Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Physical Sciences and Mathematics

On Path Consistency For Binary Constraint Satisfaction Problems, Christopher G. Reeson Dec 2016

On Path Consistency For Binary Constraint Satisfaction Problems, Christopher G. Reeson

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Constraint satisfaction problems (CSPs) provide a flexible and powerful framework for modeling and solving many decision problems of practical importance. Consistency properties and the algorithms for enforcing them on a problem instance are at the heart of Constraint Processing and best distinguish this area from other areas concerned with the same combinatorial problems. In this thesis, we study path consistency (PC) and investigate several algorithms for enforcing it on binary finite CSPs. We also study algorithms for enforcing consistency properties that are related to PC but are stronger or weaker than PC.

We identify and correct errors in the literature …


Semeo: A Semantic Equivalence Analysis Framework For Obfuscated Android Applications, Zhen Hu Dec 2016

Semeo: A Semantic Equivalence Analysis Framework For Obfuscated Android Applications, Zhen Hu

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Software repackaging is a common approach for creating malware. In this approach, malware authors inject malicious payloads into legitimate applications; then, to ren- der security analysis more difficult, they obfuscate most or all of the code. This forces analysts to spend a large amount of effort filtering out benign obfuscated methods in order to locate potentially malicious methods for further analysis. If an effective mechanism for filtering out benign obfuscated methods were available, the number of methods that must be analyzed could be reduced, allowing analysts to be more productive. In this thesis, we introduce SEMEO, a highly effective and …


Towards Building A Review Recommendation System That Trains Novices By Leveraging The Actions Of Experts, Shilpa Khanal Dec 2016

Towards Building A Review Recommendation System That Trains Novices By Leveraging The Actions Of Experts, Shilpa Khanal

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Online reviews increase consumer visits, increase the time spent on the website, and create a sense of community among the frequent shoppers. Because of the importance of online reviews, online retailers such as Amazon.com and eOpinions provide detailed guidelines for writing reviews. However, though these guidelines provide instructions on how to write reviews, reviewers are not provided instructions for writing product-specific reviews. As a result, poorly-written reviews are abound and a customer may need to scroll through a large number of reviews, which could be up to 6000 pixels down from the top of the page, in order to find …


Recognizing And Combating Cybercrime, Marcia L. Dority Baker Oct 2016

Recognizing And Combating Cybercrime, Marcia L. Dority Baker

Information Technology Services: Publications

Can You Spot the Scam?

Scams make great stories. Tales of Internet crime or other fraud make up some of Hollywood's most exciting thrillers. While cybercrime blockbusters are fun to watch on the big screen, cybercrime is a serious problem on campuses globally.

How many people do you know who are the victim of a scam (Internet or phone)? According to the FBI, cybercrime is a growing threat that affects individuals and businesses around the world. A recent Washington Post article reported that cybercrime cost the global economy $445 billion in 2014.


Improving The Efficiency Of Ci With Uber-Commits, Matias Waterloo Aug 2016

Improving The Efficiency Of Ci With Uber-Commits, Matias Waterloo

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Continuous Integration (CI) is a software engineering practice where developers break their coding tasks into small changes that can be integrated with the shared code repository on a frequent basis. The primary objectives of CI are to avoid integration problems caused by large change sets and to provide prompt developer feedback so that if a problem is detected, it can be easily and quickly resolved. In this thesis, we argue that while keeping changes small and integrating often is a wise approach for developers, the CI server may be more efficient operating on a different scale. In our approach, the …


Use Of Clustering Techniques For Protein Domain Analysis, Eric Rodene Jul 2016

Use Of Clustering Techniques For Protein Domain Analysis, Eric Rodene

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Next-generation sequencing has allowed many new protein sequences to be identified. However, this expansion of sequence data limits the ability to determine the structure and function of most of these newly-identified proteins. Inferring the function and relationships between proteins is possible with traditional alignment-based phylogeny. However, this requires at least one shared subsequence. Without such a subsequence, no meaningful alignments between the protein sequences are possible. The entire protein set (or proteome) of an organism contains many unrelated proteins. At this level, the necessary similarity does not occur. Therefore, an alternative method of understanding relationships within diverse sets of proteins …


Significant Permission Identification For Android Malware Detection, Lichao Sun Jul 2016

Significant Permission Identification For Android Malware Detection, Lichao Sun

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

A recent report indicates that a newly developed malicious app for Android is introduced every 11 seconds. To combat this alarming rate of malware creation, we need a scalable malware detection approach that is effective and efficient. In this thesis, we introduce SigPID, a malware detection system based on permission analysis to cope with the rapid increase in the number of Android malware. Instead of analyzing all 135 Android permissions, our approach applies 3-level pruning by mining the permission data to identify only significant permissions that can be effective in distinguishing benign and malicious apps. Based on the identified significant …


Flying By Fire: Making Controlled Burns Safer For Humans And Uavs, Rebecca Horzewski, Carrick Detweiler Apr 2016

Flying By Fire: Making Controlled Burns Safer For Humans And Uavs, Rebecca Horzewski, Carrick Detweiler

UCARE Research Products

A temperature sensing circuit board was developed that will allow Nimbus Lab's controlled burn starting UAV to react to the temperatures around it.


Table Headers: An Entrance To The Data Mine, George Nagy, Sharad C. Seth Jan 2016

Table Headers: An Entrance To The Data Mine, George Nagy, Sharad C. Seth

CSE Conference and Workshop Papers

Algorithmic methods are demonstrated for information extraction from table header elements, including data categories and data hierarchies. The table headers are found with the Minimum Index Point Search algorithm. The header-path alignment and header completion algorithms yield database-ready table content and configuration statistics on a random sample of 400 diverse tables with ground truth and 1120 tables without ground truth from international statistical data sites.


Impacts Of Soil Type And Moisture On The Capacity Of Multi-Carrier Modulation In Internet Of Underground Things, Abdul Salam, Mehmet C. Vuran Jan 2016

Impacts Of Soil Type And Moisture On The Capacity Of Multi-Carrier Modulation In Internet Of Underground Things, Abdul Salam, Mehmet C. Vuran

CSE Conference and Workshop Papers

Unique interactions between soil and communication components in wireless underground communications necessitate revisiting fundamental communication concepts from a different perspective. In this paper, capacity profile of wireless underground (UG) channel for multi-carrier transmission techniques is analyzed based on empirical antenna return loss and channel frequency response models in different soil types and moisture values. It is shown that data rates in excess of 124 Mbps are possible for distances up to 12 m. For shorter distances and lower soil moisture conditions, data rates of 362 Mbps can be achieved. It is also shown that due to soil moisture variations, UG …


Learning Hierarchically Decomposable Concepts With Active Over-Labeling, Yuji Mo, Stephen Scott, Doug Downey Jan 2016

Learning Hierarchically Decomposable Concepts With Active Over-Labeling, Yuji Mo, Stephen Scott, Doug Downey

CSE Conference and Workshop Papers

Many classification tasks target high-level concepts that can be decomposed into a hierarchy of finer-grained subconcepts. For example, some string entities that are Locations are also Attractions, some Attractions are Museums, etc. Such hierarchies are common in named entity recognition (NER), document classification, and biological sequence analysis. We present a new approach for learning hierarchically decomposable concepts. The approach learns a high-level classifier (e.g., location vs. non-location) by seperately learning multiple finer-grained classifiers (e.g., museum vs. non-museum), and then combining the results. Soliciting labels at a finer level of granularity than that of the target concept is a new approach …