Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences

PDF

Computer science

Institution
Publication Year
Publication
Publication Type

Articles 31 - 60 of 66

Full-Text Articles in Physical Sciences and Mathematics

A Survey Of Attention Deficit Hyperactivity Disorder Identification Using Psychophysiological Data, S. De Silva, S. Dayarathna, G. Ariyarathne, D. Meedeniya, Sampath Jayarathna Jan 2019

A Survey Of Attention Deficit Hyperactivity Disorder Identification Using Psychophysiological Data, S. De Silva, S. Dayarathna, G. Ariyarathne, D. Meedeniya, Sampath Jayarathna

Computer Science Faculty Publications

Attention Deficit Hyperactivity Disorder (ADHD) is one of the most common neurological disorders among children, that affects different areas in the brain that allows executing certain functionalities. This may lead to a variety of impairments such as difficulties in paying attention or focusing, controlling impulsive behaviours and overreacting. The continuous symptoms may have a severe impact in the long-term. This paper explores the ADHD identification studies using eye movement data and functional Magnetic Resonance Imaging (fMRI). This study discusses different machine learning techniques, existing models and analyses the existing literature. We have identified the current challenges and possible future directions …


U.S. Census Explorer: A Gui And Visualization Tool For The U.S. Census Data Api, Timothy Snyder Jan 2019

U.S. Census Explorer: A Gui And Visualization Tool For The U.S. Census Data Api, Timothy Snyder

Williams Honors College, Honors Research Projects

U.S. Census Explorer is a software application that is designed to provide tools for intuitive exploration and analysis of United States census data for non-technical users. The application serves as an interface into the U.S. Census Bureau’s data API that enables a complete workflow from data acquisition to data visualization without the need for technical intervention from the user. The suite of tools provided include a graphical user interface for dynamically querying U.S. census data, geographic visualizations, and the ability to download your work to common spreadsheet and image formats for inclusion in external works.


Perception & Perspective: An Analysis Of Discourse And Situational Factors In Reference Frame Selection, Robert J. Ross, Kavita E. Thomas Jun 2018

Perception & Perspective: An Analysis Of Discourse And Situational Factors In Reference Frame Selection, Robert J. Ross, Kavita E. Thomas

Conference papers

To integrate perception into dialogue, it is necessary to bind spatial language descriptions to reference frame use. To this end, we present an analysis of discourse and situational factors that may influence reference frame choice in dialogues. We show that factors including spatial orientation, task, self and other alignment, and dyad have an influence on reference frame use. We further show that a computational model to estimate reference frame based on these features provides results greater than both random and greedy reference frame selection strategies.


Programming For Data Science Csc 310, Amanda Izenstark Mar 2017

Programming For Data Science Csc 310, Amanda Izenstark

Library Impact Statements

No abstract provided.


Data Science Program, Amanda Izenstark Feb 2017

Data Science Program, Amanda Izenstark

Library Impact Statements

No abstract provided.


Visual Code: Breaking The Binary, Jacob Johannesen, Andrew Adriance Jun 2016

Visual Code: Breaking The Binary, Jacob Johannesen, Andrew Adriance

Liberal Arts and Engineering Studies

This project seeks to create an accessible programming language that is more visually based. Although some solutions exist, namely MIT’s Scratch, nothing has caught up to the mobile age. This proj- ect aims to reframe creating a game or app into the context of tell- ing a story, putting character creation first. By researching sto- ry-telling and how people learn, and by applying technical and user interface design knowledge, this project intends to deliver a soft- ware solution that opens introductory coding education to more people.


Professor Pang Hwee Hwa Appointed Dean Of Smu School Of Information Systems, Singapore Management University May 2016

Professor Pang Hwee Hwa Appointed Dean Of Smu School Of Information Systems, Singapore Management University

SMU Press Releases

The Singapore Management University (SMU) has announced today the appointment of Professor Pang Hwee Hwa as the next Dean of the SMU School of Information Systems (SIS) with effect from 1 July 2016 for a term of five years. Selected from a global pool of candidates after an extensive and rigorous global search which started in October 2015, Prof Pang’s strong commitment to research in information systems and a passion for excellence in education, make him the ideal candidate to lead the School of Information Systems.


Catching Card Counters, Sarah French Apr 2016

Catching Card Counters, Sarah French

Honors Projects in Mathematics

The casino industry has been researched through a variety of disciplines including psychological gambling habits, technological advances, business strategies, and mathematical simulations. In the vast number of studies that have been conducted, there are few scholarly articles that focus on the specific aspect of card counting. The majority of games in the casino are designed to favor the “house”. This study focuses on the game of blackjack, in which players using a card counting strategy can tip the odds in their favor. A computer simulation was used to model the betting strategy of a card counter who would bet methodically. …


An Investigation Of Socio-Technical Components Of Knowledge Management System (Kms) Usage, Noel Wint Jr. Jan 2016

An Investigation Of Socio-Technical Components Of Knowledge Management System (Kms) Usage, Noel Wint Jr.

CCE Theses and Dissertations

Existing literature indicates that although both academics and practitioners recognize knowledge management (KM) as a source of competitive advantage, users are not always willing to use a knowledge management system (KMS). Because of the social nature of knowledge transfer, a KMS can be considered a socio-technical system. Many explanations have been presented for this failure to utilize the KMS. These explanations include a number of the socio-technical factors relating to people, processes, and technologies. While these factors may have significant explanatory power when examined independently, existing studies have not sufficiently addressed the interactions among all three socio-technical factors or their …


Empirical Analysis Of Socio-Cognitive Factors Affecting Security Behaviors And Practices Of Smartphone Users, Joseph P. Simpson Jan 2016

Empirical Analysis Of Socio-Cognitive Factors Affecting Security Behaviors And Practices Of Smartphone Users, Joseph P. Simpson

CCE Theses and Dissertations

The overall security posture of information systems (IS) depends on the behaviors of the IS users. Several studies have shown that users are the greatest vulnerability to IS security. The proliferation of smartphones is introducing an entirely new set of risks, threats, and vulnerabilities. Smartphone devices amplify this data exposure problem by enabling instantaneous transmission and storage of personally identifiable information (PII) by smartphone users, which is becoming a major security risk. Moreover, companies are also capitalizing on the availability and powerful computing capabilities of these smartphone devices and developing a bring-your-own-device (BYOD) program, which makes companies susceptible to divulgence …


A Study Of The Success Of Group Formation In Virtual Teams Using Computer-Mediated Communications, Eliel Melón-Ramos Jan 2016

A Study Of The Success Of Group Formation In Virtual Teams Using Computer-Mediated Communications, Eliel Melón-Ramos

CCE Theses and Dissertations

In the digital domain, virtual teams within organizations and corporations are becoming common. Restructuring an organization or corporation is vital because competition and globalization are increasing. In this era of globalization, distributed working groups need to develop a competitive advantage in these ever-changing environments. Historically, teams had experienced problems stemming from geographical and temporal limitations. With the increase of technology in telecommunications, organizations are increasingly forming virtual teams, which have become critical to the survival of nearly any corporate entity.

Virtual teams have some of the same problems that regular teams have. One of the key challenges is the method …


An Empirical Assessment Of Employee Cyberslacking In The Public Sector, Wilnelia Hernández Jan 2016

An Empirical Assessment Of Employee Cyberslacking In The Public Sector, Wilnelia Hernández

CCE Theses and Dissertations

With the increasing use of the Internet, new challenges are presented to employees in the workplace. Employees spend time during work hours on non-work related activities including visiting e-commerce Websites, managing personal email accounts, and engaging in e-banking. These types of actions in the workplace are known as cyberslacking. Cyberslacking affects the employees’ productivity, presents legal concerns, and undermines the security of the organization’s network. This research study addressed the problem of cyberslacking in the public sector, by assessing the ethical severity of cyberslacking activities, as well as how employees perceived that the frequency of such activities occurred by their …


Technical Communication As Teaching: A Grounded Theory Study Of Cognitive Empathy And Audience Engagement Among Computer Science Majors In A Technical Communication Classroom, Robert Michael Rowan Jun 2015

Technical Communication As Teaching: A Grounded Theory Study Of Cognitive Empathy And Audience Engagement Among Computer Science Majors In A Technical Communication Classroom, Robert Michael Rowan

Theses and Dissertations

This dissertation is a grounded theory study of empathy, ethical awareness, and audience engagement activities in students in a technical writing service course. The course was designed around an empathy-oriented approach to teaching technical writing and writing research. The students are primarily computer science majors, and the teaching methods include a genre and writing research approach as well as the use of an extended metaphor of technical communication as a form of teaching. Findings indicate that students respond to the metaphor by drawing upon positive and empathetically-informed models of teachers and teaching to guide how they would work with and …


Immunology Inspired Detection Of Data Theft From Autonomous Network Activity, Theodore O. Cochran Apr 2015

Immunology Inspired Detection Of Data Theft From Autonomous Network Activity, Theodore O. Cochran

CCE Theses and Dissertations

The threat of data theft posed by self-propagating, remotely controlled bot malware is increasing. Cyber criminals are motivated to steal sensitive data, such as user names, passwords, account numbers, and credit card numbers, because these items can be parlayed into cash. For anonymity and economy of scale, bot networks have become the cyber criminal’s weapon of choice. In 2010 a single botnet included over one million compromised host computers, and one of the largest botnets in 2011 was specifically designed to harvest financial data from its victims. Unfortunately, current intrusion detection methods are unable to effectively detect data extraction techniques …


Determinants Of Intention To Use New Technology: An Investigation Of Students In Higher Education, Yolanda Dupree Jan 2015

Determinants Of Intention To Use New Technology: An Investigation Of Students In Higher Education, Yolanda Dupree

CCE Theses and Dissertations

The federal government continues to monitor the cost of paper texts as an essential component of postsecondary education expenses. The Higher Education Act (HEA), which was initially passed in 1965, was created to buttress the educational resources of colleges and universities. Along with addressing the benefits of financial aid in postsecondary and higher education, the act referenced the projected financial burdens of paper texts. The last 2008 reauthorization suggested that colleges and universities develop plans to reduce the costs of college. Congress is currently working to reauthorize the legislation. Based on this information, the problem identified in this study explored …


Legal Issues: Security And Privacy With Mobile Devices, Brian Leonard, Maurice Dawson Dec 2014

Legal Issues: Security And Privacy With Mobile Devices, Brian Leonard, Maurice Dawson

Maurice Dawson

Privacy and security are two items being woven into the fabric of American law concerning mobile devices. This chapter will review and analyze the associated laws and policies that are currently in place or have been proposed to ensure proper execution of security measures for mobile and other devices while still protecting individual privacy. This chapter will address the fact that as the American society significantly uses mobile devices, it is imperative to understand the legal actions surrounding these technologies to include their associated uses. This chapter will also address the fact that with 9/11 in the not so distant …


Singapore Management University Establishes A New Research Centre On Secure Mobile Computing Technologies And Solutions, Singapore Management University Oct 2014

Singapore Management University Establishes A New Research Centre On Secure Mobile Computing Technologies And Solutions, Singapore Management University

SMU Press Releases

The Singapore Management University (SMU) has announced today the establishment of a new centre of research excellence that focuses on mobile computing security. Funded by Singapore’s National Research Foundation (NRF), the Secure Mobile Centre is developing efficient and scalable technologies and solutions that strengthen the security of mobile computing systems, applications and services. The Secure Mobile Centre is led by a team of five faculty members from SMU’s School of Information Systems who specialise in information security and trust: Professor Robert DENG (Centre Director), Professor PANG Hwee Hwa, Associate Professor LI Yingjiu, Associate Professor DING Xuhua and Assistant Professor Debin …


Moved But Not Gone: An Evaluation Of Real-Time Methods For Discovering Replacement Web Pages, Martin Klein, Michael L. Nelson Jan 2014

Moved But Not Gone: An Evaluation Of Real-Time Methods For Discovering Replacement Web Pages, Martin Klein, Michael L. Nelson

Computer Science Faculty Publications

Inaccessible Web pages and 404 “Page Not Found” responses are a common Web phenomenon and a detriment to the user’s browsing experience. The rediscovery of missing Web pages is, therefore, a relevant research topic in the digital preservation as well as in the Information Retrieval realm. In this article, we bring these two areas together by analyzing four content- and link-based methods to rediscover missing Web pages. We investigate the retrieval performance of the methods individually as well as their combinations and give an insight into how effective these methods are over time. As the main result of this work, …


Decrease In Free Computer Science Papers Found Through Google Scholar, Lee A. Pedersen, Julie Arendt Jan 2014

Decrease In Free Computer Science Papers Found Through Google Scholar, Lee A. Pedersen, Julie Arendt

VCU Libraries Faculty and Staff Publications

Purpose - Google Scholar was used to locate free full-text versions of computer science research papers to determine what proportion could be freely accessed.
Design/methodology/approach - A sample of 1967 conference papers and periodical articles from 2003-2010, indexed in the ACM Guide to Computing Literature, was searched for manually in Google Scholar, using the paper or article title and the first author’s surname and supplementary searches as needed.
Findings - Free full-text versions were found for 52% of the conference papers and 55% of the periodical articles. Documents with older publication dates were more likely to be freely accessible than …


Dhl And Singapore Management University Launch Green Transformation Lab, Singapore Management University May 2013

Dhl And Singapore Management University Launch Green Transformation Lab, Singapore Management University

SMU Press Releases

DHL, the world’s leading logistics company, is partnering with Singapore Management University (SMU) to accelerate the evolution of sustainable logistics across Asia Pacific with the launch of the Green Transformation Lab. This S$2 million initiative, hosted at the SMU School of Information Systems on the University’s city campus, will focus on the creation of innovative solutions to help organizations transform their businesses towards sustainable green growth and drive beneficial change in supply chains across the region. This joint DHL-SMU initiative will fulfill its mission through education, research and best practice development.


Library Impact Statement For Csc 423 Network Intrusion Detection And Defense, Amanda Izenstark Nov 2012

Library Impact Statement For Csc 423 Network Intrusion Detection And Defense, Amanda Izenstark

Amanda Izenstark

Library Impact Statement in response to new course proposal for CSC 423 Network Intrusion Detection and Defense. New course was supported with no need for additional resources.


Library Impact Statement For Csc 523 Advanced Intrusion Detection And Defense, Amanda Izenstark Nov 2012

Library Impact Statement For Csc 523 Advanced Intrusion Detection And Defense, Amanda Izenstark

Amanda Izenstark

Library Impact Statement for CSC 523 Advanced Intrusion Detection and Defense. No new library resources are required to support this course.


Library Impact Statement For Csc 424 Live Forensics And Incident Response, Amanda Izenstark Nov 2012

Library Impact Statement For Csc 424 Live Forensics And Incident Response, Amanda Izenstark

Amanda Izenstark

Library Impact Statement in response to new course proposal for CSC 424 Live Forensics and Incident Response. New course was supported with no need for additional resources.


A Multi-Platform Application Suite For Enhancing South Asian Language Pedagogy, Tao Bai, Christopher K. Chung, Konstantin Läufer, Daisy Rockwell, George K. Thiruvathukal Jan 2012

A Multi-Platform Application Suite For Enhancing South Asian Language Pedagogy, Tao Bai, Christopher K. Chung, Konstantin Läufer, Daisy Rockwell, George K. Thiruvathukal

Konstantin Läufer

This interdisciplinary project explores the potential for handheld/wireless (H/W) technology in the context of language education within and beyond the classroom. Specifically, we have designed and implemented a suite of multi-platform (desktop/laptop, handheld, and browser) applications to enhance the teaching of South Asian languages such as Hindi-Urdu. Such languages are very difficult to learn, let alone write, and H/W devices (with their handwriting/drawing capabilities) can play a significant role in overcoming the learning curve. The initial application suite includes a character/word tracer, a word splitter/joiner, a smart flashcard with audio, contextual augmented stories for reading comprehension, and a poetic metronome. …


A Multi-Platform Application Suite For Enhancing South Asian Language Pedagogy, Tao Bai, Christopher K. Chung, Konstantin Läufer, Daisy Rockwell, George K. Thiruvathukal Nov 2011

A Multi-Platform Application Suite For Enhancing South Asian Language Pedagogy, Tao Bai, Christopher K. Chung, Konstantin Läufer, Daisy Rockwell, George K. Thiruvathukal

George K. Thiruvathukal

This interdisciplinary project explores the potential for handheld/wireless (H/W) technology in the context of language education within and beyond the classroom. Specifically, we have designed and implemented a suite of multi-platform (desktop/laptop, handheld, and browser) applications to enhance the teaching of South Asian languages such as Hindi-Urdu. Such languages are very difficult to learn, let alone write, and H/W devices (with their handwriting/drawing capabilities) can play a significant role in overcoming the learning curve. The initial application suite includes a character/word tracer, a word splitter/joiner, a smart flashcard with audio, contextual augmented stories for reading comprehension, and a poetic metronome. …


Library Impact Statement For Csc 523 Advanced Intrusion Detection And Defense, Amanda Izenstark Nov 2011

Library Impact Statement For Csc 523 Advanced Intrusion Detection And Defense, Amanda Izenstark

Library Impact Statements

Library Impact Statement for CSC 523 Advanced Intrusion Detection and Defense. No new library resources are required to support this course.


Library Impact Statement For Csc 420 Introduction To Information Assurance, Amanda Izenstark Sep 2011

Library Impact Statement For Csc 420 Introduction To Information Assurance, Amanda Izenstark

Library Impact Statements

Library Impact Statement in response to new course proposal for CSC 420 Introduction to Information Assurance. New course was supported with no need for additional resources.


Library Impact Statement For Csc 523 Advanced Intrusion Detection And Defense, Amanda Izenstark Sep 2011

Library Impact Statement For Csc 523 Advanced Intrusion Detection And Defense, Amanda Izenstark

Library Impact Statements

Library Impact Statement in response to new course proposal for CSC 523 Advanced Intrusion Detection and Defense. New course was supported with no need for additional resources.


Library Impact Statement For Csc 423 Network Intrusion Detection And Defense, Amanda Izenstark Sep 2011

Library Impact Statement For Csc 423 Network Intrusion Detection And Defense, Amanda Izenstark

Library Impact Statements

Library Impact Statement in response to new course proposal for CSC 423 Network Intrusion Detection and Defense. New course was supported with no need for additional resources.


Library Impact Statement For Csc 424 Live Forensics And Incident Response, Amanda Izenstark Sep 2011

Library Impact Statement For Csc 424 Live Forensics And Incident Response, Amanda Izenstark

Library Impact Statements

Library Impact Statement in response to new course proposal for CSC 424 Live Forensics and Incident Response. New course was supported with no need for additional resources.