wR(*,m)C

•Experimental Evaluations

•Conclusions & Future Work


Digital Commons powered by bepress