Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Analytical models (2)
- Coalgebra (2)
- Distributed systems (2)
- Graph theory (2)
- Modal logic (2)
-
- Stochastic processes (2)
- Wireless sensor networks (2)
- 3D audio (1)
- Accuracy (1)
- Ad hoc networks (1)
- Adjustable range (1)
- Aggregates (1)
- Algebraic theories (1)
- Animation (1)
- Antarctica (1)
- Arbitrary node lifetime distributions (1)
- Area coverage (1)
- Art education (1)
- Asthma (1)
- Astronomy (1)
- Auditory Scene Analysis (1)
- Baseball (1)
- Baserunning (1)
- Bayesian modeling (1)
- Big data (1)
- Binaural spatialization (1)
- Book indexing (1)
- Botnet proliferation (1)
- Bro (1)
- Categorical Semantics (1)
- Publication
-
- Computer Science Faculty Publications (6)
- MIS/OM/DS Faculty Publications (4)
- Engineering Faculty Articles and Research (3)
- CSE Conference and Workshop Papers (2)
- Electrical and Computer Engineering Publications (2)
-
- Masters Theses 1911 - February 2014 (2)
- Statistical and Data Sciences: Faculty Publications (2)
- Computer Science: Faculty Publications and Other Works (1)
- Computer Sciences and Electrical Engineering Faculty Research (1)
- Department of Computer Graphics Technology Degree Theses (1)
- Mathematics, Statistics, and Computer Science Honors Projects (1)
- Other (1)
- Pharmacy and Nursing Student Research and Evidence-Based Medicine Poster Session (1)
- Publications and Research (1)
Articles 1 - 28 of 28
Full-Text Articles in Physical Sciences and Mathematics
Fuzzy-Excom Software Project Risk Assessment, Luiz Fernando Capretz, Ekananta Manalif, Ali Bou Nassif, Danny Ho
Fuzzy-Excom Software Project Risk Assessment, Luiz Fernando Capretz, Ekananta Manalif, Ali Bou Nassif, Danny Ho
Electrical and Computer Engineering Publications
A software development project can be considered to be risky project due to the uncertainty of the information (customer requirements), the complexity of the process, and the intangible nature of the product. Under these conditions, risk management in software development projects is mandatory, but often it is difficult and expensive to implement.
Expert COCOMO is an efficient approach to software project risk management, which leverages existing knowledge and expertise from previous effort estimation activities to assess the risk in a new software project. However, the original method has a limitation because it cannot effectively deal with imprecise and uncertain inputs …
Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns
Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns
MIS/OM/DS Faculty Publications
We examine the effects of human resource management (HRM) practices (e.g., career development, social support, compensation, and security) on IT professionals‟ job search behavior. Job search is a relatively novel dependent variable in studies of voluntary withdrawal behavior, in general, and for IT professionals, in particular. From a universalistic perspective, HRM practices individually and in combination exhibit independently additive effects on job search behavior. Our study contrasts this perspective with configurational theory, hypothesizing that proposed idealtype configurations of HRM practices have synergistic effects on job search behavior. We contribute to the IT and broader HRM literature by theoretically explicating and …
Temporal Data Mining Of Uncertain Water Reservoir Data, Abhinaya Mohan, Peter Revesz
Temporal Data Mining Of Uncertain Water Reservoir Data, Abhinaya Mohan, Peter Revesz
CSE Conference and Workshop Papers
This paper describes the challenges of data mining uncertain water reservoir data based on past human operations in order to learn from them reservoir policies that can be automated for the future operation of the water reservoirs. Records of human operations of water reservoirs often contain uncertain data. For example, the recorded amounts of water released and retained in the water reservoirs are typically uncertain, i.e., they are bounded by some minimum and maximum values. Moreover, the time of release is also uncertain, i.e., typically only monthly or weekly amounts are recorded. To increase the effectiveness of data mining of …
Efficacy Of Smartphone Technology On Improving Asthma Control And Compliance, Dustin Nelson, Lauren Macks, Gregory Paine, Forouzan Poursoltan, Tirhas Mekonnen, Melody L. Hartzler
Efficacy Of Smartphone Technology On Improving Asthma Control And Compliance, Dustin Nelson, Lauren Macks, Gregory Paine, Forouzan Poursoltan, Tirhas Mekonnen, Melody L. Hartzler
Pharmacy and Nursing Student Research and Evidence-Based Medicine Poster Session
Asthma is the fifth most costly disease in the U.S., estimated to cost over $50 billion annually. This large cost is due to the large number of hospitalizations, ER visits, and doctor’s office visits. Improving patient adherence to asthma medications would decrease these costs significantly by preventing most hospital and doctor’s office visits. AsthmaSense® is a free to download smartphone application available on both iTunes and Android marketplaces. AsthmaSense® will allow patients to record when they take their medications, as well as send them reminders to take their medications.
Sense Beauty Via Face, Dressing, And/Or Voice, Tam Nguyen, Si Liu, Bingbing Ni, Jun Tan, Yong Rui, Shuicheng Yan
Sense Beauty Via Face, Dressing, And/Or Voice, Tam Nguyen, Si Liu, Bingbing Ni, Jun Tan, Yong Rui, Shuicheng Yan
Computer Science Faculty Publications
Discovering the secret of beauty has been the pursuit of artists and philosophers for centuries. Nowadays, the computational model for beauty estimation has been actively explored in computer science community, yet with the focus mainly on facial features. In this work, we perform a comprehensive study of female attractiveness conveyed by single/multiple modalities of cues, i.e., face, dressing, and/or voice, and aim to uncover how different modalities individually and collectively affect the human sense of beauty. To this end, we collect the first Multi-Modality Beauty (M2B) dataset in the world for female attractiveness study, which is thoroughly annotated …
Hi, Magic Closet, Tell Me What To Wear!, Si Liu, Tam Nguyen, Jiashi Feng, Meng Wang, Shuicheng Yan
Hi, Magic Closet, Tell Me What To Wear!, Si Liu, Tam Nguyen, Jiashi Feng, Meng Wang, Shuicheng Yan
Computer Science Faculty Publications
In this demo, we present a practical system, "magic closet," for automatic occasion-oriented clothing pairing. Given a user-input occasion, e.g., wedding or shopping, the magic closet intelligently and automatically pairs the user-specified reference clothing (upper body or lower body) with the most suitable one from online shops. Two key criteria are explicitly considered for the magic closet system. One criterion is to dress properly, e.g., compared to suit pants, it is more decent to wear a cocktail dress for a banquet occasion. The other criterion is to dress aesthetically, e.g., a red T-shirt matches better with white pants than with …
3dme: 3d Media Express From Rgb-D Images, Tam Nguyen, Lusong Li, Jun Tan, Shuicheng Yan
3dme: 3d Media Express From Rgb-D Images, Tam Nguyen, Lusong Li, Jun Tan, Shuicheng Yan
Computer Science Faculty Publications
Considering the continuously increasing availability and accessibility of 3D media and the depth camera such as Kinect, we demonstrate an innovative 3D media system called 3DME. The objective of this demo is three-fold.
First, the demo exhibits the creation of 3D images from RGB-D images. Second, 3DME allows a user to insert impressive effects to the produced 3D content. Last but not least, our demo is one of the first attempts toward advertising with 3D content.
Principles For Conducting Critical Realist Case Study Research In Information Systems, Donald E. Wynn, Clay K. Williams
Principles For Conducting Critical Realist Case Study Research In Information Systems, Donald E. Wynn, Clay K. Williams
MIS/OM/DS Faculty Publications
Critical realism is emerging as a viable philosophical paradigm for conducting social science research, and has been proposed as an alternative to the more prevalent paradigms of positivism and interpretivism. Few papers, however, have offered clear guidance for applying this philosophy to actual research methodologies. Under critical realism, a causal explanation for a given phenomenon is inferred by explicitly identifying the means by which structural entities and contextual conditions interact to generate a given set of events. Consistent with this view of causality, we propose a set of methodological principles for conducting and evaluating critical realism-based explanatory case study research …
Defining Industry Expectations And Misconceptions Of Art And Technology Co-Creativity, Vanessa C. Brasfield
Defining Industry Expectations And Misconceptions Of Art And Technology Co-Creativity, Vanessa C. Brasfield
Department of Computer Graphics Technology Degree Theses
The primary purpose of this study was to establish whether or not students and industry professionals share the same views about what students should be learning in animation education, what skills are necessary, and whether or not students graduating with a bachelor’s degree would be adequately prepared for an entry level position. To establish where misconceptions lie, surveys were issued to three groups: undergraduate students, post-graduate students, and industry professionals. These surveys were then analyzed using paired t-test for validation and question relevance, and ANOVA models to establish whether or not groups shared viewpoints. These data established significance within the …
Stochastic Analysis Of Horizontal Ip Scanning, Derek Leonard, Zhongmei Yao, Xiaoming Wang, Dmitri Loguinov
Stochastic Analysis Of Horizontal Ip Scanning, Derek Leonard, Zhongmei Yao, Xiaoming Wang, Dmitri Loguinov
Computer Science Faculty Publications
Intrusion Detection Systems (IDS) have become ubiquitous in the defense against virus outbreaks, malicious exploits of OS vulnerabilities, and botnet proliferation. As attackers frequently rely on host scanning for reconnaissance leading to penetration, IDS is often tasked with detecting scans and preventing them. However, it is currently unknown how likely an IDS is to detect a given Internet-wide scan pattern and whether there exist sufficiently fast scan techniques that can remain virtually undetectable at large-scale. To address these questions, we propose a simple analytical model for the window-expiration rules of popular IDS tools (i.e., Snort and Bro) and utilize a …
On Superposition Of Heterogeneous Edge Processes In Dynamic Random Graphs, Zhongmei Yao, Daren B. H. Cline, Dmitri Loguinov
On Superposition Of Heterogeneous Edge Processes In Dynamic Random Graphs, Zhongmei Yao, Daren B. H. Cline, Dmitri Loguinov
Computer Science Faculty Publications
This paper builds a generic modeling framework for analyzing the edge-creation process in dynamic random graphs in which nodes continuously alternate between active and inactive states, which represent churn behavior of modern distributed systems. We prove that despite heterogeneity of node lifetimes, different initial out-degree, non-Poisson arrival/failure dynamics, and complex spatial and temporal dependency among creation of both initial and replacement edges, a superposition of edge-arrival processes to a live node under uniform selection converges to a Poisson process when system size becomes sufficiently large. Due to the convoluted dependency and non-renewal nature of various point processes, this result significantly …
Maximizing Network Lifetime On The Line With Adjustable Sensing Ranges, Amotz Bar-Noy, Ben Baumer
Maximizing Network Lifetime On The Line With Adjustable Sensing Ranges, Amotz Bar-Noy, Ben Baumer
Statistical and Data Sciences: Faculty Publications
Given n sensors on a line, each of which is equipped with a unit battery charge and an adjustable sensing radius, what schedule will maximize the lifetime of a network that covers the entire line? Trivially, any reasonable algorithm is at least a 1/2-approximation, but we prove tighter bounds for several natural algorithms. We focus on developing a linear time algorithm that maximizes the expected lifetime under a random uniform model of sensor distribution. We demonstrate one such algorithm that achieves an average-case approximation ratio of almost 0.9. Most of the algorithms that we consider come from a family based …
Open Source Classroom Polling (Interactive Response) Facility, Ronald I. Greenberg
Open Source Classroom Polling (Interactive Response) Facility, Ronald I. Greenberg
Computer Science: Faculty Publications and Other Works
The contents of the UNIX directory resulting from unzipping the .zip file provide a demonstration of a simple polling facililty that instructors can use in class any time that students have access to a web browser. This is a good way to have students work problems and see to what extent they are converging towards correct answers.
Unlike other polling facilities, this one is completely free without any restrictions on number of simultaneous users, etc. It also allows a feature most polling facilities do not in that it may be used for completely free-form answers, and the instructor can still …
A Paleoclimate Modeling Experiment To Calculate The Soil Carbon Respiration Flux For The Paleocene-Eocene Thermal Maximum, David M. Tracy
A Paleoclimate Modeling Experiment To Calculate The Soil Carbon Respiration Flux For The Paleocene-Eocene Thermal Maximum, David M. Tracy
Masters Theses 1911 - February 2014
The Paleocene-Eocene Thermal Maximum (PETM) (55 million years ago) stands as the largest in a series of extreme warming (hyperthermal) climatic events, which are analogous to the modern day increase in greenhouse gas concentrations. Orbitally triggered (Lourens et al., 2005, Galeotti et al., 2010), the PETM is marked by a large (-3‰) carbon isotope excursion (CIE). Hypothesized to be methane driven, Zeebe et al., (2009) noted that a methane based release would only account for 3.5°C of warming. An isotopically heavier carbon, such as that of soil and C3 plants, has the potential to account for the …
Large Scale Image Retrieval From Books, Mao Zhao
Large Scale Image Retrieval From Books, Mao Zhao
Masters Theses 1911 - February 2014
Search engines play a very important role in daily life. As multimedia product becomes more and more popular, people have developed search engines for images and videos. In the first part of this thesis, I propose a prototype of a book image search engine. I discuss tag representation for the book images, as well as the way to apply the probabilistic model to generate image tags. Then I propose the random walk refinement method using tag similarity graph. The image search system is built on the Galago search engine developed in UMASS CIIR lab.
Consider the large amount of data …
Sensing Through The Continent: Towards Monitoring Migratory Birds Using Cellular Sensor Networks, David Anthony, William P. Bennett, Mehmet C. Vuran, Matthew B. Dwyer, Sebastian Elbaum, Anne Lacy, Mike Engels, Walter Wehtje
Sensing Through The Continent: Towards Monitoring Migratory Birds Using Cellular Sensor Networks, David Anthony, William P. Bennett, Mehmet C. Vuran, Matthew B. Dwyer, Sebastian Elbaum, Anne Lacy, Mike Engels, Walter Wehtje
CSE Conference and Workshop Papers
This paper presents CraneTracker, a novel sensor platform for monitoring migratory birds. The platform is designed to monitor Whooping Cranes, an endangered species that conducts an annual migration of 4, 000 km between southern Texas and north-central Canada. CraneTracker includes a rich set of sensors, a multi-modal radio, and power control circuitry for sustainable, continental-scale information delivery during migration. The need for large-scale connectivity motivates the use of cellular technology in low-cost sensor platforms augmented by a low-power transceiver for ad-hoc connectivity. This platform leads to a new class of cellular sensor networks (CSNs) for time-critical and mobile sensing applications. …
Evolution Of Software Engineers’ Personality Profile, Daniel Varona, Luiz Fernando Capretz, Arif Raza
Evolution Of Software Engineers’ Personality Profile, Daniel Varona, Luiz Fernando Capretz, Arif Raza
Electrical and Computer Engineering Publications
The Myers-Briggs Type Indicator (MBTI) has been applied to several studies that explore various dimensions of human factors in software engineering. Accordingly, this work reviews the results of these studies to explore existing trends. In order to attain a greater understanding of human resources in the software industry, we have reviewed sixteen studies that had been performed between 1985 and 2011. This review concludes that the changes in the complexity of software processes and products have created new roles and demanded new skills for software engineers.
Significantly Reducing The Processing Times Of High-Speed Photometry Data Sets Using A Distributed Computing Model, Paul Doyle, Fredrick Mtenzi, Niall Smith, Adrian Collins, Brendan O'Shea
Significantly Reducing The Processing Times Of High-Speed Photometry Data Sets Using A Distributed Computing Model, Paul Doyle, Fredrick Mtenzi, Niall Smith, Adrian Collins, Brendan O'Shea
Other
The scientific community is in the midst of a data analysis crisis. The increasing capacity of scientific CCD instrumentation and their falling costs is contributing to an explosive generation of raw photometric data. This data must go through a process of cleaning and reduction before it can be used for high precision photometric analysis. Many existing data processing pipelines either assume a relatively small dataset or are batch processed by a High Performance Computing centre. A radical overhaul of these processing pipelines is required to allow reduction and cleaning rates to process terabyte sized datasets at near capture rates using …
On Binaural Spatialization And The Use Of Gpgpu For Audio Processing, Davide Andrea Mauro Phd
On Binaural Spatialization And The Use Of Gpgpu For Audio Processing, Davide Andrea Mauro Phd
Computer Sciences and Electrical Engineering Faculty Research
3D recordings and audio, namely techniques that aim to create the perception of sound sources placed anywhere in 3 dimensional space, are becoming an interesting resource for composers, live performances and augmented reality. This thesis focuses on binaural spatialization techniques.
We will tackle the problem from three different perspectives. The first one is related to the implementation of an engine for audio convolution, this is a real implementation problem where we will confront with a number of already available systems trying to achieve better results in terms of performances. General Purpose computing on Graphic Processing Units (GPGPU) is a promising …
The Design, Implementation, And Evaluation Of A Pointing Device For A Wearable Computer, Andres Calvo, Gregory Burnett, Victor Finomore, Saverio Perugini
The Design, Implementation, And Evaluation Of A Pointing Device For A Wearable Computer, Andres Calvo, Gregory Burnett, Victor Finomore, Saverio Perugini
Computer Science Faculty Publications
U.S. Air Force special tactics operators at times use small wearable computers (SWCs) for mission objectives. The primary pointing device of a SWC is either a touchpad or trackpoint, embedded into the chassis of the SWC. In situations where the user cannot directly interact with these pointing devices, the utility of the SWC is decreased. We developed a pointing device called the G3 that can be used for SWCs used by operators. The device utilizes gyroscopic sensors attached to the user’s index finger to move the computer cursor according to the angular velocity of his finger. We showed that, as …
Beefmoves: Dissemination, Diversity, And Dynamics Of English Borrowings In A German Hip Hop Forum, Matt Garley, Julia Hockenmaier
Beefmoves: Dissemination, Diversity, And Dynamics Of English Borrowings In A German Hip Hop Forum, Matt Garley, Julia Hockenmaier
Publications and Research
We investigate how novel English-derived words (anglicisms) are used in a German-language Internet hip hop forum, and what factors contribute to their uptake.
Ancillary Service Capacity Optimization For Both Electric Power Suppliers And Independent System Operator, Lijian Chen, Dengfeng Sun, Guang Li
Ancillary Service Capacity Optimization For Both Electric Power Suppliers And Independent System Operator, Lijian Chen, Dengfeng Sun, Guang Li
MIS/OM/DS Faculty Publications
Ancillary Services (AS) in electric power industry are critical to support the transmission of energy from generators to load demands while maintaining reliable operation of transmission systems in accordance with good utility practice. The ancillary services are procured by the independent system operator (ISO) through a process called the market clearing process which can be modeled by the partial equilibrium from the ends of ISO. There are two capacity optimization problems for both Market participants (MP) and Independent System Operator (ISO). For a market participant, the firm needs to determine the capacity allocation plan for various AS to pursue operating …
Irish Cios’ Influence On Technology Innovation And It-Business Alignment, Harvey Enns, Joseph J. Mcdonagh
Irish Cios’ Influence On Technology Innovation And It-Business Alignment, Harvey Enns, Joseph J. Mcdonagh
MIS/OM/DS Faculty Publications
Technology is the driving force behind many of today’s new products, services, and cost-cutting measures. However, there are gaps in our understanding about how technological innovation is fostered and nurtured in organizations.
Part of the answer is to examine how Chief Information Officers (CIOs) exercise influence regarding technological innovation in organizations. This is particularly important since the CIO is the head of technology in organizations, an important source of technological innovation. This article draws on an established executive influence framework to demonstrate how Irish CIOs are able to solidify Information Technology’s (IT’s) contribution to technological innovation via relational means. Most …
Strongly Complete Logics For Coalgebras, Alexander Kurz, Jiří Rosický
Strongly Complete Logics For Coalgebras, Alexander Kurz, Jiří Rosický
Engineering Faculty Articles and Research
Coalgebras for a functor model different types of transition systems in a uniform way. This paper focuses on a uniform account of finitary logics for set-based coalgebras. In particular, a general construction of a logic from an arbitrary set-functor is given and proven to be strongly complete under additional assumptions. We proceed in three parts.
Part I argues that sifted colimit preserving functors are those functors that preserve universal algebraic structure. Our main theorem here states that a functor preserves sifted colimits if and only if it has a finitary presentation by operations and equations. Moreover, the presentation of the …
Coalgebraic Logics (Dagstuhl Seminar 12411), Ernst-Erich Doberkat, Alexander Kurz
Coalgebraic Logics (Dagstuhl Seminar 12411), Ernst-Erich Doberkat, Alexander Kurz
Engineering Faculty Articles and Research
This report documents the program and the outcomes of Dagstuhl Seminar 12411 “Coalgebraic Logics”. The seminar deals with recent developments in the area of coalgebraic logic, a branch of logics which combines modal logics with coalgebraic semantics. Modal logic finds its uses when reasoning about behavioural and temporal properties of computation and communication, coalgebras have evolved into a general theory of systems. Consequently, it is natural to combine both areas for a mathematical description of system specification. Coalgebraic logics are closely related to the broader categories semantics/formal methods and verification/logic.
Parsing The Relationship Between Baserunning And Batting Abilities Within Lineups, Ben S. Baumer, James Piette, Brad Null
Parsing The Relationship Between Baserunning And Batting Abilities Within Lineups, Ben S. Baumer, James Piette, Brad Null
Statistical and Data Sciences: Faculty Publications
A baseball team's offensive prowess is a function of two types of abilities: batting and baserunning. While each has been studied extensively in isolation, the effects of their interaction is not well understood. We model offensive output as a scalar function f of an individual player's batting and baserunning profile z. Each of these profiles is in turn estimated from Retrosheet data using heirarchical Bayesian models. We then use the SimulOutCome simulation engine as a method to generate values of f(z) over a fine grid of points. Finally, for each of several methods of taking the extra base, we graphically …
Characterizing Conflict In Wikipedia, Nathaniel Miller
Characterizing Conflict In Wikipedia, Nathaniel Miller
Mathematics, Statistics, and Computer Science Honors Projects
Wikipedia serves as the Internet's most widely viewed reference. In order to ensure its success, editors who create and maintain articles must resolve conflicts over appropriate article content. Previous research has measured Wikipedia conflict at two levels: single articles and categories of pages. I observe conflicts within small groups of articles, identifying their frequency, size, and intensity. Additionally, I identify individual conflicts spanning multiple articles and effects of conflict upon users' editing habits. I analyze cross-article conflict in three stages. First, I cluster a group of 1.4 million Wikipedia articles. Next, I find individual user conflicts within each article cluster …
Completeness For The Coalgebraic Cover Modality, Clemens Kupke, Alexander Kurz, Yde Venema
Completeness For The Coalgebraic Cover Modality, Clemens Kupke, Alexander Kurz, Yde Venema
Engineering Faculty Articles and Research
We study the finitary version of the coalgebraic logic introduced by L. Moss. The syntax of this logic, which is introduced uniformly with respect to a coalgebraic type functor, required to preserve weak pullbacks, extends that of classical propositional logic with a so-called coalgebraic cover modality depending on the type functor. Its semantics is defined in terms of a categorically defined relation lifting operation.
As the main contributions of our paper we introduce a derivation system, and prove that it provides a sound and complete axiomatization for the collection of coalgebraically valid inequalities. Our soundness and completeness proof is algebraic, …