Csci 49378: Lecture 8: Cloud Systems And Infrastructures Ii,
2020
CUNY Hunter College
Csci 49378: Lecture 8: Cloud Systems And Infrastructures Ii, Bonan Liu, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CSCI 49378: Intro to Distributed Systems and Cloud Computing - "Cloud Systems and Infrastructures II" (Week Eight) delivered at Hunter College in Spring 2020 by Bonan Liu as part of the Tech-in-Residence Corps program.
Csci 49378: Lecture 11: Logging, Monitoring, And Advanced Topics,
2020
CUNY Hunter College
Csci 49378: Lecture 11: Logging, Monitoring, And Advanced Topics, Bonan Liu, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CSCI 49378: Intro to Distributed Systems and Cloud Computing - "Logging, Monitoring, and Advanced Topics" (Week Eleven) delivered at Hunter College in Spring 2020 by Bonan Liu as part of the Tech-in-Residence Corps program.
Csci 49378: Lecture 4: Distributed File Systems,
2020
CUNY Hunter College
Csci 49378: Lecture 4: Distributed File Systems, Bonan Liu, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CSCI 49378: Intro to Distributed Systems and Cloud Computing - "Distributed File Systems" (Week Four) delivered at Hunter College in Spring 2020 by Bonan Liu as part of the Tech-in-Residence Corps program.
Csci 49378: Final Project Assignment: Distributed Systems And Cloud Computing,
2020
CUNY Hunter College
Csci 49378: Final Project Assignment: Distributed Systems And Cloud Computing, Bonan Liu, Nyc Tech-In-Residence Corps
Open Educational Resources
Final Project Assignment for the course: "CSCI 49378: Intro to Distributed Systems and Cloud Computing" delivered at Hunter College in Spring 2020 by Bonan Liu as part of the Tech-in-Residence Corps program.
Csci 49378: Lecture 10: Cloud Storage And Databases Ii,
2020
CUNY Hunter College
Csci 49378: Lecture 10: Cloud Storage And Databases Ii, Bonan Liu, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CSCI 49378: Intro to Distributed Systems and Cloud Computing - "Cloud Storage and Databases II" (Week Ten) delivered at Hunter College in Spring 2020 by Bonan Liu as part of the Tech-in-Residence Corps program.
Csci 49378: Lecture 5: Distributed Web-Based Applications,
2020
CUNY Hunter College
Csci 49378: Lecture 5: Distributed Web-Based Applications, Bonan Liu, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CSCI 49378: Intro to Distributed Systems and Cloud Computing - "Distributed Web-based Applications" (Week five) delivered at Hunter College in Spring 2020 by Bonan Liu as part of the Tech-in-Residence Corps program.
Csci 49378: Lecture 9: Cloud Storage And Databases I,
2020
CUNY Hunter College
Csci 49378: Lecture 9: Cloud Storage And Databases I, Bonan Liu, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CSCI 49378: Intro to Distributed Systems and Cloud Computing - "Cloud Storage and Databases I" (Week Nine) delivered at Hunter College in Spring 2020 by Bonan Liu as part of the Tech-in-Residence Corps program.
Devops: Lecture 1 - "Overview",
2020
CUNY City College
Devops: Lecture 1 - "Overview", Jeremy Andrews, Nyc Tech-In-Residence Corps
Open Educational Resources
Overview lecture for the "DevOps" course delivered at the City College of New York in Spring 2020 by Jeremy Andrews as part of the Tech-in-Residence Corps program.
Devops: Architecting Your Infrastructure (Syllabus),
2020
CUNY City College
Devops: Architecting Your Infrastructure (Syllabus), Jeremy Andrews, Nyc Tech-In-Residence Corps
Open Educational Resources
Syllabus for the "DevOps" course delivered at the City College of New York in Spring 2020 by Jeremy Andrews as part of the Tech-in-Residence Corps program.
Learning In The Machine: To Share Or Not To Share?,
2020
Chapman University
Learning In The Machine: To Share Or Not To Share?, Jordan Ott, Erik Linstead, Nicholas Lahaye, Pierre Baldi
Engineering Faculty Articles and Research
Weight-sharing is one of the pillars behind Convolutional Neural Networks and their successes. However, in physical neural systems such as the brain, weight-sharing is implausible. This discrepancy raises the fundamental question of whether weight-sharing is necessary. If so, to which degree of precision? If not, what are the alternatives? The goal of this study is to investigate these questions, primarily through simulations where the weight-sharing assumption is relaxed. Taking inspiration from neural circuitry, we explore the use of Free Convolutional Networks and neurons with variable connection patterns. Using Free Convolutional Networks, we show that while weight-sharing is a pragmatic optimization …
Graph Classification With Kernels, Embeddings And Convolutional Neural Networks,
2020
San Jose State University
Graph Classification With Kernels, Embeddings And Convolutional Neural Networks, Monica Golahalli Seenappa, Katerina Potika, Petros Potikas
Faculty Publications, Computer Science
In the graph classification problem, given is a family of graphs and a group of different categories, and we aim to classify all the graphs (of the family) into the given categories. Earlier approaches, such as graph kernels and graph embedding techniques have focused on extracting certain features by processing the entire graph. However, real world graphs are complex and noisy and these traditional approaches are computationally intensive. With the introduction of the deep learning framework, there have been numerous attempts to create more efficient classification approaches. We modify a kernel graph convolutional neural network approach, that extracts subgraphs (patches) …
Iot-Hass: A Framework For Protecting Smart Home Environment,
2020
Dakota State University
Iot-Hass: A Framework For Protecting Smart Home Environment, Tarig Mudawi
Masters Theses & Doctoral Dissertations
While many solutions have been proposed for smart home security, the problem that no single solution fully protects the smart home environment still exists. In this research we propose a security framework to protect the smart home environment. The proposed framework includes three engines that complement each other to protect the smart home IoT devices. The first engine is an IDS/IPS module that monitors all traffic in the home network and then detects, alerts users, and/or blocks packets using anomaly-based detection. The second engine works as a device management module that scans and verifies IoT devices in the home network, …
Automated Synthesis Of Local Time Requirement For Service Composition,
2020
Singapore Management University
Automated Synthesis Of Local Time Requirement For Service Composition, Étienne André, Tian Huat Tan, Manman Chen, Shuang Liu, Jun Sun, Yang Liu, Jin Song Dong
Research Collection School Of Computing and Information Systems
Service composition aims at achieving a business goal by composing existing service-based applications or components. The response time of a service is crucial, especially in time-critical business environments, which is often stated as a clause in service-level agreements between service providers and service users. To meet the guaranteed response time requirement of a composite service, it is important to select a feasible set of component services such that their response time will collectively satisfy the response time requirement of the composite service. In this work, we use the BPEL modeling language that aims at specifying Web services. We extend it …
Wireless Underground Communications In Sewer And Stormwater Overflow Monitoring: Radio Waves Through Soil And Asphalt Medium,
2020
Purdue University
Wireless Underground Communications In Sewer And Stormwater Overflow Monitoring: Radio Waves Through Soil And Asphalt Medium, Usman Raza, Abdul Salam
Faculty Publications
Storm drains and sanitary sewers are prone to backups and overflows due to extra amount wastewater entering the pipes. To prevent that, it is imperative to efficiently monitor the urban underground infrastructure. The combination of sensors system and wireless underground communication system can be used to realize urban underground IoT applications, e.g., storm water and wastewater overflow monitoring systems. The aim of this article is to establish a feasibility of the use of wireless underground communications techniques, and wave propagation through the subsurface soil and asphalt layers, in an underground pavement system for storm water and sewer overflow monitoring application. …
Who Owns Bitcoin? Private Law Facing The Blockchain,
2020
University of Minnesota Law School
Who Owns Bitcoin? Private Law Facing The Blockchain, Matthias Lehmann
Minnesota Journal of Law, Science & Technology
No abstract provided.
A Visual Analytics System For Making Sense Of Real-Time Twitter Streams,
2020
The University of Western Ontario
A Visual Analytics System For Making Sense Of Real-Time Twitter Streams, Amir Haghighatimaleki
Electronic Thesis and Dissertation Repository
Through social media platforms, massive amounts of data are being produced. Twitter, as one such platform, enables users to post “tweets” on an unprecedented scale. Once analyzed by machine learning (ML) techniques and in aggregate, Twitter data can be an invaluable resource for gaining insight. However, when applied to real-time data streams, due to covariate shifts in the data (i.e., changes in the distributions of the inputs of ML algorithms), existing ML approaches result in different types of biases and provide uncertain outputs. This thesis describes a visual analytics system (i.e., a tool that combines data visualization, human-data interaction, and …
The Social Media Machines: An Investigation Of The Effect Of Trust Moderated By Disinformation On Users’ Decision-Making Process,
2020
Nova Southeastern University
The Social Media Machines: An Investigation Of The Effect Of Trust Moderated By Disinformation On Users’ Decision-Making Process, Zulma Valedon Westney
CCE Theses and Dissertations
Social media networking sites (SMNS) have become a popular communications medium where users share information, knowledge, and persuasion. In less than two decades, social media's (SM) dominance as a communication medium can't be disputed, for good or evil. Combined with the newly found immediacy and pervasiveness, these SM applications' persuasive power are useful weapons for organizations, angry customers, employees, actors, and activists bent on attacking or hacking other individuals, institutions, or systems. Consequently, SM has become the preferred default mechanism of news sources; however, users are unsure if the information gathered is true or false. According to the literature, SMNS …
Building Something With The Raspberry Pi,
2020
Harrisburg University of Science and Technology
Building Something With The Raspberry Pi, Richard Kordel
Presidential Research Grants
In 2017 Ryan Korn and I submitted a grant proposal in the annual Harrisburg University President’s Grant process. Our proposal was to partner with a local high school to install a classroom of 20 Raspberry Pi’s, along with the requisite peripherals. In that classroom students would be challenged to design something that combined programming with physical computing. In our presentation to the school we suggested that this project would give students the opportunity to be “amazing.”
As part of the grant, the top three students would be given scholarships to HU and the top five finalists would all be permitted …
Protecting The Protector: Mapping The Key Terrain That Supports The Continuous Monitoring Mission Of A Cloud Cybersecurity Service Provider,
2020
Nova Southeastern University
Protecting The Protector: Mapping The Key Terrain That Supports The Continuous Monitoring Mission Of A Cloud Cybersecurity Service Provider, Chris Bush
CCE Theses and Dissertations
Key terrain is a concept that is relevant to warfare, military strategy, and tactics. A good general maps out terrain to identify key areas to protect in support of a mission (i.e., a bridge allowing for mobility of supplies and reinforcements). Effective ways to map terrain in Cyberspace (KT-C) has been an area of interest for researchers in Cybersecurity ever since the Department of Defense designated Cyberspace as a warfighting domain. The mapping of KT-C for a mission is accomplished by putting forth efforts to understand and document a mission's dependence on Cyberspace and cyber assets. A cloud Cybersecurity Service …
Mobile Technology As A Leverage Point For The Spread Of Permaculture In The Food System,
2020
Regis University
Mobile Technology As A Leverage Point For The Spread Of Permaculture In The Food System, Daniel Finley
Regis University Student Publications (comprehensive collection)
This thesis argues that the current food system is untenable in the long term due to its significant negative impacts on the global ecosystem and society.