Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

30,301 Full-Text Articles 30,102 Authors 7,711,165 Downloads 289 Institutions

All Articles in Computer Sciences

Faceted Search

30,301 full-text articles. Page 6 of 863.

Expected Length Of The Longest Chain In Linear Hashing, Pongthip Srivarangkul, Hemanta K. Maji 2018 PurdueUniversity

Expected Length Of The Longest Chain In Linear Hashing, Pongthip Srivarangkul, Hemanta K. Maji

The Summer Undergraduate Research Fellowship (SURF) Symposium

Hash table with chaining is a data structure that chains objects with identical hash values together with an entry or a memory address. It works by calculating a hash value from an input then placing the input in the hash table entry. When we place two inputs in the same entry, they chain together in a linear linked list. We are interested in the expected length of the longest chain in linear hashing and methods to reduce the length because the worst-case look-up time is directly proportional to it.

The linear hash function used to calculate hash value is defined ...


Exploring Confidentiality Issues In Hyperledger Fabric Business Applications, Shivam Bajpayi, Pedro Moreno-Sanchez, Donghang Lu, Sihao Yin 2018 Purdue University

Exploring Confidentiality Issues In Hyperledger Fabric Business Applications, Shivam Bajpayi, Pedro Moreno-Sanchez, Donghang Lu, Sihao Yin

The Summer Undergraduate Research Fellowship (SURF) Symposium

The rise of Bitcoin and cryptocurrencies over the last decade have made its underlying technology (blockchain) come into the spotlight. Blockchain is a secure ledger of linked records called blocks. These records are cryptographically immutable and any tampering with the block is evident through a change in the cryptographic signature of the block. Among the blockchains deployed in practice today, Hyperledger Fabric is a platform that allows businesses to make use of blockchains in their applications. However, confidentiality issues arise with respects to the blocks in this blockchain network due to the fact that blocks might contain sensitive information accessible ...


A Divide-And-Conquer Approach To Syntax-Guided Synthesis, Peiyuan Shen, Xiaokang Qiu 2018 Purdue University

A Divide-And-Conquer Approach To Syntax-Guided Synthesis, Peiyuan Shen, Xiaokang Qiu

The Summer Undergraduate Research Fellowship (SURF) Symposium

Program synthesis aims to generate programs automatically from user-provided specifications. One critical research thrust is called Syntax-Guideds Synthesis. In addition to semantic specifications, the user should also provide a syntactic template of the desired program, which helps the synthesizer reduce the search space. The traditional symbolic approaches, such as CounterExample-Guided Inductive Synthesis (CEGIS) framework, does not scale to large search spaces. The goal of this project is to explore a compositional, divide-n-conquer approach that heuristically divides the synthesis task into subtasks and solves them separately. The idea is to decompose the function to be synthesized by creating a set of ...


Tool For Correlating Ebsd And Afm Data Arrays, Andrew Krawec, Matthew Michie, John Blendell 2018 Purdue University

Tool For Correlating Ebsd And Afm Data Arrays, Andrew Krawec, Matthew Michie, John Blendell

The Summer Undergraduate Research Fellowship (SURF) Symposium

Ceramic and semiconductor research is limited in its ability to create holistic representations of data in concise, easily-accessible file formats or visual data representations. These materials are used in everyday electronics, and optimizing their electrical and physical properties is important for developing more advanced computational technologies. There is a desire to understand how changing the composition of the ceramic alters the shape and structure of the grown crystals. However, few accessible tools exist to generate a dataset with the proper organization to understand correlations between grain orientation and crystallographic orientation. This paper outlines an approach to analyzing the crystal structure ...


Deep Neural Network Architectures For Modulation Classification Using Principal Component Analysis, Sharan Ramjee, Shengtai Ju, Diyu Yang, Aly El Gamal 2018 Purdue University

Deep Neural Network Architectures For Modulation Classification Using Principal Component Analysis, Sharan Ramjee, Shengtai Ju, Diyu Yang, Aly El Gamal

The Summer Undergraduate Research Fellowship (SURF) Symposium

In this work, we investigate the application of Principal Component Analysis to the task of wireless signal modulation recognition using deep neural network architectures. Sampling signals at the Nyquist rate, which is often very high, requires a large amount of energy and space to collect and store the samples. Moreover, the time taken to train neural networks for the task of modulation classification is large due to the large number of samples. These problems can be drastically reduced using Principal Component Analysis, which is a technique that allows us to reduce the dimensionality or number of features of the samples ...


Sort Vs. Hash Join On Knights Landing Architecture, Victor L. Pan, Felix Lin 2018 Purdue University

Sort Vs. Hash Join On Knights Landing Architecture, Victor L. Pan, Felix Lin

The Summer Undergraduate Research Fellowship (SURF) Symposium

With the increasing amount of information stored, there is a need for efficient database algorithms. One of the most important database operations is “join”. This involves combining columns from two tables and grouping common values in the same row in order to minimize redundant data. The two main algorithms used are hash join and sort merge join. Hash join builds a hash table to allow for faster searching. Sort merge join first sorts the two tables to make it more efficient when comparing values. There has been a lot of debate over which approach is superior. At first, hash join ...


Creating A Better Technological Piano Practice Aid With Knowledge Tracing, Max Feldkamp 2018 University of Colorado, Boulder

Creating A Better Technological Piano Practice Aid With Knowledge Tracing, Max Feldkamp

Keyboard Graduate Theses & Dissertations

Modern music tutoring software and mobile instructional applications have great potential to help students practice at home effectively. They can offer extensive feedback on what the student is getting right and wrong and have adopted a gamified design with levels, badges, and other game-like elements to help gain wider appeal among students. Despite their advantages for motivating students and creating a safe practice environment, no current music instruction software demonstrates any knowledge about a student’s level of mastery. This can lead to awkward pedagogy and user frustration. Applying Bayesian Knowledge Tracing to tutoring systems provides an ideal way to ...


Scaling Up An Infrastructure For Controlled Experimentation With Testing Techniques, Wayne D. Motycka 2018 University of Nebraska - Lincoln

Scaling Up An Infrastructure For Controlled Experimentation With Testing Techniques, Wayne D. Motycka

Computer Science and Engineering: Theses, Dissertations, and Student Research

Software testing research often involves reproducing previous experimental results. Previous work created a repository infrastructure for containment and dissemination of testable research subjects using a private centralized storage mechanism for hosting these test subject archives. While this is a good way to store these subjects it can be inefficient when the size of subjects increases or the number of versions of the subject’s source code is large. The delivery of these large subjects from a centralized repository can be quite large and on occasion may not succeed requiring the user to repeat the download request. Coupled with the limited ...


A Characterization Of The Medical-Legal Partnership (Mlp) Of Nebraska Medicine, Jordan Pieper 2018 University of Nebraska Medical Center

A Characterization Of The Medical-Legal Partnership (Mlp) Of Nebraska Medicine, Jordan Pieper

Service Learning/Capstone Experience

This research study was completed at Legal Aid of Nebraska’s Health, Education, and Law Project through the partnership it has formed working with Nebraska Medicine and Iowa Legal Aid. Traditionally, health and disease have always been viewed exclusively as "healthcare" issues. But with healthcare consistently growing towards holistic approaches to help patients, we now know there are deeper, structural conditions of society that can act as strong driving forces of a person's poor daily living conditions that can negatively impact health. The importance of a Medical-Legal Partnership is that it considers a patient's social determinants of health ...


Academic Interests, Career Choices And Job Opportunities, Doyel Pal, Praveenkumar Khethavath 2018 CUNY La Guardia Community College

Academic Interests, Career Choices And Job Opportunities, Doyel Pal, Praveenkumar Khethavath

Open Educational Resources

This assignment is designed for students in First Year Seminar for Engineering and Computer Science. The main goal of the assignment is to introduce students to their major and stimulating their interests related to career choices and academics. This will give students a chance to develop integrative learning skills by making connections between their major and respective career opportunities. This assignment will use new features of ePortfolio to enhance student’s creativity by customizing everything from background, photos, fonts, text, portfolio content etc. Instead of a uniform profile, each students’ page will reflect the distinct visual representation of their personality ...


Welcoming Remarks From The Ijcic Honorary Editor, Peter Grabosky 2018 Australian National University

Welcoming Remarks From The Ijcic Honorary Editor, Peter Grabosky

International Journal of Cybersecurity Intelligence & Cybercrime

No abstract provided.


The Present And Future Of Cybercrime, Cyberterrorism, And Cybersecurity, Kyung-shick Choi, Claire Seungeun Lee 2018 Bridgewater State University

The Present And Future Of Cybercrime, Cyberterrorism, And Cybersecurity, Kyung-Shick Choi, Claire Seungeun Lee

International Journal of Cybersecurity Intelligence & Cybercrime

Cybercriminology combines knowledge from criminology, psychology, sociology, computer science, and cybersecurity to provide an in-depth understanding of cybercrime. Cybercrime and cybersecurity are interconnected across many places, platforms, and actors. Cybercrime issues are continuously and expeditiously changing and developing, especially with the advent of new technologies. The International Journal of Cybersecurity Intelligence and Cybercrime (IJCIC) aims to contribute to the growing field of cybercriminology and cybersecurity. The IJCIC is eager to work with scholars, policy analysts, practitioners, and others to enhance theory, methods, and practice within cybercrime and cybersecurity at the regional, national, and international levels.


Spreading Propaganda In Cyberspace: Comparing Cyber-Resource Usage Of Al Qaeda And Isis, Kyung-shick Choi, Claire Seungeun Lee, Robert Cadigan 2018 Bridgewater State University

Spreading Propaganda In Cyberspace: Comparing Cyber-Resource Usage Of Al Qaeda And Isis, Kyung-Shick Choi, Claire Seungeun Lee, Robert Cadigan

International Journal of Cybersecurity Intelligence & Cybercrime

Terrorists in cyberspace are increasingly utilizing social media to promote their ideologies, recruit new members, and justify terrorist attacks and actions. This study explores the ways in which types of social media, message contents, and motives for spreading propaganda take shape in cyberspace. In order to empirically test these relations, we created a dataset with annual terrorism reports from 2011 to 2016. In our global cyberterrorism dataset, we used and connected cyber-resources (Facebook, online forum, Twitter mentions, websites, and YouTube videos) and legal documents of individual cases that were mentioned in the reports. The results show that YouTube videos were ...


Juvenile Hackers: An Empirical Test Of Self-Control Theory And Social Bonding Theory, Sinchul Back, Sadhika Soor, Jennifer LaPrade 2018 Florida International University

Juvenile Hackers: An Empirical Test Of Self-Control Theory And Social Bonding Theory, Sinchul Back, Sadhika Soor, Jennifer Laprade

International Journal of Cybersecurity Intelligence & Cybercrime

In accordance with a similar growth in information technology, computer hacking has become a pervasive issue as a form of crime worldwide in recent years. Self-control theory and social bonding theory have frequently been employed to explain various types of crimes, but rarely to explore computer hacking. Drawing from Gottfredson and Hirschi’s (1990) self-control theory and Hirschi’s (1969) social bonding theory, the purpose of this study is to empirically examine the suitability of these two theories in explaining juvenile computer hacking offenses. The self-report survey data utilized for the present study was derived from middle school and high ...


Architecture Of Aggression In Cyberspace. Testing Cyber Aggression In Young Adults In Hungary, Katalin Parti, Tibor Kiss, Gergely Koplányi 2018 National Institute of Criminology Hungary

Architecture Of Aggression In Cyberspace. Testing Cyber Aggression In Young Adults In Hungary, Katalin Parti, Tibor Kiss, Gergely Koplányi

International Journal of Cybersecurity Intelligence & Cybercrime

In order to test whether and how violence is exacerbated in online social networking sites, we utilized the BryantSmith Aggression Scale (Bryant & Smith, 2001), and included examples in the questionnaire offering solutions for 7 different hypothetical cases occurring online (Kiss, 2017). The questionnaire was sent to social work and law school students in Hungary. Prevalence and levels of aggression and its manifestation as violence online proved to be not more severe than in offline social relations. Law students were more aware than students of social work that online hostile acts are discrediting. Students of social work were significantly more prone ...


An Argument For Interdisciplinary Programs In Cybersecurity, Dennis Giever 2018 New Mexico State University

An Argument For Interdisciplinary Programs In Cybersecurity, Dennis Giever

International Journal of Cybersecurity Intelligence & Cybercrime

In this commentary Dr. Giever presents a compelling argument for interdisciplinary programs in cybersecurity at the university level. He argues that we no longer have the luxury of allowing barriers to exist between those tasked with IT security and those who provide physical security. He recommends that any security program take an “all possible paths” or “balanced approach” to the protection of assets within an organization. Students in computer science, criminal justice, business, human resources, and others should work collaboratively within education programs learning these necessary skills. A team effort is needed to accomplish the myriad of tasks necessary to ...


Privacy-Preserving Photo Taking And Accessing For Mobile Phones, Ang Li 2018 University of Arkansas, Fayetteville

Privacy-Preserving Photo Taking And Accessing For Mobile Phones, Ang Li

Theses and Dissertations

Today, we are living in environments that are full of cameras embedded in devices such as smart phones and wearables. These mobile devices and as well as apps installed on them are designed to be extremely convenient for users to take, store and share photos. In spite of the convenience brought by ubiquitous cameras, users' privacy may be breached through photos that are taken and stored with mobile devices. For example, when users take a photo of a scenery, a building or a target person, a stranger may also be unintentionally captured in the photo. Such photos expose the location ...


Theatrical Genre Prediction Using Social Network Metrics, Manisha Shukla 2018 University of Arkansas, Fayetteville

Theatrical Genre Prediction Using Social Network Metrics, Manisha Shukla

Theses and Dissertations

With the emergence of digitization, large text corpora are now available online that provide humanities scholars an opportunity to perform literary analysis leveraging the use of computational techniques. This work is focused on applying network theory concepts in the field of literature to explore correlations between the mathematical properties of the social networks of plays and the plays’ dramatic genre, specifically how well social network metrics can identify genre without taking vocabulary into consideration. Almost no work has been done to study the ability of mathematical properties of network graphs to predict literary features. We generated character interaction networks of ...


Building Test Anonymity Networks In A Cybersecurity Lab Environment, John Schriner 2018 CUNY Queensborough Community College

Building Test Anonymity Networks In A Cybersecurity Lab Environment, John Schriner

Student Theses

This paper explores current methods for creating test anonymity networks in a laboratory environment for the purpose of improving these networks while protecting user privacy. We first consider how each of these networks is research-driven and interested in helping researchers to conduct their research ethically. We then look to the software currently available for researchers to set up in their labs. Lastly we explore ways in which digital forensics and cybersecurity students could get involved with these projects and look at several class exercises that help students to understand particular attacks on these networks and ways they can help to ...


Formal Verification Of A Modern Boot Loader, Scott D. Constable, Rob Sutton, Arash Sahebolamri, Steve Chapin 2018 Syracuse University

Formal Verification Of A Modern Boot Loader, Scott D. Constable, Rob Sutton, Arash Sahebolamri, Steve Chapin

Electrical Engineering and Computer Science Technical Reports

We introduce the Syracuse Assured Boot Loader Executive (SABLE), a trustworthy secure loader. A trusted boot loader performs a cryptographic measurement (hash) of program code and executes it unconditionally, allowing later-stage software to verify the integrity of the system through local or remote attestation. A secure loader differs from a trusted loader in that it executes subsequent code only if measurements of that code match known-good values. We have applied a rigorous formal verification technique recently demonstrated in practice by NICTA in their verification of the seL4 microkernel. We summarize our design philosophy from a high level and present our ...


Digital Commons powered by bepress