Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Wright State University (176)
- Washington University in St. Louis (47)
- Embry-Riddle Aeronautical University (41)
- Missouri University of Science and Technology (25)
- Singapore Management University (23)
-
- TÜBİTAK (23)
- University of Central Florida (16)
- Air Force Institute of Technology (14)
- Old Dominion University (12)
- Selected Works (7)
- Iowa State University (6)
- Brigham Young University (2)
- Munster Technological University (2)
- Portland State University (2)
- Western Kentucky University (2)
- California State University, San Bernardino (1)
- Chapman University (1)
- Louisiana Tech University (1)
- San Jose State University (1)
- Smith College (1)
- Technological University Dublin (1)
- University of Arkansas, Fayetteville (1)
- University of Nevada, Las Vegas (1)
- University of New Hampshire (1)
- University of New Haven (1)
- University of North Florida (1)
- William & Mary (1)
- Keyword
-
- Department of Computer Science and Engineering (11)
- Neurocontrollers (6)
- Discrete-time systems (5)
- Internet (5)
- Nonlinear Control Systems (5)
-
- Adaptive Control (4)
- Documentation (4)
- Human Factors (4)
- Information security (4)
- Lyapunov Methods (4)
- #antcenter (3)
- Authentication (3)
- Computer networks--Security measures (3)
- Learning (Artificial Intelligence) (3)
- Optimal Control (3)
- 3-D shape measurement (2)
- Closed Loop Systems (2)
- Computer science (2)
- Computer security (2)
- Continuous Time Recurrent Neural Network (2)
- Control System Synthesis (2)
- Data encryption (Computer science) (2)
- Decentralized Control (2)
- Discrete Time Systems (2)
- Evolutionary Algorithm (2)
- Forensics (2)
- Gradient Methods (2)
- Kinematic/Dynamic Controller (2)
- Learning Systems (2)
- Lyapunov Method (2)
- Publication
-
- Computer Science & Engineering Syllabi (160)
- All Computer Science and Engineering Research (47)
- Journal of Digital Forensics, Security and Law (23)
- Research Collection School Of Computing and Information Systems (23)
- Turkish Journal of Electrical Engineering and Computer Sciences (23)
-
- Electrical and Computer Engineering Faculty Research & Creative Works (22)
- Annual ADFSL Conference on Digital Forensics, Security and Law (16)
- Electronic Theses and Dissertations (16)
- Theses and Dissertations (13)
- Browse all Theses and Dissertations (11)
- Computer Science and Engineering Faculty Publications (5)
- David G. Novick (5)
- Song Zhang (5)
- Faculty Publications (3)
- Computational Modeling & Simulation Engineering Faculty Publications (2)
- Computational Modeling & Simulation Engineering Theses & Dissertations (2)
- Computer Science Faculty Publications and Presentations (2)
- Computer Science Faculty Research & Creative Works (2)
- Computer Science Theses & Dissertations (2)
- Electrical & Computer Engineering Faculty Publications (2)
- Engineering Management & Systems Engineering Theses & Dissertations (2)
- Publications (2)
- Theses (2)
- Aleksandar Dogandžić (1)
- Computer Science Faculty Publications (1)
- Conference Papers (1)
- Dissertations, Theses, and Masters Projects (1)
- Doctoral Dissertations (1)
- Electrical & Computer Engineering Theses & Dissertations (1)
- Electrical & Computer Engineering and Computer Science Faculty Publications (1)
- Publication Type
Articles 1 - 30 of 410
Full-Text Articles in Engineering
Evaluation Of Robocode As A Teaching Tool For Computer Programming, Arnold Hensman
Evaluation Of Robocode As A Teaching Tool For Computer Programming, Arnold Hensman
Conference Papers
Robocode began as an educational tool to aid in learning Java programming. It has since evolved into something of a phenomenon, as the prospect of creating simple to complex virtual tanks appears to pose an attractive challenge to both novice and expert programmers alike. What started out as a teaching tool has grown into a worldwide network of competitors, all keen to prove that their ‘bot’ stands out from the crowd. Competitions are well organised and many Robocode events are a PR dream for the computing companies that sponsor them. Without a doubt, this easy to use application has sparked …
What Is Rcu, Fundamentally?, Paul E. Mckenney, Jonathan Walpole
What Is Rcu, Fundamentally?, Paul E. Mckenney, Jonathan Walpole
Computer Science Faculty Publications and Presentations
Read-copy update (RCU) is a synchronization mechanism that was added to the Linux kernel in October of 2002. RCU achieves scalability improvements by allowing reads to occur concurrently with updates. In contrast with conventional locking primitives that ensure mutual exclusion among concurrent threads regardless of whether they be readers or updaters, or with reader-writer locks that allow concurrent reads but not in the presence of updates, RCU supports concurrency between a single updater and multiple readers. RCU ensures that reads are coherent by maintaining multiple versions of objects and ensuring that they are not freed up until all pre-existing read-side …
Tuning Tabu Search Strategies Via Visual Diagnosis, Steven Halim, Hoong Chuin Lau
Tuning Tabu Search Strategies Via Visual Diagnosis, Steven Halim, Hoong Chuin Lau
Research Collection School Of Computing and Information Systems
While designing working metaheuristics can be straightforward, tuning them to solve the underlying combinatorial optimization problem well can be tricky. Several tuning methods have been proposed but they do not address the new aspect of our proposed classification of the metaheuristic tuning problem: tuning search strategies. We propose a tuning methodology based on Visual Diagnosis and a generic tool called Visualizer for Metaheuristics Development Framework(V-MDF) to address specifically the problem of tuning search (particularly Tabu Search) strategies. Under V-MDF, we propose the use of a Distance Radar visualizer where the human and computer can collaborate to diagnose the occurrence of …
Self-Organizing Neural Architectures And Cooperative Learning In A Multiagent Environment, Dan Xiao, Ah-Hwee Tan
Self-Organizing Neural Architectures And Cooperative Learning In A Multiagent Environment, Dan Xiao, Ah-Hwee Tan
Research Collection School Of Computing and Information Systems
Temporal-Difference–Fusion Architecture for Learning, Cognition, and Navigation (TD-FALCON) is a generalization of adaptive resonance theory (a class of self-organizing neural networks) that incorporates TD methods for real-time reinforcement learning. In this paper, we investigate how a team of TD-FALCON networks may cooperate to learn and function in a dynamic multiagent environment based on minefield navigation and a predator/prey pursuit tasks. Experiments on the navigation task demonstrate that TD-FALCON agent teams are able to adapt and function well in a multiagent environment without an explicit mechanism of collaboration. In comparison, traditional Q-learning agents using gradient-descent-based feedforward neural networks, trained with the …
Study Of The Minimum Spanning Hyper-Tree Routing Algorithm In Wireless Sensor Networks, Ting Yang, Yugeng Sun, Zhaoxia Wang, Juwei Zhang, Yingqiang Ding
Study Of The Minimum Spanning Hyper-Tree Routing Algorithm In Wireless Sensor Networks, Ting Yang, Yugeng Sun, Zhaoxia Wang, Juwei Zhang, Yingqiang Ding
Research Collection School Of Computing and Information Systems
Designing energy-efficient routing protocols to effectively increase the networks' lifetime and provide the robust network service is one of the important problems in the research of wireless sensor networks. Using the hyper-graph theory, the paper represents large-scale wireless sensor networks into a hyper-graph model, which can effectively decrease the control messages in routing process. Based on this mathematic model, the paper presents the minimum spanning hyper-tree routing algorithm in synchronous wireless sensor networks (MSHT-SN), which builds a minimum energy consumption tree for data collection from multi-nodes to Sink node. The validity of the algorithm is proved by the theatrical analysis. …
High-Speed Three-Dimensional Shape Measurement System Using A Modified Twoplus- One Phase-Shifting Algorithm, Song Zhang, Shing-Tung Yau
High-Speed Three-Dimensional Shape Measurement System Using A Modified Twoplus- One Phase-Shifting Algorithm, Song Zhang, Shing-Tung Yau
Song Zhang
This paper describes a high-resolution, real-time, three-dimensional shape measurement system using the modified two-plus-one phase-shifting algorithm. The data acquisition speed is as high as 60frames∕s with an image resolution of 640×480pixels per frame. Experiments demonstrated that the system was able to acquire the dynamic changing objects such as facial geometric shape changes when the subject is speaking, and the modified two-plus-one phase-shifting algorithm can further alleviate the error due to motion. Applications of this system include manufacturing, online inspection, medical imaging, compute vision, and computer graphics.
Effects Of Electromagnetic Interference On Control Area Network Performance, Fei Ren, Y. Rosa Zheng, Maciej Jan Zawodniok, Jagannathan Sarangapani
Effects Of Electromagnetic Interference On Control Area Network Performance, Fei Ren, Y. Rosa Zheng, Maciej Jan Zawodniok, Jagannathan Sarangapani
Electrical and Computer Engineering Faculty Research & Creative Works
In this paper, the effects of electromagnetic interference (EMI) on control area network (CAN) communications are investigated by hardware experiments. Distinct CAN bit rates, communication cables, and networks are used to test effects of EMI on CAN bus. Waveforms of CAN data frames in EMI environment are observed and analyzed for figuring out details of effects. Experiments show that the EMI pulses frequently encountered in automobile and off-road machinery can cause the reduction of bit rates and errors in high-speed CAN communications. Replacing traditional unshielded parallel communication cables with shielded communication cables is proved to be an effective method of …
Predictive Congestion Control Protocol For Wireless Sensor Networks, Maciej Jan Zawodniok, Jagannathan Sarangapani
Predictive Congestion Control Protocol For Wireless Sensor Networks, Maciej Jan Zawodniok, Jagannathan Sarangapani
Electrical and Computer Engineering Faculty Research & Creative Works
Available congestion control schemes, for example transport control protocol (TCP), when applied to wireless networks, result in a large number of packet drops, unfair scenarios and low throughputs with a significant amount of wasted energy due to retransmissions. To fully utilize the hop by hop feedback information, this paper presents a novel, decentralized, predictive congestion control (DPCC) for wireless sensor networks (WSN). The DPCC consists of an adaptive flow and adaptive back-off interval selection schemes that work in concert with energy efficient, distributed power control (DPC). The DPCC detects the onset of congestion using queue utilization and the embedded channel …
Designing The Market Game For A Commodity Trading Simulation, Shih-Fen Cheng
Designing The Market Game For A Commodity Trading Simulation, Shih-Fen Cheng
Research Collection School Of Computing and Information Systems
In this paper, we propose to design a market game that (a) can be used in modeling and studying commodity trading scenarios, and (b) can be used in capturing human traders' behaviors. Specifically, we demonstrate the usefulness of this commodity trading game in a single-commodity futures trading scenario. A pilot experiment was run with a mixture of human traders and an autonomous agent that emulates the aggregatedmarket condition, with the assumption that this autonomous agent would hint each of its action through a public announcement. We show that the information collected from this simulation can be used to extract the …
Multi-Period Combinatorial Auction Mechanism For Distributed Resource Allocation And Scheduling, Hoong Chuin Lau, Shih-Fen Cheng, Thin Yin Leong, Jong Han Park, Zhengyi Zhao
Multi-Period Combinatorial Auction Mechanism For Distributed Resource Allocation And Scheduling, Hoong Chuin Lau, Shih-Fen Cheng, Thin Yin Leong, Jong Han Park, Zhengyi Zhao
Research Collection School Of Computing and Information Systems
We consider the problem of resource allocation and scheduling where information and decisions are decentralized, and our goal is to propose a market mechanism that allows resources from a central resource pool to be allocated to distributed decision makers (agents) that seek to optimize their respective scheduling goals. We propose a generic combinatorial auction mechanism that allows agents to competitively bid for the resources needed in a multi-period setting, regardless of the respective scheduling problem faced by the agent, and show how agents can design optimal bidding strategies to respond to price adjustment strategies from the auctioneer. We apply our …
The Price Of Stability In Selfish Scheduling Games, Lucas Agussurja, Hoong Chuin Lau
The Price Of Stability In Selfish Scheduling Games, Lucas Agussurja, Hoong Chuin Lau
Research Collection School Of Computing and Information Systems
Game theory has gained popularity as an approach to analysing and understanding distributed systems with selfinterested agents. Central to game theory is the concept of Nash equilibrium as a stable state (solution) of the system, which comes with a price - the loss in efficiency. The quantification of the efficiency loss is one of the main research concerns. In this paper, we study the quality and computational characteristic of the best Nash equilibrium in two selfish scheduling models: the congestion model and the sequencing model. In particular, we present the following results: (1) In the congestion model: first, the best …
Visualizing Morphometric Data Of Vasculatures, Thomas Wischgoll
Visualizing Morphometric Data Of Vasculatures, Thomas Wischgoll
Computer Science and Engineering Faculty Publications
Volume visualization is a common, very well-established visualization technique for volumetric data sets. Numerous advancements have been proposed and sophisticated improvements have been implemented to produce elaborated renderings that are capable of enhancing details within the volume. However, volume visualization alone is often not sufficient for the application domain. Often times, researchers are interested in accurate measurements extracted from volumetric data to gain further insight of the specimen. These extracted measurements can then be used to generate and visualize a geometric reconstruction of the specimen. The visualization can incorporate additional tools that allow researchers to determine additional measurements of the …
Electric Power: Cyber And Electromagnetic Security Issues, George H. Baker
Electric Power: Cyber And Electromagnetic Security Issues, George H. Baker
George H Baker
Electric power is essential to the functioning of U.S. society. The electric power system increasingly operates at or near its reliability limits. The geographic scale of the tightly coupled networks involved makes the system susceptible to large-scale outages. More frequent natural and accidental failures portend possible catastrophes from intentional disruption. Deregulation has been a major factor to the lack of investment in system upgrades. Techniques to prevent attacks and reduce vulnerabilities are available and affordable.
"Conversational" Dialogues In Direct-Manipulation Interfaces, David G. Novick
"Conversational" Dialogues In Direct-Manipulation Interfaces, David G. Novick
David G. Novick
This paper reports ongoing research in extending direct-manipulation interfaces by incorporating, via the direct-manipulation modality itself, interaction techniques that add kinds of language features associated with spoken conversation. The paper proposes means of implementing ways for a user of a direct-manipulation system to define new kinds of relations among objects in the interface.
Users And Uses Of Synchronous Business Communications Software, David G. Novick, Eleanor Wynn
Users And Uses Of Synchronous Business Communications Software, David G. Novick, Eleanor Wynn
David G. Novick
To help designers and authors understand users' intentions and work practices for synchronous business communications in a systematic way, we used ethnographic and task-analytic techniques to collect, analyze and classify evidence of the activities of potential users as they conducted their work lives. The interactions we observed among our users took place through a variety of modalities. We found eight categories of tasks for the collaborative or interactive work in which our subjects engaged. Based on these data, we were able to classify roles of potential users of synchronous business communications software into a set of "archetypes" that characterize their …
Hands-Free Documentation, Karen Ward, David G. Novick
Hands-Free Documentation, Karen Ward, David G. Novick
David G. Novick
In this paper, we introduce an analysis of the requirements and design choices for hands-free documentation. Hands-busy tasks such as cooking or car repair may require substantial interruption of the task: moving the pan off the burner and wiping hands, or crawling out from underneath the car. We review the need for hands-free documentation and explore the role of task in the use of documentation. Our central analysis examines the roles and characteristics of input and output modalities of hands-free documentation. In particular, we review the use of speech as an input modality, and then visual means and speech as …
An Interaction Initiative Model For Documentation, David G. Novick, Karen Ward
An Interaction Initiative Model For Documentation, David G. Novick, Karen Ward
David G. Novick
In this paper we propose a model of creation and use of documentation based on the concept of mixed-initiative interaction. In our model, successful single-initiative interaction is characterized by grounding of contributions, and successful mixed-initiative interaction is characterized by both grounding and agreement. Just as in spoken conversation, achievement of actual agreement depends on the intentions of both parties; agreement is achieved when the reader follows the documentation’s instructions. In fact, readers are not obligated to—and often do not—act according to the author’s intentions. By making these dynamics explicit, the model can aid authors in developing effective documentation. The paper …
Assessing Effectiveness Of Personality Style In Documentation, Kenneth Sayles, David G. Novick
Assessing Effectiveness Of Personality Style In Documentation, Kenneth Sayles, David G. Novick
David G. Novick
This paper extends previous work by other researchers that indicated that users of computers preferred a computer with a personality that was similar to theirs. We conducted a similar experiment, but looking beyond preference to see if the personality of documentation would make a difference in the user’s performance. Our data suggest did not indicate that personality match affects performance; and if such a relationship exists it is likely to be weak. We discuss the related research, describe our methodology, present our results, and describe their implications and limitations.
A Two-Phase Approach To Interactivity Enhancement For Large-Scale Distributed Virtual Environments, Nguyen Binh Duong Ta, Suiping Zhou
A Two-Phase Approach To Interactivity Enhancement For Large-Scale Distributed Virtual Environments, Nguyen Binh Duong Ta, Suiping Zhou
Research Collection School Of Computing and Information Systems
Distributed virtual environments (DVEs) are distributed systems that allow multiple geographically distributed clients (users) to interact simultaneously in a computer-generated, shared virtual world. Applications of DVEs can be seen in many areas nowadays, such as online games, military simulations, collaborative designs, etc. To support large-scale DVEs with real-time interactions among thousands or even more distributed clients, a geographically distributed server architecture (GDSA) is generally needed, and the virtual world can be partitioned into many distinct zones to distribute the load among the servers. Due to the geographic distributions of clients and servers in such architectures, it is essential to efficiently …
Ceg 320/520: Computer Organization, Michael L. Raymer
Ceg 320/520: Computer Organization, Michael L. Raymer
Computer Science & Engineering Syllabi
No abstract provided.
Ceg 221: Advanced C Programming For Engineers, Robert Helt
Ceg 221: Advanced C Programming For Engineers, Robert Helt
Computer Science & Engineering Syllabi
This course introduces advanced constructs, algorithms, and data structures in the C programming language. Emphasis is on problem solving and techniques useful to engineers. Topics include functions, array, pointers, structures as well as sorting algorithms, linked lists, complex numbers, stacks, queues, hash tables, and binary trees. 4 credit hours. Prerequisite: CEG220 (Introduction to C Programming for Engineers).
Ceg 420/620: Computer Architecture, Jack Jean
Ceg 420/620: Computer Architecture, Jack Jean
Computer Science & Engineering Syllabi
No abstract provided.
Ceg 210: Pc Networking I, Karen Meyer
Ceg 210: Pc Networking I, Karen Meyer
Computer Science & Engineering Syllabi
Introduction to PC networking hardware, concepts, and technologies. Focus is on LAN administration, hardware and software configuration.
Ceg 220: Introduction To C Programming For Engineers I, Robert Helt
Ceg 220: Introduction To C Programming For Engineers I, Robert Helt
Computer Science & Engineering Syllabi
This course provides a general introduction to computers as a problem-solving tool using the C programming language. Emphasis is on algorithms and techniques useful to engineers. Topics include data representation, debugging, and program verification. 4 credit hours. Prerequisite: MTH 229 (Calculus I) or EGR 101 (Engineering Mathematics).f
Ceg 233: Linux And Windows, Prabhaker Mateti
Ceg 233: Linux And Windows, Prabhaker Mateti
Computer Science & Engineering Syllabi
Introduction to Linux and Windows systems. GUI and Windowing Systems. Files and Directories. Ownership and Sharing. Programs and Processes. System calls, Libraries. Loading. Dynamic linking. Command Line Shells. Scripting languages. Regular expressions. Clients and Servers. Web browser clients and servers. Secure shell, sftp. SSL/TSL. HTTPS. System Administration.
Ceg 220: Introduction To C Programming For Engineers I, Jay Dejongh
Ceg 220: Introduction To C Programming For Engineers I, Jay Dejongh
Computer Science & Engineering Syllabi
This course provides a general introduction to computers as a problem-solving tool using the C programming language. Emphasis is on algorithms and techniques useful to engineers. Topics include data representation, debugging, and program verification. 4 credit hours. Prerequisite: MTH 229 (Calculus I) or EGR 101 (Engineering Mathematics).
Ceg 360/560 Ee 451/651: Digital System Design, Meilin Liu
Ceg 360/560 Ee 451/651: Digital System Design, Meilin Liu
Computer Science & Engineering Syllabi
Design of digital systems. Topics include flip-flops, registers, counters, programmable logic devices, memory devices, register-level design, and microcomputer system organization. Students must show competency in the design of digital systems.
Ceg 433/633: Operating Systems, Thomas Wischgoll
Ceg 433/633: Operating Systems, Thomas Wischgoll
Computer Science & Engineering Syllabi
By the end of this quarter, you should be able to apply the concepts above to the following:
• Develop, test and debug programs in Unix.
• Improve the performance of programs by tuning virtual memory usage, and file io.
• Design and construct device drivers for Unix.
• Design and build newer file systems for any OS.
Ceg 402/602: Introduction To Computer Communication, Bin Wang
Ceg 402/602: Introduction To Computer Communication, Bin Wang
Computer Science & Engineering Syllabi
This course provides an introduction to basic concepts of communication networks, different types of networks, protocols over different layers, and network applications through lectures, labs, homework, and reading on relevant materials.
You will
• Understand networking principles, protocols, and technologies.
• Understand some design and performance issues involved in providing a network service.
• Acquire background for supporting e-commerce, e-government, and e-education.
• Gain hands-on experience with programming techniques for network protocols.
• Obtain background for original research in computer networks.
Ceg 498: Design Experience, Thomas C. Hartrum
Ceg 498: Design Experience, Thomas C. Hartrum
Computer Science & Engineering Syllabi
CEG 498 (Design Experience) is a summative computer engineering design project course that builds upon previous engineering, science, mathematics and communications course work. CEG 498 projects are a minimum of two quarters in length and must be completed in groups of at least three students. Projects are selected under the guidance of the course instructor and are tailored to both student interest and formal classroom preparation. Students are evaluated both on their individual contributions as recorded in a graded engineering journal and on the quality of their collective efforts as reflected in group generated products.
Student groups meet with the …