Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

55,227 Full-Text Articles 72,033 Authors 23,183,657 Downloads 375 Institutions

All Articles in Computer Sciences

Faceted Search

55,227 full-text articles. Page 1988 of 2010.

Ceg 830: Distributed Computing Systems, Prabhaker Mateti 2010 Wright State University - Main Campus

Ceg 830: Distributed Computing Systems, Prabhaker Mateti

Computer Science & Engineering Syllabi

Example languages and packages: SR and PYM, file servers, semantics of file sharing, caches and replication, log-structured file systems, remote evaluation, process migration, mobile projects, check pointing and rollback-recovery.


Ceg 860: Object-Oriented Programming, Krishnaprasad Thirunarayan 2010 Wright State University - Main Campus

Ceg 860: Object-Oriented Programming, Krishnaprasad Thirunarayan

Computer Science & Engineering Syllabi

This course motivates the need for object-oriented programming, and studies, in detail, object-oriented programming techniques, languages, and technology. The lectures will focus on the foundations of OOP, while the student presentations will focus on the applications and extensions of Object Technology.


Ceg/Ee 260 Digital Computing Hardware/Switching Circuits, Meilin Liu 2010 Wright State University - Main Campus

Ceg/Ee 260 Digital Computing Hardware/Switching Circuits, Meilin Liu

Computer Science & Engineering Syllabi

We will discuss and cover basic digital, combinational and sequential logic systems. Labs will be used to gain valuable practical experience in implementing elementary circuits and logic designs.


Ceg 320/520: Computer Organization, Nikolaos Bourbakis 2010 Wright State University - Main Campus

Ceg 320/520: Computer Organization, Nikolaos Bourbakis

Computer Science & Engineering Syllabi

No abstract provided.


Distributed Reasoning With El++ Using Mapreduce, Frederick Maier, Raghava Mutharaju, Pascal Hitzler 2010 Wright State University - Main Campus

Distributed Reasoning With El++ Using Mapreduce, Frederick Maier, Raghava Mutharaju, Pascal Hitzler

Computer Science and Engineering Faculty Publications

It has recently been shown that the MapReduce framework for distributed computation can be used effectively for large-scale RDF Schema reasoning, computing the deductive closure of over a billion RDF triples within a reasonable time. Later work has carried this approach over to OWL Horst. In this paper, we provide a MapReduce algorithm for classifying knowledge bases in the description logic EL++, which is essentially the OWL 2 profile OWL 2 EL. The traditional EL++ classification algorithm is recast into a form compatible with MapReduce, and it is shown how the revised algorithm can be realized within …


Towards Context-Aware Real-Time Information Dissemination, Kyoung-Don Kang, Greg Vert 2010 Binghamton University--SUNY

Towards Context-Aware Real-Time Information Dissemination, Kyoung-Don Kang, Greg Vert

Computer Science Faculty Scholarship

Real-time information dissemination is essential for the success of key applications such as transportation management and battlefield monitoring. In these applications, relevant information should be disseminated to interested users in a timely fashion. However, it is challenging to support timely information dissemination due to the limited and even time-varying network bandwidth. Thus, a naive approach disseminating every data with no consideration of the context that describes where and when the data is acquired and how it can satisfy users may only provide poor performance and user perceived quality of service (QoS). To address the problem, we design a novel context-aware …


Auto-Generation Of Use Case Controllers, Pushkar Marathe 2010 San Jose State University

Auto-Generation Of Use Case Controllers, Pushkar Marathe

Master's Projects

The thesis is based on the concept of generating machine executable code from UML diagrams. There has been some research done on the same topic but it is mainly focused on class diagrams. My main focus will be on the use case diagrams, and sequence diagrams. Sequence diagrams give us the details of any process in a step-by-step fashion which makes it easier to extract the required information regarding the use cases and the controllers which help us generate the code. The process follows three steps, first being generation of UML diagrams. Secondly, these are converted into XMI (XML Metadata …


Document Builder, Thien Tran 2010 San Jose State University

Document Builder, Thien Tran

Master's Projects

In this paper, we consider problems related to on-demand content publishing and maintenance. Specifically, we are concerned with the recent concept of structural Content Management Systems (CMS) and its design principles. We focus on Apache Ant, a popular document generator tool for the Java development industry. However, Ant has not been widely extended beyond its capacity to deal with computer programs, which limits its utility. We analyze the Ant build script structure, study its usage, and implement an on-demand document generator for Ant. The focus is to provide a better document build model based on Ant, which can provide document …


Scala Server Faces, Vikas Vittal Rao 2010 San Jose State University

Scala Server Faces, Vikas Vittal Rao

Master's Projects

Progress in the Java language has been slow over the last few years. Scala is emerging as one of the probable successors for Java with features such as type inference, higher order functions, closure support and sequence comprehensions. This allows object-oriented yet concise code to be written using Scala. While Java based MVC frameworks are still prevalent, Scala based frameworks along with Ruby on Rails, Django and PHP are emerging as competitors. Scala has a web framework called Lift which has made an attempt to borrow the advantages of other frameworks while keeping code concise. Since Sun’s MVC framework, Java …


Enhancing Open-Source Localization, Farzana Forhad 2010 San Jose State University

Enhancing Open-Source Localization, Farzana Forhad

Master's Projects

Pootle is a web portal which is designed to be a web translation tool. We can run Pootle like an internet server and run a local copy on an intranet. Pootle has a user friendly interface which ensures better quality and easier translation of projects. Users can log into the Pootle and create their own projects under any language, and they can also add or retrieve any language from any project or any project from any language. Although Pootle has many advantages, it also has its drawbacks, and one of the biggest drawbacks of Pootle is that whatever translation is …


Cs 416/616: Matrix Computations, Ronald F. Taylor 2010 Wright State University - Main Campus

Cs 416/616: Matrix Computations, Ronald F. Taylor

Computer Science & Engineering Syllabi

This course is a survey of numerical methods in linear algebra for application to problems in engineering and the sciences. Emphasis is on using modern software tools on high performance computing systems. This course covers the mathematics of linear equations, eigenvalue problems, singular value decomposition, and least squares. Material covered will be relevant to applications areas such as structural analysis, heat transfer, neural networks, mechanical vibrations, and image processing in biomedical engineering. A familiarity with MATLAB is useful, and the ability to program in languages such as CIC++ or Fortran is very important. A basic knowledge of matrix algebra is …


Ceg 750: Microprocessor, Jack Jean 2010 Wright State University - Main Campus

Ceg 750: Microprocessor, Jack Jean

Computer Science & Engineering Syllabi

Design and implement an MC6812 computer system based on an Axiom CSM-12C32 board that allows the loading of a 6812 application program from a PC so as to reconfigure the system as both an analog waveform storage scope and a digital logic analyzer.


A Scalable Method For Solving High-Dimensional Continuous Pomdps Using Local Approximation, Tom Erez, William D. Smart 2010 Washington University in St Louis

A Scalable Method For Solving High-Dimensional Continuous Pomdps Using Local Approximation, Tom Erez, William D. Smart

All Computer Science and Engineering Research

Partially-Observable Markov Decision Processes (POMDPs) are typically solved by finding an approximate global solution to a corresponding belief-MDP. In this paper, we offer a new planning algorithm for POMDPs with continuous state, action and observation spaces. Since such domains have an inherent notion of locality, we can find an approximate solution using local optimization methods. We parameterize the belief distribution as a Gaussian mixture, and use the Extended Kalman Filter (EKF) to approximate the belief update. Since the EKF is a first-order filter, we can marginalize over the observations analytically. By using feedback control and state estimation during policy execution, …


A Species-Conserving Genetic Algorithm For Multimodal Optimization, Michael Scott Brown 2010 Nova Southeastern University

A Species-Conserving Genetic Algorithm For Multimodal Optimization, Michael Scott Brown

CCE Theses and Dissertations

The problem of multimodal functional optimization has been addressed by much research producing many different search techniques. Niche Genetic Algorithms is one area that has attempted to solve this problem. Many Niche Genetic Algorithms use some type of radius. When multiple optima occur within the radius, these algorithms have a difficult time locating them. Problems that have arbitrarily close optima create a greater problem. This paper presents a new Niche Genetic Algorithm framework called Dynamic-radius Species-conserving Genetic Algorithm. This new framework extends existing Genetic Algorithm research.

This new framework enhances an existing Niche Genetic Algorithm in two ways. As the …


An Investigation Of Factors That Affect Hipaa Security Compliance In Academic Medical Centers, James William Brady 2010 Nova Southeastern University

An Investigation Of Factors That Affect Hipaa Security Compliance In Academic Medical Centers, James William Brady

CCE Theses and Dissertations

HIPAA security compliance in academic medical centers is a central concern of researchers, academicians, and practitioners. Increased numbers of data security breaches and information technology implementations have caused concern over the confidentiality, integrity, and availability of electronic personal health information. The federal government has implemented stringent HIPAA security compliance reviews and significantly extended the scope and enforcement of the HIPAA Security Rule. However, academic medical centers have shown limited compliance with the HIPAA Security Rule. Therefore, the goal of this study was to investigate the factors that may affect HIPAA security compliance in academic medical centers. Based on a review …


Ascertaining The Relationship Between Security Awareness And The Security Behavior Of Individuals, Gordon J. Grant 2010 Nova Southeastern University

Ascertaining The Relationship Between Security Awareness And The Security Behavior Of Individuals, Gordon J. Grant

CCE Theses and Dissertations

Security threats caused by the inappropriate actions of the user continue to be a significant security problem within any organization. The purpose of this study was to continue the efforts of Katz by assessing the security behavior and practices of working professionals. Katz conducted a study that assessed whether the faculty and staff at Armstrong Atlantic State University had been performing the simple everyday practices and behavior necessary to avert insider threats to information security. Critical in understanding human behavior is in knowing how behavior varies across different groups or demographics. Because a user's behavior can be influenced by demographic …


Judges' Awareness, Understanding, And Application Of Digital Evidence, Gary Craig Kessler 2010 Nova Southeastern University

Judges' Awareness, Understanding, And Application Of Digital Evidence, Gary Craig Kessler

CCE Theses and Dissertations

As digital evidence grows in both volume and importance in criminal and civil courts, judges need to fairly and justly evaluate the merits of the offered evidence. To do so, judges need a general understanding of the underlying technologies and applications from which digital evidence is derived. Due to the relative newness of the computer forensics field, there have been few studies on the use of digital forensic evidence and none about judges' relationship with digital evidence.

This study addressed judges' awareness, knowledge, and perceptions of digital evidence, using grounded theory methods. The interaction of judges with digital evidence has …


Quantum Algorithm Animator, Lori Eileen Nicholson 2010 Nova Southeastern University

Quantum Algorithm Animator, Lori Eileen Nicholson

CCE Theses and Dissertations

The design and development of quantum algorithms present a challenge, especially for inexperienced computer science students. Despite the numerous common concepts with classical computer science, quantum computation is still considered a branch of theoretical physics not commonly used by computer scientists. Experimental research into the development of a quantum computer makes the use of quantum mechanics in organizing computation more attractive, however the physical realization of a working quantum computer may still be decades away.

This study introduces quantum computing to computer science students using a quantum algorithm animator called QuAL. QuAL's design uses features common to classical algorithm animators …


Early Detection Of Online Auction Opportunistic Sellers Through The Use Of Negative-Positive Feedback, Gregory J. Reinert 2010 Nova Southeastern University

Early Detection Of Online Auction Opportunistic Sellers Through The Use Of Negative-Positive Feedback, Gregory J. Reinert

CCE Theses and Dissertations

Apparently fraud is a growth industry. The monetary losses from Internet fraud have increased every year since first officially reported by the Internet Crime Complaint Center (IC3) in 2000. Prior research studies and third-party reports of fraud show rates substantially higher than eBay’s reported negative feedback rate of less than 1%. The conclusion is most buyers are withholding reports of negative feedback.

Researchers Nikitov and Stone in a forensic case study of a single opportunistic eBay seller found buyers sometimes embedded negative comments in positive feedback as a means of avoiding retaliation from sellers and damage to their reputation. This …


Assistive Technology Attrition: Identifying Why Teachers Abandon Assistive Technologies, Michael Edward Sharpe 2010 Nova Southeastern University

Assistive Technology Attrition: Identifying Why Teachers Abandon Assistive Technologies, Michael Edward Sharpe

CCE Theses and Dissertations

The study surveyed a sample of K-12 teachers who had used assistive technology (AT) in the classroom to determine answers to five research questions. These were, (1) why the teachers adopted AT, (2) their attitudes and perceptions about its value, (3) challenges they have experienced in adopting AT, (4) whether they have discontinued or decreased use of AT, and, if so, (5) the factors that led to this result.

The study used both quantitative and qualitative methods. For the quantitative aspect, an online survey instrument was developed to answer five research questions. Participants were teachers who had used AT in …


Digital Commons powered by bepress