Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

PDF

2007

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 410

Full-Text Articles in Engineering

Evaluation Of Robocode As A Teaching Tool For Computer Programming, Arnold Hensman Dec 2007

Evaluation Of Robocode As A Teaching Tool For Computer Programming, Arnold Hensman

Conference Papers

Robocode began as an educational tool to aid in learning Java programming. It has since evolved into something of a phenomenon, as the prospect of creating simple to complex virtual tanks appears to pose an attractive challenge to both novice and expert programmers alike. What started out as a teaching tool has grown into a worldwide network of competitors, all keen to prove that their ‘bot’ stands out from the crowd. Competitions are well organised and many Robocode events are a PR dream for the computing companies that sponsor them. Without a doubt, this easy to use application has sparked …


What Is Rcu, Fundamentally?, Paul E. Mckenney, Jonathan Walpole Dec 2007

What Is Rcu, Fundamentally?, Paul E. Mckenney, Jonathan Walpole

Computer Science Faculty Publications and Presentations

Read-copy update (RCU) is a synchronization mechanism that was added to the Linux kernel in October of 2002. RCU achieves scalability improvements by allowing reads to occur concurrently with updates. In contrast with conventional locking primitives that ensure mutual exclusion among concurrent threads regardless of whether they be readers or updaters, or with reader-writer locks that allow concurrent reads but not in the presence of updates, RCU supports concurrency between a single updater and multiple readers. RCU ensures that reads are coherent by maintaining multiple versions of objects and ensuring that they are not freed up until all pre-existing read-side …


Tuning Tabu Search Strategies Via Visual Diagnosis, Steven Halim, Hoong Chuin Lau Dec 2007

Tuning Tabu Search Strategies Via Visual Diagnosis, Steven Halim, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

While designing working metaheuristics can be straightforward, tuning them to solve the underlying combinatorial optimization problem well can be tricky. Several tuning methods have been proposed but they do not address the new aspect of our proposed classification of the metaheuristic tuning problem: tuning search strategies. We propose a tuning methodology based on Visual Diagnosis and a generic tool called Visualizer for Metaheuristics Development Framework(V-MDF) to address specifically the problem of tuning search (particularly Tabu Search) strategies. Under V-MDF, we propose the use of a Distance Radar visualizer where the human and computer can collaborate to diagnose the occurrence of …


Self-Organizing Neural Architectures And Cooperative Learning In A Multiagent Environment, Dan Xiao, Ah-Hwee Tan Dec 2007

Self-Organizing Neural Architectures And Cooperative Learning In A Multiagent Environment, Dan Xiao, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

Temporal-Difference–Fusion Architecture for Learning, Cognition, and Navigation (TD-FALCON) is a generalization of adaptive resonance theory (a class of self-organizing neural networks) that incorporates TD methods for real-time reinforcement learning. In this paper, we investigate how a team of TD-FALCON networks may cooperate to learn and function in a dynamic multiagent environment based on minefield navigation and a predator/prey pursuit tasks. Experiments on the navigation task demonstrate that TD-FALCON agent teams are able to adapt and function well in a multiagent environment without an explicit mechanism of collaboration. In comparison, traditional Q-learning agents using gradient-descent-based feedforward neural networks, trained with the …


Study Of The Minimum Spanning Hyper-Tree Routing Algorithm In Wireless Sensor Networks, Ting Yang, Yugeng Sun, Zhaoxia Wang, Juwei Zhang, Yingqiang Ding Dec 2007

Study Of The Minimum Spanning Hyper-Tree Routing Algorithm In Wireless Sensor Networks, Ting Yang, Yugeng Sun, Zhaoxia Wang, Juwei Zhang, Yingqiang Ding

Research Collection School Of Computing and Information Systems

Designing energy-efficient routing protocols to effectively increase the networks' lifetime and provide the robust network service is one of the important problems in the research of wireless sensor networks. Using the hyper-graph theory, the paper represents large-scale wireless sensor networks into a hyper-graph model, which can effectively decrease the control messages in routing process. Based on this mathematic model, the paper presents the minimum spanning hyper-tree routing algorithm in synchronous wireless sensor networks (MSHT-SN), which builds a minimum energy consumption tree for data collection from multi-nodes to Sink node. The validity of the algorithm is proved by the theatrical analysis. …


High-Speed Three-Dimensional Shape Measurement System Using A Modified Twoplus- One Phase-Shifting Algorithm, Song Zhang, Shing-Tung Yau Nov 2007

High-Speed Three-Dimensional Shape Measurement System Using A Modified Twoplus- One Phase-Shifting Algorithm, Song Zhang, Shing-Tung Yau

Song Zhang

This paper describes a high-resolution, real-time, three-dimensional shape measurement system using the modified two-plus-one phase-shifting algorithm. The data acquisition speed is as high as 60frames∕s with an image resolution of 640×480pixels per frame. Experiments demonstrated that the system was able to acquire the dynamic changing objects such as facial geometric shape changes when the subject is speaking, and the modified two-plus-one phase-shifting algorithm can further alleviate the error due to motion. Applications of this system include manufacturing, online inspection, medical imaging, compute vision, and computer graphics.


Effects Of Electromagnetic Interference On Control Area Network Performance, Fei Ren, Y. Rosa Zheng, Maciej Jan Zawodniok, Jagannathan Sarangapani Nov 2007

Effects Of Electromagnetic Interference On Control Area Network Performance, Fei Ren, Y. Rosa Zheng, Maciej Jan Zawodniok, Jagannathan Sarangapani

Electrical and Computer Engineering Faculty Research & Creative Works

In this paper, the effects of electromagnetic interference (EMI) on control area network (CAN) communications are investigated by hardware experiments. Distinct CAN bit rates, communication cables, and networks are used to test effects of EMI on CAN bus. Waveforms of CAN data frames in EMI environment are observed and analyzed for figuring out details of effects. Experiments show that the EMI pulses frequently encountered in automobile and off-road machinery can cause the reduction of bit rates and errors in high-speed CAN communications. Replacing traditional unshielded parallel communication cables with shielded communication cables is proved to be an effective method of …


Predictive Congestion Control Protocol For Wireless Sensor Networks, Maciej Jan Zawodniok, Jagannathan Sarangapani Nov 2007

Predictive Congestion Control Protocol For Wireless Sensor Networks, Maciej Jan Zawodniok, Jagannathan Sarangapani

Electrical and Computer Engineering Faculty Research & Creative Works

Available congestion control schemes, for example transport control protocol (TCP), when applied to wireless networks, result in a large number of packet drops, unfair scenarios and low throughputs with a significant amount of wasted energy due to retransmissions. To fully utilize the hop by hop feedback information, this paper presents a novel, decentralized, predictive congestion control (DPCC) for wireless sensor networks (WSN). The DPCC consists of an adaptive flow and adaptive back-off interval selection schemes that work in concert with energy efficient, distributed power control (DPC). The DPCC detects the onset of congestion using queue utilization and the embedded channel …


Designing The Market Game For A Commodity Trading Simulation, Shih-Fen Cheng Nov 2007

Designing The Market Game For A Commodity Trading Simulation, Shih-Fen Cheng

Research Collection School Of Computing and Information Systems

In this paper, we propose to design a market game that (a) can be used in modeling and studying commodity trading scenarios, and (b) can be used in capturing human traders' behaviors. Specifically, we demonstrate the usefulness of this commodity trading game in a single-commodity futures trading scenario. A pilot experiment was run with a mixture of human traders and an autonomous agent that emulates the aggregatedmarket condition, with the assumption that this autonomous agent would hint each of its action through a public announcement. We show that the information collected from this simulation can be used to extract the …


Multi-Period Combinatorial Auction Mechanism For Distributed Resource Allocation And Scheduling, Hoong Chuin Lau, Shih-Fen Cheng, Thin Yin Leong, Jong Han Park, Zhengyi Zhao Nov 2007

Multi-Period Combinatorial Auction Mechanism For Distributed Resource Allocation And Scheduling, Hoong Chuin Lau, Shih-Fen Cheng, Thin Yin Leong, Jong Han Park, Zhengyi Zhao

Research Collection School Of Computing and Information Systems

We consider the problem of resource allocation and scheduling where information and decisions are decentralized, and our goal is to propose a market mechanism that allows resources from a central resource pool to be allocated to distributed decision makers (agents) that seek to optimize their respective scheduling goals. We propose a generic combinatorial auction mechanism that allows agents to competitively bid for the resources needed in a multi-period setting, regardless of the respective scheduling problem faced by the agent, and show how agents can design optimal bidding strategies to respond to price adjustment strategies from the auctioneer. We apply our …


The Price Of Stability In Selfish Scheduling Games, Lucas Agussurja, Hoong Chuin Lau Nov 2007

The Price Of Stability In Selfish Scheduling Games, Lucas Agussurja, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

Game theory has gained popularity as an approach to analysing and understanding distributed systems with selfinterested agents. Central to game theory is the concept of Nash equilibrium as a stable state (solution) of the system, which comes with a price - the loss in efficiency. The quantification of the efficiency loss is one of the main research concerns. In this paper, we study the quality and computational characteristic of the best Nash equilibrium in two selfish scheduling models: the congestion model and the sequencing model. In particular, we present the following results: (1) In the congestion model: first, the best …


Visualizing Morphometric Data Of Vasculatures, Thomas Wischgoll Oct 2007

Visualizing Morphometric Data Of Vasculatures, Thomas Wischgoll

Computer Science and Engineering Faculty Publications

Volume visualization is a common, very well-established visualization technique for volumetric data sets. Numerous advancements have been proposed and sophisticated improvements have been implemented to produce elaborated renderings that are capable of enhancing details within the volume. However, volume visualization alone is often not sufficient for the application domain. Often times, researchers are interested in accurate measurements extracted from volumetric data to gain further insight of the specimen. These extracted measurements can then be used to generate and visualize a geometric reconstruction of the specimen. The visualization can incorporate additional tools that allow researchers to determine additional measurements of the …


Electric Power: Cyber And Electromagnetic Security Issues, George H. Baker Oct 2007

Electric Power: Cyber And Electromagnetic Security Issues, George H. Baker

George H Baker

Electric power is essential to the functioning of U.S. society. The electric power system increasingly operates at or near its reliability limits. The geographic scale of the tightly coupled networks involved makes the system susceptible to large-scale outages. More frequent natural and accidental failures portend possible catastrophes from intentional disruption. Deregulation has been a major factor to the lack of investment in system upgrades. Techniques to prevent attacks and reduce vulnerabilities are available and affordable.


"Conversational" Dialogues In Direct-Manipulation Interfaces, David G. Novick Oct 2007

"Conversational" Dialogues In Direct-Manipulation Interfaces, David G. Novick

David G. Novick

This paper reports ongoing research in extending direct-manipulation interfaces by incorporating, via the direct-manipulation modality itself, interaction techniques that add kinds of language features associated with spoken conversation. The paper proposes means of implementing ways for a user of a direct-manipulation system to define new kinds of relations among objects in the interface.


Users And Uses Of Synchronous Business Communications Software, David G. Novick, Eleanor Wynn Oct 2007

Users And Uses Of Synchronous Business Communications Software, David G. Novick, Eleanor Wynn

David G. Novick

To help designers and authors understand users' intentions and work practices for synchronous business communications in a systematic way, we used ethnographic and task-analytic techniques to collect, analyze and classify evidence of the activities of potential users as they conducted their work lives. The interactions we observed among our users took place through a variety of modalities. We found eight categories of tasks for the collaborative or interactive work in which our subjects engaged. Based on these data, we were able to classify roles of potential users of synchronous business communications software into a set of "archetypes" that characterize their …


Hands-Free Documentation, Karen Ward, David G. Novick Oct 2007

Hands-Free Documentation, Karen Ward, David G. Novick

David G. Novick

In this paper, we introduce an analysis of the requirements and design choices for hands-free documentation. Hands-busy tasks such as cooking or car repair may require substantial interruption of the task: moving the pan off the burner and wiping hands, or crawling out from underneath the car. We review the need for hands-free documentation and explore the role of task in the use of documentation. Our central analysis examines the roles and characteristics of input and output modalities of hands-free documentation. In particular, we review the use of speech as an input modality, and then visual means and speech as …


An Interaction Initiative Model For Documentation, David G. Novick, Karen Ward Oct 2007

An Interaction Initiative Model For Documentation, David G. Novick, Karen Ward

David G. Novick

In this paper we propose a model of creation and use of documentation based on the concept of mixed-initiative interaction. In our model, successful single-initiative interaction is characterized by grounding of contributions, and successful mixed-initiative interaction is characterized by both grounding and agreement. Just as in spoken conversation, achievement of actual agreement depends on the intentions of both parties; agreement is achieved when the reader follows the documentation’s instructions. In fact, readers are not obligated to—and often do not—act according to the author’s intentions. By making these dynamics explicit, the model can aid authors in developing effective documentation. The paper …


Assessing Effectiveness Of Personality Style In Documentation, Kenneth Sayles, David G. Novick Oct 2007

Assessing Effectiveness Of Personality Style In Documentation, Kenneth Sayles, David G. Novick

David G. Novick

This paper extends previous work by other researchers that indicated that users of computers preferred a computer with a personality that was similar to theirs. We conducted a similar experiment, but looking beyond preference to see if the personality of documentation would make a difference in the user’s performance. Our data suggest did not indicate that personality match affects performance; and if such a relationship exists it is likely to be weak. We discuss the related research, describe our methodology, present our results, and describe their implications and limitations.


A Two-Phase Approach To Interactivity Enhancement For Large-Scale Distributed Virtual Environments, Nguyen Binh Duong Ta, Suiping Zhou Oct 2007

A Two-Phase Approach To Interactivity Enhancement For Large-Scale Distributed Virtual Environments, Nguyen Binh Duong Ta, Suiping Zhou

Research Collection School Of Computing and Information Systems

Distributed virtual environments (DVEs) are distributed systems that allow multiple geographically distributed clients (users) to interact simultaneously in a computer-generated, shared virtual world. Applications of DVEs can be seen in many areas nowadays, such as online games, military simulations, collaborative designs, etc. To support large-scale DVEs with real-time interactions among thousands or even more distributed clients, a geographically distributed server architecture (GDSA) is generally needed, and the virtual world can be partitioned into many distinct zones to distribute the load among the servers. Due to the geographic distributions of clients and servers in such architectures, it is essential to efficiently …


Ceg 320/520: Computer Organization, Michael L. Raymer Oct 2007

Ceg 320/520: Computer Organization, Michael L. Raymer

Computer Science & Engineering Syllabi

No abstract provided.


Ceg 221: Advanced C Programming For Engineers, Robert Helt Oct 2007

Ceg 221: Advanced C Programming For Engineers, Robert Helt

Computer Science & Engineering Syllabi

This course introduces advanced constructs, algorithms, and data structures in the C programming language. Emphasis is on problem solving and techniques useful to engineers. Topics include functions, array, pointers, structures as well as sorting algorithms, linked lists, complex numbers, stacks, queues, hash tables, and binary trees. 4 credit hours. Prerequisite: CEG220 (Introduction to C Programming for Engineers).


Ceg 420/620: Computer Architecture, Jack Jean Oct 2007

Ceg 420/620: Computer Architecture, Jack Jean

Computer Science & Engineering Syllabi

No abstract provided.


Ceg 210: Pc Networking I, Karen Meyer Oct 2007

Ceg 210: Pc Networking I, Karen Meyer

Computer Science & Engineering Syllabi

Introduction to PC networking hardware, concepts, and technologies. Focus is on LAN administration, hardware and software configuration.


Ceg 220: Introduction To C Programming For Engineers I, Robert Helt Oct 2007

Ceg 220: Introduction To C Programming For Engineers I, Robert Helt

Computer Science & Engineering Syllabi

This course provides a general introduction to computers as a problem-solving tool using the C programming language. Emphasis is on algorithms and techniques useful to engineers. Topics include data representation, debugging, and program verification. 4 credit hours. Prerequisite: MTH 229 (Calculus I) or EGR 101 (Engineering Mathematics).f


Ceg 233: Linux And Windows, Prabhaker Mateti Oct 2007

Ceg 233: Linux And Windows, Prabhaker Mateti

Computer Science & Engineering Syllabi

Introduction to Linux and Windows systems. GUI and Windowing Systems. Files and Directories. Ownership and Sharing. Programs and Processes. System calls, Libraries. Loading. Dynamic linking. Command Line Shells. Scripting languages. Regular expressions. Clients and Servers. Web browser clients and servers. Secure shell, sftp. SSL/TSL. HTTPS. System Administration.


Ceg 220: Introduction To C Programming For Engineers I, Jay Dejongh Oct 2007

Ceg 220: Introduction To C Programming For Engineers I, Jay Dejongh

Computer Science & Engineering Syllabi

This course provides a general introduction to computers as a problem-solving tool using the C programming language. Emphasis is on algorithms and techniques useful to engineers. Topics include data representation, debugging, and program verification. 4 credit hours. Prerequisite: MTH 229 (Calculus I) or EGR 101 (Engineering Mathematics).


Ceg 360/560 Ee 451/651: Digital System Design, Meilin Liu Oct 2007

Ceg 360/560 Ee 451/651: Digital System Design, Meilin Liu

Computer Science & Engineering Syllabi

Design of digital systems. Topics include flip-flops, registers, counters, programmable logic devices, memory devices, register-level design, and microcomputer system organization. Students must show competency in the design of digital systems.


Ceg 433/633: Operating Systems, Thomas Wischgoll Oct 2007

Ceg 433/633: Operating Systems, Thomas Wischgoll

Computer Science & Engineering Syllabi

By the end of this quarter, you should be able to apply the concepts above to the following:

• Develop, test and debug programs in Unix.

• Improve the performance of programs by tuning virtual memory usage, and file io.

• Design and construct device drivers for Unix.

• Design and build newer file systems for any OS.


Ceg 402/602: Introduction To Computer Communication, Bin Wang Oct 2007

Ceg 402/602: Introduction To Computer Communication, Bin Wang

Computer Science & Engineering Syllabi

This course provides an introduction to basic concepts of communication networks, different types of networks, protocols over different layers, and network applications through lectures, labs, homework, and reading on relevant materials.

You will

• Understand networking principles, protocols, and technologies.

• Understand some design and performance issues involved in providing a network service.

• Acquire background for supporting e-commerce, e-government, and e-education.

• Gain hands-on experience with programming techniques for network protocols.

• Obtain background for original research in computer networks.


Ceg 498: Design Experience, Thomas C. Hartrum Oct 2007

Ceg 498: Design Experience, Thomas C. Hartrum

Computer Science & Engineering Syllabi

CEG 498 (Design Experience) is a summative computer engineering design project course that builds upon previous engineering, science, mathematics and communications course work. CEG 498 projects are a minimum of two quarters in length and must be completed in groups of at least three students. Projects are selected under the guidance of the course instructor and are tailored to both student interest and formal classroom preparation. Students are evaluated both on their individual contributions as recorded in a graded engineering journal and on the quality of their collective efforts as reflected in group generated products.

Student groups meet with the …