Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 331

Full-Text Articles in Physical Sciences and Mathematics

Locally Tight Programs, Jorge Fandinno, Vladimir Lifschitz, Nathan Temple Jan 2024

Locally Tight Programs, Jorge Fandinno, Vladimir Lifschitz, Nathan Temple

Computer Science Faculty Publications

Program completion is a translation from the language of logic programs into the language of first-order theories. Its original definition has been extended to programs that include integer arithmetic, accept input, and distinguish between output predicates and auxiliary predicates. For tight programs, that generalization of completion is known to match the stable model semantics, which is the basis of answer set programming. We show that the tightness condition in this theorem can be replaced by a less restrictive “local tightness” requirement. From this fact we conclude that the proof assistant ANTHEM-P2P can be used to verify equivalence between locally tight …


Locally Tight Programs, Jorge Fandinno, Vladimir Lifschitz, Nathan Temple Jan 2024

Locally Tight Programs, Jorge Fandinno, Vladimir Lifschitz, Nathan Temple

Computer Science Faculty Publications

Program completion is a translation from the language of logic programs into the language of first-order theories. Its original definition has been extended to programs that include integer arithmetic, accept input, and distinguish between output predicates and auxiliary predicates. For tight programs, that generalization of completion is known to match the stable model semantics, which is the basis of answer set programming. We show that the tightness condition in this theorem can be replaced by a less restrictive “local tightness” requirement. From this fact we conclude that the proof assistant ANTHEM-P2P can be used to verify equivalence between locally tight …


External Behavior Of A Logic Program And Verification Of Refactoring, Jorge Fandinno, Zachary Hansen, Yuliya Lierler, Vladimir Lifschitz, Nathan Temple Jul 2023

External Behavior Of A Logic Program And Verification Of Refactoring, Jorge Fandinno, Zachary Hansen, Yuliya Lierler, Vladimir Lifschitz, Nathan Temple

Computer Science Faculty Publications

Refactoring is modifying a program without changing its external behavior. In this paper, we make the concept of external behavior precise for a simple answer set programming language. Then we describe a proof assistant for the task of verifying that refactoring a program in that language is performed correctly.


System Predictor: Grounding Size Estimator For Logic Programs Under Answer Set Semantics, Daniel Bresnahan, Nicholas Hippen, Yuliya Lierler Jun 2023

System Predictor: Grounding Size Estimator For Logic Programs Under Answer Set Semantics, Daniel Bresnahan, Nicholas Hippen, Yuliya Lierler

Computer Science Faculty Publications

Answer set programming is a declarative logic programming paradigm geared towards solving difficult combinatorial search problems. While different logic programs can encode the same problem, their performance may vary significantly. It is not always easy to identify which version of the program performs the best. We present the system PREDICTOR (and its algorithmic backend) for estimating the grounding size of programs, a metric that can influence a performance of a system processing a program. We evaluate the impact of PREDICTOR when used as a guide for rewritings produced by the answer set programming rewriting tools PROJECTOR and LPOPT. The results …


Efficient Convoy Routing And Bridge Load Optimization User Interface, Brandon Lacy, Will Heller, Yonas Kassa, Brian Ricks, Robin Gandhi May 2023

Efficient Convoy Routing And Bridge Load Optimization User Interface, Brandon Lacy, Will Heller, Yonas Kassa, Brian Ricks, Robin Gandhi

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

No abstract provided.


Building Explainable Machine Learning Lifecycle: Model Training, Selection, And Deployment With Explainability, Vidit Singh, Yonas Kassa, Brian Ricks, Robin Gandhi May 2023

Building Explainable Machine Learning Lifecycle: Model Training, Selection, And Deployment With Explainability, Vidit Singh, Yonas Kassa, Brian Ricks, Robin Gandhi

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

No abstract provided.


Developing Architecture For A Routing System Using Bridge Data And Adversary Avoidance, Will Heller, Brian Ricks, Yonas Kassa, Brandon Lacy, Rahul Kamar Nethakani May 2023

Developing Architecture For A Routing System Using Bridge Data And Adversary Avoidance, Will Heller, Brian Ricks, Yonas Kassa, Brandon Lacy, Rahul Kamar Nethakani

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

No abstract provided.


Progress In A New Visualization Strategy For Ml Models, Alex Wissing, Brian Ricks, Robin Gandhi, Yonas Kassa, Akshay Kale May 2023

Progress In A New Visualization Strategy For Ml Models, Alex Wissing, Brian Ricks, Robin Gandhi, Yonas Kassa, Akshay Kale

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

No abstract provided.


How To Select Simple-Yet-Accurate Model Of Bridge Maintenance?, Akshay Kale, Yonas Kassa, Brian Ricks, Robin Gandhi May 2023

How To Select Simple-Yet-Accurate Model Of Bridge Maintenance?, Akshay Kale, Yonas Kassa, Brian Ricks, Robin Gandhi

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

No abstract provided.


Positive Dependency Graphs Revisited, Jorge Fandinno, Vladimir Lifschitz Aug 2022

Positive Dependency Graphs Revisited, Jorge Fandinno, Vladimir Lifschitz

Computer Science Faculty Publications

Theory of stable models is the mathematical basis of answer set programming. Several results in that theory refer to the concept of the positive dependency graph of a logic program. We describe a modification of that concept and show that the new understanding of positive dependency makes it possible to strengthen some of these results.


Abstract Argumentation And Answer Set Programming: Two Faces Of Nelson’S Logic, Jorge Fandinno, Luis Fariñas Del Cerro May 2022

Abstract Argumentation And Answer Set Programming: Two Faces Of Nelson’S Logic, Jorge Fandinno, Luis Fariñas Del Cerro

Computer Science Faculty Publications

In this work, we show that both logic programming and abstract argumentation frameworks can be interpreted in terms of Nelson’s constructive logic N4. We do so by formalising, in this logic, two principles that we call noncontradictory inference and strengthened closed world assumption: the first states that no belief can be held based on contradictory evidence while the latter forces both unknown and contradictory evidence to be regarded as false. Using these principles, both logic programming and abstract argumentation frameworks are translated into constructive logic in a modular way and using the object language. Logic programming implication and abstract argumentation …


The 10th Annual Computer Science Workshop, Submissions, Abstract Template, Computer Science Department Feb 2022

The 10th Annual Computer Science Workshop, Submissions, Abstract Template, Computer Science Department

Computer Science Faculty Proceedings & Presentations

This is the abstract template for the 10th Annual Computer Science Graduate Research Workshop (2022). To learn more about this workshop, please visit: https://digitalcommons.unomaha.edu/csworkshop/2022/.


On The Security Of Bluetooth Low Energy In Two Consumer Wearable Heart Rate Monitors/Sensing Devices, Yesem Kurt Peker, Gabriel Bello, Alfredo J. Perez Jan 2022

On The Security Of Bluetooth Low Energy In Two Consumer Wearable Heart Rate Monitors/Sensing Devices, Yesem Kurt Peker, Gabriel Bello, Alfredo J. Perez

Computer Science Faculty Publications

Since its inception in 2013, Bluetooth Low Energy (BLE) has become the standard for short-distance wireless communication in many consumer devices, as well as special-purpose devices. In this study, we analyze the security features available in Bluetooth LE standards and evaluate the features implemented in two BLE wearable devices (a Fitbit heart rate wristband and a Polar heart rate chest wearable) and a BLE keyboard to explore which security features in the BLE standards are implemented in the devices. In this study, we used the ComProbe Bluetooth Protocol Analyzer, along with the ComProbe software to capture the BLE traffic of …


Factors Affecting Student Educational Choices Regarding Oer Material In Computer Science, Anastasia Angelopoulou, Rania Hodhod, Alfredo J. Perez Jan 2022

Factors Affecting Student Educational Choices Regarding Oer Material In Computer Science, Anastasia Angelopoulou, Rania Hodhod, Alfredo J. Perez

Computer Science Faculty Publications

The use of Open Educational Resources (OER) in course settings provides a solution to reduce the textbook barrier. Several published studies have concluded that high textbook costs may influence students' educational choices. However, there are other student characteristics that may be relevant to OER. In this work, we study various factors that may influence students' educational choices regarding OER and their impact on a student’s perspectives on OER use and quality. More specifically, we investigate whether there are significant differences in the frequency of use and perceived quality of the OER textbook based on gender, prior academic achievements, income, seniority, …


Secure And Privacy-Preserving Crowdsensing Using Smart Contracts: Issues And Solutions, Alfredo J. Perez, Sherali Zeadally Dec 2021

Secure And Privacy-Preserving Crowdsensing Using Smart Contracts: Issues And Solutions, Alfredo J. Perez, Sherali Zeadally

Computer Science Faculty Publications

The advent of Blockchain and smart contracts is empowering many technologies and systems to automate commerce and facilitate the exchange, tracking and the provision of goods, data and services in a reliable and auditable way. Crowdsensing systems is one type of systems that have been receiving a lot of attention in the past few years. In crowdsensing systems consumer devices such as mobile phones and Internet of Things devices are used to deploy wide-scale sensor networks. We identify some of the major security and privacy issues associated with the development of crowdsensing systems based on smart contracts and Blockchain. We …


Recent Advances In Wearable Sensing Technologies, Alfredo J. Perez, Sherali Zeadally Oct 2021

Recent Advances In Wearable Sensing Technologies, Alfredo J. Perez, Sherali Zeadally

Computer Science Faculty Publications

Wearable sensing technologies are having a worldwide impact on the creation of novel business opportunities and application services that are benefiting the common citizen. By using these technologies, people have transformed the way they live, interact with each other and their surroundings, their daily routines, and how they monitor their health conditions. We review recent advances in the area of wearable sensing technologies, focusing on aspects such as sensor technologies, communication infrastructures, service infrastructures, security, and privacy. We also review the use of consumer wearables during the coronavirus disease 19 (COVID-19) pandemic caused by the severe acute respiratory syndrome coronavirus …


Swift Trust And Sensemaking In Fast Response Virtual Teams, Xiaodan Yu, Yuanyanhang Shen, Deepak Khazanchi Oct 2021

Swift Trust And Sensemaking In Fast Response Virtual Teams, Xiaodan Yu, Yuanyanhang Shen, Deepak Khazanchi

Information Systems and Quantitative Analysis Faculty Publications

Fast-response virtual teams (FRVTs) have been developed as a response to emergent challenges faced by organizations that need to be addressed urgently. Even though FRVTs offer enormous potential in terms of their benefits, their success is not guaranteed. When used, the need for high performing FRVTs has become critical for organizational success. However, there is a lack of detailed understanding of how sensemaking can potentially influence FRVT performance. Drawing on social exchange theory, we identify swift trust as a potential antecedent of sensemaking. In this paper, we report the results of a study that examined the effects of swift trust …


Politeness In Security Directives: Insights In Browser Compliance For The Human Element, Deanna House, Gabe Giordano Dec 2020

Politeness In Security Directives: Insights In Browser Compliance For The Human Element, Deanna House, Gabe Giordano

Information Systems and Quantitative Analysis Faculty Publications

The technical protection provided by information security technology is necessary as a frontline defense against threats. However, the human element adds great risk to systems and cannot be ignored. This research explores the human elements related to security communications and intention to comply with security directives. Security communications are more-commonly being sent using richer computer-based channels. While the goal of security communications is the gain compliance, there is still much to learn related to what influences a user to comply. This research explores the effects that (im)politeness has on intention to comply with security directives. The research utilized an experiment …


A User Study Of A Wearable System To Enhance Bystanders’ Facial Privacy, Alfredo J. Perez, Sherali Zeadally, Scott Griffith, Luis Y. Matos Garcia, Jason A. Mouloud Oct 2020

A User Study Of A Wearable System To Enhance Bystanders’ Facial Privacy, Alfredo J. Perez, Sherali Zeadally, Scott Griffith, Luis Y. Matos Garcia, Jason A. Mouloud

Computer Science Faculty Publications

The privacy of users and information are becoming increasingly important with the growth and pervasive use of mobile devices such as wearables, mobile phones, drones, and Internet of Things (IoT) devices. Today many of these mobile devices are equipped with cameras which enable users to take pictures and record videos anytime they need to do so. In many such cases, bystanders’ privacy is not a concern, and as a result, audio and video of bystanders are often captured without their consent. We present results from a user study in which 21 participants were asked to use a wearable system called …


Cyber Supply Chain Risk Management: Toward An Understanding Of The Antecedents To Demand For Assurance, Clark Hampton, Steve G. Sutton, Vicky Arnold, Deepak Khazanchi Oct 2020

Cyber Supply Chain Risk Management: Toward An Understanding Of The Antecedents To Demand For Assurance, Clark Hampton, Steve G. Sutton, Vicky Arnold, Deepak Khazanchi

Information Systems and Quantitative Analysis Faculty Publications

Recognizing the need for effective cyber risk management processes across the supply chain, the AICPA issued a new SOC in March 2020 for assuring cyber supply chain risk management (C-SCRM) processes. This study examines supply chain relationship factors and cyber risk issues to better understand the demand for C-SCRM assurance. Resource-Advantage Theory of Competition provides the conceptual foundation for assessing the dual drivers of relationship building and cyber risk management on demand for assurance. We use a field survey to collect data from 205 professionals enabling evaluation of the complex relationships in the theoretical model. Results support all hypotheses, provide …


Effect Of Implementing Subgoals In Code.Org's Intro To Programming Unit In Computer Science Principles, Lauren E. Margulieux, Briana Baker Morrison, Baker Franke, Hari Ramilison Oct 2020

Effect Of Implementing Subgoals In Code.Org's Intro To Programming Unit In Computer Science Principles, Lauren E. Margulieux, Briana Baker Morrison, Baker Franke, Hari Ramilison

Computer Science Faculty Publications

The subgoal learning framework has improved performance for novice programmers in higher education, but it has only started to be applied and studied in K-12 (primary/secondary). Programming education in K-12 is growing, and many international initiatives are attempting to increase participation, including curricular initiatives like Computer Science Principles and non-profit organizations like Code.org. Given that subgoal learning is designed to help students with no prior knowledge, we designed and implemented subgoals in the introduction to programming unit in Code.org's Computer Science Principles course. The redesigned unit includes subgoal-oriented instruction and subgoal-themed pre-written comments that students could add to their programming …


Prototypical Career Paths In Urban, Suburban, And Rural Locations In The United States, Tenace Kwaku Setor, Damien Joseph Jun 2020

Prototypical Career Paths In Urban, Suburban, And Rural Locations In The United States, Tenace Kwaku Setor, Damien Joseph

Information Systems and Quantitative Analysis Faculty Publications

Career paths are formed over time from interactions between individuals, organizations, and labor markets within and across geographic locations. What are the prototypical career paths thus formed? Who are the likely incumbents of these career paths? What are the consequences of pursuing these career paths? This study combines micro-level perspectives on personal agency and macro-level institutional factors to explain how careers unfold over time and space. The juxtaposition of micro- and macro-level factors contributes to career research and practice, which have traditionally examined careers as movements across organizations and occupations over time, but almost exclusively within specific geographic locations. We …


When Agile Means Staying: A Moderated Mediated Model, Tenace Kwaku Setor May 2020

When Agile Means Staying: A Moderated Mediated Model, Tenace Kwaku Setor

Information Systems and Quantitative Analysis Faculty Publications

The design of software development methods focuses on improving task processes, including accommodating changing user requirements and accelerating product delivery. However, there is limited research on how the use of different software development methods impacts IT professionals’ perceptions of organizational mobility. Drawing on concepts from the agile development literature and job characteristics theory, we formulate a moderated mediation model explicating the mechanism and the condition under which agile development use exerts an influence on IT professionals’ intention to stay with their current employer. Specifically, we examine job satisfaction as mediating the effect of using agile development on the intention to …


Reducing Withdrawal And Failure Rates In Introductory Programming With Subgoal Labeled Worked Examples, Lauren E. Margulieux, Briana B. Morrison, Adrienne Decker May 2020

Reducing Withdrawal And Failure Rates In Introductory Programming With Subgoal Labeled Worked Examples, Lauren E. Margulieux, Briana B. Morrison, Adrienne Decker

Computer Science Faculty Publications

Background

Programming a computer is an increasingly valuable skill, but dropout and failure rates in introductory programming courses are regularly as high as 50%. Like many fields, programming requires students to learn complex problem-solving procedures from instructors who tend to have tacit knowledge about low-level procedures that they have automatized. The subgoal learning framework has been used in programming and other fields to breakdown procedural problem solving into smaller pieces that novices can grasp more easily, but it has only been used in short-term interventions. In this study, the subgoal learning framework was implemented throughout a semester-long introductory programming course …


A Semi-Automated Technique For Transcribing Accurate Crowd Motions, Alexander Fuchsberger, Brian Ricks, Zhicheng Chen Apr 2020

A Semi-Automated Technique For Transcribing Accurate Crowd Motions, Alexander Fuchsberger, Brian Ricks, Zhicheng Chen

Computer Science Faculty Publications

We present a novel technique for transcribing crowds in video scenes that allows extracting the positions of moving objects in video frames. The technique can be used as a more precise alternative to image processing methods, such as background-removal or automated pedestrian detection based on feature extraction and classification. By manually projecting pedestrian actors on a two-dimensional plane and translating screen coordinates to absolute real-world positions using the cross ratio, we provide highly accurate and complete results at the cost of increased processing time. We are able to completely avoid most errors found in other automated annotation techniques, resulting from …


The 10th Annual Computer Science Workshop, Submissions, Abstract Template, Computer Science Department Apr 2020

The 10th Annual Computer Science Workshop, Submissions, Abstract Template, Computer Science Department

Computer Science Faculty Proceedings & Presentations

This is the abstract template for the 10th Annual Computer Science Graduate Research Workshop (2020). To learn more about this workshop, please visit: https://digitalcommons.unomaha.edu/csworkshop/2020/.


A Cost Analysis Of Internet Of Things Sensor Data Storage On Blockchain Via Smart Contracts, Yesem Kurt Peker, Xavier Rodriguez, James Ericsson, Suk Jin Lee, Alfredo J. Perez Feb 2020

A Cost Analysis Of Internet Of Things Sensor Data Storage On Blockchain Via Smart Contracts, Yesem Kurt Peker, Xavier Rodriguez, James Ericsson, Suk Jin Lee, Alfredo J. Perez

Computer Science Faculty Publications

Blockchain is a developing technology that can be utilized for secure data storage and sharing. In this work, we examine the cost of Blockchain-based data storage for constrained Internet of Things (IoT) devices. We had two phases in the study. In the first phase, we stored data retrieved from a temperature/humidity sensor connected to an Ethereum testnet blockchain using smart contracts in two different ways: first, appending the new data to the existing data, storing all sensor data; and second, overwriting the new data onto the existing data, storing only a recent portion of the data. In the second phase, …


Icedge: When Edge Computing Meets Information-Centric Networking, Spyridon Mastorakis, Abderrahmen Mtibaa, Jonathan Lee, Satyajayant Misra Jan 2020

Icedge: When Edge Computing Meets Information-Centric Networking, Spyridon Mastorakis, Abderrahmen Mtibaa, Jonathan Lee, Satyajayant Misra

Computer Science Faculty Publications

In today’s era of explosion of Internet of Things (IoT) and end-user devices and their data volume, emanating at the network’s edge, the network should be more in-tune with meeting the needs of these demanding edge computing applications. To this end, we design and prototype Information-Centric edge (ICedge), a general-purpose networking framework that streamlines service invocation and improves reuse of redundant computation at the edge. ICedge runs on top of Named-Data Networking, a realization of the Information-Centric Networking vision, and handles the “low-level” network communication on behalf of applications. ICedge features a fully distributed design that: (i) enables users to …


The Curious Case Of Loops, Briana B. Morrison, Lauren E. Margulieux, Adrienne Decker Jan 2020

The Curious Case Of Loops, Briana B. Morrison, Lauren E. Margulieux, Adrienne Decker

Computer Science Faculty Publications

Background and Context

Subgoal labeled worked examples have been extensively researched, but the research has been reported piecemeal. This paper aggregates data from three studies, including data previously unreported, to holistically examine the effect of subgoal labeled worked examples across three student populations and across different instructional designs.

Objective

By aggregating the data, we provide more statistical power for somewhat surprising yet replicable results. We discuss which results generalize across populations, focusing on a stable effect size for subgoal labels in programming instruction.

Method

We use descriptive and inferential statistics to examine the data collected from different student populations and …


Application Of The Benford’S Law To Social Bots And Information Operations Activities, Lale Madahali, Margeret Hall Jan 2020

Application Of The Benford’S Law To Social Bots And Information Operations Activities, Lale Madahali, Margeret Hall

Interdisciplinary Informatics Faculty Proceedings & Presentations

Benford's law shows the pattern of behavior in normal systems. It states that in natural systems digits' frequency have a certain pattern such that the occurrence of first digits in numbers are unevenly distributed. In systems with natural behavior, numbers begin with a “1” are more common than numbers beginning with “9”. It implies that if the distribution of first digits deviate from the expected distribution, it is indicative of fraud. It has many applications in forensic accounting, stock markets, finding abnormal data in survey data, and natural science. We investigate whether social media bots and Information Operations activities are …