Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Physical Sciences and Mathematics (269)
- Computer Sciences (230)
- Engineering (210)
- Social and Behavioral Sciences (145)
- Computer Engineering (113)
-
- Law (113)
- Business (93)
- Electrical and Computer Engineering (66)
- Library and Information Science (59)
- Education (40)
- Artificial Intelligence and Robotics (38)
- Information Security (36)
- Databases and Information Systems (34)
- Life Sciences (32)
- Operations Research, Systems Engineering and Industrial Engineering (32)
- Science and Technology Law (27)
- Digital Communications and Networking (25)
- Science and Technology Studies (25)
- Numerical Analysis and Scientific Computing (24)
- Medicine and Health Sciences (22)
- Business Administration, Management, and Operations (21)
- Communication (19)
- Computer Law (18)
- Internet Law (18)
- Management Information Systems (18)
- Technology and Innovation (18)
- Systems Science (17)
- Intellectual Property Law (15)
- Civil and Environmental Engineering (14)
- Computer and Systems Architecture (14)
- Institution
-
- University of Nebraska - Lincoln (68)
- Singapore Management University (30)
- Technical Disclosure Commons (30)
- Selected Works (29)
- Walden University (27)
-
- University of Wollongong (26)
- University for Business and Technology in Kosovo (20)
- Chulalongkorn University (19)
- New Jersey Institute of Technology (19)
- TÜBİTAK (19)
- China Simulation Federation (17)
- Association of Arab Universities (15)
- San Jose State University (14)
- Western University (13)
- City University of New York (CUNY) (12)
- Southern Methodist University (12)
- University of New Mexico (12)
- Zayed University (12)
- Rochester Institute of Technology (11)
- Technological University Dublin (11)
- University of South Florida (11)
- Kennesaw State University (10)
- Old Dominion University (10)
- University of Rhode Island (10)
- California State University, San Bernardino (9)
- University of Central Florida (9)
- University of Mississippi (9)
- Utah State University (9)
- Brigham Young University (7)
- Clemson University (7)
- Keyword
-
- Cloud computing (37)
- Cloud Computing (26)
- Machine learning (21)
- Internet of Things (19)
- Technology (17)
-
- Cloud (14)
- Informatics (14)
- Machine Learning (14)
- Blockchain (13)
- Cybersecurity (13)
- Privacy (13)
- Big data (12)
- Security (12)
- Artificial intelligence (10)
- Big Data (10)
- Information Technology (10)
- Internet (10)
- 600-level (9)
- Computer Science (9)
- Graduate (9)
- IoT (9)
- Undergraduate (9)
- Fog computing (8)
- IT (8)
- Artificial Intelligence (7)
- Bioinformatics (7)
- Edge computing (7)
- Education (7)
- Information (7)
- Information Systems (7)
- Publication
-
- Library Philosophy and Practice (e-journal) (48)
- Theses and Dissertations (38)
- Defensive Publications Series (29)
- Walden Dissertations and Doctoral Studies (27)
- Electronic Theses and Dissertations (25)
-
- Research Collection School Of Computing and Information Systems (21)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (19)
- Turkish Journal of Electrical Engineering and Computer Sciences (19)
- Faculty of Engineering and Information Sciences - Papers: Part B (18)
- Journal of System Simulation (17)
- Honors Theses (16)
- Applied Mathematics & Information Sciences (15)
- Informatics Syllabi (13)
- All Works (12)
- Faculty Publications (12)
- Doctoral Dissertations (11)
- Articles (10)
- Theses (10)
- Electronic Thesis and Dissertation Repository (9)
- Faculty Scholarship (9)
- Journal of International Technology and Information Management (7)
- Neutrosophic Sets and Systems (7)
- Master's Projects (6)
- SMU Data Science Review (6)
- All ETDs from UAB (5)
- Dissertations and Theses (5)
- Open Educational Resources (5)
- All Dissertations (4)
- Boise State University Theses and Dissertations (4)
- CCE Theses and Dissertations (4)
- Publication Type
- File Type
Articles 1 - 30 of 927
Full-Text Articles in Entire DC Network
Maintaining Economic Stabilization In Indonesia And South Korea Through Digital Farming, Aprillia Christianawati
Maintaining Economic Stabilization In Indonesia And South Korea Through Digital Farming, Aprillia Christianawati
Journal of Environmental Science and Sustainable Development
Digital farming is a type of digital economy that cannot be separated from essential elements, such as data availability and farmers themselves. Digital farming is found easily in many developed or agricultural countries, such as southern Europe and Brazil, nor to Indonesia and South Korea. However, Indonesia and South Korea experienced internet utilization and agricultural land area discrepancies which come to similar result, still developing sustainable agriculture. Thus, subjects of the study are Indonesia and South Korea due to their location in the Asian continent and similar history as developing countries in the past. Using farmer households and land agricultural …
Using The Analytic Hierarchy Process For Decision Making In Smart Traffic Light For High Priority Vehicle, Muhammad Izzuddin Mahali, Eko Marpanaji, Muhammad Adi Febri Setiawan
Using The Analytic Hierarchy Process For Decision Making In Smart Traffic Light For High Priority Vehicle, Muhammad Izzuddin Mahali, Eko Marpanaji, Muhammad Adi Febri Setiawan
Elinvo (Electronics, Informatics, and Vocational Education)
Kemacetan sering terjadi di banyak persimpangan jalan kota-kota besar di Indonesia. Sesuatu yang penting seperti kendaraan prioritas sering pula berada pada kemaccetan tersebut. Untuk mengatasi permasalahan tersebut terdapat inovasi baru yaitu Intelligent Traffic Light yang dibekali dengan Aplikasi "Bang Jopin". Namun terdapat permasalahan baru ketika ada kendaraan prioritas melakukan request emergency secara bersamaan pada traffic light yang sama. Penentuan prioritas tidak dapat dilakukan dengan pengurutan saja karena ketika memprioritaskan kendaraan pada traffic light harus mempertimbangkan karakteristik traffic light dan kebiasaan pengendara. Oleh kerena itu, Metode Analitical Hierarchy Process (AHP) merupakan solusi yang tepat dalam menentukan kendaraan prioritas yang didahulukan ketika …
Book Review: Indonesia's Digital-Based Economic Transformation: The Emergence Of New Technological, Business, Economic, And Policy Trends In Indonesia, Anika Widiana
Economics and Finance in Indonesia
No abstract provided.
Using Blockchain Technology For The Organ Procurement And Transplant Network, Utsav Jain
Using Blockchain Technology For The Organ Procurement And Transplant Network, Utsav Jain
Master's Theses
The organ donation system in the United States is centralized and difficult to audit by the general public. This centralized approach may lead to data integrity issues in the future. The Organ Procurement and Transplant Network (OPTN) was built and maintained by a non-governmental organization called the United Network for Organ Sharing (UNOS) under its proprietary UNet(SM) umbrella platform. This platform is made up of proprietary closed source software and does not provide the general public easy access to the organ transplant data for auditing. This study investigates the feasibility, challenges, and advantages of a blockchain-based OPTN.
A prototype of …
Critical Engagement On Digital Sovereignty In International Relations: Actor Transformation And Global Hierarchy, Abid A. Adonis
Critical Engagement On Digital Sovereignty In International Relations: Actor Transformation And Global Hierarchy, Abid A. Adonis
Global: Jurnal Politik Internasional
The idea of digital sovereignty in the last twenty years increasingly reifies into chiefly policy making debates as the reaction of China’s determined activism on internet governance, Snowden’s case, and increasingly big internet corporations’ unchecked endeavors. International actors’ growing concerns on security, economy, data protection, and socio-political issues invoke new discourses on digital sovereignty since it bears global political consequences by nature. This stimulates recent intellectual debate in academic literature on how digital sovereignty affects (or be affected by) international politics. This article critically examines the development of digital sovereignty literatures. This article classifies literature taxonomically on four major themes: …
A Hybrid And Scalable Error Correction Algorithm For Indel And Substitution Errors Of Long Reads, Arghya Kusum Das, Sayan Goswami, Kisung Lee, Seung Jong Park
A Hybrid And Scalable Error Correction Algorithm For Indel And Substitution Errors Of Long Reads, Arghya Kusum Das, Sayan Goswami, Kisung Lee, Seung Jong Park
Computer Science Faculty Research & Creative Works
Background: Long-read sequencing has shown the promises to overcome the short length limitations of second-generation sequencing by providing more complete assembly. However, the computation of the long sequencing reads is challenged by their higher error rates (e.g., 13% vs. 1%) and higher cost ($0.3 vs. $0.03 per Mbp) compared to the short reads. Methods: In this paper, we present a new hybrid error correction tool, called ParLECH (Parallel Long-read Error Correction using Hybrid methodology). The error correction algorithm of ParLECH is distributed in nature and efficiently utilizes the k-mer coverage information of high throughput Illumina short-read sequences to rectify the …
Digital Readout And Control Of A Superconducting Qubit, Caleb Jordan Howington
Digital Readout And Control Of A Superconducting Qubit, Caleb Jordan Howington
Dissertations - ALL
In the quest to build a fault-tolerant quantum computer, superconducting circuits based on Josephson junctions have emerged as a leading architecture. Coherence times have increased significantly over the last two decades, and processors with ∼ 50 qubits have been experimentally demonstrated. These systems traditionally utilize microwave frequency control signals, and heterodyne based detection schemes for measurement. Both of these techniques rely heavily on room temperature microwave generators, high-bandwidth lines from room temperature to millikelvin temperatures, and bulky non-reciprocal elements such as cryogenic microwave isolators. Reliance on these elements makes it impractical to scale existing devices up a single order of …
Digital Transformation – The Hype And Conceptual Changes, Luka Tomat, Peter Trkman
Digital Transformation – The Hype And Conceptual Changes, Luka Tomat, Peter Trkman
Economic and Business Review
Digital transformation (DT) is attracting increased attention; many papers and special issues focus on various aspects of DT. Still, DT often serves solely as a repackaging of previously existing ideas. Our paper argues that the term is over-hyped and has been used to rebrand various fields to attract management attention. However, this alone cannot explain the reasons for such an immense rise in the popularity of the concept. To understand the underlying motives for current DT adoration, our paper aims to identify conceptual changes that have happened in the last decade. These changes have to be considered if companies want …
Digital Transformation – A Hungarian Overview, Andrea Kő, Péter Fehér, Zoltán Szabó
Digital Transformation – A Hungarian Overview, Andrea Kő, Péter Fehér, Zoltán Szabó
Economic and Business Review
Digital transformation is considered as an increasingly important process for organizations today, critical for the survival of companies. The spreading of digital technologies throughout our societies brings along various changes in organisational culture, people, business processes and business models. The perception of digital transformation’s importance among the management of companies is lower in some European countries, among others in Hungary. Our research aims to provide an overview of digital transformation in Hungarian companies from the dimensions of strategy, technology and digital innovation capabilities. We discuss the objectives of digital transformation and the role of IT departments in digital transformation. The …
Foreign Direct Investments Into Fintech And Blockchain Technology Startups In Latin America, Y. Tatiana Clavijo, Hernán Pantaleón
Foreign Direct Investments Into Fintech And Blockchain Technology Startups In Latin America, Y. Tatiana Clavijo, Hernán Pantaleón
University of Miami Inter-American Law Review
Technology is changing our everyday lives at a faster rate every minute from artificial intelligence and medical advances in robotics to the upcoming self-driving cars. Every sector of our lives is being impacted, disrupted, and constantly altered by innovations, including our finances. In the developed markets, fintech, or financial technology, is the new and exciting area of product innovation for financial services. The innovations rely on the internet, blockchain technology, and the new and highly controversial digital currencies. Consequently, new digital platforms and mobile applications create new possibilities while being accessible to more people at a lower cost across borders. …
Identifying At-Risk Clients For Xyz Packaging, Co., Eduardo Carlos Cantu Medellin, Mihir Parikh, Christopher Graves, Brendon Jones
Identifying At-Risk Clients For Xyz Packaging, Co., Eduardo Carlos Cantu Medellin, Mihir Parikh, Christopher Graves, Brendon Jones
SMU Data Science Review
We present a multi-algorithmic modeling approach for the identification of at-risk customers for XYZ Packaging Inc. We define at-risk customers as those having declining seasonally adjusted gross income forecasts which are a strong indicator of impending customer churn. Customer retention is an area of interest regardless of industry but is especially vital in commodity-based low margin industries. We employ traditional Autoregressive Integrated Moving Average (ARIMA) and Anomaly Detection algorithms for discriminating changes in customer revenue patterns. Ultimately, we identify a meaningful proportion of clients whose forward-looking quarterly demand can be predicted within an actionable degree of accuracy.
Exploiting Memristors For Compressive Sensing Applications, Fengyu Qian
Exploiting Memristors For Compressive Sensing Applications, Fengyu Qian
Doctoral Dissertations
The amount of sensory signal is increasing dramatically as we’re stepping into the era of Internet of Things (IoT). Compressive Sensing (CS), feature as Sub-Nyquist sampling rate and low complexity sensing architectures, is very promising for these kinds of applications where resources are restricted. Through applying this novel compression technology, data size of sensory signals are largely compressed such that it is very efficient within the signal processing, data transmitting and storage processes. Compared to conventional codec method, CS technique requires less hardware resources and achieve lower power consumption within sensor nodes.
However, there are several bottle-necks of existing compressive …
Integrating Lidar Data And Multi-Temporal Aerial Imagery To Map Wetland Inundation Dynamics Using Google Earth Engine, Qiusheng Wu, Charles B. Lane, Xuecao Li, Kaiguang Zhao, Yuyu Zhou, Nicholas Clinton, Ben Devries, Heather E. Golden, Megan W. Lang
Integrating Lidar Data And Multi-Temporal Aerial Imagery To Map Wetland Inundation Dynamics Using Google Earth Engine, Qiusheng Wu, Charles B. Lane, Xuecao Li, Kaiguang Zhao, Yuyu Zhou, Nicholas Clinton, Ben Devries, Heather E. Golden, Megan W. Lang
United States Environmental Protection Agency: Staff Publications
The Prairie Pothole Region of North America is characterized by millions of depressional wetlands, which provide critical habitats for globally significant populations of migratory waterfowl and other wildlife species. Due to their relatively small size and shallow depth, these wetlands are highly sensitive to climate variability and anthropogenic changes, exhibiting inter- and intra-annual inundation dynamics. Moderate-resolution satellite imagery (e.g., Landsat, Sentinel) alone cannot be used to effectively delineate these small depressional wetlands. By integrating fine spatial resolution Light Detection and Ranging (LiDAR) data and multi-temporal (2009–2017) aerial images, we developed a fully automated approach to delineate wetland inundation extent at …
Learning Nearest Neighbor Graphs From Noisy Distance Samples, Blake Mason, Ardhendu S. Tripathy, Robert Nowak
Learning Nearest Neighbor Graphs From Noisy Distance Samples, Blake Mason, Ardhendu S. Tripathy, Robert Nowak
Computer Science Faculty Research & Creative Works
We consider the problem of learning the nearest neighbor graph of a dataset of n items. The metric is unknown, but we can query an oracle to obtain a noisy estimate of the distance between any pair of items. This framework applies to problem domains where one wants to learn people's preferences from responses commonly modeled as noisy distance judgments. In this paper, we propose an active algorithm to find the graph with high probability and analyze its query complexity. In contrast to existing work that forces Euclidean structure, our method is valid for general metrics, assuming only symmetry and …
Leveraging Cloud-Based Nfv And Sdn Platform Towards Quality-Driven Next-Generation Mobile Networks, Hassan Hawilo
Leveraging Cloud-Based Nfv And Sdn Platform Towards Quality-Driven Next-Generation Mobile Networks, Hassan Hawilo
Electronic Thesis and Dissertation Repository
Network virtualization has become a key approach for Network Service Providers (NSPs) to mitigate the challenge of the continually increasing demands for network services. Tightly coupled with their software components, legacy network devices are difficult to upgrade or modify to meet the dynamically changing end-user needs. To virtualize their infrastructure and mitigate those challenges, NSPs have started to adopt Software Defined Networking (SDN) and Network Function Virtualization (NFV). To this end, this thesis addresses the challenges faced on the road of transforming the legacy networking infrastructure to a more dynamic and agile virtualized environment to meet the rapidly increasing demand …
School Of Education Hooding Ceremony & Reception Program, December 2019, Lindenwood University
School Of Education Hooding Ceremony & Reception Program, December 2019, Lindenwood University
College of Education: Hooding Ceremony
School of Education Hooding Ceremony & Reception Program, December 2019.
A Cloud Service Composition Optimization Based On Hnn, Huili Zhang, Zhihe Li
A Cloud Service Composition Optimization Based On Hnn, Huili Zhang, Zhihe Li
Journal of System Simulation
Abstract: With the rapid development of Cloud service application, how to effectively optimize the composition of Cloud services on cloud platform and improve the overall performance of cloud platform system have become an urgent research issue. In order to improve the efficiency of Cloud services, a combined optimization model based on Hopfield neural network is proposed. The problem of Cloud services is modeled. The problem is expressed as Hopfield Neural Network energy model for optimization, and a PSO group algorithm with Cauchy disturbance is designed to improve the Hopfield model. The experimental comparison shows that the method can improve …
Modeling And Simulation Of Complex Equipment Health Management System Based On Cloud Computing, Tianrui Zhang, Chuansheng Qu, Baoku Wu, Jianan Xu
Modeling And Simulation Of Complex Equipment Health Management System Based On Cloud Computing, Tianrui Zhang, Chuansheng Qu, Baoku Wu, Jianan Xu
Journal of System Simulation
Abstract: For complex equipment operation safely, the health management problems of complex equipment life cycle is analyzed. In order to realize remote service, complex equipment health management mode based on cloud computing is proposed. Aiming at the accuracy problem in the process of extracting and recognizing complex equipment characteristic data, the feature knowledge acquisition method based on ontology is researched, and the expression and acquisition algorithm of state characteristic knowledge is proposed. A task sequencing algorithm faults based on fuzzy comprehensive evaluation method is proposed, an appropriate task assignment model is selected for scheduling health management technicians. …
Parallel Tasks Optimization Scheduling In Cloud Manufacturing System, Chenwei Feng, Wang Yan
Parallel Tasks Optimization Scheduling In Cloud Manufacturing System, Chenwei Feng, Wang Yan
Journal of System Simulation
Abstract: To solve the problem of unbalanced resource requirements and low resource utilization when the same type of tasks are executed in parallel in the cloud manufacturing system, a task resource scheduling model with the goal of minimizing cost, minimizing time, maximizing reliability and optimizing quality is established. A non-dominated sorting genetic algorithm based on reference points (NSGA-III) is adopted to solve the model by combining real number matrix coding and crossover and mutation based on real number coding instead of common evolutionary strategy. And an optimal decision strategy based on combination of analytic hierarchy process and entropy value method …
The Scheduling Algorithm Of Cloud Job Based On Hopfield Neural Network, Yudong Guo, Jinping Zuo
The Scheduling Algorithm Of Cloud Job Based On Hopfield Neural Network, Yudong Guo, Jinping Zuo
Journal of System Simulation
Abstract: Focusing on the low efficiency of cloud job scheduling and the insufficient utility of resource, a job scheduling algorithm based on Hopfield Neural Network is proposed. In order to improve the resource scheduling ability of the system, The resource characteristics which influence the cloud job scheduling are shown. The mathematical model of resource constraints is established, and the Hopfield energy function is designed and optimized. The average utilization rate of 9 nodes is analyzed by using the standard test cases, and the performance and resource utilization of the proposed strategy are compared with three typical algorithms. …
Study On Optimization Of Shore Bridge Operator Scheduling Considering The Influence Of Ambient Temperature, Yibin Wang, Haihong Yu, Danlan Xie
Study On Optimization Of Shore Bridge Operator Scheduling Considering The Influence Of Ambient Temperature, Yibin Wang, Haihong Yu, Danlan Xie
Journal of System Simulation
Abstract: The refinement of port management puts forward new requirements for its service capacity, and human factors are the key factors affecting the port service capacity. It is a new and feasible research direction to improve port operation efficiency by adjusting human factors. Based on the theoretical model of temperature affecting efficiency, this paper uses FlexSim system simulation software to analyze the change of employee's working efficiency with time, and studies the optimal scheduling strategy of shore bridge operators under different temperatures. Finally, it is concluded that when the ambient temperature is suitable for human body, the eight-hour scheduling …
The United States Eroding Global Military Advantage; Is There A Way Back?, Fatima Munib
The United States Eroding Global Military Advantage; Is There A Way Back?, Fatima Munib
Master's Theses
This thesis explores the U.S. eroding global military advantage in light of the current changing security environment. First, I examine the process and type of erosion taking place. I expand the existing debate and show that the erosion is not defined in monetary terms but in terms of the declining U.S influence within the established rule-based international order. Secondly, I use China and Russia as case-studies to define the present geopolitical rivalries and the (re)emergence of revisionist powers. Both China and Russia aim to shape the emerging international order and threaten the U.S. national security with the increased inter-state competition. …
Application User-Interface Specific Emotional Response Collection, N/A
Application User-Interface Specific Emotional Response Collection, N/A
Defensive Publications Series
A computing device is described that is configured to determine an emotional response of a user to an application being used by the user. For instance, when an application developer wishes to improve an application, the computing device may collect emotional data by utilizing sensors (e.g., cameras, microphone, touch panel, motion sensors, accelerometer, gyroscope, etc.) embedded within the computing device running the application. The computing device may correlate the collected emotional data to specific portions of the application so that the computing device may locate within the application where the emotional data appears to suggest the user is confused. For …
Research On Topology Mapping Method For Multiscale Integration Network Emulation, Liu Yuan, Changling Qiu, Xiaofeng Wang, Jiang Min
Research On Topology Mapping Method For Multiscale Integration Network Emulation, Liu Yuan, Changling Qiu, Xiaofeng Wang, Jiang Min
Journal of System Simulation
Abstract: For large-scale and scalable network emulation requirements, multi-scale integration emulation based on lightweight virtualization and full virtualization is the trend. In order to take into account the advantages of both virtualizations and enhance the performance of network emulation, a topology mapping method (TMMI) is proposed for multi-scale integration network emulation. This method divides the network topology into lightweight virtualization mapping area and integration virtualization mapping area, and according to different mapping areas uses the optimized multi-level partitioning method to map the network topology reasonably. Experiments show that the proposed method can effectively balance the load and communication overhead …
Application Of Ground-Based Lidar And Gap Intercept Measurements To Quantify A Shrub Configuration Metric Within Greater Sage-Grouse Nesting Habitat, Khodabakhsh Zabihi, Kenneth L. Driese, Ginger B. Paige, Ann L. Hild
Application Of Ground-Based Lidar And Gap Intercept Measurements To Quantify A Shrub Configuration Metric Within Greater Sage-Grouse Nesting Habitat, Khodabakhsh Zabihi, Kenneth L. Driese, Ginger B. Paige, Ann L. Hild
Western North American Naturalist
Vegetation composition (i.e., relative proportion of species) and configuration (i.e., horizontal and vertical arrangement of the plant components) in sagebrush-steppe ecosystems are fundamental determinants of the suitability of nesting habitat for Greater Sage-Grouse (Centrocercus urophasianus). The spatial arrangement of shrub and herbaceous canopy cover conceals Greater Sage-Grouse from predators and protects the nest from natural hazards, and gaps in vegetative cover provide escape routes for hens. Most sage-grouse habitat studies quantify vegetation composition, but few quantify habitat configuration at fine scales. We used ground-based lidar (light detection and ranging) data from Greater Sage-Grouse nesting habitat to test the …
Optimal Management Of Virtual Infrastructures Under Flexible Cloud Service Agreements, Zhiling Guo, Jin Li, Ram Ramesh
Optimal Management Of Virtual Infrastructures Under Flexible Cloud Service Agreements, Zhiling Guo, Jin Li, Ram Ramesh
Research Collection School Of Computing and Information Systems
A cloud service agreement entails the provisioning of a required set of virtual infrastructure resources at a specified level of availability to a client. The agreement also lays out the price charged to the client and a penalty to the provider when the assured availability is not met. The availability assurance involves backup resource provisioning, and the provider needs to allocate backups cost-effectively by balancing the resource-provisioning costs with the potential penalty costs. We develop stochastic dynamic optimization models of the backup resource-provisioning problem, leading to cost-effective resource-management policies in different practical settings. We present two sets of dynamic provisioning …
Ethics And Public Policy, Richard Palmatier Jr.
Ethics And Public Policy, Richard Palmatier Jr.
IAAO Annual Legal Seminar
Reviews ethics and public policy. Outline includes: lawyer ethics vs. corporate ethics, who is the "client," who is the opposing party, confidentiality, conflicts of interest, competence, out of "court" publicity and statements, gifts, and volunteer activities.
“Technology Is Great, But It’S Really Time-Consuming:” Understanding Students’ Digital Academic Lives, Mariana Regalado, Maura A. Smale
“Technology Is Great, But It’S Really Time-Consuming:” Understanding Students’ Digital Academic Lives, Mariana Regalado, Maura A. Smale
Publications and Research
Digital technology has become integral to higher education, incorporated by colleges and universities into teaching, student support and operations. We know that undergraduates lead busy lives, especially those attending commuter universities, and that they bring their prior experiences with technology with them into their college careers. However, while technology access and use in our everyday lives and workplaces has increased in the past few decades, it is not as ubiquitous as we might wish, and our students do encounter barriers to learning and connecting with digital technologies.
We draw on our decade of research on the experiences of CUNY undergraduate …
Processing And Delivering Security Signals From Guests To Hosts In Virtualized Environments, Michael Halcrow, Thomas Garnier, Brandon Baker, Eric Biggers, Maya Kaczorowski, Hovik Manucharyan, Konstantin Stepanyuk
Processing And Delivering Security Signals From Guests To Hosts In Virtualized Environments, Michael Halcrow, Thomas Garnier, Brandon Baker, Eric Biggers, Maya Kaczorowski, Hovik Manucharyan, Konstantin Stepanyuk
Defensive Publications Series
This disclosure describes techniques that leverage memory organization in virtual machines and their hosts to emplace code that protects against malware. Malware detection instrumentation is emplaced in guest kernel space, which is relatively privileged and better protected than other guest memory spaces. Malware behavioral analysis logic, which classifies a guest process as benign or malign, is emplaced in host ring 3 space, to take advantage of the virtualization boundary.
Even if unaffected by the attack, the protected kernel may still not be able to quickly communicate knowledge of the attack to the malware behavioral analysis logic, which resides in the …
The Fog Development Kit: A Platform For The Development And Management Of Fog Systems, Colton Powell
The Fog Development Kit: A Platform For The Development And Management Of Fog Systems, Colton Powell
Computer Science and Engineering Master's Theses
With the rise of the Internet of Things (IoT), fog computing has emerged to help traditional cloud computing in meeting scalability demands. Fog computing makes it possible to fulfill real-time requirements of applications by bringing more processing, storage, and control power geographically closer to end-devices. How- ever, since fog computing is a relatively new field, there is no standard platform for research and development in a realistic environment, and this dramatically inhibits innovation and development of fog-based applications. In response to these challenges, we propose the Fog Development Kit (FDK). By providing high-level interfaces for allocating computing and networking resources, …