Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Physical Sciences and Mathematics (133)
- Law (129)
- Engineering (128)
- Computer Sciences (117)
- Social and Behavioral Sciences (85)
-
- Computer Engineering (63)
- Business (61)
- Education (48)
- Electrical and Computer Engineering (30)
- Intellectual Property Law (29)
- Information Security (26)
- Databases and Information Systems (25)
- Internet Law (24)
- Library and Information Science (22)
- Science and Technology Law (21)
- Computer Law (18)
- Higher Education (18)
- Medicine and Health Sciences (17)
- Privacy Law (17)
- Science and Technology Studies (16)
- Computer and Systems Architecture (14)
- Management Information Systems (14)
- Digital Communications and Networking (13)
- Life Sciences (13)
- Business Administration, Management, and Operations (11)
- Communication (11)
- Technology and Innovation (11)
- Arts and Humanities (10)
- Data Storage Systems (10)
- Civil and Environmental Engineering (9)
- Institution
-
- Selected Works (43)
- Association of Arab Universities (27)
- University of Wollongong (24)
- SelectedWorks (23)
- Singapore Management University (22)
-
- Purdue University (21)
- University of Nebraska - Lincoln (16)
- Georgia Southern University (12)
- Western University (12)
- Missouri University of Science and Technology (10)
- Nova Southeastern University (10)
- University of Richmond (10)
- St. Cloud State University (9)
- Technological University Dublin (9)
- Brigham Young University (7)
- California Polytechnic State University, San Luis Obispo (7)
- Maurer School of Law: Indiana University (7)
- University of North Carolina School of Law (7)
- Georgia State University (6)
- Kennesaw State University (6)
- Portland State University (6)
- San Jose State University (6)
- Santa Clara Law (6)
- University of Massachusetts Amherst (6)
- University of Mississippi (6)
- University of New Mexico (6)
- University of North Florida (6)
- University of South Florida (6)
- Air Force Institute of Technology (5)
- Brooklyn Law School (5)
- Keyword
-
- Cloud computing (46)
- Cloud Computing (25)
- Internet (19)
- Privacy (19)
- Cloud (17)
-
- Security (16)
- Data (12)
- Technology (10)
- Big Data (8)
- Education (8)
- Fourth Amendment (8)
- Information technology (8)
- Big data (7)
- Copyright (7)
- Internet of Things (7)
- Computing (6)
- Cybersecurity (6)
- Intellectual property (6)
- Law and Technology (6)
- Virtualization (6)
- Law practice (5)
- MapReduce (5)
- Cloud storage (4)
- Distributed Systems (4)
- Educational technology (4)
- Encryption (4)
- Information (4)
- Jurisdiction (4)
- Learning (4)
- Mobile (4)
- Publication
-
- Applied Mathematics & Information Sciences (27)
- Theses and Dissertations (20)
- Doctoral Dissertations (14)
- Research Collection School Of Computing and Information Systems (14)
- Faculty of Engineering and Information Sciences - Papers: Part A (13)
-
- Electronic Theses and Dissertations (10)
- Faculty Scholarship (10)
- Open Access Dissertations (10)
- Theses (8)
- Faculty Publications (7)
- CCE Theses and Dissertations (6)
- Dissertations (6)
- Electronic Thesis and Dissertation Repository (6)
- Masters Theses (6)
- North Carolina Journal of Law & Technology (6)
- Richmond Journal of Law & Technology (6)
- UNF Graduate Theses and Dissertations (6)
- Master's Projects (5)
- Walden Dissertations and Doctoral Studies (5)
- Articles by Maurer Faculty (4)
- Computer Science Dissertations (4)
- Culminating Projects in Mechanical and Manufacturing Engineering (4)
- Electrical and Computer Engineering ETDs (4)
- Electrical and Computer Engineering Publications (4)
- Publications (4)
- USF Tampa Graduate Theses and Dissertations (4)
- University of Wollongong Thesis Collection 1954-2016 (4)
- All Dissertations (3)
- Commencement Programs (3)
- Culminating Projects in Information Assurance (3)
- Publication Type
Articles 1 - 30 of 653
Full-Text Articles in Entire DC Network
Advanced Techniques For Computational And Information Sciences, William Guo, Chih-Cheng Hung, Paul Scheunders, Bor-Chen Kuo
Advanced Techniques For Computational And Information Sciences, William Guo, Chih-Cheng Hung, Paul Scheunders, Bor-Chen Kuo
Faculty and Research Publications
New techniques in computational and information sciences have played an important role in keeping advancing the so called knowledge economy. Advanced techniques have been introduced to or emerging in almost every field of the scientific world for hundreds of years, which has been accelerated since the late 1970s when the advancement in computers and digital technologies brought the world into the Information Era. In addition to the rapid development of computational intelligence and new data fusion techniques in the past thirty years [1–4], mobile and cloud computing, grid computing driven numeric computation models, big data intelligence, and other emerging technologies …
Personal Reflections / 12.22.15, José M. Torres
Personal Reflections / 12.22.15, José M. Torres
Personal Reflections
Warmest wishes of the holiday season to you and your families! With 2016 upon us, it’s a great time to reflect on an incredible year. While the lack of a fiscal year 2016 State of Illinois budget has pre-empted much of our thinking, we can be proud of making advancements in key areas. I’m so pleased with your work, efforts and results. Each member of our IMSA Community— faculty, staff, students, parents, alumni, Board of Trustees and IMSA Fund Board members, our vendors, partners and stakeholders—pulled together in 2015. Our collaborative and supportive efforts made a difference in advancing IMSA.
Evaluating Different Distributed-Cyber-Infrastructure For Data And Compute Intensive Scientific Application, Arghya Kusum Das, Seung Jong Park, Jaeki Hong, Wooseok Chang
Evaluating Different Distributed-Cyber-Infrastructure For Data And Compute Intensive Scientific Application, Arghya Kusum Das, Seung Jong Park, Jaeki Hong, Wooseok Chang
Computer Science Faculty Research & Creative Works
Scientists are increasingly using the current state of the art big data analytic software (e.g., Hadoop, Giraph, etc.) for their data-intensive applications over HPC environment. However, understanding and designing the hardware environment that these data- and compute-intensive applications require for good performance is challenging. With this motivation, we evaluated the performance of big data software over three different distributed-cyber-infrastructures, including a traditional HPC-cluster called SuperMikeII, a regular datacenter called SwatIII, and a novel MicroBrick-based hyperscale system called CeresII, using our own benchmark Parallel Genome Assembler (PGA). PGA is developed atop Hadoop and Giraph and serves as a good real-world example …
Improving Energy Sustainability In Electrical Vehicle Energy Networks And Internet Of Things, Abdurrahman Arikan
Improving Energy Sustainability In Electrical Vehicle Energy Networks And Internet Of Things, Abdurrahman Arikan
Doctoral Dissertations
Energy sustainability is a pressing issue facing the modern society. The twin pillars of sustainable energy are renewable energy and energy efficiency. In this dissertation, we propose novel architectures and approaches to improve energy sustainability in two application domains: transportation and the Internet of Things. Transporta- tion is one of the major sources of energy consumption and environmental pollution. Plug-in hybrid electric vehicles (PHEVs) present many opportunities in improving energy efficiency and reducing greenhouse gas emissions. In addition, with batteries and built-in mobility, PHEVs can form a mobile and distributed energy network, where energy can be conveniently transported from place …
Strengthening Public Health Through Web-Based Data Query Systems, Manik Ahuja
Strengthening Public Health Through Web-Based Data Query Systems, Manik Ahuja
Doctoral Dissertations
Archival abstract submitted.
Whose Talk Is Walked? It Decentralizability, Vendor Versus Adopter Discourse, And The Diffusion Of Social Media Versus Big Data, Shaila Miranda, Inchan Kim, Dawei David Wang
Whose Talk Is Walked? It Decentralizability, Vendor Versus Adopter Discourse, And The Diffusion Of Social Media Versus Big Data, Shaila Miranda, Inchan Kim, Dawei David Wang
Business and Information Technology Faculty Research & Creative Works
Discourse plays a central role in organizing vision and computerization movement perspectives on IT innovation diffusion. While we know that different actors within a community contribute to the discourse, we know relatively little about the roles different actors play in diffusing different types of IT innovations. Our study investigates vendor versus adopter roles in social media and big data diffusion. We conceptualize the difference between the two IT innovations in terms of their decentralizability, i.e., extent to which decision rights pertinent to adoption of an organizational innovation can be decentralized. Based on this concept, we hypothesized: (1) adopters would contribute …
Lacan's Cybernetics, Svitlana Matviyenko
Lacan's Cybernetics, Svitlana Matviyenko
Electronic Thesis and Dissertation Repository
This project explores the synchronicity of psychoanalytic and cybernetic practices from the mid-to-late nineteenth century by recovery and analysis of a shared material media culture. This project takes as a starting point the work of French psychoanalyst Jacques Lacan, who observed the affinity between cybernetics and psychoanalysis, “two roughly contemporaneous techniques,” related to the emergence of the two distinct types of sciences: exact and “conjectural.” I investigate their shared patterns of figuration in the two fields, before they developed significant, and even irreconcilable, differences. This project demonstrates that what Lacan discussed explicitly in the 1950s, particularly, in his “cybernetic” Seminar …
Security Protocol Suite For Preventing Cloud-Based Denial-Of-Service Attacks, Marwan M. Darwish
Security Protocol Suite For Preventing Cloud-Based Denial-Of-Service Attacks, Marwan M. Darwish
Electronic Thesis and Dissertation Repository
Cloud systems, also known as cloud services, are among the primary solutions of the information technology domain. Cloud services are accessed through an identity authentication process. These authentication processes have become increasingly vulnerable to adversaries who may perform denial-of-service (DoS) attacks to make cloud services inaccessible. Several strong authentication protocols have been employed to protect conventional network systems. Nevertheless, they can cause a DoS threat when implemented in the cloud-computing system. This is because the comprehensive verification process may exhaust the cloud resources and shut down cloud’s services. This thesis proposes a novel cloud-based secure authentication (CSA) protocol suite that …
Direct Digital Engagement Of Patients And Democratizing Health Care, Dov Greenbaum
Direct Digital Engagement Of Patients And Democratizing Health Care, Dov Greenbaum
Santa Clara High Technology Law Journal
Direct Digital Engagement of Patients and Democratizing Health Care
Secure Cloud Computing For Solving Large-Scale Linear Systems Of Equations, Xuhui Chen
Secure Cloud Computing For Solving Large-Scale Linear Systems Of Equations, Xuhui Chen
Theses and Dissertations
Solving large-scale linear systems of equations (LSEs) is one of the most common and fundamental problems in big data. But such problems are often too expensive to solve for resource-limited users. Cloud computing has been proposed as an efficient and costeffective way of solving such tasks. Nevertheless, one critical concern in cloud computing is data privacy. Many previous works on secure outsourcing of LSEs have high computational complexity and share a common serious problem, i.e., a huge number of external memory I/O operations, which may render those outsourcing schemes impractical. We develop a practical secure outsourcing algorithm for solving large-scale …
Only A Pawn In The Game: Rethinking Induced Patent Infringement, W. Keith Robinson
Only A Pawn In The Game: Rethinking Induced Patent Infringement, W. Keith Robinson
Santa Clara High Technology Law Journal
Only a Pawn in the Game: Rethinking Induced Patent Infringement
On Problematic Robotic Thresholds, Adam K. Taylor
On Problematic Robotic Thresholds, Adam K. Taylor
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Large configuration spaces present difficulties for developers validating large soft- ware systems and for users selecting the proper configuration to achieve the desired runtime behavior. Robot systems face the same challenges as they may have hundreds of configurable parameters. Our work focuses on co-robotic systems, those in which robots and humans work closely together to augment each other’s capabilities. We aim to leverage the user’s knowledge about a system to help determine configuration errors. To accomplish this, users mark runtime failures while observing the system in operation. A marked error indicates the robot “did something when it should not have” …
Lanthorn, Vol. 50, No. 28, December 3, 2015, Grand Valley State University
Lanthorn, Vol. 50, No. 28, December 3, 2015, Grand Valley State University
Volume 50, July 13, 2015 - June 6, 2016
Lanthorn is Grand Valley State's student newspaper, published from 1968 to the present.
Energy Forecasting For Event Venues: Big Data And Prediction Accuracy, Katarina Grolinger, Alexandra L'Heureux, Miriam Am Capretz, Luke Seewald
Energy Forecasting For Event Venues: Big Data And Prediction Accuracy, Katarina Grolinger, Alexandra L'Heureux, Miriam Am Capretz, Luke Seewald
Electrical and Computer Engineering Publications
Advances in sensor technologies and the proliferation of smart meters have resulted in an explosion of energy-related data sets. These Big Data have created opportunities for development of new energy services and a promise of better energy management and conservation. Sensor-based energy forecasting has been researched in the context of office buildings, schools, and residential buildings. This paper investigates sensor-based forecasting in the context of event-organizing venues, which present an especially difficult scenario due to large variations in consumption caused by the hosted events. Moreover, the significance of the data set size, specifically the impact of temporal granularity, on energy …
Parity, Hamza Hasan
Parity, Hamza Hasan
Architecture Senior Theses
Digital data contributes to an increasingly alienated aspect of our infrastructure. The complex practices of the Internet produce highly specified, engineered objects. Though their forms are ‘optimized,’ their intentions are not: the two primary considerations for the development of the infrastructure of the Internet are energy and security. Each category presents its own deliberations, but both often produce non-architectural, infrastructural elements beyond public visibility. The hidden infrastructure of data storage and mining (the indexing and analysis of data and traffic) produces spaces outside the agency of normative architectural discourse.
The key consideration for the design of the Internet is redundancy, …
A Network Topology Control And Identity Authentication Protocol With Support For Movable Sensor Nodes, Ying Zhang, Wei Chen, Jixing Liang, Bingxin Zheng, Shengming Jiang
A Network Topology Control And Identity Authentication Protocol With Support For Movable Sensor Nodes, Ying Zhang, Wei Chen, Jixing Liang, Bingxin Zheng, Shengming Jiang
Computer Science Faculty Research
It is expected that in the near future wireless sensor network (WSNs) will be more widely used in the mobile environment, in applications such as Autonomous Underwater Vehicles (AUVs) for marine monitoring and mobile robots for environmental investigation. The sensor nodes’ mobility can easily cause changes to the structure of a network topology, and lead to the decline in the amount of transmitted data, excessive energy consumption, and lack of security. To solve these problems, a kind of efficient Topology Control algorithm for node Mobility (TCM) is proposed. In the topology construction stage, an efficient clustering algorithm is adopted, which …
Generalized Techniques For Using System Execution Traces To Support Software Performance Analysis, Thelge Manjula Peiris
Generalized Techniques For Using System Execution Traces To Support Software Performance Analysis, Thelge Manjula Peiris
Open Access Dissertations
This dissertation proposes generalized techniques to support software performance analysis using system execution traces in the absence of software development artifacts such as source code. The proposed techniques do not require modifications to the source code, or to the software binaries, for the purpose of software analysis (non-intrusive). The proposed techniques are also not tightly coupled to the architecture specific details of the system being analyzed. This dissertation extends the current techniques of using system execution traces to evaluate software performance properties, such as response times, service times. The dissertation also proposes a novel technique to auto-construct a dataflow model …
Dancing Around Technology And Nursing Informatics: Can Wearable Technology Challenge Educators To Propel Informatics Content Into Baccalaureate Curricula?, Paula Peter Byrne
Dancing Around Technology And Nursing Informatics: Can Wearable Technology Challenge Educators To Propel Informatics Content Into Baccalaureate Curricula?, Paula Peter Byrne
Doctor of Nursing Practice Projects
A more current example of disruptive innovation is The Internet of Things (IoT), a term that describes the expanding network of physical objects that feature an internet provider address allowing connectivity and a wireless communication between these objects and other Internet-enabled devices and systems. The IoT significantly changes the relationship between people and devices, and with increased Broadband access, it allows people to share data effortlessly and seamlessly. Connections can be people-people, people-things, and things-things. Increasingly, everyday objects like a refrigerator, car, or baby monitor are designed to have network connectivity allowing them to send and receive wireless data. Current …
Network Neutrality And Consumer Demand For “Better Than Best Efforts” Traffic Management, Rob Frieden
Network Neutrality And Consumer Demand For “Better Than Best Efforts” Traffic Management, Rob Frieden
Fordham Intellectual Property, Media and Entertainment Law Journal
INTRODUCTION The Internet increasingly offers a preferred medium for access to video and other types of high value content that may require Internet Service Providers (“ISPs”) to use special efforts to ensure superior quality of service (“QOS”). ISPs have made substantial investments in infrastructure upgrades to satisfy growing demand for networks capable of delivering bandwidth intensive traffic at higher transmission speeds. Additionally, they work to accommodate consumer expectations of having content access anytime, anywhere, through any medium, via any device, and in any screen presentation format. Early adopters of new video delivery technologies rely on both wireline and wireless alternatives …
Implementing Sharepoint Migration In A Software Development Firm, Yashwanth Reddy Majji
Implementing Sharepoint Migration In A Software Development Firm, Yashwanth Reddy Majji
Culminating Projects in Mechanical and Manufacturing Engineering
Company ABC, established in 2009, has headquarters in Fremont, California. Company ABC branches out to NC and TX. It had visions to travel beyond horizons. Company ABC offers a wide range of IT services that are needed for business development like Staffing Solutions, Consulting, Software Development, Cloud Computing and many other services. Company ABC’s largest product is User Profile System (UPS). User Profile System store data on a server by creating logs. This makes the data hugely extensible and can be distributed across the clients very easily. Company ABC designs its consumer Profile System to collect modified information which can …
Development Of Insurance Agreement Transfer Assignment, Mithilesh R. Karuka
Development Of Insurance Agreement Transfer Assignment, Mithilesh R. Karuka
Culminating Projects in Mechanical and Manufacturing Engineering
This project was implemented in an insurance company where they offer different insurance for various commercial and personal line of business. XYZ group offer a full array of benefits solutions–including education, enrollment services and valuable claim support–to meet the needs of both employers and their workers. This project will focus on implementation of algorithms to automatically switch agreements between sales representatives. As this project involves interaction with other departments, Integration testing along with user acceptance testing will also be added to testing phase to maintain consistency. The main objective is to implement a new system from the ground up that …
Malware Collection And Analysis Via Hardware Virtualization, Tamas K. Lengyel
Malware Collection And Analysis Via Hardware Virtualization, Tamas K. Lengyel
Doctoral Dissertations
Malware is one of the biggest security threat today and deploying effective defensive solutions requires the collection and rapid analysis of a continuously increasing number of samples. The collection and analysis is greatly complicated by the proliferation of metamorphic malware as the efficacy of signature-based static analysis systems is greatly reduced. While honeypots and dynamic malware analysis has been effectively deployed to combat the problem, significant challenges remain. The rapidly increasing number of malware samples poses a particular challenge as it greatly inflates the cost of the hardware required to process the influx. As modern malware also deploys anti-debugging and …
A Robust Data Exchange Framework For Connected Vehicle Technology Supported Dynamic Transit Operations, Yucheng An
A Robust Data Exchange Framework For Connected Vehicle Technology Supported Dynamic Transit Operations, Yucheng An
All Theses
Transit systems are an integral part of surface transportation systems. A connected vehicle technology (CVT) supported transit system will assist the users to manage trips both dynamically and efficiently. The primary focus of this research is to develop and evaluate the performance of a secure, scalable, and resilient data exchange framework. In the developed data exchange framework, a new data analytics layer, named Transit Cloud, is used to receive data from different sources, and send it to different users for a Dynamic Transit Operations (DTO) application. The DTO application allows the transit users to request trip information and obtain itineraries, …
Equity Crowdfunding: A Market For Lemons?, Darian M. Ibrahim
Equity Crowdfunding: A Market For Lemons?, Darian M. Ibrahim
Faculty Publications
No abstract provided.
An Automated Tool For High Resolution Visualization Applied To Transient Watershed Models, Noah Robert Taylor
An Automated Tool For High Resolution Visualization Applied To Transient Watershed Models, Noah Robert Taylor
Theses and Dissertations
Numeric hydrologic models can aid in water resource management by providing predictive simulations of water behavior. As computers become more advanced, the models developed also become more complex using more data to represent larger areas for forecasting hydrologic behavior. Unfortunately, as the simulations use more data, the output often becomes difficult to manage and share without investing time and effort into setting up server environments or decreasing the quality of the output to compensate for an efficient and effective user experience. A proposed solution to facilitate the accessibility of massive hydrologic model output is through the web-based visualization tool developed …
Bandwidth Estimation For Virtual Networks, Ertong Zhang
Bandwidth Estimation For Virtual Networks, Ertong Zhang
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Cloud computing is transforming a large part of IT industry, as evidenced by the increasing popularity of public cloud computingservices, such as Amazon Web Service, Google Cloud Platform, Microsoft Windows Azure, and Rackspace Public Cloud. Manycloud computing applications are bandwidth-intensive, and thus the network bandwidth information of clouds is important for theirusers to manage and troubleshoot the application performance.
The current bandwidth estimation methods originally developed for the traditional Internet, however, face great challenges in clouds dueto virtualization that is the main enabling technique of cloud computing. First, virtual machine scheduling, which is an importantcomponent of computer virtualization for processor …
An Efficient Holistic Data Distribution And Storage Solution For Online Social Networks, Guoxin Liu
An Efficient Holistic Data Distribution And Storage Solution For Online Social Networks, Guoxin Liu
All Dissertations
In the past few years, Online Social Networks (OSNs) have dramatically spread over the world. Facebook [4], one of the largest worldwide OSNs, has 1.35 billion users, 82.2% of whom are outside the US [36]. The browsing and posting interactions (text content) between OSN users lead to user data reads (visits) and writes (updates) in OSN datacenters, and Facebook now serves a billion reads and tens of millions of writes per second [37]. Besides that, Facebook has become one of the top Internet traffic sources [36] by sharing tremendous number of large multimedia files including photos and videos. The servers …
Addressing Security Risks For Mobile Devices: What Higher Education Leaders Should Know, Casey J. Gordon
Addressing Security Risks For Mobile Devices: What Higher Education Leaders Should Know, Casey J. Gordon
Department of Educational Administration: Dissertations, Theses, and Student Research
This qualitative study examined the topic of mobile device security at higher education institutions in the Midwestern United States. This study sought to answer the question of how higher education institutions have responded to threats to campus data security posed by mobile devices. It explored the questions of what institutions are doing currently, the policies and procedures they have in place, and what leaders should do in the future.
This research study consisted of four case studies, compiled through interviews with key Information Technology (IT) professionals and faculty at each of the four institutions studied as well as an examination …
3d Reconstruction Of Close Range Objects Using Free And Open Source Software And Raspberry Pi Technologies, Juan Lorenzo Monrreal
3d Reconstruction Of Close Range Objects Using Free And Open Source Software And Raspberry Pi Technologies, Juan Lorenzo Monrreal
Theses and Dissertations
Existing 3D rendering open source software along with Raspberry Pi technology can be used to create an affordable method and workflow for time efficient, accurate and quality scans for 3D printing. The emergence of technology spurs a technological community working to progress in a collaborative effort. This brings a potential to the possibility of efficient and economical solutions to emerging problems, in this case, the ability to render three dimensional scans using free and open source software as well as Raspberry Pi technology. The focus of this paper will be divided into three different aspects including the background needed to …
The New Genomic Semicommons, Anna B. Laakmann
The New Genomic Semicommons, Anna B. Laakmann
UC Irvine Law Review
No abstract provided.