Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

2011

Institution
Keyword
Publication
Publication Type
File Type

Articles 31 - 60 of 2076

Full-Text Articles in Physical Sciences and Mathematics

Automated Detection Of Likely Design Flaws In Layered Architectures, Aditya Budi, - Lucia, David Lo, Lingxiao Jiang, Shaowei Wang Dec 2011

Automated Detection Of Likely Design Flaws In Layered Architectures, Aditya Budi, - Lucia, David Lo, Lingxiao Jiang, Shaowei Wang

David LO

Layered architecture prescribes a good principle for separating concerns to make systems more maintainable. One example of such layered architectures is the separation of classes into three groups: Boundary, Control, and Entity, which are referred to as the three analysis class stereotypes in UML. Classes of different stereotypes are interacting with one another, when properly designed, the overall interaction would be maintainable, flexible, and robust. On the other hand, poor design would result in less maintainable system that is prone to errors. In many software projects, the stereotypes of classes are often missing, thus detection of design flaws becomes non-trivial. …


A Speculative Approach To Parallelization In Particle Swarm Optimization, Matthew Gardner, Andrew Mcnabb, Kevin Seppi Dec 2011

A Speculative Approach To Parallelization In Particle Swarm Optimization, Matthew Gardner, Andrew Mcnabb, Kevin Seppi

Faculty Publications

Particle swarm optimization (PSO) has previously been parallelized primarily by distributing the computation corresponding to particles across multiple processors. In these approaches, the only benefit of additional processors is an increased swarm size. However, in many cases this is not efficient when scaled to very large swarm sizes (on very large clusters). Current methods cannot answer well the question: “How can 1000 processors be fully utilized when 50 or 100 particles is the most efficient swarm size?” In this paper we attempt to answer that question with a speculative approach to the parallelization of PSO that we refer to as …


Drift Detection Using Uncertainty Distribution Divergence, Patrick Lindstrom, Brian Mac Namee, Sarah Jane Delany Dec 2011

Drift Detection Using Uncertainty Distribution Divergence, Patrick Lindstrom, Brian Mac Namee, Sarah Jane Delany

Conference papers

Concept drift is believed to be prevalent inmost data gathered from naturally occurring processes andthus warrants research by the machine learning community.There are a myriad of approaches to concept drift handlingwhich have been shown to handle concept drift with varyingdegrees of success.

However, most approaches make the keyassumption that the labelled data will be available at nolabelling cost shortly after classification, an assumption whichis often violated. The high labelling cost in many domainsprovides a strong motivation to reduce the number of labelledinstances required to handle concept drift. Explicit detectionapproaches that do not require labelled instances to detectconcept drift show great …


Effective Security By Obscurity, John Christian Smith Dec 2011

Effective Security By Obscurity, John Christian Smith

John Christian Smith

"Security by obscurity" is a bromide which is frequently applied to undermine the perceived value of a certain class of techniques in security. This usage initially stemmed from applications and experience in the areas of cryptographic theory, and the open vs. closed source debate. Through the perceived absence of true security, the field of security by obscurity has not coalesced into a viable or recognizable approach for security practitioners. Consequently, this has resulted in these techniques going under-used and under-appreciated by defenders, while they continue to provide value to attackers, which creates an unfortunate information asymmetry. Exploring effective methods for …


A Hierarchical Image Processing Approach For Diagnostic Analysis Of Microcirculation Videos, Nazanin Mirshahi Dec 2011

A Hierarchical Image Processing Approach For Diagnostic Analysis Of Microcirculation Videos, Nazanin Mirshahi

Theses and Dissertations

Knowledge of the microcirculatory system has added significant value to the analysis of tissue oxygenation and perfusion. While developments in videomicroscopy technology have enabled medical researchers and physicians to observe the microvascular system, the available software tools are limited in their capabilities to determine quantitative features of microcirculation, either automatically or accurately. In particular, microvessel density has been a critical diagnostic measure in evaluating disease progression and a prognostic indicator in various clinical conditions. As a result, automated analysis of the microcirculatory system can be substantially beneficial in various real-time and off-line therapeutic medical applications, such as optimization of resuscitation. …


Quality Selection For Dynamic Adaptive Streaming Over Http With Scalable Video Coding, Travis L. Andelin Dec 2011

Quality Selection For Dynamic Adaptive Streaming Over Http With Scalable Video Coding, Travis L. Andelin

Theses and Dissertations

Video streaming on the Internet is increasingly using Dynamic Adaptive Streaming over HTTP (DASH), in which the video is converted into various quality levels and divided into two-second segments. A client can then adjust its video quality over time by choosing to download the appropriate quality level for a given segment using standard HTTP. Scalable Video Coding (SVC) is a promising enhancement to the DASH protocol. With SVC, segments are divided into subset bitstream blocks. At playback, blocks received for a given segment are combined to additively increase the current quality. Unlike traditional DASH, which downloads segments serially, this encoding …


User Choice Between Traditional And Computerized Methods: An Activity Perspective, Jun Sun Dec 2011

User Choice Between Traditional And Computerized Methods: An Activity Perspective, Jun Sun

Information Systems Faculty Publications and Presentations

Numerous computerized methods emerge to replace traditional methods in people’s personal, work and social lives, but many are hesitant to make the transition. This study examines the factors that influence human choice between different methods. According to Activity Theory, traditional and computerized methods are both tools that a person uses for a certain task. The situated experiences with various methods shape people’s attitude toward using them later in terms of tool readiness. The understanding leads to hypothesized relationships between user-, method- and task-specific factors and the dependent variable. The results from an empirical study support that method experiences have strong …


The Design And Evolution Of Zipcode, Anthony Skjellum, Steven G. Smith, Nathan E. Doss, Alvin Leung Dec 2011

The Design And Evolution Of Zipcode, Anthony Skjellum, Steven G. Smith, Nathan E. Doss, Alvin Leung

Steven D. Smith

Zipcode is a message-passing and process-management system that was designed for multicomputers and homogeneous networks of computers in order to support libraries and large-scale multicomputer software. The system has evolved significantly over the last five years, based on our experiences and identified needs. Features of Zipcode that were originally unique to it, were its simultaneous support of static process groups, communication contexts, and virtual topologies, forming the "mailer" data structure. Point-to-point and collective operations reference the underlying group, and use contexts to avoid mixing up messages. Recently, we have added "gather-send" and "receive-scatter" semantics, based on persistent Zipcode "invoices," both …


A Study Of Correlations Between The Definition And Application Of The Gene Ontology, Yuji Mo Dec 2011

A Study Of Correlations Between The Definition And Application Of The Gene Ontology, Yuji Mo

Computer and Electronics Engineering: Dissertations, Theses, and Student Research

When using the Gene Ontology (GO), nucleotide and amino acid sequences are annotated by terms in a structured and controlled vocabulary organized into relational graphs. The usage of the vocabulary (GO terms) in the annotation of these sequences may diverge from the relations defined in the ontology. We measure the consistency of the use of GO terms by comparing GO's defined structure to the terms' application. To do this, we first use synthetic data with different characteristics to understand how these characteristics influence the correlation values determined by various similarity measures. Using these results as a baseline, we found that …


Alignment-Free Methods And Its Applications, Ramez Mina Dec 2011

Alignment-Free Methods And Its Applications, Ramez Mina

Student Work

Comparing biological sequences remains one of the most vital activities in Bioinformatics. Comparing biological sequences would address the relatedness between species, and find similar structures that might lead to similar functions.

Sequence alignment is the default method, and has been used in the domain for over four decades. It gained a lot of trust, but limitations and even failure has been reported, especially with the new generated genomes. These new generated genomes have bigger size, and to some extent suffer errors. Such errors come mainly as a result from the sequencing machine. These sequencing errors should be considered when submitting …


Application Oriented Analysis Of Large Scale Datasets, Prashant Shivaji Paymal Dec 2011

Application Oriented Analysis Of Large Scale Datasets, Prashant Shivaji Paymal

Student Work

Diverse application areas, such as social network, epidemiology, and software engineering consist of systems of objects and their relationships. Such systems are generally modeled as graphs. Graphs consist of vertices that represent the objects, and edges that represent the relationships between them. These systems are data intensive and it is important to correctly analyze the data to obtain meaningful information. Combinatorial metrics can provide useful insights for analyzing these systems. In this thesis, we use the graph based metrics such as betweenness centrality, clustering coefficient, articulation points, etc. for analyzing instances of large change in evolving networks (Software Engineering), and …


A Scalable Architecture For Simplifying Full-Range Scientific Data Analysis, Wesley James Kendall Dec 2011

A Scalable Architecture For Simplifying Full-Range Scientific Data Analysis, Wesley James Kendall

Doctoral Dissertations

According to a recent exascale roadmap report, analysis will be the limiting factor in gaining insight from exascale data. Analysis problems that must operate on the full range of a dataset are among the most difficult. Some of the primary challenges in this regard come from disk access, data managment, and programmability of analysis tasks on exascale architectures. In this dissertation, I have provided an architectural approach that simplifies and scales data analysis on supercomputing architectures while masking parallel intricacies to the user. My architecture has three primary general contributions: 1) a novel design pattern and implmentation for reading multi-file …


Energy Functional For Nuclear Masses, Michael Giovanni Bertolli Dec 2011

Energy Functional For Nuclear Masses, Michael Giovanni Bertolli

Doctoral Dissertations

An energy functional is formulated for mass calculations of nuclei across the nuclear chart with major-shell occupations as the relevant degrees of freedom. The functional is based on Hohenberg-Kohn theory. Motivation for its form comes from both phenomenology and relevant microscopic systems, such as the three-level Lipkin Model. A global fit of the 17-parameter functional to nuclear masses yields a root- mean-square deviation of χ[chi] = 1.31 MeV, on the order of other mass models. The construction of the energy functional includes the development of a systematic method for selecting and testing possible functional terms. Nuclear radii are computed within …


Personality Dimensions And Temperaments Of Engineering Professors And Students – A Survey, Arif Raza, Zaka Ulmustafa, Luiz Fernando Capretz Dec 2011

Personality Dimensions And Temperaments Of Engineering Professors And Students – A Survey, Arif Raza, Zaka Ulmustafa, Luiz Fernando Capretz

Electrical and Computer Engineering Publications

This research work aims to study personality profiles and temperaments of Pakistani software engineering professors and students. In this survey we have collected personality profiles of 18 professors and 92 software engineering students. According to the Myers-Briggs Type Indicator (MBTI) instrument, the most prominent personality type among professors as well as among students is a combination of Introversion, Sensing, Thinking, and Judging (ISTJ). The study shows ITs (Introverts and Thinking) and IJs (Introverts and Judging) are the leading temperaments among the professors. About the students’ data, the results of the study indicate SJs (Sensing and Judging) and ISs (Introverts and …


Overview Of Contrast Data Mining As A Field And Preview Of An Upcoming Book, Guozhu Dong, James Bailey Dec 2011

Overview Of Contrast Data Mining As A Field And Preview Of An Upcoming Book, Guozhu Dong, James Bailey

Kno.e.sis Publications

This report provides an overview of the field of contrast data mining and its applications, and offers a preview of an upcoming book on the topic. The importance of contrasting is discussed and a brief survey is given covering the following topics: general definitions and terminology for contrast patterns, representative contrast pattern mining algorithms, applications of contrast mining for fundamental data mining tasks such as classification and clustering, applications of contrast mining in bioinformatics, medicine, blog analysis, image analysis and subgroup mining, results on contrast based dataset similarity measure, and on analyzing item interaction in contrast patterns, and open research …


The Mechanics Of Implementing Rss - Really Simple Syndication, Umakant Mishra Dec 2011

The Mechanics Of Implementing Rss - Really Simple Syndication, Umakant Mishra

Umakant Mishra

RSS is a format to update the frequently updated content in the Internet such as blog entries, news headlines etc. An RSS document contains full or summarized texts plus metadata such as publishing dates and authorship. RSS stands for Really simple Syndication. RSS feeds benefits publishers by letting them syndicate content automatically. A standardized XML file format is used to publish once and viewed by many different programs.


Dirty Tricks Played By The Domain Registrars, Umakant Mishra Dec 2011

Dirty Tricks Played By The Domain Registrars, Umakant Mishra

Umakant Mishra

With the popularity of Internet the number of websites are increasing in exponential rate. Everybody needs a website and every website needs a domain name and a hosting server. Domain names often represent a business organization or a commercial brand. Hence, changing domain names may affect business strategy and result in serious business loss. The domain registrars often take advantage of customers’ ignorance and weakness and trouble them to unduly extract more and more money.


The Dirty Tricks Played By Web Hosting Agencies, Umakant Mishra Dec 2011

The Dirty Tricks Played By Web Hosting Agencies, Umakant Mishra

Umakant Mishra

The number of websites are increasing in exponential rate. There are almost 50,000 websites being launched in every week and a similar number of web hosting companies are thriving to grab that opportunity. This has led to a cutthroat competition between the web hosting companies. The competition has gone beyond the ethical boundaries and many of them follow various unfair practices to attract and retain customers.


The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz M. Al-Debei Dec 2011

The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz M. Al-Debei

Dr. Mutaz M. Al-Debei

The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications, which are becoming increasingly accurate with the evolution of positioning techniques, have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility …


Mobile Phone Graph Evolution: Findings, Model And Interpretation, Siyuan Liu, Lei Li, Christos Faloutsos, Lionel M. Ni Dec 2011

Mobile Phone Graph Evolution: Findings, Model And Interpretation, Siyuan Liu, Lei Li, Christos Faloutsos, Lionel M. Ni

LARC Research Publications

What are the features of mobile phone graph along the time? How to model these features? What are the interpretation for the evolutional graph generation process? To answer the above challenging problems, we analyze a massive who-call-whom networks as long as a year, gathered from records of two large mobile phone communication networks both with 2 million users and 2 billion of calls. We examine the calling behavior distribution at multiple time scales (e.g. day, week, month and quarter), and find that the distribution is not only skewed with a heavy tail, but also changing at different time scales. How …


Stability And Classification Performance Of Feature Selection Techniques, Huanjing Wang, Taghi Khoshgoftaar, Qianhui Liang Dec 2011

Stability And Classification Performance Of Feature Selection Techniques, Huanjing Wang, Taghi Khoshgoftaar, Qianhui Liang

Computer Science Faculty Publications

Feature selection techniques can be evaluated based on either model performance or the stability (robustness) of the technique. The ideal situation is to choose a feature selec- tion technique that is robust to change, while also ensuring that models built with the selected features perform well. One domain where feature selection is especially important is software defect prediction, where large numbers of met- rics collected from previous software projects are used to help engineers focus their efforts on the most faulty mod- ules. This study presents a comprehensive empirical ex- amination of seven filter-based feature ranking techniques (rankers) applied to …


Outlier Detection Using Modified-Ranks And Other Variants, Huaming Huang, Kishan Mehrotra, Chilukuri K. Mohan Dec 2011

Outlier Detection Using Modified-Ranks And Other Variants, Huaming Huang, Kishan Mehrotra, Chilukuri K. Mohan

Electrical Engineering and Computer Science - Technical Reports

Rank based algorithms provide a promising approach for outlier detection, but currently used rank-based measures of outlier detection suffer from two deficiencies: first they take a large value from an object whose density is high even though the object may not be an outlier and second the distance between the object and its nearest cluster plays a mild role though its rank with respect to its neighbor. To correct for these deficiencies we introduce the concept of modified-rank and propose new algorithms for outlier detection based on this concept.


A Distributed Approach For Fault Mitigation In Large Scale Distributed Systems, Mina Jung Dec 2011

A Distributed Approach For Fault Mitigation In Large Scale Distributed Systems, Mina Jung

Electrical Engineering and Computer Science - Dissertations

In a large scale real-time distributed system, a large number of components and the time criticality of tasks can contribute to complex situations. Providing predictable and reliable service is a paramount interest in such a system. For example, a single point failure in an electric grid system may lead to a widespread power outage like the Northeast Blackout of 2003. System design and implementation address fault avoidance and mitigation. However, not all faults and failures can be removed during these phases, and therefore run-time fault avoidance and mitigation are needed during the operation. Timing constraints and predictability of the system …


Computing Inconsistency Measure Based On Paraconsistent Semantics, Pascal Hitzler, Yue Ma, Guilin Qi Dec 2011

Computing Inconsistency Measure Based On Paraconsistent Semantics, Pascal Hitzler, Yue Ma, Guilin Qi

Computer Science and Engineering Faculty Publications

Measuring inconsistency in knowledge bases has been recognized as an important problem in several research areas. Many methods have been proposed to solve this problem and a main class of them is based on some kind of paraconsistent semantics. However, existing methods suffer from two limitations: (i) they are mostly restricted to propositional knowledge bases; (ii) very few of them discuss computational aspects of computing inconsistency measures. In this article, we try to solve these two limitations by exploring algorithms for computing an inconsistency measure of first-order knowledge bases. After introducing a four-valued semantics for first-order logic, we define an …


Report On Advances In The Field Of Artificial Intelligence Attributed To Captcha, Craig M. Schow Dec 2011

Report On Advances In The Field Of Artificial Intelligence Attributed To Captcha, Craig M. Schow

All Graduate Plan B and other Reports, Spring 1920 to Spring 2023

A CAPTCHA is a specialized human interaction proof that exploits gaps between human and computer recognition abilities. By design, the hardness of a CAPTCHA is based on the difficulty of advancing the underlying artificial intelligence [AI] technology to a level that eliminates any exploitable gap. Due to this fact computer scientists have concluded that the widespread use of CAPTCHA would accelerate research in the underlying fields of AI eventually leading to near-­‐human capabilities in certain AI systems. Despite these predictions no attempt has been made to identify advances in AI which can be attributed to the use of CAPTCHA.

The …


Design And Implementation Of An Open Framework For Ubiquitous Carbon Footprint Calculator Applications, Farzana Rahman, Casey O'Brien, Sheikh Iqbal Ahamed, He Zhang, Lin Liu Dec 2011

Design And Implementation Of An Open Framework For Ubiquitous Carbon Footprint Calculator Applications, Farzana Rahman, Casey O'Brien, Sheikh Iqbal Ahamed, He Zhang, Lin Liu

Mathematics, Statistics and Computer Science Faculty Research and Publications

As climate change is becoming an important global issue, more and more people are beginning to pay attention to reducing greenhouse gas emissions. To measure personal or household carbon dioxide emission, there are already plenty of carbon footprint calculators available on the web. Most of these calculators use quantitative models to estimate carbon emission caused by a user's activities. Although these calculators can promote public awareness regarding carbon emission due to an individual's behavior, there are concerns about the consistency and transparency of these existing CO2 calculators. Apart from a small group of smart phone based carbon footprint calculator …


Sensitivity Of The Frozen/Melted Basal Boundary To Perturbations Of Basal Traction And Geothermal Heat Flux : Isunnguata Sermia, Western Greenland, Douglas John Brinkerhoff, Toby Warren Meierbachtol, Jesse Johnson, Joel T. Harper Dec 2011

Sensitivity Of The Frozen/Melted Basal Boundary To Perturbations Of Basal Traction And Geothermal Heat Flux : Isunnguata Sermia, Western Greenland, Douglas John Brinkerhoff, Toby Warren Meierbachtol, Jesse Johnson, Joel T. Harper

Computer Science Faculty Publications

A full-stress, thermomechanically coupled, numerical model is used to explore the interaction between basal thermal conditions and motion of a terrestrially terminating section of the west Greenland ice sheet. The model domain is a two-dimensional flowline profile extending from the ice divide to the margin. We use data-assimilation techniques based on the adjoint model in order to optimize the basal traction field, minimizing the difference between modeled and observed surface velocities. We monitor the sensitivity of the frozen/melted boundary (FMB) to changes in prescribed geothermal heat flux and sliding speed by applying perturbations to each of these parameters. The FMB …


Modeling 5 Years Of Subglacial Lake Activity In The Macayeal Ice Stream (Antarctica) Catchment Through Assimilation Of Icesat Laser Altimetry, Sasha P. Carter, Helen A. Fricker, Donald D. Blankenship, Jesse V. Johnson, William Lipscomb, Stephen F. Price, Duncan A. Young Dec 2011

Modeling 5 Years Of Subglacial Lake Activity In The Macayeal Ice Stream (Antarctica) Catchment Through Assimilation Of Icesat Laser Altimetry, Sasha P. Carter, Helen A. Fricker, Donald D. Blankenship, Jesse V. Johnson, William Lipscomb, Stephen F. Price, Duncan A. Young

Computer Science Faculty Publications

Subglacial lakes beneath Antarctica’s fast-moving ice streams are known to undergo ~1km3 volume changes on annual timescales. Focusing on the MacAyeal Ice Stream (MacIS) lake system, we create a simple model for the response of subglacial water distribution to lake discharge events through assimilation of lake volume changes estimated from Ice, Cloud and land Elevation Satellite (ICESat) laser altimetry. We construct a steady-state water transport model in which known subglacial lakes are treated as either sinks or sources depending on the ICESat-derived filling or drainingrates. The modeled volume change rates of five large subglacial lakes in the downstream portion …


Powersearch: Augmenting Mobile Phone Search Through Personalization, Xiangyu Liu Dec 2011

Powersearch: Augmenting Mobile Phone Search Through Personalization, Xiangyu Liu

Computer Science and Computer Engineering Undergraduate Honors Theses

Cell phone has become a fundamental element of people's life. People use it to call each other, browse websites, send text messages, etc. Among all the functionalities, the most important and frequently used is the search functionality. Based on ComScore, in July 2008, Google was estimated to host 235 millions searches per day. However, unlike the search on desktop, the search on cell phone has one critical constrain: battery. Cell phone performing a normal Google search, the battery drains very fast. The reason is that when sending a query to and fetching the results from Google, cell phone keeps communicating …


Automated Pollen Image Classification, Nicholas Quentin Haas Dec 2011

Automated Pollen Image Classification, Nicholas Quentin Haas

Masters Theses

This Master of Science thesis reviews previous research, proposes a method anddemonstrates proof-of-concept software for the automated matching of pollen grainimages to satisfy degree requirements at the University of Tennessee. An ideal imagesegmentation algorithm and shape representation data structure is selected, alongwith a multi-phase shape matching system. The system is shown to be invariantto synthetic image translation, rotation, and to a lesser extent global contrast andintensity changes. The proof-of-concept software is used to demonstrate how pollengrains can be matched to images of other pollen grains, stored in a database, thatshare similar features with up to a 75% accuracy rate.