Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Cybersecurity (23)
- Computer Science (11)
- Cloud computing (7)
- Scala (7)
- Computer Networking (6)
-
- "cloud computing" (5)
- Empirical studies (4)
- HCI (4)
- Human Computer Interaction (3)
- Java 8 (3)
- Machine learning (3)
- Streams (3)
- Accessibility (2)
- Artificial intelligence (2)
- Computer science (2)
- Deep learning (2)
- Devops (2)
- Disabilities (2)
- Functional programming (2)
- Machine Learning (2)
- Multi-paradigm programming (2)
- Quantum (2)
- Software engineering (2)
- Static analysis (2)
- UI/UX (2)
- Web development (2)
- 'space and time'; data science; 'schools of thought'; metaphysics; ontology (1)
- ARKit (1)
- Actor bug API usages (1)
- Actor bug differences (1)
- Publication
- Publication Type
- File Type
Articles 1 - 30 of 96
Full-Text Articles in Physical Sciences and Mathematics
Extending Import Detection Algorithms For Concept Import From Two To Three Biomedical Terminologies, Vipina K. Keloth, James Geller, Yan Chen, Julia Xu
Extending Import Detection Algorithms For Concept Import From Two To Three Biomedical Terminologies, Vipina K. Keloth, James Geller, Yan Chen, Julia Xu
Publications and Research
Background: While enrichment of terminologies can be achieved in different ways, filling gaps in the IS-A hierarchy backbone of a terminology appears especially promising. To avoid difficult manual inspection, we started a research program in 2014, investigating terminology densities, where the comparison of terminologies leads to the algorithmic discovery of potentially missing concepts in a target terminology. While candidate concepts have to be approved for import by an expert, the human effort is greatly reduced by algorithmic generation of candidates. In previous studies, a single source terminology was used with one target terminology.
Methods: In this paper, we are extending …
Responsive Web Design, Ashley Varon, David Karlins
Responsive Web Design, Ashley Varon, David Karlins
Publications and Research
Responsive web design is one of the most important topics in web. It can be one of the main reasons a website can be costing a business clients, and creating an effect on a business. The rise in popularity of mobile phones and tablets makes it crucial for a website to be designed to respond and adjust to different viewports. This project will research how important responsive web design is in 2020 and the positive or negative impacts it may have on the users, customers, and businesses. Companies must consider text size, layout, navigation, image sizes, and testing when designing …
Actor Concurrency Bugs: A Comprehensive Study On Symptoms, Root Causes, Api Usages, And Differences, Mehdi Bagherzadeh, Nicholas Fireman, Anas Shawesh, Raffi T. Khatchadourian
Actor Concurrency Bugs: A Comprehensive Study On Symptoms, Root Causes, Api Usages, And Differences, Mehdi Bagherzadeh, Nicholas Fireman, Anas Shawesh, Raffi T. Khatchadourian
Publications and Research
Actor concurrency is becoming increasingly important in the development of real-world software systems. Although actor concurrency may be less susceptible to some multithreaded concurrency bugs, such as low-level data races and deadlocks, it comes with its own bugs that may be different. However, the fundamental characteristics of actor concurrency bugs, including their symptoms, root causes, API usages, examples, and differences when they come from different sources are still largely unknown. Actor software development can significantly benefit from a comprehensive qualitative and quantitative understanding of these characteristics, which is the focus of this work, to foster better API documentations, development practices, …
Csci 49380/79526: Fundamentals Of Reactive Programming - Assignment 5, Raffi T. Khatchadourian
Csci 49380/79526: Fundamentals Of Reactive Programming - Assignment 5, Raffi T. Khatchadourian
Open Educational Resources
No abstract provided.
Collections In Scala, Raffi T. Khatchadourian
Collections In Scala, Raffi T. Khatchadourian
Open Educational Resources
No abstract provided.
Csci 49380/79526: Fundamentals Of Reactive Programming - Assignment 4, Raffi T. Khatchadourian
Csci 49380/79526: Fundamentals Of Reactive Programming - Assignment 4, Raffi T. Khatchadourian
Open Educational Resources
No abstract provided.
Csci 49380/79526: Fundamentals Of Reactive Programming - Assignment 3, Raffi T. Khatchadourian
Csci 49380/79526: Fundamentals Of Reactive Programming - Assignment 3, Raffi T. Khatchadourian
Open Educational Resources
No abstract provided.
Csci 49380/79526: Fundamentals Of Reactive Programming- Assignment 1, Raffi T. Khatchadourian
Csci 49380/79526: Fundamentals Of Reactive Programming- Assignment 1, Raffi T. Khatchadourian
Open Educational Resources
No abstract provided.
Csci 49380/79526: Fundamentals Of Reactive Programming- Syllabus, Raffi T. Khatchadourian
Csci 49380/79526: Fundamentals Of Reactive Programming- Syllabus, Raffi T. Khatchadourian
Open Educational Resources
No abstract provided.
Csci 49380/79526: Fundamentals Of Reactive Programming - Assignment 2, Raffi T. Khatchadourian
Csci 49380/79526: Fundamentals Of Reactive Programming - Assignment 2, Raffi T. Khatchadourian
Open Educational Resources
No abstract provided.
Systems And Network Administration - Introduction, Jimmy Richford, Nyc Tech-In-Residence Corps
Systems And Network Administration - Introduction, Jimmy Richford, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for CISC 4311: Systems and Network Administration (Fall 2020)
Cisc 4331 – Systems And Network Administration - Week 5, Jimmy Richford, Nyc Tech-In-Residence Corps
Cisc 4331 – Systems And Network Administration - Week 5, Jimmy Richford, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture 5 for CISC 4331 - Systems and Network Administration
Cisc 4331 – Systems And Network Administration - Week 3, Jimmy Richford, Nyc Tech-In-Residence Corps
Cisc 4331 – Systems And Network Administration - Week 3, Jimmy Richford, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture 3 for CISC 4331: Systems and Network Administration
Cisc 4331 – Systems And Network Administration Week 6, Jimmy Richford, Nyc Tech-In-Residence Corps
Cisc 4331 – Systems And Network Administration Week 6, Jimmy Richford, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture 6 for CISC 4331 - Systems and Network Administration
Cisc 4331 – Systems And Network Administration - Week 4, Jimmy Richford, Nyc Tech-In-Residence Corps
Cisc 4331 – Systems And Network Administration - Week 4, Jimmy Richford, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture 4 for CISC 4331 - Systems and Network Administration
Cisc 4331 – Systems And Network Administration - Week 2, Jimmy Richford, Nyc Tech-In-Residence Corps
Cisc 4331 – Systems And Network Administration - Week 2, Jimmy Richford, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture 2 for CISC 4331: Systems and Network Administration
Lecture - Csci 275: Linux Systems Administration And Security, Moe Hassan, Nyc Tech-In-Residence Corps
Lecture - Csci 275: Linux Systems Administration And Security, Moe Hassan, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for CSCI 275: Linux Systems Administration and Security
Chapter 3: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana
Chapter 3: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana
Open Educational Resources
No abstract provided.
Chapter 6: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana
Chapter 6: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana
Open Educational Resources
No abstract provided.
Chapter 7: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana
Chapter 7: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana
Open Educational Resources
No abstract provided.
Chapter 2: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana
Chapter 2: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana
Open Educational Resources
No abstract provided.
Chapter 1: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana
Chapter 1: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana
Open Educational Resources
No abstract provided.
Chapter 4: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana
Chapter 4: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana
Open Educational Resources
No abstract provided.
Chapter 5: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana
Chapter 5: Essential Aspects Of Physical Design And Implementation Of Relational Databases, Tatiana Malyuta, Ashwin Satyanarayana
Open Educational Resources
No abstract provided.
The Internet Never Forgets: Image-Based Sexual Abuse And The Workplace, John Schriner, Melody Lee Rood
The Internet Never Forgets: Image-Based Sexual Abuse And The Workplace, John Schriner, Melody Lee Rood
Publications and Research
Image-based sexual abuse (IBSA), commonly known as revenge pornography, is a type of cyberharassment that often results in detrimental effects to an individual's career and livelihood. Although there exists valuable research concerning cyberharassment in the workplace generally, there is little written about specifically IBSA and the workplace. This chapter examines current academic research on IBSA, the issues with defining this type of abuse, victim blaming, workplace policy, and challenges to victim-survivors' redress. The authors explore monetary motivation for websites that host revenge pornography and unpack how the dark web presents new challenges to seeking justice. Additionally, this chapter presents recommendations …
Inheritance Details In Scala, Raffi T. Khatchadourian
Inheritance Details In Scala, Raffi T. Khatchadourian
Open Educational Resources
No abstract provided.
A Semi-Automated Approach To Medical Image Segmentation Using Conditional Random Field Inference, Yu-Chi Hu
A Semi-Automated Approach To Medical Image Segmentation Using Conditional Random Field Inference, Yu-Chi Hu
Dissertations, Theses, and Capstone Projects
Medical image segmentation plays a crucial role in delivering effective patient care in various diagnostic and treatment modalities. Manual delineation of target volumes and all critical structures is a very tedious and highly time-consuming process and introduce uncertainties of treatment outcomes of patients. Fully automatic methods holds great promise for reducing cost and time, while at the same time improving accuracy and eliminating expert variability, yet there are still great challenges. Legally and ethically, human oversight must be integrated with ”smart tools” favoring a semi-automatic technique which can leverage the best aspects of both human and computer.
In this work …
Valid Time Rdf, Hsien-Tseng Wang
Valid Time Rdf, Hsien-Tseng Wang
Dissertations, Theses, and Capstone Projects
The Semantic Web aims at building a foundation of semantic-based data models and languages for not only manipulating data and knowledge, but also supporting decision making by machines. Naturally, time-varying data and knowledge are required in Semantic Web applications to incorporate time and further reason about it. However, the original specifications of Resource Description Framework (RDF) and Web Ontology Language (OWL) do not include constructs for handling time-varying data and knowledge. For simplicity, RDF model is confined to binary predicates, hence some form of reification is needed to represent higher-arity predicates. To this date, there are many proposals extending RDF …
Unclonable Secret Keys, Marios Georgiou
Unclonable Secret Keys, Marios Georgiou
Dissertations, Theses, and Capstone Projects
We propose a novel concept of securing cryptographic keys which we call “Unclonable Secret Keys,” where any cryptographic object is modified so that its secret key is an unclonable quantum bit-string whereas all other parameters such as messages, public keys, ciphertexts, signatures, etc., remain classical. We study this model in the authentication and encryption setting giving a plethora of definitions and positive results as well as several applications that are impossible in a purely classical setting.
In the authentication setting, we define the notion of one-shot signatures, a fundamental element in building unclonable keys, where the signing key not only …
Role Of Influence In Complex Networks, Nur Dean
Role Of Influence In Complex Networks, Nur Dean
Dissertations, Theses, and Capstone Projects
Game theory is a wide ranging research area; that has attracted researchers from various fields. Scientists have been using game theory to understand the evolution of cooperation in complex networks. However, there is limited research that considers the structure and connectivity patterns in networks, which create heterogeneity among nodes. For example, due to the complex ways most networks are formed, it is common to have some highly “social” nodes, while others are highly isolated. This heterogeneity is measured through metrics referred to as “centrality” of nodes. Thus, the more “social” nodes tend to also have higher centrality.
In this thesis, …