Open Access. Powered by Scholars. Published by Universities.®

Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

838 Full-Text Articles 1,072 Authors 942,313 Downloads 110 Institutions

All Articles in Systems Architecture

Faceted Search

838 full-text articles. Page 8 of 31.

Csci 49378: Lecture 8: Cloud Systems And Infrastructures Ii, Bonan Liu, NYC Tech-in-Residence Corps 2020 CUNY Hunter College

Csci 49378: Lecture 8: Cloud Systems And Infrastructures Ii, Bonan Liu, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CSCI 49378: Intro to Distributed Systems and Cloud Computing - "Cloud Systems and Infrastructures II" (Week Eight) delivered at Hunter College in Spring 2020 by Bonan Liu as part of the Tech-in-Residence Corps program.


Csci 49378: Lecture 11: Logging, Monitoring, And Advanced Topics, Bonan Liu, NYC Tech-in-Residence Corps 2020 CUNY Hunter College

Csci 49378: Lecture 11: Logging, Monitoring, And Advanced Topics, Bonan Liu, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CSCI 49378: Intro to Distributed Systems and Cloud Computing - "Logging, Monitoring, and Advanced Topics" (Week Eleven) delivered at Hunter College in Spring 2020 by Bonan Liu as part of the Tech-in-Residence Corps program.


Csci 49378: Lecture 4: Distributed File Systems, Bonan Liu, NYC Tech-in-Residence Corps 2020 CUNY Hunter College

Csci 49378: Lecture 4: Distributed File Systems, Bonan Liu, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CSCI 49378: Intro to Distributed Systems and Cloud Computing - "Distributed File Systems" (Week Four) delivered at Hunter College in Spring 2020 by Bonan Liu as part of the Tech-in-Residence Corps program.


Csci 49378: Final Project Assignment: Distributed Systems And Cloud Computing, Bonan Liu, NYC Tech-in-Residence Corps 2020 CUNY Hunter College

Csci 49378: Final Project Assignment: Distributed Systems And Cloud Computing, Bonan Liu, Nyc Tech-In-Residence Corps

Open Educational Resources

Final Project Assignment for the course: "CSCI 49378: Intro to Distributed Systems and Cloud Computing" delivered at Hunter College in Spring 2020 by Bonan Liu as part of the Tech-in-Residence Corps program.


Csci 49378: Lecture 10: Cloud Storage And Databases Ii, Bonan Liu, NYC Tech-in-Residence Corps 2020 CUNY Hunter College

Csci 49378: Lecture 10: Cloud Storage And Databases Ii, Bonan Liu, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CSCI 49378: Intro to Distributed Systems and Cloud Computing - "Cloud Storage and Databases II" (Week Ten) delivered at Hunter College in Spring 2020 by Bonan Liu as part of the Tech-in-Residence Corps program.


Csci 49378: Lecture 5: Distributed Web-Based Applications, Bonan Liu, NYC Tech-in-Residence Corps 2020 CUNY Hunter College

Csci 49378: Lecture 5: Distributed Web-Based Applications, Bonan Liu, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CSCI 49378: Intro to Distributed Systems and Cloud Computing - "Distributed Web-based Applications" (Week five) delivered at Hunter College in Spring 2020 by Bonan Liu as part of the Tech-in-Residence Corps program.


Csci 49378: Lecture 9: Cloud Storage And Databases I, Bonan Liu, NYC Tech-in-Residence Corps 2020 CUNY Hunter College

Csci 49378: Lecture 9: Cloud Storage And Databases I, Bonan Liu, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CSCI 49378: Intro to Distributed Systems and Cloud Computing - "Cloud Storage and Databases I" (Week Nine) delivered at Hunter College in Spring 2020 by Bonan Liu as part of the Tech-in-Residence Corps program.


Devops: Lecture 1 - "Overview", Jeremy Andrews, NYC Tech-in-Residence Corps 2020 CUNY City College

Devops: Lecture 1 - "Overview", Jeremy Andrews, Nyc Tech-In-Residence Corps

Open Educational Resources

Overview lecture for the "DevOps" course delivered at the City College of New York in Spring 2020 by Jeremy Andrews as part of the Tech-in-Residence Corps program.


Devops: Architecting Your Infrastructure (Syllabus), Jeremy Andrews, NYC Tech-in-Residence Corps 2020 CUNY City College

Devops: Architecting Your Infrastructure (Syllabus), Jeremy Andrews, Nyc Tech-In-Residence Corps

Open Educational Resources

Syllabus for the "DevOps" course delivered at the City College of New York in Spring 2020 by Jeremy Andrews as part of the Tech-in-Residence Corps program.


Learning In The Machine: To Share Or Not To Share?, Jordan Ott, Erik Linstead, Nicholas LaHaye, Pierre Baldi 2020 Chapman University

Learning In The Machine: To Share Or Not To Share?, Jordan Ott, Erik Linstead, Nicholas Lahaye, Pierre Baldi

Engineering Faculty Articles and Research

Weight-sharing is one of the pillars behind Convolutional Neural Networks and their successes. However, in physical neural systems such as the brain, weight-sharing is implausible. This discrepancy raises the fundamental question of whether weight-sharing is necessary. If so, to which degree of precision? If not, what are the alternatives? The goal of this study is to investigate these questions, primarily through simulations where the weight-sharing assumption is relaxed. Taking inspiration from neural circuitry, we explore the use of Free Convolutional Networks and neurons with variable connection patterns. Using Free Convolutional Networks, we show that while weight-sharing is a pragmatic optimization …


Graph Classification With Kernels, Embeddings And Convolutional Neural Networks, Monica Golahalli Seenappa, Katerina Potika, Petros Potikas 2020 San Jose State University

Graph Classification With Kernels, Embeddings And Convolutional Neural Networks, Monica Golahalli Seenappa, Katerina Potika, Petros Potikas

Faculty Publications, Computer Science

In the graph classification problem, given is a family of graphs and a group of different categories, and we aim to classify all the graphs (of the family) into the given categories. Earlier approaches, such as graph kernels and graph embedding techniques have focused on extracting certain features by processing the entire graph. However, real world graphs are complex and noisy and these traditional approaches are computationally intensive. With the introduction of the deep learning framework, there have been numerous attempts to create more efficient classification approaches. We modify a kernel graph convolutional neural network approach, that extracts subgraphs (patches) …


Iot-Hass: A Framework For Protecting Smart Home Environment, Tarig Mudawi 2020 Dakota State University

Iot-Hass: A Framework For Protecting Smart Home Environment, Tarig Mudawi

Masters Theses & Doctoral Dissertations

While many solutions have been proposed for smart home security, the problem that no single solution fully protects the smart home environment still exists. In this research we propose a security framework to protect the smart home environment. The proposed framework includes three engines that complement each other to protect the smart home IoT devices. The first engine is an IDS/IPS module that monitors all traffic in the home network and then detects, alerts users, and/or blocks packets using anomaly-based detection. The second engine works as a device management module that scans and verifies IoT devices in the home network, …


Automated Synthesis Of Local Time Requirement For Service Composition, Étienne ANDRÉ, Tian Huat TAN, Manman CHEN, Shuang LIU, Jun SUN, Yang LIU, Jin Song DONG 2020 Singapore Management University

Automated Synthesis Of Local Time Requirement For Service Composition, Étienne André, Tian Huat Tan, Manman Chen, Shuang Liu, Jun Sun, Yang Liu, Jin Song Dong

Research Collection School Of Computing and Information Systems

Service composition aims at achieving a business goal by composing existing service-based applications or components. The response time of a service is crucial, especially in time-critical business environments, which is often stated as a clause in service-level agreements between service providers and service users. To meet the guaranteed response time requirement of a composite service, it is important to select a feasible set of component services such that their response time will collectively satisfy the response time requirement of the composite service. In this work, we use the BPEL modeling language that aims at specifying Web services. We extend it …


Wireless Underground Communications In Sewer And Stormwater Overflow Monitoring: Radio Waves Through Soil And Asphalt Medium, Usman Raza, Abdul Salam 2020 Purdue University

Wireless Underground Communications In Sewer And Stormwater Overflow Monitoring: Radio Waves Through Soil And Asphalt Medium, Usman Raza, Abdul Salam

Faculty Publications

Storm drains and sanitary sewers are prone to backups and overflows due to extra amount wastewater entering the pipes. To prevent that, it is imperative to efficiently monitor the urban underground infrastructure. The combination of sensors system and wireless underground communication system can be used to realize urban underground IoT applications, e.g., storm water and wastewater overflow monitoring systems. The aim of this article is to establish a feasibility of the use of wireless underground communications techniques, and wave propagation through the subsurface soil and asphalt layers, in an underground pavement system for storm water and sewer overflow monitoring application. …


Who Owns Bitcoin? Private Law Facing The Blockchain, Matthias Lehmann 2020 University of Minnesota Law School

Who Owns Bitcoin? Private Law Facing The Blockchain, Matthias Lehmann

Minnesota Journal of Law, Science & Technology

No abstract provided.


A Visual Analytics System For Making Sense Of Real-Time Twitter Streams, Amir HaghighatiMaleki 2020 The University of Western Ontario

A Visual Analytics System For Making Sense Of Real-Time Twitter Streams, Amir Haghighatimaleki

Electronic Thesis and Dissertation Repository

Through social media platforms, massive amounts of data are being produced. Twitter, as one such platform, enables users to post “tweets” on an unprecedented scale. Once analyzed by machine learning (ML) techniques and in aggregate, Twitter data can be an invaluable resource for gaining insight. However, when applied to real-time data streams, due to covariate shifts in the data (i.e., changes in the distributions of the inputs of ML algorithms), existing ML approaches result in different types of biases and provide uncertain outputs. This thesis describes a visual analytics system (i.e., a tool that combines data visualization, human-data interaction, and …


The Social Media Machines: An Investigation Of The Effect Of Trust Moderated By Disinformation On Users’ Decision-Making Process, Zulma Valedon Westney 2020 Nova Southeastern University

The Social Media Machines: An Investigation Of The Effect Of Trust Moderated By Disinformation On Users’ Decision-Making Process, Zulma Valedon Westney

CCE Theses and Dissertations

Social media networking sites (SMNS) have become a popular communications medium where users share information, knowledge, and persuasion. In less than two decades, social media's (SM) dominance as a communication medium can't be disputed, for good or evil. Combined with the newly found immediacy and pervasiveness, these SM applications' persuasive power are useful weapons for organizations, angry customers, employees, actors, and activists bent on attacking or hacking other individuals, institutions, or systems. Consequently, SM has become the preferred default mechanism of news sources; however, users are unsure if the information gathered is true or false. According to the literature, SMNS …


Building Something With The Raspberry Pi, Richard Kordel 2020 Harrisburg University of Science and Technology

Building Something With The Raspberry Pi, Richard Kordel

Presidential Research Grants

In 2017 Ryan Korn and I submitted a grant proposal in the annual Harrisburg University President’s Grant process. Our proposal was to partner with a local high school to install a classroom of 20 Raspberry Pi’s, along with the requisite peripherals. In that classroom students would be challenged to design something that combined programming with physical computing. In our presentation to the school we suggested that this project would give students the opportunity to be “amazing.”

As part of the grant, the top three students would be given scholarships to HU and the top five finalists would all be permitted …


Protecting The Protector: Mapping The Key Terrain That Supports The Continuous Monitoring Mission Of A Cloud Cybersecurity Service Provider, Chris Bush 2020 Nova Southeastern University

Protecting The Protector: Mapping The Key Terrain That Supports The Continuous Monitoring Mission Of A Cloud Cybersecurity Service Provider, Chris Bush

CCE Theses and Dissertations

Key terrain is a concept that is relevant to warfare, military strategy, and tactics. A good general maps out terrain to identify key areas to protect in support of a mission (i.e., a bridge allowing for mobility of supplies and reinforcements). Effective ways to map terrain in Cyberspace (KT-C) has been an area of interest for researchers in Cybersecurity ever since the Department of Defense designated Cyberspace as a warfighting domain. The mapping of KT-C for a mission is accomplished by putting forth efforts to understand and document a mission's dependence on Cyberspace and cyber assets. A cloud Cybersecurity Service …


Mobile Technology As A Leverage Point For The Spread Of Permaculture In The Food System, Daniel Finley 2020 Regis University

Mobile Technology As A Leverage Point For The Spread Of Permaculture In The Food System, Daniel Finley

Regis University Student Publications (comprehensive collection)

This thesis argues that the current food system is untenable in the long term due to its significant negative impacts on the global ecosystem and society.


Digital Commons powered by bepress