Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Social networks analysis (2)
- Behavior intention; information security; information security behavior; fear; self-confidence; EPPM (1)
- Building simulation (1)
- CS1 (1)
- Chatbots (1)
-
- Citizen science (1)
- Computational Thinking (1)
- Confidentiality and privacy (1)
- Conversational agents (1)
- Conversational skill (1)
- Crowd generation (1)
- Crowd simulation (1)
- Data mining (1)
- Deception (1)
- Electronic Word-of-Mouth (eWOM) (1)
- Exploratory factor analysis (1)
- Games Extension Honors Minigames (1)
- Gender differences (1)
- Graph analysis (1)
- Online tie strength (1)
- Outreach (1)
- Participatory research (1)
- Problem solving (1)
- Professional–patient relationship (1)
- Relevance (1)
- Research ethics (1)
- Social bots (1)
- Social interaction (1)
- Social science research (1)
- Subgoal learning (1)
- Publication
-
- Computer Science Graduate Research Workshop (13)
- Information Systems and Quantitative Analysis Faculty Publications (5)
- UNO Student Research and Creative Activity Fair (5)
- Computer Science Faculty Publications (4)
- Interdisciplinary Informatics Faculty Proceedings & Presentations (2)
-
- Computer Science Faculty Proceedings & Presentations (1)
- Computer Science Theses, Dissertations, and Student Creative Activity (1)
- Information Systems and Quantitative Analysis Faculty Proceedings & Presentations (1)
- Information Systems and Quantitative Analysis Theses, Dissertations, and Student Creative Activity (1)
- Interdisciplinary Informatics Faculty Publications (1)
- Student Work (1)
- Theses/Capstones/Creative Projects (1)
- Publication Type
- File Type
Articles 1 - 30 of 36
Full-Text Articles in Physical Sciences and Mathematics
Grounding Size Predictions For Answer Set Programs, Nicholas Hippen
Grounding Size Predictions For Answer Set Programs, Nicholas Hippen
Student Work
Answer set programming is a declarative programming paradigm geared towards solving difficult combinatorial search problems. Logic programs under answer set semantics can typically be written in many different ways while still encoding the same problem. These different versions of the program may result in diverse performances. Unfortunately, it is not always easy to identify which version of the program performs the best, requiring expert knowledge on both answer set processing and the problem domain. More so, the best version to use may even vary depending on the problem instance. One measure that has been shown to correlate with performance is …
Uncovering And Characterizing Splice Variants Associated With Survival In Lung Cancer Patients, Sean West, Sushil Kumar, Surinder K. Batra, Hesham Ali, Dario Ghersi
Uncovering And Characterizing Splice Variants Associated With Survival In Lung Cancer Patients, Sean West, Sushil Kumar, Surinder K. Batra, Hesham Ali, Dario Ghersi
Interdisciplinary Informatics Faculty Publications
Splice variants have been shown to play an important role in tumor initiation and progression and can serve as novel cancer biomarkers. However, the clinical importance of individual splice variants and the mechanisms by which they can perturb cellular functions are still poorly understood. To address these issues, we developed an efficient and robust computational method to: (1) identify splice variants that are associated with patient survival in a statistically significant manner; and (2) predict rewired protein-protein interactions that may result from altered patterns of expression of such variants. We applied our method to the lung adenocarcinoma dataset from TCGA …
Generation Of Crowd Arrival And Destination Locations/Times In Complex Transit Facilities, Brian Ricks, Andrew Dobson, Athanasios Krontiris, Kostas Bekris, Mubbasir Kapadia, Fred Roberts
Generation Of Crowd Arrival And Destination Locations/Times In Complex Transit Facilities, Brian Ricks, Andrew Dobson, Athanasios Krontiris, Kostas Bekris, Mubbasir Kapadia, Fred Roberts
Computer Science Faculty Publications
In order to simulate virtual agents in the replica of a real facility across a long time span, a crowd simulation engine needs a list of agent arrival and destination locations and times that reflect those seen in the actual facility. Working together with a major metropolitan transportation authority, we propose a specification that can be used to procedurally generate this information. This specification is both uniquely compact and expressive—compact enough to mirror the mental model of building managers and expressive enough to handle the wide variety of crowds seen in real urban environments. We also propose a procedural algorithm …
Phishing: Message Appraisal And The Exploration Of Fear And Self-Confidence, Deanna House, M. K. Raja
Phishing: Message Appraisal And The Exploration Of Fear And Self-Confidence, Deanna House, M. K. Raja
Information Systems and Quantitative Analysis Faculty Publications
Phishing attacks have threatened the security of both home users and organizations in recent years. Phishing uses social engineering to fraudulently obtain information that is confidential or sensitive. Individuals are targeted to take action by clicking on a link and providing information. This research explores fear arousal and self-confidence in subjects confronted by phishing attacks. The study collected data from multiple sources (including an attempted phishing attack). The survey results indicated that when individuals had a high level of fear arousal related to providing login credentials they had a decreased intention to respond to a phishing attack. Self-confidence did not …
Structural Bot Detection In Social Networks, Lale Madahali
Structural Bot Detection In Social Networks, Lale Madahali
Interdisciplinary Informatics Faculty Proceedings & Presentations
Social network platforms are a major part of toady’s life. They are usually used for entertainment, news, advertisements, and branding for businesses and individuals alike. However, use of automated accounts, also known as bots, pollute this environment and avoid having a reliable clean online world. In this work, I address the problem of detecting bots in online social networks.
The Effect Of Conversational Agent Skill On User Behavior During Deception, Ryan M. Schuetzler, G. Mark Grimes, Justin Scott Giboney
The Effect Of Conversational Agent Skill On User Behavior During Deception, Ryan M. Schuetzler, G. Mark Grimes, Justin Scott Giboney
Information Systems and Quantitative Analysis Faculty Publications
Conversational agents (CAs) are an integral component of many personal and business interactions. Many recent advancements in CA technology have attempted to make these interactions more natural and human-like. However, it is currently unclear how human-like traits in a CA impact the way users respond to questions from the CA. In some applications where CAs may be used, detecting deception is important. Design elements that make CA interactions more human-like may induce undesired strategic behaviors from human deceivers to mask their deception. To better understand this interaction, this research investigates the effect of conversational skill—that is, the ability of the …
Using The Solo Taxonomy To Understand Subgoal Labels Effect In Cs1, Adrienne Decker, Lauren E. Margulieux, Briana B. Morrison
Using The Solo Taxonomy To Understand Subgoal Labels Effect In Cs1, Adrienne Decker, Lauren E. Margulieux, Briana B. Morrison
Computer Science Faculty Proceedings & Presentations
This work extends previous research on subgoal labeled instructions by examining their effect across a semester-long, Java-based CS1 course. Across four quizzes, students were asked to explain in plain English the process that they would use to solve a programming problem. In this mixed methods study, we used the SOLO taxonomy to categorize student responses about problem-solving processes and compare students who learned with subgoal labels to those who did not. The use of the SOLO taxonomy classification allows us to look deeper than the mere correctness of answers to focus on the quality of the answers produced in terms …
The Rise Of Citizen Science In Health And Biomedical Research, Andrea Wiggins, John Wilbanks
The Rise Of Citizen Science In Health And Biomedical Research, Andrea Wiggins, John Wilbanks
Information Systems and Quantitative Analysis Faculty Publications
Citizen science models of public participation in scientific research represent a growing area of opportunity for health and biomedical research, as well as new impetus for more collaborative forms of engagement in large-scale research. However, this also surfaces a variety of ethical issues that both fall outside of and build upon the standard human subjects concerns in bioethics. This article provides background on citizen science, examples of current projects in the field, and discussion of established and emerging ethical issues for citizen science in health and biomedical research.
Design And Pilot Testing Of Subgoal Labeled Worked Examples For Five Core Concepts In Cs1, Lauren E. Margulieux, Briana B. Morrison, Adrienne Decker
Design And Pilot Testing Of Subgoal Labeled Worked Examples For Five Core Concepts In Cs1, Lauren E. Margulieux, Briana B. Morrison, Adrienne Decker
Computer Science Faculty Publications
Subgoal learning has improved student problem-solving performance in programming, but it has been tested for only oneto-two hours of instruction at a time. Our work pioneers implementing subgoal learning throughout an entire introductory programming course. In this paper we discuss the protocol that we used to identify subgoals for core programming procedures, present the subgoal labels created for the course, and outline the subgoal-labeled instructional materials that were designed for a Java-based course. To examine the effect of subgoal labeled materials on student performance in the course, we compared quiz and exam grades between students who learned using subgoal labels …
Grant Anon Minigames Extension, Justin Robbins
Grant Anon Minigames Extension, Justin Robbins
Theses/Capstones/Creative Projects
The Grant Anon system was designed to be a casualized version of the real-time strategy genre, a genre usually known for its difficulty and competitiveness because of Starcraft II, the most popular game in the genre. Grant Anon was designed as part of a capstone project, and this report details the extension that was created to add an additional element designed to make it easier for any player to enjoy Grant Anon: minigames. These minigames serve to reduce the skill needed to participate effectively in Grant Anon. This is accomplished by providing an alternative means of gaining an advantage over …
Cooperative Signaling Behavior: Signals For Open Source Project Health, Georg John Peter Link
Cooperative Signaling Behavior: Signals For Open Source Project Health, Georg John Peter Link
Information Systems and Quantitative Analysis Theses, Dissertations, and Student Creative Activity
The core contribution is a critique of signaling theory from investigating cooperative signaling behavior in the context of organizational engagement with open source projects. Open source projects display signals of project health which are used by organizations. Projects and organizations engage in cooperative signaling behavior when they work together to create signals. Signaling theory is critiqued in the cooperative context of organizational engagements with open source projects by describing how cooperative signaling behavior occurs in three processes: identifying, evaluating, and filtering new signals. The contribution is informed through engaged field research and interviews, which are presented as a thick description …
Expanding Controllability Of Hybrid Recommender Systems: From Positive To Negative Relevance, Behnam Rahdari, Chun-Hua Tsai, Peter Brusilovsky
Expanding Controllability Of Hybrid Recommender Systems: From Positive To Negative Relevance, Behnam Rahdari, Chun-Hua Tsai, Peter Brusilovsky
Information Systems and Quantitative Analysis Faculty Proceedings & Presentations
A hybrid recommender system fuses multiple data sources, usually with static and nonadjustable weightings, to deliver recommendations. One limitation of this approach is the problem to match user preference in all situations. In this paper, we present two user-controllable hybrid recommender interfaces, which offer a set of sliders to dynamically tune the impact of different sources of relevance on the final ranking. Two user studies were performed to design and evaluate the proposed interfaces.
Processing Narratives By Means Of Action Languages, Craig Olson
Processing Narratives By Means Of Action Languages, Craig Olson
Computer Science Theses, Dissertations, and Student Creative Activity
In this work we design a narrative understanding system Text2ALM that can be used in Question Answering domains. System Text2ALM utilizes an action language 𝒜ℒℳ to perform inferences on complex interactions of events described in narratives. The methodology that Text2ALM follows in its implementation was originally outlined by Yuliya Lierler, Daniela Inclezan, and Michael Gelfond in 2017 via a manual process, and this work serves as a proof of concept in a large-scale environment. Our system automates the conversion of a narrative to an 𝒜ℒℳ model containing facts about the narrative. We make use of the VerbNet lexicon that we …
A Communication Architecture For Crowd Management In Emergency And Disruptive Scenarios, Alfredo J. Perez, Sherali Zeadally
A Communication Architecture For Crowd Management In Emergency And Disruptive Scenarios, Alfredo J. Perez, Sherali Zeadally
Computer Science Faculty Publications
Crowd management aims to develop support infrastructures that can effectively manage crowds at any time. In emergency and disruptive scenarios this concept can minimize the risk to human life and to the infrastructure. We propose the Communication Architecture for Crowd Management (CACROM), which can support crowd management under emergency and disruptive scenarios. We identify, describe, and discuss the various components of the proposed architecture, and we briefly discuss open challenges in the design of crowd management systems for emergency and disruptive scenarios.
A Formal Approach To Circle Formation In Multi-Agent Systems, Rui Yang
A Formal Approach To Circle Formation In Multi-Agent Systems, Rui Yang
Computer Science Graduate Research Workshop
No abstract provided.
Conflict Resolution Using Α-Shapes For Distributed Robotic Sampling Of Ambient Phenomena In Initially Unknown Environments, Brad Woosley
Conflict Resolution Using Α-Shapes For Distributed Robotic Sampling Of Ambient Phenomena In Initially Unknown Environments, Brad Woosley
Computer Science Graduate Research Workshop
No abstract provided.
Dynamic Lazy Grounding In Answer Set Programming, Brian Hodges
Dynamic Lazy Grounding In Answer Set Programming, Brian Hodges
Computer Science Graduate Research Workshop
No abstract provided.
Automatic Program Rewriting For Non-Ground Answer Set Programs, Nicholas Hippen
Automatic Program Rewriting For Non-Ground Answer Set Programs, Nicholas Hippen
Computer Science Graduate Research Workshop
No abstract provided.
Automated Tool Support For Security Bug Repair In Mobile Applications, Larry Singleton
Automated Tool Support For Security Bug Repair In Mobile Applications, Larry Singleton
Computer Science Graduate Research Workshop
No abstract provided.
Tool Support For Recurring Code Change Inspection With Deep Learning, Krishna Teja Ayinala
Tool Support For Recurring Code Change Inspection With Deep Learning, Krishna Teja Ayinala
Computer Science Graduate Research Workshop
No abstract provided.
Analysis Of Subgoal Data In Computer Science Principles - Data Cleaning, Hari Ramilison
Analysis Of Subgoal Data In Computer Science Principles - Data Cleaning, Hari Ramilison
Computer Science Graduate Research Workshop
No abstract provided.
Co-Designing An Academic Focus Mobile Application, Mohammad Farhad Afzali
Co-Designing An Academic Focus Mobile Application, Mohammad Farhad Afzali
Computer Science Graduate Research Workshop
No abstract provided.
Processing Narratives By Means Of Action Languages, Craig Olson
Processing Narratives By Means Of Action Languages, Craig Olson
Computer Science Graduate Research Workshop
No abstract provided.
Intelligent And Human-Aware Decision Making For Semi-Autonomous Human Rehabilitation Assistance Using Modular Robots, Anoop Mishra
Intelligent And Human-Aware Decision Making For Semi-Autonomous Human Rehabilitation Assistance Using Modular Robots, Anoop Mishra
Computer Science Graduate Research Workshop
No abstract provided.
Machine Learning Techniques For Predicting Mobility-Related Perception Errors In Astronauts, Steven Belcher
Machine Learning Techniques For Predicting Mobility-Related Perception Errors In Astronauts, Steven Belcher
Computer Science Graduate Research Workshop
No abstract provided.
A Technique For Improving Classification Accuracy Of Highly Imbalanced And Sparse Datasets, Sindhura Bonthu
A Technique For Improving Classification Accuracy Of Highly Imbalanced And Sparse Datasets, Sindhura Bonthu
Computer Science Graduate Research Workshop
No abstract provided.
Learning From Imbalanced Datasets: Evaluating The Predictive Accuracy Of Minority Classes, Adithi Deborah Chakravarthy
Learning From Imbalanced Datasets: Evaluating The Predictive Accuracy Of Minority Classes, Adithi Deborah Chakravarthy
Computer Science Graduate Research Workshop
No abstract provided.
Two-Sided Matching For Mentor-Mentee Allocations—Algorithms And Manipulation Strategies, Christian Haas, Margeret Hall
Two-Sided Matching For Mentor-Mentee Allocations—Algorithms And Manipulation Strategies, Christian Haas, Margeret Hall
Information Systems and Quantitative Analysis Faculty Publications
In scenarios where allocations are determined by participant’s preferences, Two-Sided Matching is a well-established approach with applications in College Admissions, School Choice, and Mentor-Mentee matching problems. In such a context, participants in the matching have preferences with whom they want to be matched with. This article studies two important concepts in Two-Sided Matching: multiple objectives when finding a solution, and manipulation of preferences by participants. We use real data sets from a Mentor-Mentee program for the evaluation to provide insight on realistic effects and implications of the two concepts. In the first part of the article, we consider the quality …
Role Of Gender Differences On Individuals' Responses To Electronic Word-Of-Mouth In Social Interactions, Jonghak Sun, Seokwoo Song, Deanna House, Mintaek Kwon
Role Of Gender Differences On Individuals' Responses To Electronic Word-Of-Mouth In Social Interactions, Jonghak Sun, Seokwoo Song, Deanna House, Mintaek Kwon
Information Systems and Quantitative Analysis Faculty Publications
Considering the significant effects of electronic Word-of-Mouth (eWOM), this research explores how individuals respond to eWOM and whether gender differences exist in their perceptions. To do so, by employing the perspective of social interactions, we examine the proposed relationships are different between genders. We collected data using a survey and tested the hypotheses via path analysis. The results indicate that, gender differences were found specific to search effort, product involvement, and information credibility. Women with strong online ties had a tendency to be more involved in the product information and to find the information more credible. In addition, when women …
Design For Safety: Decreasing First Responder Health Risks Through Real-Time Bio-Sensor Alerts, Suzy Fendrick
Design For Safety: Decreasing First Responder Health Risks Through Real-Time Bio-Sensor Alerts, Suzy Fendrick
UNO Student Research and Creative Activity Fair
The focus of this research project is using the Design Thinking process to create an informative dashboard for first responders. Design Thinking involves empathizing with the user, defining the problems to be solved, ideation, creating prototypes, and testing. This iterate process focuses on the user, resulting in the most effective product possible. The dashboard will display real-time biosensor data from sensors in the first responders’ uniforms. This project is part of a larger project with the goal of vastly improving the safety of first responders during emergency hazardous material incidents.