Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 41

Full-Text Articles in Physical Sciences and Mathematics

Exploring The Dimensions Of Nomophobia: Developing And Validating A Questionnaire Using Mixed Methods Research, Caglar Yildirim Oct 2014

Exploring The Dimensions Of Nomophobia: Developing And Validating A Questionnaire Using Mixed Methods Research, Caglar Yildirim

Caglar Yildirim

Nomophobia is defined as the fear of being out of mobile phone contact and is considered a modern age phobia introduced to our lives as a byproduct of the interaction between people and mobile information and communication technologies, especially smartphones. This research study sought to contribute to the nomophobia research literature by identifying and describing the dimensions of nomophobia and developing a questionnaire to measure nomophobia. Consequently, this study adopted a two-phase, exploratory sequential mixed methods design. The first phase was a qualitative exploration of nomophobia through semi-structured interviews conducted with nine undergraduate students at a large Midwestern university in …


A Sophisticated Library Search Strategy Using Folksonomies And Similarity Matching, William Lund, Yiu-Kai Ng, Maria Pera Sep 2014

A Sophisticated Library Search Strategy Using Folksonomies And Similarity Matching, William Lund, Yiu-Kai Ng, Maria Pera

William Lund

Libraries, private and public, offer valuable resources to library patrons. As of today the only way to locate information archived exclusively in libraries is through their catalogs. Library patrons, however, often find it difficult to formulate a proper query, which requires using specific keywords assigned to different fields of desired library catalog records, to obtain relevant results. These improperly formulated queries often yield irrelevant results or no results at all. This negative experience in dealing with existing library systems turn library patrons away from library catalogs; instead, they rely on Web search engines to perform their searches first and upon …


Ensemble Methods For Historical Machine-Printed Document Recognition, William Lund Sep 2014

Ensemble Methods For Historical Machine-Printed Document Recognition, William Lund

William Lund

The usefulness of digitized documents is directly related to the quality of the extracted text. Optical Character Recognition (OCR) has reached a point where well-formatted and clean machine- printed documents are easily recognizable by current commercial OCR products; however, older or degraded machine-printed documents present problems to OCR engines resulting in word error rates (WER) that severely limit either automated or manual use of the extracted text. Major archives of historical machine-printed documents are being assembled around the globe, requiring an accurate transcription of the text for the automated creation of descriptive metadata, full-text searching, and information extraction. Given document …


On Modeling Contention For Shared Caches In Multi-Core Processors With Techniques From Ecology, Amy Apon, Wesley Emeneker Aug 2014

On Modeling Contention For Shared Caches In Multi-Core Processors With Techniques From Ecology, Amy Apon, Wesley Emeneker

Amy W. Apon

Multi-core x86_64 processors introduced an important change in architecture, a shared last level cache. Historically, each processor has had access to a large private cache that seamlessly and transparently (to end users) interfaced with main memory. Previously, processes or threads only had to compete for memory bandwidth, but now they are competing for actual space. Competition for space and environmental resources is a problem studied in other scientific domains. This paper introduces methods from ecology to model multi-core cache usage with the competitive Lotka–Volterra equations. A model is presented and validated for characterizing the interaction of cores through shared caching, …


A Component-Based End-To-End Simulation Of The Linux File System, Amy Apon, Hai Nguyen Aug 2014

A Component-Based End-To-End Simulation Of The Linux File System, Amy Apon, Hai Nguyen

Amy W. Apon

The Linux file system is designed with components utilizing a layered architecture. The upper components hide details of the lower components, and each layer presents unified and simple interfaces to the layers above and below. This design helps Linux to be flexible as well as to provide support for multiple types of storage devices. In this paper, this component architecture is used to develop a realistic simulation without having to model lower level details of the hardware layer or particular storage devices. A detailed simulation-based performance model of the Linux ext3 file system has been developed using Colored Petri Nets. …


Personalizing Software Development Practice Using Mastery-Based Coaching, Chris Boesch, Sandra Boesch Jul 2014

Personalizing Software Development Practice Using Mastery-Based Coaching, Chris Boesch, Sandra Boesch

Chris BOESCH

The authors previously developed a system to facilitate the self-directed learning and practicing of software languages in Singapore. One of the goals of this self-directed learning was to enable the development of student mentors who would then be able to assist other students during classroom sessions. Building on this work, the authors extended the platform to support personalized coaching with the goals of further enabling and preparing students to mentor their peers. This paper covers the challenges, insights, and features that were developed in order to develop and deploy this mastery-based coaching feature.


Community Funding Models For Computational Resources, Amy Apon, Jeff Pummill, Dana Brunson Jul 2014

Community Funding Models For Computational Resources, Amy Apon, Jeff Pummill, Dana Brunson

Amy W. Apon

As scientific research has extended far beyond the practicality and abilities of laboratory experiments, computational simulations have become the mainstay of enabling and furthering the research in a way never previously thought possible. It is becoming commonplace to model and simulate both the very large, such as black hole collisions in astrophysics, and the very small, such as subatomic particle behavior and interaction in high energy physics. In addition to the previous examples detailing extremes, practically every area of research currently utilizes and benefits from computational resources to simulate their work; financial modeling, weather forecasting, geological phenomena, geo-spatial data analysis, …


Shibboleth As A Tool For Authorized Access Control To The Subversion Repository System, Linh Ngo, Amy Apon Jul 2014

Shibboleth As A Tool For Authorized Access Control To The Subversion Repository System, Linh Ngo, Amy Apon

Linh B Ngo

Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is maintained at their home institution. With Shibboleth, a federation of institutions can share resources among users and yet allow the administration of both the user access control to resources and the user identity and attribute information to be performed at the hosting or home institution. Subversion is a version control repository system that allows the creation of fine-grained permissions to files and directories. In this project an infrastructure, Shibbolized Subversion, has been …


The Pitman Inequality For Exchangeable Random Vectors, J. Behboodian, Naveen Bansal, Gholamhossein Hamedani, Hans Volkmer Jul 2014

The Pitman Inequality For Exchangeable Random Vectors, J. Behboodian, Naveen Bansal, Gholamhossein Hamedani, Hans Volkmer

Naveen Bansal

In this short article the following inequality called the “Pitman inequality” is proved for the exchangeable random vector (X1,X2,…,Xn)(X1,X2,…,Xn) without the assumption of continuity and symmetry for each component XiXi:

P(|1n∑i=1nXi|≤|∑i=1nαiXi|)≥12 ,

where allαi≥0 are special weights with∑i=1nαi=1.


Randomized Detection Of Extraneous Factors, Manfred Minimair Jun 2014

Randomized Detection Of Extraneous Factors, Manfred Minimair

Manfred Minimair

A projection operator of a system of parametric polynomials is a polynomial in the coefficients of the system that vanishes if the system has a common root. The projection operator is a multiple of the resultant of the system, and the factors of the projection operator that are not contained in the resultant are called extraneous factors. The main contribution of this work is to provide a randomized algorithm to check whether a factor is extraneous, which is an important task in applications. A lower bound for the success probability is determined which can be set arbitrarily close to one. …


As-Trust: A Trust Quantification Scheme For Autonomous Systems In Bgp, Jian Chang, Krishna Venkatasubramanian, Andrew West, Sampath Kannan, Boon Thau Loo, Oleg Sokolsky, Insup Lee Jun 2014

As-Trust: A Trust Quantification Scheme For Autonomous Systems In Bgp, Jian Chang, Krishna Venkatasubramanian, Andrew West, Sampath Kannan, Boon Thau Loo, Oleg Sokolsky, Insup Lee

Oleg Sokolsky

The Border Gateway Protocol (BGP) works by frequently exchanging updates that disseminate reachability information about IP prefixes (i.e., IP address blocks) between Autonomous Systems (ASes) on the Internet. The ideal operation of BGP relies on three major behavioral assumptions (BAs): (1) information contained in the update is legal and correct, (2) a route to a prefix is stable, and (3) the route adheres to the valley free routing policy. The current operation of BGP implicitly trusts all ASes to adhere to these assumptions. However, several documented violation of these assumptions attest to the fact that such an assumption of trust …


The Medical Device Dongle: An Open-Source Standards-Based Platform For Interoperable Medical Device Connectivity, Philip Asare, Danyang Cong, Santosh Vattam, Baekgyu Kim, Andrew King, Oleg Sokolsky, Insup Lee, Shan Lin, Margaret Mullen-Fortino Jun 2014

The Medical Device Dongle: An Open-Source Standards-Based Platform For Interoperable Medical Device Connectivity, Philip Asare, Danyang Cong, Santosh Vattam, Baekgyu Kim, Andrew King, Oleg Sokolsky, Insup Lee, Shan Lin, Margaret Mullen-Fortino

Oleg Sokolsky

Emerging medical applications require device coordination, increasing the need to connect devices in an interoperable manner. However, many of the existing health devices in use were not originally developed for network connectivity and those devices with networking capabilities either use proprietary protocols or implementations of standard protocols that are unavailable to the end user. The first set of devices are unsuitable for device coordination applications and the second set are unsuitable for research in medical device interoperability. We propose the Medical Device Dongle (MDD), a low-cost, open-source platform that addresses both issues.


As-Cred: Reputation And Alert Service For Inter-Domain Routing, Jian Chang, Krishna Venkatasubramanian, Andrew West, Sampath Kannan, Insup Lee, Boon Thau Loo, Oleg Sokolsky Jun 2014

As-Cred: Reputation And Alert Service For Inter-Domain Routing, Jian Chang, Krishna Venkatasubramanian, Andrew West, Sampath Kannan, Insup Lee, Boon Thau Loo, Oleg Sokolsky

Oleg Sokolsky

Being the backbone routing system of the Internet, the operational aspect of the inter-domain routing is highly complex. Building a trustworthy ecosystem for inter-domain routing requires the proper maintenance of trust relationships among tens of thousands of peer IP domains called Autonomous Systems (ASes). ASes today implicitly trust any routing information received from other ASes as part of the Border Gateway Protocol (BGP) updates. Such blind trust is problematic given the dramatic rise in the number of anomalous updates being disseminated, which pose grave security consequences for the inter-domain routing operation. In this paper, we present ASCRED, an AS reputation …


Link Spamming Wikipedia For Profit, Andrew West, Jian Chang, Krishna Venkatasubramanian, Oleg Sokolsky, Insup Lee Jun 2014

Link Spamming Wikipedia For Profit, Andrew West, Jian Chang, Krishna Venkatasubramanian, Oleg Sokolsky, Insup Lee

Oleg Sokolsky

Collaborative functionality is an increasingly prevalent web technology. To encourage participation, these systems usually have low barriers-to-entry and permissive privileges. Unsurprisingly, ill-intentioned users try to leverage these characteristics for nefarious purposes. In this work, a particular abuse is examined -- link spamming -- the addition of promotional or otherwise inappropriate hyperlinks.

Our analysis focuses on the "wiki" model and the collaborative encyclopedia, Wikipedia, in particular. A principal goal of spammers is to maximize *exposure*, the quantity of people who view a link. Creating and analyzing the first Wikipedia link spam corpus, we find that existing spam strategies perform quite poorly …


From Question Context To Answer Credibility: Modeling Semantic Structures For Question Answering Using Statistical Methods, Protima Banerjee, Hyoil Han Jun 2014

From Question Context To Answer Credibility: Modeling Semantic Structures For Question Answering Using Statistical Methods, Protima Banerjee, Hyoil Han

Hyoil Han

Within a Question Answering (QA) framework, Question Context plays a vital role. We define Question Context to be background knowledge that can be used to represent the user’s information need more completely than the terms in the query alone. This paper proposes a novel approach that uses statistical language modeling techniques to develop a semantic Question Context which we then incorporate into the Information Retrieval (IR) stage of QA. Our approach proposes an Aspect-Based Relevance Language Model as basis of the Question Context Model. This model proposes that the sparse vocabulary of a query can be supplemented with semantic information …


A Computationally Efficient System For High-Performance Multi-Document Summarization, Sean Sovine, Hyoil Han Jun 2014

A Computationally Efficient System For High-Performance Multi-Document Summarization, Sean Sovine, Hyoil Han

Hyoil Han

We propose and develop a simple and efficient algorithm for generating extractive multi-document summaries and show that this algorithm exhibits state-of-the-art or near state-of-the-art performance on two Document Understanding Conference datasets and two Text Analysis Conference datasets. Our results show that algorithms using simple features and computationally efficient methods are competitive with much more complex methods for multi-document summarization (MDS). Given these findings, we believe that our summarization algorithm can be used as a baseline in future MDS evaluations. Further, evidence shows that our system is near the upper limit of performance for extractive MDS.


Language Modeling Approaches To Information Retrieval, Protima Banerjee, Hyoil Han Jun 2014

Language Modeling Approaches To Information Retrieval, Protima Banerjee, Hyoil Han

Hyoil Han

This article surveys recent research in the area of language modeling (sometimes called statistical language modeling) approaches to information retrieval. Language modeling is a formal probabilistic retrieval framework with roots in speech recognition and natural language processing. The underlying assumption of language modeling is that human language generation is a random process; the goal is to model that process via a generative statistical model. In this article, we discuss current research in the application of language modeling to information retrieval, the role of semantics in the language modeling framework, cluster-based language models, use of language modeling for XML retrieval and …


Will Fault Localization Work For These Failures? An Automated Approach To Predict Effectiveness Of Fault Localization Tools, Tien-Duy B. Le, David Lo Jun 2014

Will Fault Localization Work For These Failures? An Automated Approach To Predict Effectiveness Of Fault Localization Tools, Tien-Duy B. Le, David Lo

David LO

Debugging is a crucial yet expensive activity to improve the reliability of software systems. To reduce debugging cost, various fault localization tools have been proposed. A spectrum-based fault localization tool often outputs an ordered list of program elements sorted based on their likelihood to be the root cause of a set of failures (i.e., their suspiciousness scores). Despite the many studies on fault localization, unfortunately, however, for many bugs, the root causes are often low in the ordered list. This potentially causes developers to distrust fault localization tools. Recently, Parnin and Orso highlight in their user study that many debuggers …


Drone: Predicting Priority Of Reported Bugs By Multi-Factor Analysis, Yuan Tian, David Lo, Chengnian Sun Jun 2014

Drone: Predicting Priority Of Reported Bugs By Multi-Factor Analysis, Yuan Tian, David Lo, Chengnian Sun

David LO

Bugs are prevalent. To improve software quality, developers often allow users to report bugs that they found using a bug tracking system such as Bugzilla. Users would specify among other things, a description of the bug, the component that is affected by the bug, and the severity of the bug. Based on this information, bug triagers would then assign a priority level to the reported bug. As resources are limited, bug reports would be investigated based on their priority levels. This priority assignment process however is a manual one. Could we do better? In this paper, we propose an automated …


Multi-Abstraction Concern Localization, Tien-Duy B. Duy, Shaowei Wang, David Lo Jun 2014

Multi-Abstraction Concern Localization, Tien-Duy B. Duy, Shaowei Wang, David Lo

David LO

Concern localization refers to the process of locating code units that match a particular textual description. It takes as input textual documents such as bug reports and feature requests and outputs a list of candidate code units that need to be changed to address the bug reports or feature requests. Many information retrieval (IR) based concern localization techniques have been proposed in the literature. These techniques typically represent code units and textual descriptions as a bag of tokens at one level of abstraction, e.g., each token is a word, or each token is a topic. In this work, we propose …


Theory And Practice, Do They Match? A Case With Spectrum-Based Fault Localization, Tien-Duy B. Le, Ferdian Thung, David Lo Jun 2014

Theory And Practice, Do They Match? A Case With Spectrum-Based Fault Localization, Tien-Duy B. Le, Ferdian Thung, David Lo

David LO

Spectrum-based fault localization refers to the process of identifying program units that are buggy from two sets of execution traces: normal traces and faulty traces. These approaches use statistical formulas to measure the suspiciousness of program units based on the execution traces. There have been many spectrum-based fault localization approaches proposing various formulas in the literature. Two of the best performing and well-known ones are Tarantula and Ochiai. Recently, Xie et al. find that theoretically, under certain assumptions, two families of spectrum-based fault localization formulas outperform all other formulas including those of Tarantula and Ochiai. In this work, we empirically …


Intertwining Material And Virtual Work, Daniel Robey, Kathy Schwaig, Leigh Jin May 2014

Intertwining Material And Virtual Work, Daniel Robey, Kathy Schwaig, Leigh Jin

Kathy S Schwaig

Virtual work in organizations continues to be promoted despite the absence of a strong conceptual understanding of virtual work and its consequences. In this paper, we draw from and , who treat virtual work as a second, electronically mediated representation of material work. The virtual and material representations co-exist and intertwine, potentially allowing teams and organizations to extend their capabilities. We identify four aspects of intertwining: reinforcement, complementarity, synergy, and reciprocity. In instances where the relationship between virtual and material worlds of work lack one or more of these aspects, ironic and confused outcomes may result. We illustrate these aspects …


Knowledge Management In An Organisational Climate Of Uncertainty And Change: A Longitudinal Case Study Of An Australian University, Denise Gengatharen Apr 2014

Knowledge Management In An Organisational Climate Of Uncertainty And Change: A Longitudinal Case Study Of An Australian University, Denise Gengatharen

Denise E Gengatharen

Universities are in the knowledge business and are expected to be at the forefront of knowledge management (KM). However, KM in a university is complex given the diversity of stakeholder groups. This is exacerbated in the Australian context by the changing climate of rationalisation, corporatisation and marketisation universities faced in the past decade. This paper investigates KM strategies in an Australian university to uncover barriers to knowledge-sharing among academics. Although the organisational infrastructure supports KM, many academics have not actively embraced it. One reason is that they struggle with KM for operational excellence in the increasing administrative aspects of the …


You've Got Mail: Accountability And End User Attitudes To Email Management., Mark Brogan, Susan Vreugdenburg Apr 2014

You've Got Mail: Accountability And End User Attitudes To Email Management., Mark Brogan, Susan Vreugdenburg

Mark Brogan

In a pioneering ethnographic study of end user responses to the problem of ‘information overload’ Whittaker and Sidner (1996) found that the design of systems primarily as methods of asynchronous communication, posed significant information management problems for users. In another contemporaneous study, David Bearman (1993) extended understanding of the implications of end user email management behavior by identifying significant accountability implications for organizations arising from the use of email. Recent case studies in the United States and Australia (Leopold, 2008; Raleigh Chronicle, 2008; Strutt, and Taylor, 2007) have once again focused attention on the accountability consequences for Government of email …


A Bounded Or Unbounded Universe?: Knowledge Management In Postgraduate Lis Education, Mark Brogan, Philip Hingston, Victoria Wilson Apr 2014

A Bounded Or Unbounded Universe?: Knowledge Management In Postgraduate Lis Education, Mark Brogan, Philip Hingston, Victoria Wilson

Mark Brogan

The School of Computer and Information Science at ECU has made a commitment to teaching Knowledge Management (KM) and is, at present, engaged in the process of determining its place within existing postgraduate LIS and IT courses. In turn, it is engaging in debate with other academics and industry practitioners about the unique contribution that the LIS disciplines could make to KM. This paper reports on the research and consultative processes that the School undertook and discusses the findings and conclusions. It will also offer some thoughts on where the authors believe LIS, in particular, can make a contribution to …


A Rich Storehouse For The Relief Of Man's Estate: Education For Knowledge Management, Victoria Wilson, Philip Hingston, Mark Brogan Apr 2014

A Rich Storehouse For The Relief Of Man's Estate: Education For Knowledge Management, Victoria Wilson, Philip Hingston, Mark Brogan

Mark Brogan

No abstract provided.


In The Shadow Of The Cloud - Technology In The Rim Workspace, Mark Brogan, David Roberts Apr 2014

In The Shadow Of The Cloud - Technology In The Rim Workspace, Mark Brogan, David Roberts

Mark Brogan

In 2008 RIM Professionals Australasia conducted its first Technology Survey, on which the authors reported in a previous issue. At the time, it was recognised that the greatest value to professionals would come from a longitudinal study, enabling 'flash in the pan' innovation to be sorted from durable change that has implications for the work and education of RIM professionals. This article - in two parts in this issue of iQ and the next - reports results from the RIM Professionals Australasia 2010 Technology Survey, which has enabled a longitudinal view of data first gathered in 2008.


Ae2 Commander: Simulation And Serious Games In The Online Cultural Heritage Space, Mark Brogan, Martin Masek Apr 2014

Ae2 Commander: Simulation And Serious Games In The Online Cultural Heritage Space, Mark Brogan, Martin Masek

Mark Brogan

In 2009, the School of Computer and Security Science, Edith Cowan University, won an Ian Maclean Award to research the role of computer simulation in the archives online space.1 The grant was used to build an authentic World War I role-play game called AE2 Commander, based on the exploits of the World War I Australian submarine AE2.2 AE2 Commander is being used to research the application of serious gaming technologies and methods in the archives online space and to foster understanding of how original sources might be used as part of computer simulation and serious gaming. In this article, the …


Social Sensing For Urban Crisis Management: The Case Of Singapore Haze, Philips Kokoh Prasetyo, Ming Gao, Ee Peng Lim, Christie N. Scollon Mar 2014

Social Sensing For Urban Crisis Management: The Case Of Singapore Haze, Philips Kokoh Prasetyo, Ming Gao, Ee Peng Lim, Christie N. Scollon

Ming Gao

Sensing social media for trends and events has become possible as increasing number of users rely on social media to share information. In the event of a major disaster or social event, one can therefore study the event quickly by gathering and analyzing social media data. One can also design appropriate responses such as allocating resources to the affected areas, sharing event related information, and managing public anxiety. Past research on social event studies using social media often focused on one type of data analysis (e.g., hashtag clusters, diffusion of events, influential users, etc.) on a single social media data …


Jummp: Job Uninterrupted Maneuverable Mapreduce Platform, William Moody, Linh Ngo, Edward Duffy, Amy Apon Feb 2014

Jummp: Job Uninterrupted Maneuverable Mapreduce Platform, William Moody, Linh Ngo, Edward Duffy, Amy Apon

Amy W. Apon

In this paper, we present JUMMP, the Job Uninterrupted Maneuverable MapReduce Platform, an automated scheduling platform that provides a customized Hadoop environment within a batch-scheduled cluster environment. JUMMP enables an interactive pseudo-persistent MapReduce platform within the existing administrative structure of an academic high performance computing center by “jumping” between nodes with minimal administrative effort. Jumping is implemented by the synchronization of stopping and starting daemon processes on different nodes in the cluster. Our experimental evaluation shows that JUMMP can be as efficient as a persistent Hadoop cluster on dedicated computing resources, depending on the jump time. Additionally, we show that …