Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Journal articles (19)
- Articles (15)
- Computer science (12)
- Emerging Technologies (9)
- EAgriculture (8)
-
- Bayesian Networks (7)
- Computer Science Education (7)
- Security (7)
- Architectural strategy (6)
- Computing in Science and Engineering (6)
- Parallel and Distributed Systems (6)
- Privacy (6)
- Social Implications of ICT (6)
- Uberveillance (6)
- Computer Science (5)
- Data (5)
- Mobile and Pervasive Computing (5)
- National Security (5)
- Operating Systems (5)
- Policing (5)
- Surveillance (5)
- XML (5)
- Amanda Izenstark (4)
- Bayesian networks (4)
- Collection management (4)
- College of Arts and Sciences (4)
- Computer Science Department (4)
- Conference Proceedings (4)
- Cyber (4)
- Embedded systems (4)
- Publication
-
- David LO (24)
- Xiao-Jun Yang (21)
- Konstantin Läufer (20)
- Professor Katina Michael (17)
- Dr Deogratias Harorimana (14)
-
- Leisa Armstrong (14)
- C. Jason Woodard (11)
- Andrew McCallum (10)
- Associate Professor Katina Michael (9)
- Erik G Learned-Miller (9)
- Mark L. Chang (8)
- Ole J Mengshoel (8)
- Jan Kallberg (7)
- Miao Wang (7)
- Amanda Izenstark (5)
- Amber Settle (5)
- Arcot Desai NARASIMHALU (5)
- Edward Aractingi (5)
- George J. Pappas (5)
- Shlomo Zilberstein (5)
- Bruce Vanstone (4)
- Dr Markus Hagenbuchner (4)
- Dr. Torstein Tengs (4)
- Jeremy Straub (4)
- Kyriakos MOURATIDIS (4)
- Rahul Mangharam (4)
- Sarah Spence Adams (4)
- Allen B. Downey (3)
- Dr Guilin Wang (3)
- Dr Robert Brown (3)
Articles 31 - 60 of 364
Full-Text Articles in Entire DC Network
P2cp: A New Cloud Storage Model To Enhance Performance Of Cloud Services, Zhe Sun, Jun Shen, Ghassan Beydoun
P2cp: A New Cloud Storage Model To Enhance Performance Of Cloud Services, Zhe Sun, Jun Shen, Ghassan Beydoun
Associate Professor Ghassan Beydoun
This paper presents a storage model named Peer to Cloud and Peer (P2CP). Assuming that the P2CP model follows the Poisson process or Little’s law, we prove that the speed and availability of P2CP is generally better than that of the pure Peer to Peer (P2P) model, the Peer to Server, Peer (P2SP) model or the cloud model. A key feature of our P2CP is that it has three data transmission tunnels: the cloud-user data transmission tunnel, the clients’ data transmission tunnel, and the common data transmission tunnel. P2CP uses the cloud storage system as a common storage system. When …
Security Analysis Of Two Signcryption Schemes, Guilin Wang, Robert H. Deng, Dongjin Kwak, Sangjae Moon
Security Analysis Of Two Signcryption Schemes, Guilin Wang, Robert H. Deng, Dongjin Kwak, Sangjae Moon
Dr Guilin Wang
Signcryption is a new cryptographic primitive that performs signing and encryption simultaneously, at a cost significantly lower than that required by the traditional signature-then-encryption approach. In this paper, we present a security analysis of two such schemes: the Huang-Chang convertible signcryption scheme, and the Kwak-Moon group signcryption scheme. Our results show that both schemes are insecure. Specifically, the Huang-Chang scheme fails to provide confidentiality, while the Kwak-Moon scheme does not satisfy the properties of unforgeability, coalition-resistance, and traceability.
Comments On "A Practical (T, N) Threshold Proxy Signature Scheme Based On The Rsa Cryptosystem", Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
Comments On "A Practical (T, N) Threshold Proxy Signature Scheme Based On The Rsa Cryptosystem", Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
Dr Guilin Wang
In a (t, n) threshold proxy signature scheme based on RSA, any t or more proxy signers can cooperatively generate a proxy signature while t-1 or fewer of them can't do it. The threshold proxy signature scheme uses the RSA cryptosystem to generate the private and the public key of the signers. In this article, we discuss the implementation and comparison of some threshold proxy signature schemes that are based on the RSA cryptosystem. Comparison is done on the basis of time complexity, space complexity and communication overhead. We compare the performance of four schemes: Hwang et al., Wen et …
Proxy Signature Scheme With Multiple Original Signers For Wireless E-Commerce Applications, Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
Proxy Signature Scheme With Multiple Original Signers For Wireless E-Commerce Applications, Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
Dr Guilin Wang
In a proxy signature scheme, a user delegates his/her signing capability to another user in such a way that the latter can sign messages on behalf of the former. We propose an efficient and secure proxy signature scheme with multiple original signers. Our scheme is suitable for wireless electronic commerce applications, since the overheads of computation and communication are low. As an example, we present an electronic air ticket booking scheme for wireless customers.
Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg
Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg
Jan Kallberg
La guerra concentrada en la red depende de la red de información global para capacidades de combate conjuntas.3 La capa fundamental crea la capacidad de combate global como la columna vertebral espacial de la red de información donde los haberes espaciales son el elemento decisivo. EE.UU. depende de las capacidades espaciales para su éxito y la seguridad nacional de EE.UU. se basa hoy en día en un número limitado de satélites muy utilizados. Estos satélites son cruciales para la disuasión estratégica, la vigilancia, la recopilación de inteligencia y las comunicaciones militares. Si la disuasión estratégica falla, los satélites forman parte …
Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael
Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael
Associate Professor Katina Michael
The boom of the internet and the explosion of new technologies have brought with them new challenges and thus new connotations of privacy. Clearly, when people deal with e-government and e-business, they do not only need the right to be let alone, but also to be let in secret. Not only do they need freedom of movement, but also to be assured of the secrecy of their information. Solove [6] has critiqued traditional definitions of privacy and argued that they do not address privacy issues created by new online technologies. Austin [7] also asserts: “[w]e do need to sharpen and …
Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael
Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael
Professor Katina Michael
This special section is dedicated to privacy in the information age. Since the rise of mobile social media in particular and the advent of cloud computing few can dispute that the times have changed. Privacy is now understood in context, and within a framework that is completely different to what it once was. The right to be let alone physically seemingly has been replaced by the right to give away as much information as you want virtually. What safeguards can be introduced into such a society? We cannot claim to wish for privacy as a right if we ourselves do …
P2cp: A New Cloud Storage Model To Enhance Performance Of Cloud Services, Zhe Sun, Jun Shen, Ghassan Beydoun
P2cp: A New Cloud Storage Model To Enhance Performance Of Cloud Services, Zhe Sun, Jun Shen, Ghassan Beydoun
Dr Jun Shen
This paper presents a storage model named Peer to Cloud and Peer (P2CP). Assuming that the P2CP model follows the Poisson process or Little’s law, we prove that the speed and availability of P2CP is generally better than that of the pure Peer to Peer (P2P) model, the Peer to Server, Peer (P2SP) model or the cloud model. A key feature of our P2CP is that it has three data transmission tunnels: the cloud-user data transmission tunnel, the clients’ data transmission tunnel, and the common data transmission tunnel. P2CP uses the cloud storage system as a common storage system. When …
Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom
Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom
Professor Katina Michael
Mobile Government Briefing: Provide services anywhere any time: - Transact to enable in-field data collection, request processing, order management, approvals, edits, updates and execute actions. - What are the implications for the incorporation of rich multimedia content on devices to better serve staff and citizens? - Addressing the security challenges of various risks around data access, data transmission, and data storage for BI architecture and mobile devices
The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther
The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther
Jan Kallberg
With sequestration looming—generating significant cuts to defense spending—the United States may find itself increasingly relying on nuclear and cyber deterrence as an affordable way to guarantee national sovereignty and prevent major conflict. While earlier defense planning and acquisitions were based on economic conditions that no longer exist, Congress’ options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense voters” than “social welfare voters,” according to a number of recent public opinion surveys.
Ieee T&S Magazine: Undergoing Transformation, Katina Michael
Ieee T&S Magazine: Undergoing Transformation, Katina Michael
Professor Katina Michael
Our Magazine is in a transformative period, not only because we are ‘Going Green’ in 2013 but because we are experiencing tremendous growth in quality international submissions. This means that we are increasingly appealing to an international audience with transdisciplinary interests. This has not gone unnoticed by the media, nor by our SSIT readership or wider engineering community.
Scaling Bayesian Network Parameter Learning With Expectation Maximization Using Mapreduce, Erik B. Reed, Ole J. Mengshoel
Scaling Bayesian Network Parameter Learning With Expectation Maximization Using Mapreduce, Erik B. Reed, Ole J. Mengshoel
Ole J Mengshoel
Mapreduce For Bayesian Network Parameter Learning Using The Em Algorithm, Aniruddha Basak, Irina Brinster, Ole J. Mengshoel
Mapreduce For Bayesian Network Parameter Learning Using The Em Algorithm, Aniruddha Basak, Irina Brinster, Ole J. Mengshoel
Ole J Mengshoel
On The Interaction Of Data Representation And Routing In Sensor Networks, Deepak Ganesan
On The Interaction Of Data Representation And Routing In Sensor Networks, Deepak Ganesan
Deepak Ganesan
We consider data gathering by a network with a sink node and a tree communication structure, where the goal is to minimize the total transmission cost of transporting the information collected by the nodes, to the sink node. This problem requires a joint optimization of the data representation at the nodes and of the transmission structure. First, we study the case when the measured data are correlated random variables, both in the lossless scenario with Slepian-Wolf coding, and in the high-resolution lossy scenario with optimal rate-distortion allocation. We show that the optimal transmission structure is the shortest path tree, and …
The Economics Of Open Source, Christopher H. Hoebeke
The Economics Of Open Source, Christopher H. Hoebeke
Christopher H Hoebeke
No abstract provided.
Glogging Your Every Move, Lisa Wachsmuth, Katina Michael
Glogging Your Every Move, Lisa Wachsmuth, Katina Michael
Professor Katina Michael
"It is one thing to lug technologies around, another thing to wear them, and even more intrusive to bear them... But that's the direction in which we're headed."
"I think we're entering an era of person-view systems which will show things on ground level and will be increasingly relayed to others via social media.
"We've got people wearing recording devices on their fingers, in their caps or sunglasses - there are huge legal and ethical implications here."
Financial Trading Systems Using Artificial Neural Networks, Bruce Vanstone, Gavin Finnie
Financial Trading Systems Using Artificial Neural Networks, Bruce Vanstone, Gavin Finnie
Bruce Vanstone
Soft computing represents that area of computing adapted from the physical sciences. Artificial intelligence techniques within this realm attempt to solve problems by applying physical laws and processes. This style of computing is particularly tolerant of imprecision and uncertainty, making the approach attractive to those researching within “noisy” realms, where the signal-to-noise ratio is quite low. Soft computing is normally accepted to include the three key areas of fuzzy logic, artificial neural networks, and probabilistic reasoning (which include genetic algorithms, chaos theory, etc.). The arena of investment trading is one such field where there is an abundance of noisy data. …
Developing High Frequency Foreign Exchange Trading Systems, Bruce Vanstone, Tobias Hahn, Gavin Finnie
Developing High Frequency Foreign Exchange Trading Systems, Bruce Vanstone, Tobias Hahn, Gavin Finnie
Bruce Vanstone
The foreign exchange (FX) spot markets are well suited to high frequency trading. They are highly liquid, allow leverage, and trade 24 hours a day, 5 days a week. This paper documents and tests the stylized facts known about high-frequency FX markets. It then postulates a high frequency trading system on the basis of these stylized facts. Benchmarking confirms the robustness of the approach, demonstrating the role algorithmic trading has to play in higher frequency trading environments.
Momentum Returns To S&P/Asx 100 Constituents, Bruce Vanstone, Tobias Hahn, Gavin Finnie
Momentum Returns To S&P/Asx 100 Constituents, Bruce Vanstone, Tobias Hahn, Gavin Finnie
Tobias Hahn
No abstract provided.
Developing High Frequency Foreign Exchange Trading Systems, Bruce Vanstone, Tobias Hahn, Gavin Finnie
Developing High Frequency Foreign Exchange Trading Systems, Bruce Vanstone, Tobias Hahn, Gavin Finnie
Tobias Hahn
The foreign exchange (FX) spot markets are well suited to high frequency trading. They are highly liquid, allow leverage, and trade 24 hours a day, 5 days a week. This paper documents and tests the stylized facts known about high-frequency FX markets. It then postulates a high frequency trading system on the basis of these stylized facts. Benchmarking confirms the robustness of the approach, demonstrating the role algorithmic trading has to play in higher frequency trading environments.
Library Impact Statement For Csc 423 Network Intrusion Detection And Defense, Amanda Izenstark
Library Impact Statement For Csc 423 Network Intrusion Detection And Defense, Amanda Izenstark
Amanda Izenstark
Library Impact Statement in response to new course proposal for CSC 423 Network Intrusion Detection and Defense. New course was supported with no need for additional resources.
Library Impact Statement For Csc 523 Advanced Intrusion Detection And Defense, Amanda Izenstark
Library Impact Statement For Csc 523 Advanced Intrusion Detection And Defense, Amanda Izenstark
Amanda Izenstark
Library Impact Statement for CSC 523 Advanced Intrusion Detection and Defense. No new library resources are required to support this course.
Library Impact Statement For Csc 424 Live Forensics And Incident Response, Amanda Izenstark
Library Impact Statement For Csc 424 Live Forensics And Incident Response, Amanda Izenstark
Amanda Izenstark
Library Impact Statement in response to new course proposal for CSC 424 Live Forensics and Incident Response. New course was supported with no need for additional resources.
Library Impact Statement For Csc 524 Advanced Incident Response, Amanda Izenstark
Library Impact Statement For Csc 524 Advanced Incident Response, Amanda Izenstark
Amanda Izenstark
Library Impact Statement in response to new course proposal for CSC 524 Advaned Incident Response. New course was supported with no need for additional resources.
Library Impact Statement For Csc 420 Introduction To Information Assurance, Amanda Izenstark
Library Impact Statement For Csc 420 Introduction To Information Assurance, Amanda Izenstark
Amanda Izenstark
Library Impact Statement in response to new course proposal for CSC 420 Introduction to Information Assurance. New course was supported with no need for additional resources.
Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael
Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael
Associate Professor Katina Michael
This mixed methods study with a sequential explanatory strategy explored qualitatively the statistically significant quantitative findings relative to Indian respondents’ perceptions about RFID (radio frequency identification) transponders implanted into the human body. In the first analysis phase of the study, there was a significant chi-square analysis reported (χ2 = 56.64, df = 3, p = .000) relative to the perception of small business owners (N = 453) that implanted chips are a more secure form of identification and/or access control in organizations and the respondents’ country of residence. Countries under study included Australia, India, the UK and US. The country …
Symbolic Generalization For On-Line Planning, Zhengzhu Feng, Eric A. Hansen, Shlomo Zilberstein
Symbolic Generalization For On-Line Planning, Zhengzhu Feng, Eric A. Hansen, Shlomo Zilberstein
Shlomo Zilberstein
Symbolic representations have been used successfully in off-line planning algorithms for Markov decision processes. We show that they can also improve the performance of on-line planners. In addition to reducing computation time, symbolic generalization can reduce the amount of costly real-world interactions required for convergence. We introduce Symbolic Real-Time Dynamic Programming (or sRTDP), an extension of RTDP. After each step of on-line interaction with an environment, sRTDP uses symbolic model-checking techniques to generalizes its experience by updating a group of states rather than a single state. We examine two heuristic approaches to dynamic grouping of states and show that they …
Sparse Q-Learning With Mirror Descent, Sridhar Mahadevan, Bo Liu
Sparse Q-Learning With Mirror Descent, Sridhar Mahadevan, Bo Liu
Sridhar Mahadevan
This paper explores a new framework for reinforcement learning based on online convex optimization, in particular mirror descent and related algorithms. Mirror descent can be viewed as an enhanced gradient method, particularly suited to minimization of convex functions in high-dimensional spaces. Unlike traditional gradient methods, mirror descent undertakes gradient updates of weights in both the dual space and primal space, which are linked together using a Legendre transform. Mirror descent can be viewed as a proximal algorithm where the distance generating function used is a Bregman divergence. A new class of proximal-gradient based temporal-difference (TD) methods are presented based on …
Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg
Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg
Jan Kallberg
In releasing the United States Department of Defense’s (DoD) Sustaining U.S. Global Leadership: Priorities for 21st Century Defense and Defense Budget Priorities and Choices in January 2012, President Barack Obama and Secretary of Defense Leon Panetta offered a rationale for the administration’s reductions in defense spending. By stating that the shift in strategic direction is an effort to “put our fiscal house in order” and a response to the 2011 Budget Control Act, which requires DoD to reduce spending by $487 billion between fiscal years 2012 and 2021, the United States’ NATO partners in Europe were given considerable reason for …
Best Practices In Teaching Information Technology Development, Amber Settle, Deborah Labelle, Hazem Said, Sheila S. Sicilia