Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (9)
- City University of New York (CUNY) (5)
- Boise State University (2)
- Liberty University (2)
- Montclair State University (2)
-
- Brigham Young University (1)
- Central Washington University (1)
- Chapman University (1)
- Chulalongkorn University (1)
- Harrisburg University of Science and Technology (1)
- Illinois State University (1)
- James Madison University (1)
- Louisiana State University (1)
- Michigan Technological University (1)
- Old Dominion University (1)
- Pepperdine University (1)
- Portland State University (1)
- Rochester Institute of Technology (1)
- Southern Adventist University (1)
- Stony Brook University (1)
- Technological University Dublin (1)
- The University of Akron (1)
- United Arab Emirates University (1)
- University of Arkansas, Fayetteville (1)
- University of Minnesota Law School (1)
- University of Nebraska at Omaha (1)
- University of Tennessee, Knoxville (1)
- University of Texas at Tyler (1)
- West Virginia University (1)
- Keyword
-
- Programming (3)
- Static analysis (3)
- Deep learning (2)
- Empirical studies (2)
- Java 8 (2)
-
- Program analysis (2)
- Raspberry Pi (2)
- Software (2)
- Streams (2)
- Actor bug API usages (1)
- Actor bug differences (1)
- Actor bug root causes (1)
- Actor bug symptoms (1)
- Affective framework (1)
- Akka actor bugs (1)
- Alaska (1)
- Albedo (1)
- Algebra. (1)
- Android (1)
- Arctic (1)
- Automated refactoring (1)
- Automatic parallelization (1)
- Autonomous software (1)
- BPEL (1)
- BYOD exams (1)
- Behaviour (1)
- Biofuel (1)
- Bioinformatics (1)
- Biomass (1)
- CUDA (1)
- Publication
-
- Research Collection School Of Computing and Information Systems (7)
- Publications and Research (3)
- Boise State University Theses and Dissertations (2)
- Department of Computer Science Faculty Scholarship and Creative Works (2)
- Dissertations and Theses Collection (Open Access) (2)
-
- Senior Honors Theses (2)
- Theses and Dissertations (2)
- All Graduate Projects (1)
- Annual Symposium on Biomathematics and Ecology Education and Research (1)
- Articles (1)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (1)
- Conference papers (1)
- Cybersecurity Undergraduate Research Showcase (1)
- Department of Applied Mathematics & Statistics Faculty Publications (1)
- Dissertations and Theses (1)
- Dissertations, Master's Theses and Master's Reports (1)
- Doctoral Dissertations (1)
- Electrical Engineering Theses (1)
- Emirates Journal for Engineering Research (1)
- Engineering Faculty Articles and Research (1)
- Graduate Theses and Dissertations (1)
- Graduate Theses, Dissertations, and Problem Reports (1)
- LSU Doctoral Dissertations (1)
- MS in Computer Science Project Reports (1)
- Marriott Student Review (1)
- Masters Theses, 2020-current (1)
- Minnesota Journal of Law, Science & Technology (1)
- Presidential Research Grants (1)
- Theses/Capstones/Creative Projects (1)
- University Honors Theses (1)
- Publication Type
Articles 1 - 30 of 44
Full-Text Articles in Physical Sciences and Mathematics
On The Generation, Structure, And Semantics Of Grammar Patterns In Source Code Identifiers, Christian D. Newman,, Reem S. Alsuhaibani, Michael J. Decker, Anthony Peruma, Dishant Kaushik, Mohamed Wiem Mkaouer, Emily Hill
On The Generation, Structure, And Semantics Of Grammar Patterns In Source Code Identifiers, Christian D. Newman,, Reem S. Alsuhaibani, Michael J. Decker, Anthony Peruma, Dishant Kaushik, Mohamed Wiem Mkaouer, Emily Hill
Articles
Identifier names are the atoms of program comprehension. Weak identifier names decrease developer productivity and degrade the performance of automated approaches that leverage identifier names in source code analysis; threatening many of the advantages which stand to be gained from advances in artificial intelligence and machine learning. Therefore, it is vital to support developers in naming and renaming identifiers. In this paper, we extend our prior work, which studies the primary method through which names evolve: rename refactorings. In our prior work, we contextualize rename changes by examining commit messages and other refactorings. In this extension, we further consider data …
Argumentation Stance Polarity And Intensity Prediction And Its Application For Argumentation Polarization Modeling And Diverse Social Connection Recommendation, Joseph Winstead Sirrianni
Argumentation Stance Polarity And Intensity Prediction And Its Application For Argumentation Polarization Modeling And Diverse Social Connection Recommendation, Joseph Winstead Sirrianni
Graduate Theses and Dissertations
Cyber argumentation platforms implement theoretical argumentation structures that promote higher quality argumentation and allow for informative analysis of the discussions. Dr. Liu’s research group has designed and implemented a unique platform called the Intelligent Cyber Argumentation System (ICAS). ICAS structures its discussions into a weighted cyber argumentation graph, which describes the relationships between the different users, their posts in a discussion, the discussion topic, and the various subtopics in a discussion. This platform is unique as it encodes online discussions into weighted cyber argumentation graphs based on the user’s stances toward one another’s arguments and ideas. The resulting weighted cyber …
A Bert-Based Dual Embedding Model For Chinese Idiom Prediction, Minghuan Tan, Jing Jiang
A Bert-Based Dual Embedding Model For Chinese Idiom Prediction, Minghuan Tan, Jing Jiang
Research Collection School Of Computing and Information Systems
Chinese idioms are special fixed phrases usually derived from ancient stories, whose meanings are oftentimes highly idiomatic and non-compositional. The Chinese idiom prediction task is to select the correct idiom from a set of candidate idioms given a context with a blank. We propose a BERT-based dual embedding model to encode the contextual words as well as to learn dual embeddings of the idioms. Specifically, we first match the embedding of each candidate idiom with the hidden representation corresponding to the blank in the context. We then match the embedding of each candidate idiom with the hidden representations of all …
Actor Concurrency Bugs: A Comprehensive Study On Symptoms, Root Causes, Api Usages, And Differences, Mehdi Bagherzadeh, Nicholas Fireman, Anas Shawesh, Raffi T. Khatchadourian
Actor Concurrency Bugs: A Comprehensive Study On Symptoms, Root Causes, Api Usages, And Differences, Mehdi Bagherzadeh, Nicholas Fireman, Anas Shawesh, Raffi T. Khatchadourian
Publications and Research
Actor concurrency is becoming increasingly important in the development of real-world software systems. Although actor concurrency may be less susceptible to some multithreaded concurrency bugs, such as low-level data races and deadlocks, it comes with its own bugs that may be different. However, the fundamental characteristics of actor concurrency bugs, including their symptoms, root causes, API usages, examples, and differences when they come from different sources are still largely unknown. Actor software development can significantly benefit from a comprehensive qualitative and quantitative understanding of these characteristics, which is the focus of this work, to foster better API documentations, development practices, …
Personalized Immunotherapy Treatment Strategies For A System Of Chronic Myelogenous Leukemia, Paul Valle
Personalized Immunotherapy Treatment Strategies For A System Of Chronic Myelogenous Leukemia, Paul Valle
Annual Symposium on Biomathematics and Ecology Education and Research
No abstract provided.
Cross-Thought For Sentence Encoder Pre-Training, Shuohang Wang, Yuwei Fang, Siqi Sun, Zhe Gan, Yu Cheng, Jingjing Liu, Jing Jiang
Cross-Thought For Sentence Encoder Pre-Training, Shuohang Wang, Yuwei Fang, Siqi Sun, Zhe Gan, Yu Cheng, Jingjing Liu, Jing Jiang
Research Collection School Of Computing and Information Systems
In this paper, we propose Cross-Thought, a novel approach to pre-training sequence encoder, which is instrumental in building reusable sequence embeddings for large-scale NLP tasks such as question answering. Instead of using the original signals of full sentences, we train a Transformer-based sequence encoder over a large set of short sequences, which allows the model to automatically select the most useful information for predicting masked words. Experiments on question answering and textual entailment tasks demonstrate that our pre-trained encoder can outperform state-of-the-art encoders trained with continuous sentence signals as well as traditional masked language modeling baselines. Our proposed approach also …
Espade: An Efficient And Semantically Secure Shortest Path Discovery For Outsourced Location-Based Services, Bharath K. Samanthula, Divyadharshini Karthikeyan, Boxiang Dong, K. Anitha Kumari
Espade: An Efficient And Semantically Secure Shortest Path Discovery For Outsourced Location-Based Services, Bharath K. Samanthula, Divyadharshini Karthikeyan, Boxiang Dong, K. Anitha Kumari
Department of Computer Science Faculty Scholarship and Creative Works
With the rapid growth of smart devices and technological advancements in tracking geospatial data, the demand for Location-Based Services (LBS) is facing a constant rise in several domains, including military, healthcare and transportation. It is a natural step to migrate LBS to a cloud environment to achieve on-demand scalability and increased resiliency. Nonetheless, outsourcing sensitive location data to a third-party cloud provider raises a host of privacy concerns as the data owners have reduced visibility and control over the outsourced data. In this paper, we consider outsourced LBS where users want to retrieve map directions without disclosing their location information. …
Evaluating Performance Of Openmp Tasks In A Seismic Stencil Application, Eric Raut, Jie Meng, Mauricio Araya-Polo, Barbara Chapman
Evaluating Performance Of Openmp Tasks In A Seismic Stencil Application, Eric Raut, Jie Meng, Mauricio Araya-Polo, Barbara Chapman
Department of Applied Mathematics & Statistics Faculty Publications
Simulations based on stencil computations (widely used in geosciences) have been dominated by the MPI+OpenMP programming model paradigm. Little effort has been devoted to experimenting with task-based parallelism in this context. We address this by introducing OpenMP task parallelism into the kernel of an industrial seismic modeling code, Minimod. We observe that even for these highly regular stencil computations, taskified kernels are competitive with traditional OpenMP-augmented loops, and in some experiments tasks even outperform loop parallelism.
This promising result sets the stage for more complex computational patterns. Simulations involve more than just the stencil calculation: a collection of kernels is …
A Fortran-Keras Deep Learning Bridge For Scientific Computing, Jordan Ott, Mike Pritchard, Natalie Best, Erik Linstead, Milan Curcic, Pierre Baldi
A Fortran-Keras Deep Learning Bridge For Scientific Computing, Jordan Ott, Mike Pritchard, Natalie Best, Erik Linstead, Milan Curcic, Pierre Baldi
Engineering Faculty Articles and Research
Implementing artificial neural networks is commonly achieved via high-level programming languages such as Python and easy-to-use deep learning libraries such as Keras. These software libraries come preloaded with a variety of network architectures, provide autodifferentiation, and support GPUs for fast and efficient computation. As a result, a deep learning practitioner will favor training a neural network model in Python, where these tools are readily available. However, many large-scale scientific computation projects are written in Fortran, making it difficult to integrate with modern deep learning methods. To alleviate this problem, we introduce a software library, the Fortran-Keras Bridge (FKB). This two-way …
Visualocv: Refined Dataflow Programming Interface For Opencv, John Boggess
Visualocv: Refined Dataflow Programming Interface For Opencv, John Boggess
MS in Computer Science Project Reports
OpenCV is a popular tool for developing computer vision algorithms; however, prototyping OpenCV-based algorithms is a time consuming and iterative process. VisualOCV is an open source tool to help users better understand and create computer vision algorithms. A user can see how data is processed at each step in their algorithm, and the results of any changes to the algorithm will be displayed to the user immediately. This can allow the user to easily experiment with various computer vision methods and their parameters. EyeCalc 1.0 uses the Microsoft Foundation Class Library, an old GUI framework by Microsoft, and contains various …
Modified Surrogate Cutting Plane Algorithm (Mscpa) For Integer Linear Programming Problems, Israa Hasan
Modified Surrogate Cutting Plane Algorithm (Mscpa) For Integer Linear Programming Problems, Israa Hasan
Emirates Journal for Engineering Research
This work concerned with introducing a new algorithm for solving integer linear programming problems. The improved algorithm can help by decreasing a calculation the complexity of these problems, an advantages of the proposed method are to reduce the solution time and to decrease algorithmic complexity. Some specific numerical examples are discussed to demonstrate the validity and applicability of the proposed method. The numerical results are compared with the solution of integer linear programming problems by using cutting plane method (Gomory method).
Snow-Albedo Feedback In Northern Alaska: How Vegetation Influences Snowmelt, Lucas C. Reckhaus
Snow-Albedo Feedback In Northern Alaska: How Vegetation Influences Snowmelt, Lucas C. Reckhaus
Theses and Dissertations
This paper investigates how the snow-albedo feedback mechanism of the arctic is changing in response to rising climate temperatures. Specifically, the interplay of vegetation and snowmelt, and how these two variables can be correlated. This has the potential to refine climate modelling of the spring transition season. Research was conducted at the ecoregion scale in northern Alaska from 2000 to 2020. Each ecoregion is defined by distinct topographic and ecological conditions, allowing for meaningful contrast between the patterns of spring albedo transition across surface conditions and vegetation types. The five most northerly ecoregions of Alaska are chosen as they encompass …
Using Applications To Guide Data Management For Emerging Memory Technologies, Timothy C. Effler
Using Applications To Guide Data Management For Emerging Memory Technologies, Timothy C. Effler
Doctoral Dissertations
A number of promising new memory technologies, such as non-volatile, storage-class memories and high-bandwidth, on-chip RAMs, are emerging. Since each of these new technologies present tradeoffs distinct from conventional DRAMs, many high performance and scientific computing systems have begun to include multiple tiers of memory storage, each with their own type of devices. To efficiently utilize the available hardware, such systems will need to alter their data management strategies to consider the performance and capabilities provided by each tier. This work aims to understand and increase the effectiveness of application data management for emerging complex memory systems. A key realization …
Novel Deep Learning Methods Combined With Static Analysis For Source Code Processing, Duy Quoc Nghi Bui
Novel Deep Learning Methods Combined With Static Analysis For Source Code Processing, Duy Quoc Nghi Bui
Dissertations and Theses Collection (Open Access)
It is desirable to combine machine learning and program analysis so that one can leverage the best of both to increase the performance of software analytics. On one side, machine learning can analyze the source code of thousands of well-written software projects that can uncover patterns that partially characterize software that is reliable, easy to read, and easy to maintain. On the other side, the program analysis can be used to define rigorous and unique rules that are only available in programming languages, which enrich the representation of source code and help the machine learning to capture the patterns better. …
Specialization: Do Your Job Well Helping Students Who Are Considering A Career In Programming Know How To Invest Their Time., Scott Pulley
Specialization: Do Your Job Well Helping Students Who Are Considering A Career In Programming Know How To Invest Their Time., Scott Pulley
Marriott Student Review
The article examines the effects of specialization on the hiring process for undergraduates studying programming whether in information systems or computer science.
Law, Technology, And Pedagogy: Teaching Coding To Build A “Future-Proof” Lawyer, Alfredo Contreras, Joe Mcgrath
Law, Technology, And Pedagogy: Teaching Coding To Build A “Future-Proof” Lawyer, Alfredo Contreras, Joe Mcgrath
Minnesota Journal of Law, Science & Technology
No abstract provided.
Automated Synthesis Of Local Time Requirement For Service Composition, Étienne André, Tian Huat Tan, Manman Chen, Shuang Liu, Jun Sun, Yang Liu, Jin Song Dong
Automated Synthesis Of Local Time Requirement For Service Composition, Étienne André, Tian Huat Tan, Manman Chen, Shuang Liu, Jun Sun, Yang Liu, Jin Song Dong
Research Collection School Of Computing and Information Systems
Service composition aims at achieving a business goal by composing existing service-based applications or components. The response time of a service is crucial, especially in time-critical business environments, which is often stated as a clause in service-level agreements between service providers and service users. To meet the guaranteed response time requirement of a composite service, it is important to select a feasible set of component services such that their response time will collectively satisfy the response time requirement of the composite service. In this work, we use the BPEL modeling language that aims at specifying Web services. We extend it …
Helion’S Snapshot Module, Nii-Kwartei Quartey
Helion’S Snapshot Module, Nii-Kwartei Quartey
Cybersecurity Undergraduate Research Showcase
During my undergraduate research, I spent my time working with a home automation program known as Helion, specifically, its Snapshot module. I was tasked with learning new material and completing part of the webpage that were unfinished. I also had to get a little creative when working on a design that users could find appealing. There were times I found working on Helion difficult but overall, working with Helion’s Snapshot Module is something that will help me improve with my undergraduate studies.
Functional Programming For Systems Software: Implementing Baremetal Programs In Habit, Donovan Ellison
Functional Programming For Systems Software: Implementing Baremetal Programs In Habit, Donovan Ellison
University Honors Theses
Programming in a baremetal environment, directly on top of hardware with very little to help manage memory or ensure safety, can be dangerous even for experienced programmers. Programming languages can ease the burden on developers and sometimes take care of entire sets of errors. This is not the case for a language like C that will do almost anything you want, for better or worse. To operate in a baremetal environment often requires direct control over memory, but it would be nice to have that capability without sacrificing safety guarantees. Rust is a new language that aims to fit this …
What Was Written Vs. Who Read It: News Media Profiling Using Text Analysis And Social Media Context, Ramy Baly, Georgi Karadzhov, Jisun An, Haewoon Kwak, Yoan Dinkov, Ahmed Ali, James Glass, Preslav. Nakov
What Was Written Vs. Who Read It: News Media Profiling Using Text Analysis And Social Media Context, Ramy Baly, Georgi Karadzhov, Jisun An, Haewoon Kwak, Yoan Dinkov, Ahmed Ali, James Glass, Preslav. Nakov
Research Collection School Of Computing and Information Systems
Predicting the political bias and the factuality of reporting of entire news outlets are critical elements of media profiling, which is an understudied but an increasingly important research direction. The present level of proliferation of fake, biased, and propagandistic content online has made it impossible to fact-check every single suspicious claim, either manually or automatically. Thus, it has been proposed to profile entire news outlets and to look for those that are likely to publish fake or biased content. This makes it possible to detect likely “fake news” the moment they are published, by simply checking the reliability of their …
A Virtualization Based System Infrastructure For Dynamic Program Analysis, Jiaqi Hong
A Virtualization Based System Infrastructure For Dynamic Program Analysis, Jiaqi Hong
Dissertations and Theses Collection (Open Access)
Dynamic malware analysis schemes either run the target program as is in an isolated environment assisted by additional hardware facilities or modify it with instrumentation code statically or dynamically. The hardware-assisted schemes usually trap the target during its execution to a more privileged environment based on the available hardware events. The more privileged environment is not accessible by the untrusted kernel, thus this approach is often applied for transparent and secure kernel analysis. Nevertheless, the isolated environment induces a virtual address gap between the analyzer and the target, which hinders effective and efficient memory introspection and undermines the correctness of …
Evolution Of Computational Thinking Contextualized In A Teacher-Student Collaborative Learning Environment., John Arthur Underwood
Evolution Of Computational Thinking Contextualized In A Teacher-Student Collaborative Learning Environment., John Arthur Underwood
LSU Doctoral Dissertations
The discussion of Computational Thinking as a pedagogical concept is now essential as it has found itself integrated into the core science disciplines with its inclusion in all of the Next Generation Science Standards (NGSS, 2018). The need for a practical and functional definition for teacher practitioners is a driving point for many recent research endeavors. Across the United States school systems are currently seeking new methods for expanding their students’ ability to analytically think and to employee real-world problem-solving strategies (Hopson, Simms, and Knezek, 2001). The need for STEM trained individuals crosses both the vocational certified and college degreed …
A Real-Time Internet Of Things (Iot) Based Affective Framework For Monitoring Emotions In Infants, Alhagie Sallah
A Real-Time Internet Of Things (Iot) Based Affective Framework For Monitoring Emotions In Infants, Alhagie Sallah
Electrical Engineering Theses
An increase in the number of working parents has led to a higher demand for remotely monitoring activities of babies through baby monitors. The baby monitors vary from simple audio and video monitoring frameworks to advance applications where we can integrate sensors for tracking vital signs such as heart rate, respiratory rate monitoring. The Internet of Things (IoT) is a network of devices where each device can is recognizable in the network. The IoT node is a sensor or device, which primarily functions as a data acquisition unit. The data acquired through the IoT nodes are wirelessly transmitted to the …
A Multi-Input Deep Learning Model For C/C++ Source Code Attribution, Richard J. Tindell Ii
A Multi-Input Deep Learning Model For C/C++ Source Code Attribution, Richard J. Tindell Ii
Masters Theses, 2020-current
Code stylometry is applying analysis techniques to a collection of source code or binaries to determine variations in style. The variations extracted are often used to identify the author of the text or to differentiate one piece from another.
In this research, we were able to create a multi-input deep learning model that could accurately categorize and group code from multiple projects. The deep learning model took as input word-based tokenization for code comments, character-based tokenization for the source code text, and the metadata features described by A. Caliskan-Islam et al. Using these three inputs, we were able to achieve …
Comparative Analysis Of Metabolic Pathways Of Bacteria Used In Fermented Food, Keanu Hoang, Kiran Bastola
Comparative Analysis Of Metabolic Pathways Of Bacteria Used In Fermented Food, Keanu Hoang, Kiran Bastola
Theses/Capstones/Creative Projects
This study presents a novel methodology for analyzing metabolic pathways. Utilizing KEGG REST API through a Biopython package and file parser, data about whether or not a bacteria has an enzyme or not was extracted. The results found that differences in metabolic pathway enrichment values follow along the lines of genera and pathway type. In particular, bacteria found in food spoilage and commercial nitrogen fixing products had high values of enrichment.
Polyhedral+Dataflow Graphs, Eddie C. Davis
Polyhedral+Dataflow Graphs, Eddie C. Davis
Boise State University Theses and Dissertations
This research presents an intermediate compiler representation that is designed for optimization, and emphasizes the temporary storage requirements and execution schedule of a given computation to guide optimization decisions. The representation is expressed as a dataflow graph that describes computational statements and data mappings within the polyhedral compilation model. The targeted applications include both the regular and irregular scientific domains.
The intermediate representation can be integrated into existing compiler infrastructures. A specification language implemented as a domain specific language in C++ describes the graph components and the transformations that can be applied. The visual representation allows users to reason about …
Obtaining Real-World Benchmark Programs From Open-Source Repositories Through Abstract-Semantics Preserving Transformations, Maria Anne Rachel Paquin
Obtaining Real-World Benchmark Programs From Open-Source Repositories Through Abstract-Semantics Preserving Transformations, Maria Anne Rachel Paquin
Boise State University Theses and Dissertations
Benchmark programs are an integral part of program analysis research. Researchers use benchmark programs to evaluate existing techniques and test the feasibility of new approaches. The larger and more realistic the set of benchmarks, the more confident a researcher can be about the correctness and reproducibility of their results. However, obtaining an adequate set of benchmark programs has been a long-standing challenge in the program analysis community.
In this thesis, we present the APT tool, a framework we designed and implemented to automate the generation of realistic benchmark programs suitable for program analysis evaluations. Our tool targets intra-procedural analyses that …
An Empirical Study On The Use And Misuse Of Java 8 Streams, Raffi T. Khatchadourian, Yiming Tang, Mehdi Bagherzadeh, Baishakhi Ray
An Empirical Study On The Use And Misuse Of Java 8 Streams, Raffi T. Khatchadourian, Yiming Tang, Mehdi Bagherzadeh, Baishakhi Ray
Publications and Research
Streaming APIs allow for big data processing of native data structures by providing MapReduce-like operations over these structures. However, unlike traditional big data systems, these data structures typically reside in shared memory accessed by multiple cores. Although popular, this emerging hybrid paradigm opens the door to possibly detrimental behavior, such as thread contention and bugs related to non-execution and non-determinism. This study explores the use and misuse of a popular streaming API, namely, Java 8 Streams. The focus is on how developers decide whether or not to run these operations sequentially or in parallel and bugs both specific and tangential …
Achieving Obfuscation Through Self-Modifying Code: A Theoretical Model, Heidi Waddell
Achieving Obfuscation Through Self-Modifying Code: A Theoretical Model, Heidi Waddell
Senior Honors Theses
With the extreme amount of data and software available on networks, the protection of online information is one of the most important tasks of this technological age. There is no such thing as safe computing, and it is inevitable that security breaches will occur. Thus, security professionals and practices focus on two areas: security, preventing a breach from occurring, and resiliency, minimizing the damages once a breach has occurred. One of the most important practices for adding resiliency to source code is through obfuscation, a method of re-writing the code to a form that is virtually unreadable. …
Storage Management Strategy In Mobile Phones For Photo Crowdsensing, En Wang, Zhengdao Qu, Xinyao Liang, Xiangyu Meng, Yongjian Yang, Dawei Li, Weibin Meng
Storage Management Strategy In Mobile Phones For Photo Crowdsensing, En Wang, Zhengdao Qu, Xinyao Liang, Xiangyu Meng, Yongjian Yang, Dawei Li, Weibin Meng
Department of Computer Science Faculty Scholarship and Creative Works
In mobile crowdsensing, some users jointly finish a sensing task through the sensors equipped in their intelligent terminals. In particular, the photo crowdsensing based on Mobile Edge Computing (MEC) collects pictures for some specific targets or events and uploads them to nearby edge servers, which leads to richer data content and more efficient data storage compared with the common mobile crowdsensing; hence, it has attracted an important amount of attention recently. However, the mobile users prefer uploading the photos through Wifi APs (PoIs) rather than cellular networks. Therefore, photos stored in mobile phones are exchanged among users, in order to …