Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

2014

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 671

Full-Text Articles in Entire DC Network

Huang's And Donaldson's Global Shakespeares And The Digital Turn, Tsu-Chung Su Dec 2014

Huang's And Donaldson's Global Shakespeares And The Digital Turn, Tsu-Chung Su

CLCWeb: Comparative Literature and Culture

In his article "Huang's and Donaldson's Global Shakespeares and the Digital Turn" Tsu-Chung Su explores the Global Shakespeares Video & Performance Archive <http://globalshakespeares.org> founded by Alexander C.Y. Huang and Peter Donaldson. Su traces the nature and history of the Archive and its raison d'être of the two founders' concern with archives and archival performance. Further, Su examines how authority and order are exercised in the project with regards to its purposes, cybernetic laws, digital logics, and the overall organizing principles concerning the Archive, its potentials, gains, and prospects, as well as its limits, difficulties, and disadvantages. Overall, …


Characterizing And Managing Intrusion Detection System (Ids) Alerts With Multi-Server/Multi-Priority Queuing Theory, Christopher C. Olsen Dec 2014

Characterizing And Managing Intrusion Detection System (Ids) Alerts With Multi-Server/Multi-Priority Queuing Theory, Christopher C. Olsen

Theses and Dissertations

The DoD sets forth an objective to employ an active cyber defense capability to prevent intrusions onto DoD networks and systems. Intrusion Detection Systems (IDS) are a critical part of network defense architectures, but their alerts can be difficult to manage. This research applies Queuing Theory to the management of IDS alerts, seeking to answer how analysts and priority schemes effect alert processing performance. To characterize the effect of these two variables on queue wait times, a MATLAB simulation was developed to allow parametric analysis under two scenarios. The first varies the number of analysts and the second varies the …


The Future Of Public Health Informatics: Alternative Scenarios And Recommended Strategies, Margo Edmunds, Lorna Thorpe, Martin Sepulveda, Clem Bezold, David A. Ross Dec 2014

The Future Of Public Health Informatics: Alternative Scenarios And Recommended Strategies, Margo Edmunds, Lorna Thorpe, Martin Sepulveda, Clem Bezold, David A. Ross

Publications and Research

Background: In October 2013, the Public Health Informatics Institute (PHII) and Institute for Alternative Futures (IAF) convened a multidisciplinary group of experts to evaluate forces shaping public health informatics (PHI) in the United States, with the aim of identifying upcoming challenges and opportunities. The PHI workshop was funded by the Robert Wood Johnson Foundation as part of its larger strategic planning process for public health and primary care. Workshop Context: During the two-day workshop, nine experts from the public and private sectors analyzed and discussed the implications of four scenarios regarding the United States economy, health care system, information technology …


Distributed Particle Filters For Data Assimilation In Simulation Of Large Scale Spatial Temporal Systems, Fan Bai Dec 2014

Distributed Particle Filters For Data Assimilation In Simulation Of Large Scale Spatial Temporal Systems, Fan Bai

Computer Science Dissertations

Assimilating real time sensor into a running simulation model can improve simulation results for simulating large-scale spatial temporal systems such as wildfire, road traffic and flood. Particle filters are important methods to support data assimilation. While particle filters can work effectively with sophisticated simulation models, they have high computation cost due to the large number of particles needed in order to converge to the true system state. This is especially true for large-scale spatial temporal simulation systems that have high dimensional state space and high computation cost by themselves. To address the performance issue of particle filter-based data assimilation, this …


Spartan Web Application Firewall, Brian C. Lee Dec 2014

Spartan Web Application Firewall, Brian C. Lee

Master's Projects

Computer security is an ongoing issue and attacks are growing more sophisit- cated. One category of attack utilizes cross-site scripting (XSS) to extract confiden- tial data such as a user’s login credential’s without the knowledge of either the user nor the web server by utilizing vulnerabilities on web pages and internet browsers. Many people develop their own web applications without learning about or having good coding practices or security in mind. Web application firewalls are able to help but can be enhanced to be more effective than they currently are at detecting re- flected XSS attacks by analyzing the request …


Novel Mobile Computation Offloading Framework For Android Devices, Meng Wang Dec 2014

Novel Mobile Computation Offloading Framework For Android Devices, Meng Wang

McKelvey School of Engineering Theses & Dissertations

The thesis implements an offloading framework for GoogleTM AndroidTM based on mobile devices. Today, the full potential for smartphones may be constrained by certain technical limits such as battery endurance and computational performance. Modern mobile applications own more powerful functions but need larger computation and faster frame rate, which consume more battery energy. Using the proposed offloading framework, mobile devices can offload computational intensive workload to servers to save battery energy consumption and reduce the execution time. The framework can also enable software developers to easily build and deploy services on the servers to support mobile devices to run computationally …


Approximation And Relaxation Approaches For Parallel And Distributed Machine Learning, Stephen Tyree Dec 2014

Approximation And Relaxation Approaches For Parallel And Distributed Machine Learning, Stephen Tyree

McKelvey School of Engineering Theses & Dissertations

Large scale machine learning requires tradeoffs. Commonly this tradeoff has led practitioners to choose simpler, less powerful models, e.g. linear models, in order to process more training examples in a limited time. In this work, we introduce parallelism to the training of non-linear models by leveraging a different tradeoff--approximation. We demonstrate various techniques by which non-linear models can be made amenable to larger data sets and significantly more training parallelism by strategically introducing approximation in certain optimization steps.

For gradient boosted regression tree ensembles, we replace precise selection of tree splits with a coarse-grained, approximate split selection, yielding both faster …


Accelerating Heuristic Search For Ai Planning, You Xu Dec 2014

Accelerating Heuristic Search For Ai Planning, You Xu

McKelvey School of Engineering Theses & Dissertations

AI Planning is an important research field. Heuristic search is the most commonly used method in solving planning problems. Despite recent advances in improving the quality of heuristics and devising better search strategies, the high computational cost of heuristic search remains a barrier that severely limits its application to real world problems. In this dissertation, we propose theories, algorithms and systems to accelerate heuristic search for AI planning.

We make four major contributions in this dissertation. First, we propose a state-space reduction method called Stratified Planning to accelerate heuristic search. Stratified Planning can be combined with any heuristic search to …


2014 Fall Florida International University Commencement, Florida International University Dec 2014

2014 Fall Florida International University Commencement, Florida International University

FIU Commencement Programs

Program for the 2014 Fall Florida International University Commencement.


Privacy-Preserving And Outsourced Multi-User K-Means Clustering, Bharath Samanthula, Fang-Yu Rao, Elisa Bertino, Xun Yi, Dangxi Liu Dec 2014

Privacy-Preserving And Outsourced Multi-User K-Means Clustering, Bharath Samanthula, Fang-Yu Rao, Elisa Bertino, Xun Yi, Dangxi Liu

Cyber Center Publications

Many techniques for privacy-preserving data mining (PPDM) have been investigated over the past decade. Often, the entities involved in the data mining process are end-users or organizations with limited computing and storage resources. As a result, such entities may want to refrain from participating in the PPDM process. To overcome this issue and to take many other benefits of cloud computing, outsourcing PPDM tasks to the cloud environment has recently gained special attention. We consider the scenario where n entities outsource their databases (in encrypted format) to the cloud and ask the cloud to perform the clustering task on their …


A Portable Wireless Particulate Sensor System For Continuous Real-Time Environmental Monitoring, James A. Hall Jr., Sin Ming Loo, Dale Stephenson, Ross Butler, Michael Pook, Joshua Kiepert, Jordan Anderson, Nicholas Terrell Dec 2014

A Portable Wireless Particulate Sensor System For Continuous Real-Time Environmental Monitoring, James A. Hall Jr., Sin Ming Loo, Dale Stephenson, Ross Butler, Michael Pook, Joshua Kiepert, Jordan Anderson, Nicholas Terrell

Dale J. Stephenson

Airborne particulate matter has been shown to be associated with morbidity and mortality, and may interfere with certain sensitive experiment. Understanding the levels and movements of particulate matter in an enclosed space can lead to a reduction in the impact of this material on health and experimental results. A system of environmental sensors including particulate matter, selected gasses, humidity, temperature, and pressure can be used to assist in tracking air movement, providing real-time mapping of potential contaminants as they move through a space. In this paper we present a system that is capable of sensing these environmental factors, collecting data …


An Analysis Of Storage Virtualization, Nicholas Costa Dec 2014

An Analysis Of Storage Virtualization, Nicholas Costa

Theses

Investigating technologies and writing expansive documentation on their capabilities is like hitting a moving target. Technology is evolving, growing, and expanding what it can do each and every day. This makes it very difficult when trying to snap a line and investigate competing technologies. Storage virtualization is one of those moving targets. Large corporations develop software and hardware solutions that try to one up the competition by releasing firmware and patch updates to include their latest developments. Some of their latest innovations include differing RAID levels, virtualized storage, data compression, data deduplication, file deduplication, thin provisioning, new file system types, …


The Potentials And Challenges Of Big Data In Public Health, Rena N. Vithiatharan Dec 2014

The Potentials And Challenges Of Big Data In Public Health, Rena N. Vithiatharan

Australian eHealth Informatics and Security Conference

The potential to use big data sources for public health increases with the broadening availability of data and improved methods of analysis. Whilst there are some well-known examples of the opportunistic use of big data, such as GoogleFlu, public health has not yet realised the full potential of such data sources. A literature review was undertaken to identify the potential of such data collections to impact public health, and to identify what challenges are currently limiting this potential. The potential include improved real-time analysis, research and development and genome studies. However, challenges listed are poor universal standardisation and classification, privacy …


Fresh: Fair And Efficient Slot Configuration And Scheduling For Hadoop Clusters, Jiayin Wang, Yi Yao, Ying Mao, Bo Sheng, Ningfang Mi Dec 2014

Fresh: Fair And Efficient Slot Configuration And Scheduling For Hadoop Clusters, Jiayin Wang, Yi Yao, Ying Mao, Bo Sheng, Ningfang Mi

Department of Computer Science Faculty Scholarship and Creative Works

Hadoop is an emerging framework for parallel big data processing. While becoming popular, Hadoop is too complex for regular users to fully understand all the system parameters and tune them appropriately. Especially when processing a batch of jobs, default Hadoop setting may cause inefficient resource utilization and unnecessarily prolong the execution time. This paper considers an extremely important setting of slot configuration which by default is fixed and static. We proposed an enhanced Hadoop system called FRESH which can derive the best slot setting, dynamically configure slots, and appropriately assign tasks to the available slots. The experimental results show that …


October To December 2014 Dec 2014

October To December 2014

All Summaries

No abstract provided.


2014 Winter Graduate & Undergraduate Commencement, Lindenwood University Dec 2014

2014 Winter Graduate & Undergraduate Commencement, Lindenwood University

Commencement Programs

Lindenwood University Commencement program.


The Google Art Project: An Analysis From A Legal And Social Perspective On Copyright Implications, Katrina Wu Dec 2014

The Google Art Project: An Analysis From A Legal And Social Perspective On Copyright Implications, Katrina Wu

Katrina Wu

The Google Art Project is an ambitious attempt by Google to curate worldwide artwork online in the highest resolution possible. Google accomplishes this by partnering with museums where museums provide access to art collections and Google provides the technology to capture high quality images. Under this existing model, Google places the burden of copyright clearances on museums and removes images from online if requested by copyright owners. An endeavor like the Google Art Project is not unprecedented however, when Google attempted to put the world’s books online under the Google Books Project, scanning millions of titles and offering snippets for …


Connect, Communicate, And Learn: How Library Instruction Programs Benefit From Learning Management Systems, Maria T. Accardi, Hong Cheng Dec 2014

Connect, Communicate, And Learn: How Library Instruction Programs Benefit From Learning Management Systems, Maria T. Accardi, Hong Cheng

LOEX Conference Proceedings 2012

Imagine these scenarios: A librarian teaching an instruction session wants to know how the previous librarian taught that session for the same instructor last year. Another librarian is short on time and ideas and wants an easy way to prep for an upcoming class. A library instruction coordinator wants to get a sense of what other librarians are doing in instruction sessions. Do any of these situations sound familiar to you? If so, you’ll want to attend this session and learn how a library instruction program can facilitate sharing and communication of ideas and stay current on teaching strategies, outcomes, …


Sitopia, Cesi Kohen Dec 2014

Sitopia, Cesi Kohen

Architecture Thesis Prep

In the projected future urban world where NAFTA doesn't exist, fresh/organic fruits and vegetables are produced within the urban realm. The goal is to create a symbiotic relationship between agriculture and architecture; analyze how spaces and typologies are challenged in order to accommodate farming; and systematize new spaces through restructuring of the code.


Vol. 6 No. 1, Fall 2014; 'Fixing' The First Sale Doctrine: Adapting Copyright Law To The New Media Distribution Paradigm, Samuel Perkins Dec 2014

Vol. 6 No. 1, Fall 2014; 'Fixing' The First Sale Doctrine: Adapting Copyright Law To The New Media Distribution Paradigm, Samuel Perkins

Northern Illinois Law Review Supplement

This Article discusses Section 109 of the Copyright Act, the first sale doctrine, in the context of digital media and internet-based storage. Traditionally, the first sale doctrine served as an important limitation on the exclusive rights of copyright owners, allowing copies of lawfully obtained works to be resold without interference from the copyright owner. As a result of this limitation, physical media remains freely alienable after the first sale, providing secondary markets for used copies and more consumer choice. However, due to the nature of digital media and the recent market shift among media distributors, first sale doctrine has become …


Onebusaway Multi-Region – Rapidly Expanding Mobile Transit Apps To New Cities, Sean J. Barbeau, Alan Borning, Kari Watkins Dec 2014

Onebusaway Multi-Region – Rapidly Expanding Mobile Transit Apps To New Cities, Sean J. Barbeau, Alan Borning, Kari Watkins

Journal of Public Transportation

Real-time transit information offers many benefits to transit riders, including reduced wait times and increased customer satisfaction. However, offering real-time transit services has been challenging for many transit agencies. While mobile applications (apps) have emerged as a preferred dissemination method for real-time information, it is typically cost-prohibitive for transit agencies to fund custom development of native mobile apps for all popular smartphone platforms. Third-party developers can offer services if an agency openly shares real-time data, but these individuals are volunteers whose priorities and deadlines may not be the same as the agency’s. As a result, few cities have full app …


Issues Of Social Data Analytics With A New Method For Sentiment Analysis Of Social Media Data, Zhaoxia Wang, Victor J. C. Tong, David Chan Dec 2014

Issues Of Social Data Analytics With A New Method For Sentiment Analysis Of Social Media Data, Zhaoxia Wang, Victor J. C. Tong, David Chan

Research Collection School of Social Sciences

Social media data consists of feedback, critiques and other comments that are posted online by internet users. Collectively, these comments may reflect sentiments that are sometimes not captured in traditional data collection methods such as administering a survey questionnaire. Thus, social media data offers a rich source of information, which can be adequately analyzed and understood. In this paper, we survey the extant research literature on sentiment analysis and discuss various limitations of the existing analytical methods. A major limitation in the large majority of existing research is the exclusive focus on social media data in the English language. There …


Subdivided Windows With Mixed Shading Devices: A Daylighting Solution For Effective Integration Of Occupants Into The Building Environmental Control, Leyla Sanati Dec 2014

Subdivided Windows With Mixed Shading Devices: A Daylighting Solution For Effective Integration Of Occupants Into The Building Environmental Control, Leyla Sanati

Theses and Dissertations

Daylighting is one of the most challenging aspects of an ecological building design. The dynamic nature of daylight along with a wide range of individual preferences makes it a complex design issue. The art of daylighting relies on fine-tuning a delicate balance between admitting sufficient daylight for occupant well being and task performance and preventing glare and over heating. These goals are rarely achieved in buildings where fenestration design is reduced to an opening with an interior blind due to occupants' infrequent shade operation. To address this problem, a number of automatic shading devices have been developed to be integrated …


Anomaly Detection Through Enhanced Sentiment Analysis On Social Media Data, Zhaoxia Wang, Victor Joo, Chuan Tong, Xin Xin, Hoong Chor Chin Dec 2014

Anomaly Detection Through Enhanced Sentiment Analysis On Social Media Data, Zhaoxia Wang, Victor Joo, Chuan Tong, Xin Xin, Hoong Chor Chin

Research Collection School Of Computing and Information Systems

Anomaly detection in sentiment analysis refers to detecting abnormal opinions, sentiment patterns or special temporal aspects of such patterns in a collection of data. The anomalies detected may be due to sudden sentiment changes hidden in large amounts of text. If these anomalies are undetected or poorly managed, the consequences may be severe, e.g. A business whose customers reveal negative sentiments and will no longer support the establishment. Social media platforms, such as Twitter, provide a vast source of information, which includes user feedback, opinion and information on most issues. Many organizations also leverage social media platforms to publish information …


Combinatorial Structure Of The Deterministic Seriation Method With Multiple Subset Solutions, Mark E. Madsen, Carl P. Lipo Dec 2014

Combinatorial Structure Of The Deterministic Seriation Method With Multiple Subset Solutions, Mark E. Madsen, Carl P. Lipo

Anthropology Faculty Scholarship

Seriation methods order a set of descriptions given some criterion (e.g., unimodality or minimum distance between similarity scores). Seriation is thus inherently a problem of finding the optimal solution among a set of permutations of objects. In this short technical note, we review the combinatorial structure of the classical seriation problem, which seeks a single solution out of a set of objects. We then extend those results to the iterative frequency seriation approach introduced by Lipo et al. (1997), which finds optimal subsets of objects which each satisfy the unimodality criterion within each subset. The number of possible solutions across …


A Novel Approach To Protecting Mobile Healthcare Applications In Mobile Cloud, Eric Reinsmidt Dec 2014

A Novel Approach To Protecting Mobile Healthcare Applications In Mobile Cloud, Eric Reinsmidt

Masters Theses and Doctoral Dissertations

In recent years there has been a shift in the devices that people use to do their computing. Of particular import has been the movement in the computing landscape towards mobile devices. As would be expected, the proliferation of mobile devices has led to an increase in their being a target for malware. In addition to this change in the sphere of personal computing devices there has, at the same time, been a shift of server side computation moving towards the cloud. There has been another development worth noting, a dramatic increase in the number of Electronic Medical Records (EMR) …


Measuring Student Performance And Providing Feedback Using Competency Framework, Joelle Elmaleh, Venky Shankararaman Dec 2014

Measuring Student Performance And Providing Feedback Using Competency Framework, Joelle Elmaleh, Venky Shankararaman

Research Collection School Of Computing and Information Systems

A number of Computer Science and Information Systems programs have effectively defined learning outcomes, course level competencies, and conducted assessments at the program level to determine areas for continuous improvement. However, many of these programs do not fully leverage the course competencies during the actual delivery and assessment of the course. This paper presents how course competencies can be used to effectively deliver and assess the course content, and give valuable timely feedback to the students. Using a large first year core course of the BSc (Information Systems Management) program (called Object Oriented Application Development course-OOAD) as an example, this …


A Metrics Suite Of Cloud Computing Adoption Readiness, Robert J. Kauffman, Dan Ma, Martin Yu Dec 2014

A Metrics Suite Of Cloud Computing Adoption Readiness, Robert J. Kauffman, Dan Ma, Martin Yu

Research Collection School Of Computing and Information Systems

Recent research on cloud computing adoption indicates that there has been a lack of deep understanding of its benefits by managers and organizations. This has been an obstacle for adoption. We report on an initial design for a firm-level cloud computing readiness metrics suite. We propose categories and measures to form a set of metrics to measure adoption readiness and assess the required adjustments in strategy and management, technology and operations, and business policies. We reviewed the relevant interdisciplinary literature and interviewed industry professionals to ground our metrics based on theory and practice knowledge. We identified four relevant categories for …


Contractual Innovation In Venture Capital, John F. Coyle Dec 2014

Contractual Innovation In Venture Capital, John F. Coyle

UC Law Journal

Scholars agree that contractual innovation, though sometimes slow to occur, can and will take place if certain conditions are met. This Article argues that the evolution of certain venture finance contracts over the past decade constitutes a prime example of such innovation. Drawing upon interviews with some of the leading venture capital attorneys in the United States, this Article chronicles how two types of venture finance securities—the convertible note and convertible preferred stock—and related contracts evolved in response to technological advances that greatly reduced the cost of launching a start-up technology company. Prior to 2005, individuals who invested in early-stage …


Lnference On Differences In K Means For Data With Excess Zeros And Detection Limits, Haolai Jiang Dec 2014

Lnference On Differences In K Means For Data With Excess Zeros And Detection Limits, Haolai Jiang

Dissertations

Many data have excess zeros or unobservable values falling below detection limit. For example, data on hospitalization costs incurred by members of a health insurance plan will have zeros for the percentage who did not get sick. Benzene exposure measurements on petroleum re nery workers have some exposures fall below the limit of detection. Traditional methods of inference like one-way ANOVA are not appropriate to analyze such data since the point mass at zero violates typical distribution assumptions.

For testing for equality of means of k distributions, we will propose a likelihood ratio test that accounts for excess zeros or …