Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (17)
- Astrophysics and Astronomy (8)
- Atmospheric Sciences (4)
- Climate (4)
- Meteorology (4)
-
- Oceanography and Atmospheric Sciences and Meteorology (4)
- Other Astrophysics and Astronomy (4)
- Other Physics (4)
- Physics (4)
- Earth Sciences (3)
- Geology (3)
- Life Sciences (3)
- Biochemistry (2)
- Biochemistry, Biophysics, and Structural Biology (2)
- Business (2)
- Chemistry (2)
- Marketing (2)
- Other Chemistry (2)
- Statistics and Probability (2)
- Bioinformatics (1)
- Computer Engineering (1)
- Engineering (1)
- Keyword
-
- Articles (4)
- Publications (4)
- Refereed Publications (4)
- Algorithm (2)
- Equations (2)
-
- Hydrodynamics (2)
- Numerical methods (2)
- Refereed Articles (2)
- Refinement (2)
- Selected Peer-reviewed Publications (2)
- Strokes (2)
- AdaBoost (1)
- Adjacency matrix (1)
- Arachnomorpha (1)
- Arthropoda (1)
- Bioinformatics (1)
- Boosting Algorithms: Regularization (1)
- Boosting algorithms (1)
- Cambrian radiation (1)
- Categorical attributes (1)
- Class probability estimation (1)
- Clustering (1)
- Data jittering (1)
- Drug effects (1)
- Fluvial (1)
- Geodispersal (1)
- Geographic information systems (1)
- Geomorphology (1)
- Graphs (1)
- Hydrology (1)
- Publication
- Publication Type
Articles 31 - 36 of 36
Full-Text Articles in Physical Sciences and Mathematics
Cryptanalysis Of Sigaba, Wing Chan
Cryptanalysis Of Sigaba, Wing Chan
Master's Projects
SIGABA is a World War II cipher machine used by the United States. Both the United States Army and the United States Navy used it for tactical communication. In this paper, we consider an attack on SIGABA using the largest practical keyspace for the machine. This attack will highlight the strengths and weaknesses of the machine, as well as provide an insight into the strength of the security provided by the cipher.
A Multiple-Copy Scheme For Multi-Channel Stop-And-Wait Harq, Yucheng Shih
A Multiple-Copy Scheme For Multi-Channel Stop-And-Wait Harq, Yucheng Shih
Master's Projects
HARQ (Hybrid Automatic Repeat Request) combines ARQ (Automatic Repeat Request) with FEC (Forward Error Correction) to provide a reliable way to ensure that data are received correctly and in sequence. A multiple-copy HARQ scheme is proposed for WiMAX (Worldwide Interoperability for Microwave Access) to reduce the waiting time of erroneously received data in the receivers’ buffer. In this project, the performances of WiMAX multi-channel stop-and-wait HARQ scheme are compared with that of the proposed multiple-copy HARQ scheme. The multiple-copy HARQ can send the same copy of a data burst on contiguous channels during noisy channel conditions so that the required …
Case Studies In Proof Checking, Robert Kam
Case Studies In Proof Checking, Robert Kam
Master's Projects
The aim of computer proof checking is not to find proofs, but to verify them. This is different from automated deduction, which is the use of computers to find proofs that humans have not devised first. Currently, checking a proof by computer is done by taking a known mathematical proof and entering it into the special language recognized by a proof verifier program, and then running the verifier to hopefully obtain no errors. Of course, if the proof checker approves the proof, there are considerations of whether or not the proof checker is correct, and this has been complicated by …
Comment: Boosting Algorithms: Regularization, Prediction And Model Fitting, A. Buja, David Mease, A. Wyner
Comment: Boosting Algorithms: Regularization, Prediction And Model Fitting, A. Buja, David Mease, A. Wyner
Faculty Publications
The authors are doing the readers of Statistical Science a true service with a well-written and up-to-date overview of boosting that originated with the seminal algorithms of Freund and Schapire. Equally, we are grateful for high-level software that will permit a larger readership to experiment with, or simply apply, boosting-inspired model fitting. The authors show us a world of methodology that illustrates how a fundamental innovation can penetrate every nook and cranny of statistical thinking and practice. They introduce the reader to one particular interpretation of boosting and then give a display of its potential with extensions from classification (where …
Pairwise Alignment Of Metamorphic Computer Viruses, Scott Mcghee
Pairwise Alignment Of Metamorphic Computer Viruses, Scott Mcghee
Master's Projects
Computer viruses and other forms of malware pose a threat to virtually any software system (with only a few exceptions). A computer virus is a piece of software which takes advantage of known weaknesses in a software system, and usually has the ability to deliver a malicious payload. A common technique that virus writers use to avoid detection is to enable the virus to change itself by having some kind of self-modifying code. This kind of virus is commonly known as a metamorphic virus, and can be particularly difficult to detect [17]. Existing virus detection software is continually being improved …
Securing Wireless Networks From Arp Cache Poisoning, Roney Philip
Securing Wireless Networks From Arp Cache Poisoning, Roney Philip
Master's Projects
Wireless networks have become an integral part of today’s networks. The ease of deployment, low cost, mobility and high data rates have contributed significantly to their popularity. The medium of data transmission in wireless networks makes them inherently less secure than wired networks. For wireless networks to access the Internet they must be connected to a wired network via an Access Point or a wireless router. This has led wireless network equipment manufacturers to implement wireless Access Points and wireless routers with a built in switch for wired clients and a WiFi access point for wireless clients. The set up …