Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

57,727 Full-Text Articles 75,958 Authors 23,280,287 Downloads 379 Institutions

All Articles in Computer Sciences

Faceted Search

57,727 full-text articles. Page 2029 of 2122.

Applicability Of Web 2.0: Training For Tactical Military Applications, Maurice Dawson 2010 University of Missouri - St Louis

Applicability Of Web 2.0: Training For Tactical Military Applications, Maurice Dawson

Maurice Dawson

This paper is a report on the findings of a study conducted on a doctoral level virtual course utilizing Second Life for usability and interaction. The project from this course allowed for further exploration of training servicemen from other nations in decision making techniques to include a level of familiarization with various technologies. As Second Life is a low cost tool this could prove invaluable to offset training costs to involve getting servicemen to understand technologies through simulation. Currently the available tools are costly and as government looks for ways to save costs Second Life can prove to be a …


Clustering Algorithm Identification System Using Wavelet Transform, Philadelphia University 2010 Philadelphia University

Clustering Algorithm Identification System Using Wavelet Transform, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


An Interview With Mr Peter Mahy Of Howells Llp Who Represented S And Marper At The European Court Of Human Rights, Katina Michael, Peter Mahy 2010 University of Wollongong

An Interview With Mr Peter Mahy Of Howells Llp Who Represented S And Marper At The European Court Of Human Rights, Katina Michael, Peter Mahy

Associate Professor Katina Michael

Mr Peter Mahy, Partner at Howells LLP and the lawyer who represented S & Marper in front of the Grand Chamber at the European Court of Human Rights was interviewed by Katina Michael on the 10th of October 2009 while she was studying towards a Masters of Transnational Crime Prevention in the Faculty of Law at the University of Wollongong. In 2010 Peter Mahy received the Legal Aid Lawyer of the Year award for his contribution to the field. Mahy received his honours law degree from Sheffield University and a Masters in Criminology from the University of Cambridge. He did …


The European Court Of Human Rights Ruling Against The Policy Of Keeping Fingerprints And Dna Samples Of Criminal Suspects In Britain, Wales And Northern Ireland: The Case Of S. And Marper V United Kingdom, Katina Michael 2010 University of Wollongong

The European Court Of Human Rights Ruling Against The Policy Of Keeping Fingerprints And Dna Samples Of Criminal Suspects In Britain, Wales And Northern Ireland: The Case Of S. And Marper V United Kingdom, Katina Michael

Associate Professor Katina Michael

In England, Wales and Northern Ireland, the Police and Criminal Evidence Act 1984 (the PACE) contained powers for the taking of fingerprints, and samples in the form of deoxyribonucleic acid (DNA). In 2001, Section 64(1A) of the PACE was substituted with Section 82 of the Criminal Justice and Police Act. The change to legislation meant that a suspect of a crime would have their fingerprints and samples permanently stored on the police national computer (PNC) even after having been acquitted. This paper critically analyses the circumstances of the landmark case of S. AND MARPER V. THE UNITED KINGDOM in two …


On Optimizing Traffic Signal Phase Ordering In Road Networks, Jason Barnes, Vamsi Paruchuri, Sriram Chellappan 2010 Missouri University of Science and Technology

On Optimizing Traffic Signal Phase Ordering In Road Networks, Jason Barnes, Vamsi Paruchuri, Sriram Chellappan

Computer Science Faculty Research & Creative Works

Traffic signals are an elementary component of all urban road networks and play a critical role in controlling the flow of vehicles. However, current road transportation systems and traffic signal implementations are very inefficient. the objective of this research is to evaluate optimal phase ordering within a signal cycle to minimize the average waiting delay and thus in turn minimizing fuel consumption and greenhouse gas (GHG) emissions. through extensive simulation analysis, we show that by choosing optimal phase ordering, the stopped delay can be reduced by 40% per car at each signal resulting in a saving of up to 100 …


Front Matter, 2010 Embry-Riddle Aeronautical University

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead, 2010 Embry-Riddle Aeronautical University

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter, 2010 Embry-Riddle Aeronautical University

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


The Social Implications Of Covert Policing, Simon Bronitt, Clive Harfield, K. Michael 2010 Australian National University

The Social Implications Of Covert Policing, Simon Bronitt, Clive Harfield, K. Michael

Professor Katina Michael

Police agencies have been accused of suffering from an acute form of technophilia. Rather than representing some dreadful disorder, this assessment reflects the strong imperative, both in police agencies and the wider community, that police must have access to the latest technologies of surveillance and crime detection.

The last decade has witnessed the proliferation of low-cost surveillance technologies, some developed specifically for law enforcement purposes. Technology once the preserve of the military or secret intelligence agencies is now within the reach of ordinary general duties police officers. The new generation of police recruits is highly adept at using new technologies. …


Demonstrating The Potential For Covert Policing In The Community: Five Stakeholder Scenarios, Roba Abbas, Katina Michael, M.G. Michael 2010 University of Wollongong

Demonstrating The Potential For Covert Policing In The Community: Five Stakeholder Scenarios, Roba Abbas, Katina Michael, M.G. Michael

Professor Katina Michael

This paper presents the real possibility that commercial mobile tracking and monitoring solutions will become widely adopted for the practice of non traditional covert policing within a community setting, resulting in community members engaging in covert policing of family, friends, or acquaintances. This paper investigates five stakeholder relationships using scenarios to demonstrate the potential socio-ethical implications that tracking and monitoring people will have on society at large. The five stakeholder types explored in this paper include: (i) husband-wife (partner-partner), (ii) parent-child, (iii) employer-employee, (iv) friend-friend, and (v) stranger-stranger. Mobile technologies such as mobile camera phones, global positioning system data loggers, …


Preservd - Privacy Ensured Service Discovery In Mobile Peer-To-Peer Networks, Santhosh Muthyapu, Sanjay Kumar Madria, Mark Linderman 2010 Missouri University of Science and Technology

Preservd - Privacy Ensured Service Discovery In Mobile Peer-To-Peer Networks, Santhosh Muthyapu, Sanjay Kumar Madria, Mark Linderman

Computer Science Faculty Research & Creative Works

In mobile peer-to-peer networks, proposed service discovery protocols disregard the exposure of the participating peers' privacy details (privileged information). in these methods, the participating peers must provide their identities during the service discovery process to be authorized to utilize services. However, a peer may not be willing to reveal its privileged information until it identifies the service providing peer. So, these peers face a problem; should the service requesting or the service providing peer reveal the identity first. the protocol presented in [12] solves this problem to some extent and discover the services available in the service requester's vicinity in …


A Tactical Information Management Middleware For Resource-Constrained Mobile P2p Networks, Bo Xu, Mark Linderman, Sanjay Madria, Ouri Wolfson 2010 Missouri University of Science and Technology

A Tactical Information Management Middleware For Resource-Constrained Mobile P2p Networks, Bo Xu, Mark Linderman, Sanjay Madria, Ouri Wolfson

Computer Science Faculty Research & Creative Works

In this paper we provide an architecture for Tactical Information Middleware for bandwidth constrained information management. We propose the ideas of rank-Based data dissemination, and the use of a tactical information management query language. These ideas will deal with dynamic changes in bandwidth and explore opportunistic data dissemination. Thus, will lead to a cross-layer design of a system capable of handling the dynamic data management issues relevant in many missions' critical applications. © 2010 IEEE.


A Resource-Efficient Adaptive Caching Scheme For Mobile Ad-Hoc Networks, Dan Hirsch, Sanjay Madria 2010 Missouri University of Science and Technology

A Resource-Efficient Adaptive Caching Scheme For Mobile Ad-Hoc Networks, Dan Hirsch, Sanjay Madria

Computer Science Faculty Research & Creative Works

In a Mobile Ad-Hoc Network environment, wireless devices have finite resources such as memory, energy and they work within the wireless constraints such as limited bandwidth and unreliable communication. Therefore, storage space, bandwidth, and battery life must be managed effectively in order to extend the usefulness and lifespan of wireless devices and the network. Caching is one of those techniques which reduce the latency and tuning time for mobile devices in the wireless network. We propose a novel scheme that seeks to distribute the storage, bandwidth and energy burden through a resource-efficient adaptive caching scheme for mobile ad-hoc networks. Our …


Adaptive Routing Scheme For Emerging Wireless Ad Hoc Networks, Behdis Eslamnour, Sarangapani Jagannathan 2010 Missouri University of Science and Technology

Adaptive Routing Scheme For Emerging Wireless Ad Hoc Networks, Behdis Eslamnour, Sarangapani Jagannathan

Electrical and Computer Engineering Faculty Research & Creative Works

Node mobility causes fading wireless channels, which in turn renders topology changes in emerging wireless ad hoc networks. in this paper, on-line estimators and Markov models are utilized to estimate fading channel conditions. using the estimated channel conditions as well as queue occupancy, available energy and link delay, approximate dynamic programming (ADP) techniques are utilized to find dynamic routes, while solving discrete-time Hamilton-Jacobi-Bellman (HJB) equation forward-in-time for route cost in multichannel multi-interface networks. the performance of the proposed load balancing method in the presence of fading channels and the performance of the optimal route selection approach for multichannel multi-interface wireless …


The Road From S. And Marper To The Prüm Treaty And The Implications On Human Rights, K. Michael 2010 University of Wollongong

The Road From S. And Marper To The Prüm Treaty And The Implications On Human Rights, K. Michael

Professor Katina Michael

This chapter investigates the implications of the S. and Marper v United Kingdom ruling by the European Court of Human Rights (ECtHR), which found that the UK Government’s current deoxyribonucleic acid (DNA) retention policy breached Article 8 of the European Convention on Human Rights (ECHR) (Council of Europe 2008). The aim of this chapter is to look beyond the changes that have been instigated in Britain, since the landmark decision by the ECtHR was made, and toward the legal and human rights implications of the sharing of DNA data across the borders of European Union member states. Of significance here …


Transparent Adaptive Library-Based Checkpointing For Master-Worker Style Parallelism, Gene D. Cooperman, Jason Ansel, Xiaoqin Ma 2010 Northeastern University

Transparent Adaptive Library-Based Checkpointing For Master-Worker Style Parallelism, Gene D. Cooperman, Jason Ansel, Xiaoqin Ma

Gene D. Cooperman

We present a transparent, system-level checkpointing solution for master-worker parallelism that automatically adapts, upon restart, to the number of processor nodes available. This is important, since nodes in a cluster fail. It also allows one to adapt to using multiple cluster partitions and multiple resources from the Computational Grid, as they become available. Checkpointing a master-worker computation has the additional advantage of needing to checkpoint only the master process. This is both fast and more economical of disk space. This has been demonstrated by checkpointing Geant4, a million line C++ program. Our solution has been implemented in the context of …


Parallelization Of Geant4 Using Top-C And Marshalgen, Gene D. Cooperman, Viet Ha Nguyen, Igor Maliutov 2010 Northeastern University

Parallelization Of Geant4 Using Top-C And Marshalgen, Gene D. Cooperman, Viet Ha Nguyen, Igor Maliutov

Gene D. Cooperman

Geant4 is a very large, highly accurate toolkit for Monte Carlo simulation of particle-matter interaction. It has been applied to high-energy physics, cosmic ray modeling, radiation shields, radiation therapy, mine detection, and other areas. Geant4 is being used to help design some high energy physics experiments (notably CMS and Atlas) to be run on the future large hadron collider: the largest particle collider in the world. The parallelization, ParGeant4, represents a challenge due to the unique characteristics of Geant4: (i) complex object-oriented design; (ii) intrinsic use of templates and abstract classes to be instantiated later by the end user; (iii) …


Spatial Queries In The Presence Of Obstacles, Jun ZHANG, Dimitris PAPADIAS, Kyriakos MOURATIDIS, Manli ZHU 2010 Hong Kong University of Science and Technology

Spatial Queries In The Presence Of Obstacles, Jun Zhang, Dimitris Papadias, Kyriakos Mouratidis, Manli Zhu

Kyriakos MOURATIDIS

Despite the existence of obstacles in many database applications, traditional spatial query processing utilizes the Euclidean distance metric assuming that points in space are directly reachable. In this paper, we study spatial queries in the presence of obstacles, where the obstructed distance between two points is defined as the length of the shortest path that connects them without crossing any obstacles. We propose efficient algorithms for the most important query types, namely, range search, nearest neighbors, e-distance joins and closest pairs, considering that both data objects and obstacles are indexed by R-trees. The effectiveness of the proposed solutions is verified …


Tree-Based Partition Querying: A Methodology For Computing Medoids In Large Spatial Datasets, Kyriakos MOURATIDIS, Dimitris Papadias, Spiros Papadimitriou 2010 Singapore Management University

Tree-Based Partition Querying: A Methodology For Computing Medoids In Large Spatial Datasets, Kyriakos Mouratidis, Dimitris Papadias, Spiros Papadimitriou

Kyriakos MOURATIDIS

Besides traditional domains (e.g., resource allocation, data mining applications), algorithms for medoid computation and related problems will play an important role in numerous emerging fields, such as location based services and sensor networks. Since the k-medoid problem is NP hard, all existing work deals with approximate solutions on relatively small datasets. This paper aims at efficient methods for very large spatial databases, motivated by: (i) the high and ever increasing availability of spatial data, and (ii) the need for novel query types and improved services. The proposed solutions exploit the intrinsic grouping properties of a data partition index in order …


Partially Materialized Digest Scheme: An Efficient Verification Method For Outsourced Databases, Kyriakos MOURATIDIS, Dimitris Sacharidis, Hwee Hwa PANG 2010 Singapore Management University

Partially Materialized Digest Scheme: An Efficient Verification Method For Outsourced Databases, Kyriakos Mouratidis, Dimitris Sacharidis, Hwee Hwa Pang

Kyriakos MOURATIDIS

In the outsourced database model, a data owner publishes her database through a third-party server; i.e., the server hosts the data and answers user queries on behalf of the owner. Since the server may not be trusted, or may be compromised, users need a means to verify that answers received are both authentic and complete, i.e., that the returned data have not been tampered with, and that no qualifying results have been omitted. We propose a result verification approach for one-dimensional queries, called Partially Materialized Digest scheme (PMD), that applies to both static and dynamic databases. PMD uses separate indexes …


Digital Commons powered by bepress