Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Computer Science (10)
- Cloud computing (7)
- Computer Networking (6)
- Cybersecurity (6)
- "cloud computing" (5)
-
- HCI (4)
- Human Computer Interaction (3)
- Machine learning (3)
- Artificial intelligence (2)
- Computer science (2)
- Deep learning (2)
- Devops (2)
- Empirical studies (2)
- Java 8 (2)
- Machine Learning (2)
- Quantum (2)
- Software engineering (2)
- Streams (2)
- UI/UX (2)
- 'space and time'; data science; 'schools of thought'; metaphysics; ontology (1)
- ARKit (1)
- Accessibility (1)
- Actor bug API usages (1)
- Actor bug differences (1)
- Actor bug root causes (1)
- Actor bug symptoms (1)
- Adjoint operator (1)
- Akka actor bugs (1)
- Alaska (1)
- Albedo (1)
- Publication
- Publication Type
Articles 1 - 30 of 63
Full-Text Articles in Physical Sciences and Mathematics
Extending Import Detection Algorithms For Concept Import From Two To Three Biomedical Terminologies, Vipina K. Keloth, James Geller, Yan Chen, Julia Xu
Extending Import Detection Algorithms For Concept Import From Two To Three Biomedical Terminologies, Vipina K. Keloth, James Geller, Yan Chen, Julia Xu
Publications and Research
Background: While enrichment of terminologies can be achieved in different ways, filling gaps in the IS-A hierarchy backbone of a terminology appears especially promising. To avoid difficult manual inspection, we started a research program in 2014, investigating terminology densities, where the comparison of terminologies leads to the algorithmic discovery of potentially missing concepts in a target terminology. While candidate concepts have to be approved for import by an expert, the human effort is greatly reduced by algorithmic generation of candidates. In previous studies, a single source terminology was used with one target terminology.
Methods: In this paper, we are extending …
Actor Concurrency Bugs: A Comprehensive Study On Symptoms, Root Causes, Api Usages, And Differences, Mehdi Bagherzadeh, Nicholas Fireman, Anas Shawesh, Raffi T. Khatchadourian
Actor Concurrency Bugs: A Comprehensive Study On Symptoms, Root Causes, Api Usages, And Differences, Mehdi Bagherzadeh, Nicholas Fireman, Anas Shawesh, Raffi T. Khatchadourian
Publications and Research
Actor concurrency is becoming increasingly important in the development of real-world software systems. Although actor concurrency may be less susceptible to some multithreaded concurrency bugs, such as low-level data races and deadlocks, it comes with its own bugs that may be different. However, the fundamental characteristics of actor concurrency bugs, including their symptoms, root causes, API usages, examples, and differences when they come from different sources are still largely unknown. Actor software development can significantly benefit from a comprehensive qualitative and quantitative understanding of these characteristics, which is the focus of this work, to foster better API documentations, development practices, …
Systems And Network Administration - Introduction, Jimmy Richford, Nyc Tech-In-Residence Corps
Systems And Network Administration - Introduction, Jimmy Richford, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for CISC 4311: Systems and Network Administration (Fall 2020)
Cisc 4331 – Systems And Network Administration - Week 5, Jimmy Richford, Nyc Tech-In-Residence Corps
Cisc 4331 – Systems And Network Administration - Week 5, Jimmy Richford, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture 5 for CISC 4331 - Systems and Network Administration
Cisc 4331 – Systems And Network Administration - Week 3, Jimmy Richford, Nyc Tech-In-Residence Corps
Cisc 4331 – Systems And Network Administration - Week 3, Jimmy Richford, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture 3 for CISC 4331: Systems and Network Administration
Cisc 4331 – Systems And Network Administration Week 6, Jimmy Richford, Nyc Tech-In-Residence Corps
Cisc 4331 – Systems And Network Administration Week 6, Jimmy Richford, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture 6 for CISC 4331 - Systems and Network Administration
Cisc 4331 – Systems And Network Administration - Week 4, Jimmy Richford, Nyc Tech-In-Residence Corps
Cisc 4331 – Systems And Network Administration - Week 4, Jimmy Richford, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture 4 for CISC 4331 - Systems and Network Administration
Cisc 4331 – Systems And Network Administration - Week 2, Jimmy Richford, Nyc Tech-In-Residence Corps
Cisc 4331 – Systems And Network Administration - Week 2, Jimmy Richford, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture 2 for CISC 4331: Systems and Network Administration
Lecture - Csci 275: Linux Systems Administration And Security, Moe Hassan, Nyc Tech-In-Residence Corps
Lecture - Csci 275: Linux Systems Administration And Security, Moe Hassan, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for CSCI 275: Linux Systems Administration and Security
Chapter 3: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana
Chapter 3: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana
Open Educational Resources
No abstract provided.
Chapter 6: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana
Chapter 6: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana
Open Educational Resources
No abstract provided.
Chapter 7: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana
Chapter 7: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana
Open Educational Resources
No abstract provided.
Chapter 2: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana
Chapter 2: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana
Open Educational Resources
No abstract provided.
Chapter 1: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana
Chapter 1: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana
Open Educational Resources
No abstract provided.
Chapter 4: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana
Chapter 4: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana
Open Educational Resources
No abstract provided.
Chapter 5: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana
Chapter 5: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana
Open Educational Resources
No abstract provided.
The Internet Never Forgets: Image-Based Sexual Abuse And The Workplace, John Schriner, Melody Lee Rood
The Internet Never Forgets: Image-Based Sexual Abuse And The Workplace, John Schriner, Melody Lee Rood
Publications and Research
Image-based sexual abuse (IBSA), commonly known as revenge pornography, is a type of cyberharassment that often results in detrimental effects to an individual's career and livelihood. Although there exists valuable research concerning cyberharassment in the workplace generally, there is little written about specifically IBSA and the workplace. This chapter examines current academic research on IBSA, the issues with defining this type of abuse, victim blaming, workplace policy, and challenges to victim-survivors' redress. The authors explore monetary motivation for websites that host revenge pornography and unpack how the dark web presents new challenges to seeking justice. Additionally, this chapter presents recommendations …
Valid Time Rdf, Hsien-Tseng Wang
Valid Time Rdf, Hsien-Tseng Wang
Dissertations, Theses, and Capstone Projects
The Semantic Web aims at building a foundation of semantic-based data models and languages for not only manipulating data and knowledge, but also supporting decision making by machines. Naturally, time-varying data and knowledge are required in Semantic Web applications to incorporate time and further reason about it. However, the original specifications of Resource Description Framework (RDF) and Web Ontology Language (OWL) do not include constructs for handling time-varying data and knowledge. For simplicity, RDF model is confined to binary predicates, hence some form of reification is needed to represent higher-arity predicates. To this date, there are many proposals extending RDF …
Unclonable Secret Keys, Marios Georgiou
Unclonable Secret Keys, Marios Georgiou
Dissertations, Theses, and Capstone Projects
We propose a novel concept of securing cryptographic keys which we call “Unclonable Secret Keys,” where any cryptographic object is modified so that its secret key is an unclonable quantum bit-string whereas all other parameters such as messages, public keys, ciphertexts, signatures, etc., remain classical. We study this model in the authentication and encryption setting giving a plethora of definitions and positive results as well as several applications that are impossible in a purely classical setting.
In the authentication setting, we define the notion of one-shot signatures, a fundamental element in building unclonable keys, where the signing key not only …
A Semi-Automated Approach To Medical Image Segmentation Using Conditional Random Field Inference, Yu-Chi Hu
A Semi-Automated Approach To Medical Image Segmentation Using Conditional Random Field Inference, Yu-Chi Hu
Dissertations, Theses, and Capstone Projects
Medical image segmentation plays a crucial role in delivering effective patient care in various diagnostic and treatment modalities. Manual delineation of target volumes and all critical structures is a very tedious and highly time-consuming process and introduce uncertainties of treatment outcomes of patients. Fully automatic methods holds great promise for reducing cost and time, while at the same time improving accuracy and eliminating expert variability, yet there are still great challenges. Legally and ethically, human oversight must be integrated with ”smart tools” favoring a semi-automatic technique which can leverage the best aspects of both human and computer.
In this work …
Role Of Influence In Complex Networks, Nur Dean
Role Of Influence In Complex Networks, Nur Dean
Dissertations, Theses, and Capstone Projects
Game theory is a wide ranging research area; that has attracted researchers from various fields. Scientists have been using game theory to understand the evolution of cooperation in complex networks. However, there is limited research that considers the structure and connectivity patterns in networks, which create heterogeneity among nodes. For example, due to the complex ways most networks are formed, it is common to have some highly “social” nodes, while others are highly isolated. This heterogeneity is measured through metrics referred to as “centrality” of nodes. Thus, the more “social” nodes tend to also have higher centrality.
In this thesis, …
Machine Learning Applications For Drug Repurposing, Hansaim Lim
Machine Learning Applications For Drug Repurposing, Hansaim Lim
Dissertations, Theses, and Capstone Projects
The cost of bringing a drug to market is astounding and the failure rate is intimidating. Drug discovery has been of limited success under the conventional reductionist model of one-drug-one-gene-one-disease paradigm, where a single disease-associated gene is identified and a molecular binder to the specific target is subsequently designed. Under the simplistic paradigm of drug discovery, a drug molecule is assumed to interact only with the intended on-target. However, small molecular drugs often interact with multiple targets, and those off-target interactions are not considered under the conventional paradigm. As a result, drug-induced side effects and adverse reactions are often neglected …
Set Operators, Xiaojin Ye
Set Operators, Xiaojin Ye
Dissertations, Theses, and Capstone Projects
My research is centered on set operators. These are universally applicable regardless of the internal structure (numeric or non-numeric) of each individual observed datum. In our research, we have developed the theory of set operators to fill holes and gaps in observed data and eliminate paper shred garbage, thereby changing the observed symbolic data set into one whose pattern is closer to the pattern in the underlying population from which the observed data set was sampled with perturbations.
We describe different set operators including increasing operators, decreasing operators, ex- pansive operators, contractive operators, union preserving operators, intersection preserving op- erators, …
Snow-Albedo Feedback In Northern Alaska: How Vegetation Influences Snowmelt, Lucas C. Reckhaus
Snow-Albedo Feedback In Northern Alaska: How Vegetation Influences Snowmelt, Lucas C. Reckhaus
Theses and Dissertations
This paper investigates how the snow-albedo feedback mechanism of the arctic is changing in response to rising climate temperatures. Specifically, the interplay of vegetation and snowmelt, and how these two variables can be correlated. This has the potential to refine climate modelling of the spring transition season. Research was conducted at the ecoregion scale in northern Alaska from 2000 to 2020. Each ecoregion is defined by distinct topographic and ecological conditions, allowing for meaningful contrast between the patterns of spring albedo transition across surface conditions and vegetation types. The five most northerly ecoregions of Alaska are chosen as they encompass …
Qwasi: The Quantum Walk Simulator, Warren V. Wilson
Qwasi: The Quantum Walk Simulator, Warren V. Wilson
Theses and Dissertations
As quantum computing continues to evolve, the ability to design and analyze novel quantum algorithms becomes a necessary focus for research. In many instances, the virtues of quantum algorithms only become evident when compared to their classical counterparts, so a study of the former often begins with a consideration of the latter. This is very much the case with quantum walk algorithms, as the success of random walks and their many, varied applications have inspired much interest in quantum correlates. Unfortunately, finding purely algebraic solutions for quantum walks is an elusive endeavor. At best, and when solvable, they require simple …
Novel Fast Algorithms For Low Rank Matrix Approximation, John T. Svadlenka
Novel Fast Algorithms For Low Rank Matrix Approximation, John T. Svadlenka
Dissertations, Theses, and Capstone Projects
Recent advances in matrix approximation have seen an emphasis on randomization techniques in which the goal was to create a sketch of an input matrix. This sketch, a random submatrix of an input matrix, having much fewer rows or columns, still preserves its relevant features. In one of such techniques random projections approximate the range of an input matrix. Dimension reduction transforms are obtained by means of multiplication of an input matrix by one or more matrices which can be orthogonal, random, and allowing fast multiplication by a vector. The Subsampled Randomized Hadamard Transform (SRHT) is the most popular among …
New Approaches To Frequent And Incremental Frequent Pattern Mining, Mehmet Bicer
New Approaches To Frequent And Incremental Frequent Pattern Mining, Mehmet Bicer
Dissertations, Theses, and Capstone Projects
Data Mining (DM) is a process for extracting interesting patterns from large volumes of data. It is one of the crucial steps in Knowledge Discovery in Databases (KDD). It involves various data mining methods that mainly fall into predictive and descriptive models. Descriptive models look for patterns, rules, relationships and associations within data. One of the descriptive methods is association rule analysis, which represents co-occurrence of items or events. Association rules are commonly used in market basket analysis. An association rule is in the form of X → Y and it shows that X and Y co-occur with a given …
Emerging Technologies In Healthcare: Analysis Of Unos Data Through Machine Learning, Reyhan Merekar
Emerging Technologies In Healthcare: Analysis Of Unos Data Through Machine Learning, Reyhan Merekar
Student Theses and Dissertations
The healthcare industry is primed for a massive transformation in the coming decades due to emerging technologies such as Artificial Intelligence (AI) and Machine Learning. With a practical application to the UNOS (United Network of Organ Sharing) database, this Thesis seeks to investigate how Machine Learning and analytic methods may be used to predict one-year heart transplantation outcomes. This study also sought to improve on predictive performances from prior studies by analyzing both Donor and Recipient data. Models built with algorithms such as Stacking and Tree Boosting gave the highest performance, with AUC’s of 0.6810 and 0.6804, respectively. In this …
An Empirical Study On The Use And Misuse Of Java 8 Streams, Raffi T. Khatchadourian, Yiming Tang, Mehdi Bagherzadeh, Baishakhi Ray
An Empirical Study On The Use And Misuse Of Java 8 Streams, Raffi T. Khatchadourian, Yiming Tang, Mehdi Bagherzadeh, Baishakhi Ray
Publications and Research
Streaming APIs allow for big data processing of native data structures by providing MapReduce-like operations over these structures. However, unlike traditional big data systems, these data structures typically reside in shared memory accessed by multiple cores. Although popular, this emerging hybrid paradigm opens the door to possibly detrimental behavior, such as thread contention and bugs related to non-execution and non-determinism. This study explores the use and misuse of a popular streaming API, namely, Java 8 Streams. The focus is on how developers decide whether or not to run these operations sequentially or in parallel and bugs both specific and tangential …
Philosophical Perspectives, Jochen Albrecht
Philosophical Perspectives, Jochen Albrecht
Publications and Research
This entry follows in the footsteps of Anselin’s famous 1989 NCGIA working paper entitled “What is special about spatial?” (a report that is very timely again in an age when non-spatial data scientists are ignorant of the special characteristics of spatial data), where he outlines three unrelated but fundamental characteristics of spatial data. In a similar vein, I am going to discuss some philosophical perspectives that are internally unrelated to each other and could warrant individual entries in this Body of Knowledge. The first one is the notions of space and time and how they have evolved in …