Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Wright State University (255)
- Singapore Management University (150)
- Edith Cowan University (89)
- Brigham Young University (61)
- Embry-Riddle Aeronautical University (56)
-
- Selected Works (56)
- Missouri University of Science and Technology (53)
- University of Massachusetts Amherst (52)
- Washington University in St. Louis (47)
- Air Force Institute of Technology (39)
- University of Nebraska - Lincoln (39)
- SelectedWorks (34)
- Georgia State University (31)
- City University of New York (CUNY) (29)
- Dartmouth College (27)
- Old Dominion University (26)
- Purdue University (25)
- California Polytechnic State University, San Luis Obispo (24)
- TÜBİTAK (23)
- California State University, San Bernardino (22)
- Clemson University (21)
- Regis University (20)
- Taylor University (18)
- University of Central Florida (18)
- San Jose State University (17)
- University of Nebraska at Omaha (16)
- Technological University Dublin (13)
- Smith College (11)
- Claremont Colleges (7)
- New Jersey Institute of Technology (7)
- Keyword
-
- [RSTDPub] (26)
- College for Professional Studies (20)
- School of Computer & Information Science (19)
- Machine learning (18)
- Architecture Arts and Humanities Business Education Engineering Law Life Sciences Medicine and Health Sciences Physical Sciences and Mathematics Social and Behavioral Sciences (17)
-
- MS Computer and Information Technology (15)
- Computer science (14)
- Department of Computer Science and Engineering (11)
- Regis University MSCIT thesis (11)
- Technology (11)
- #antcenter (10)
- Bioinformatics (9)
- Design (9)
- Government (9)
- Information technology (9)
- Internet (9)
- Security (9)
- Semantic Web (9)
- Authentication (8)
- Ontology (8)
- Artificial intelligence (7)
- Computer graphics (7)
- Data mining (7)
- Information security (7)
- Services Computing (7)
- Algorithms (6)
- Data Mining (6)
- Department of Computer Science (6)
- Documentation (6)
- Forensics (6)
- Publication
-
- Computer Science & Engineering Syllabi (160)
- Research Collection School Of Computing and Information Systems (150)
- Theses and Dissertations (72)
- Kno.e.sis Publications (57)
- All Computer Science and Engineering Research (47)
-
- Computer Science Technical Reports (39)
- Faculty Publications (35)
- Journal of Digital Forensics, Security and Law (35)
- Computer Science Faculty Publications (29)
- Australian Information Security Management Conference (26)
- Research outputs pre 2011 (26)
- Department of Computer Science Technical Reports (25)
- Australian Digital Forensics Conference (24)
- Turkish Journal of Electrical Engineering and Computer Sciences (23)
- Andrew McCallum (22)
- Electrical and Computer Engineering Faculty Research & Creative Works (22)
- Electronic Theses and Dissertations (22)
- Computer Science Department Faculty Publication Series (21)
- Computer Science and Engineering Faculty Publications (21)
- Theses Digitization Project (21)
- Regis University Student Publications (comprehensive collection) (20)
- Philadelphia University, Jordan (19)
- ACMS Conference Proceedings 2007 (18)
- CSE Technical Reports (18)
- Browse all Theses and Dissertations (17)
- Computer Science and Software Engineering (17)
- Annual ADFSL Conference on Digital Forensics, Security and Law (16)
- Computer Science Dissertations (15)
- Computer Science Faculty Research & Creative Works (15)
- Master's Projects (15)
- Publication Type
Articles 1 - 30 of 1470
Full-Text Articles in Physical Sciences and Mathematics
Humancentric Applications Of Rfid Chips, S. Derrick, K. Michael, H. Tootell
Humancentric Applications Of Rfid Chips, S. Derrick, K. Michael, H. Tootell
Dr Holly Tootell
No abstract provided.
Unit Rectangle Visibility Graphs, Alice M. Dean, Joanna A. Ellis-Monaghan, Sarah J. Hamilton, Greta Pangborn
Unit Rectangle Visibility Graphs, Alice M. Dean, Joanna A. Ellis-Monaghan, Sarah J. Hamilton, Greta Pangborn
Mathematics, Statistics and Computer Science Faculty Research and Publications
Over the past twenty years, rectangle visibility graphs have generated consider- able interest, in part due to their applicability to VLSI chip design. Here we study unit rectangle visibility graphs, with fixed dimension restrictions more closely modeling the constrained dimensions of gates and other circuit components in computer chip applications. A graph G is a unit rectangle visibility graph (URVG) if its vertices can be represented by closed unit squares in the plane with sides parallel to the axes and pairwise disjoint interiors, in such a way that two vertices are adjacent if and only if there is a non-degenerate …
Toward A New Generation Of Ice Sheet Models, Christopher M. Little, Michael Oppenheimer, Richard B. Alley, Venkatramani Balaji, Garry K. C. Clarke, Thomas L. Delworth, Robert Hallberg, David Holland, Christina L. Hulbe, Stan Jacobs, Jesse V. Johnson, Hiram Levy, William Lipscomb, Shawn J. Marshall, Byron R. Parizek, Antony J. Payne, Gavin A. Schmidt, Ronald J. Stouffer, David G. Vaughan, Michael Winton
Toward A New Generation Of Ice Sheet Models, Christopher M. Little, Michael Oppenheimer, Richard B. Alley, Venkatramani Balaji, Garry K. C. Clarke, Thomas L. Delworth, Robert Hallberg, David Holland, Christina L. Hulbe, Stan Jacobs, Jesse V. Johnson, Hiram Levy, William Lipscomb, Shawn J. Marshall, Byron R. Parizek, Antony J. Payne, Gavin A. Schmidt, Ronald J. Stouffer, David G. Vaughan, Michael Winton
Computer Science Faculty Publications
This report summarizes the conclusions and recommendations of a 1-day workshop on ice sheet modeling held at the NOAA Geophysical Fluid Dynamics Laboratory on 8 January 2007, sponsored by NOAA and by the Program in Science, Technology, and Environmental Policy of the Woodrow Wilson School of Public and International Affairs at Princeton University, N. J.
Automated Refinement And Augmentation Of Web Service Description Files, Marc Fisher Ii, Sebastian Elbaum, Gregg Rothermel
Automated Refinement And Augmentation Of Web Service Description Files, Marc Fisher Ii, Sebastian Elbaum, Gregg Rothermel
CSE Technical Reports
Web Service Description Language (WSDL) is being increasingly used to specify web service interfaces. Specifications of this type, however, are often incomplete or imprecise. For example, cursory examination of the WSDL file for Amazon’s E-Commerce Web Service reveals that it often uses a less specific type where a more specific type is applicable, or declares that elements could be missing where other documentation indicates that they are required. Further, specifications reflecting the temporal relationships between operations are completely missing, which is not surprising since they are not supported by the current WSDL standard. These problems in WSDL specifications can cause …
A Unified Framework For Solving Multiagent Task Assignment Problems, Kevin Cousin
A Unified Framework For Solving Multiagent Task Assignment Problems, Kevin Cousin
Theses and Dissertations
Multiagent task assignment problem descriptors do not fully represent the complex interactions in a multiagent domain, and algorithmic solutions vary widely depending on how the domain is represented. This issue is compounded as related research fields contain descriptors that similarly describe multiagent task assignment problems, including complex domain interactions, but generally do not provide the mechanisms needed to solve the multiagent aspect of task assignment. This research presents a unified approach to representing and solving the multiagent task assignment problem for complex problem domains. Ideas central to multiagent task allocation, project scheduling, constraint satisfaction, and coalition formation are combined to …
Settling For Limited Privacy: How Much Does It Help?, Anna M. Shubina
Settling For Limited Privacy: How Much Does It Help?, Anna M. Shubina
Dartmouth College Ph.D Dissertations
This thesis explores practical and theoretical aspects of several privacy-providing technologies, including tools for anonymous web-browsing, verifiable electronic voting schemes, and private information retrieval from databases. State-of-art privacy-providing schemes are frequently impractical for implementational reasons or for sheer information-theoretical reasons due to the amount of information that needs to be transmitted. We have been researching the question of whether relaxing the requirements on such schemes, in particular settling for imperfect but sufficient in real-world situations privacy, as opposed to perfect privacy, may be helpful in producing more practical or more efficient schemes. This thesis presents three results. The first result …
A Hybrid Multi-Robot Control Architecture, Daylond J. Hooper
A Hybrid Multi-Robot Control Architecture, Daylond J. Hooper
Theses and Dissertations
Multi-robot systems provide system redundancy and enhanced capability versus single robot systems. Implementations of these systems are varied, each with specific design approaches geared towards an application domain. Some traditional single robot control architectures have been expanded for multi-robot systems, but these expansions predominantly focus on the addition of communication capabilities. Both design approaches are application specific and limit the generalizability of the system. This work presents a redesign of a common single robot architecture in order to provide a more sophisticated multi-robot system. The single robot architecture chosen for application is the Three Layer Architecture (TLA). The primary strength …
Rendering Principal Direction Contour Lines With Oriented Textures, Kelly Gallagher
Rendering Principal Direction Contour Lines With Oriented Textures, Kelly Gallagher
All Theses
In this paper we explore the use of contour lines in computer graphics as a means of conveying shape to the end-user. Contour lines provide an alternative to traditional realistic rendering styles and may even provide a more appropriate visualization for certain situations. For our images, contour line orientation is established in accordance with principal curvature directions.
We present a method for rendering a texture, oriented in the principal curvature direction, across a traditionally-modeled geometric surface that effectively forms suggestive contour lines to enhance the visualization of that surface. We further extend the method to create animated contour textures, wherein …
A Middle-Ware Level Client Cache For A High Performance Computing I/O Simulator, Michael Bassily
A Middle-Ware Level Client Cache For A High Performance Computing I/O Simulator, Michael Bassily
All Theses
This thesis describes the design and run time analysis of the system level middle-ware cache for Hecios. Hecios is a high performance cluster I/O simulator. With Hecios, we provide a simulation environment that accurately captures the performance characteristics of all the components in a clusterwide parallel file system. Hecios was specifically modeled after PVFS2. It was designed to be extensible and to easily allow for various component modules to be easily replaced by those that model other system types. Built around the OMNeT++ simulation package, Hecios' inner-cluster communication module is easily adaptable to any TCP/IP based protocol and all standard …
Hybrid Image/Model Based Gaze-Contingent Rendering, Hunter Murphy
Hybrid Image/Model Based Gaze-Contingent Rendering, Hunter Murphy
All Dissertations
A non-isotropic hybrid image/model based gaze-contingent rendering technique utilizing ray casting on a GPU is discussed. Empirical evidence derived from human subject experiments indicates an inverse relationship between a peripherally degraded scene's high-resolution inset size and mean search time, a trend consistent with existing image-based and model-based techniques. In addition, the data suggest that maintaining a target's silhouette edges decreases search times when compared to targets with degraded edges. Benefits of the hybrid technique include simplicity of design and parallelizability, both conducive to GPU implementation.
Learning Languages From Positive Data And A Limited Number Of Short Counterexamples, Sanjay Jain, Efim Kinber
Learning Languages From Positive Data And A Limited Number Of Short Counterexamples, Sanjay Jain, Efim Kinber
School of Computer Science & Engineering Faculty Publications
We consider two variants of a model for learning languages in the limit from positive data and a limited number of short negative counterexamples (counterexamples are considered to be short if they are smaller than the largest element of input seen so far). Negative counterexamples to a conjecture are examples which belong to the conjectured language but do not belong to the input language. Within this framework, we explore how/when learners using n short (arbitrary) negative counterexamples can be simulated (or simulate) using least short counterexamples or just ‘no’ answers from a teacher. We also study how a limited number …
Distributed Web Service Coordination For Collaboration Applications And Biological Workflows, Janaka Lalith Balasooriya
Distributed Web Service Coordination For Collaboration Applications And Biological Workflows, Janaka Lalith Balasooriya
Computer Science Dissertations
In this dissertation work, we have investigated the main research thrust of decentralized coordination of workflows over web services. To address distributed workflow coordination, first we have developed “Web Coordination Bonds” as a capable set of dependency modeling primitives that enable each web service to manage its own dependencies. Web bond primitives are as powerful as extended Petri nets and have sufficient modeling and expressive capabilities to model workflow dependencies. We have designed and prototyped our “Web Service Coordination Management Middleware” (WSCMM) system that enhances current web services infrastructure to accommodate web bond enabled web services. Finally, based on core …
Improving Information Security Management In Nonprofit Organisations With Action, Mark Carey-Smith, Karen Nelson, Lauren May
Improving Information Security Management In Nonprofit Organisations With Action, Mark Carey-Smith, Karen Nelson, Lauren May
Australian Information Security Management Conference
Information security is vital for protecting important assets of organisations, including the information resources and the organisation’s reputation. In Australia, the nonprofit sector makes a significant contribution to society but is under represented in the information security literature. This paper describes research in progress that is investigating and improving information security management in some nonprofit organisations (NPOs), which incorporates a participatory action research methodology. This approach will enhance the skill set likely to be present in Australian nonprofit organisations, producing a more sustainable solution, as well as contributing to the open literature. The Technology Acceptance Model will be utilised as …
Device- Versus Network-Centric Authentication Paradigms For Mobile Devices: Operational And Perceptual Trade-Offs, S. Karatzouni, N. L. Clarke, S. M. Furnell
Device- Versus Network-Centric Authentication Paradigms For Mobile Devices: Operational And Perceptual Trade-Offs, S. Karatzouni, N. L. Clarke, S. M. Furnell
Australian Information Security Management Conference
The increasing capability and functionality of mobile devices is leading to a corresponding increase in the need for security to prevent unauthorised access. Indeed, as the data and services accessed via mobile devices become more sensitive, the existing method of user authentication (predominately based upon Personal Identification Numbers) appears increasingly insufficient. An alternative basis for authentication is offered by biometric approaches; which have the potential to be implemented in a non-intrusive manner and also enable authentication to be applied in an ongoing manner, beyond initial point-of-entry. However, the implementation of any authentication mechanism, particularly biometric approaches, introduces considerations of where …
Intrusion Detection System (Ids) Techniques And Responses For Mobile Wireless Networks, Krishnun Sansurooah
Intrusion Detection System (Ids) Techniques And Responses For Mobile Wireless Networks, Krishnun Sansurooah
Australian Information Security Management Conference
In recent years, the rapidly expanding area of mobile and wireless computing applications was definitely redefined the concept of network security. Even though that wireless had opened a new and exiting world with its advancing technology it is no doubt that it is popularity is on the rise. However, the biggest concern with either wireless or mobile computing applications in security. It can no longer be effective in the traditional way of securing networks with the use of firewalls and even with the use of stronger encryption algorithm keys. The need to develop and research for new structures and methods …
Medical Insecurity: When One Size Does Not Fit All, Patricia A. Williams
Medical Insecurity: When One Size Does Not Fit All, Patricia A. Williams
Australian Information Security Management Conference
Security is most commonly seen as a business concept. This is one reason for the poor uptake and implementation of standard security processes in non-business environments such as general medical practice. It is clear that protection of sensitive patient information is imperative yet the overarching conceptual business processes required to ensure this protection are not well suited to this context. The issue of sensitivity of information, together with the expectation that security can be effectively implemented by non-security trained professionals creates an insecure environment. The general security processes used by business, including those for risk assessment, are difficult to operationally …
Security Issues Within Virtual Worlds Such As Second Life, Chia Yao Lee, Matthew Warren
Security Issues Within Virtual Worlds Such As Second Life, Chia Yao Lee, Matthew Warren
Australian Information Security Management Conference
The advancement in Internet and bandwidth has resulted in a number of new applications to be developed. An area of advancement has been in the development of virtual worlds, where people can interact together via virtual characters. Virtual World systems have been so complex that virtual lives can be lived, including all aspect of life such as education, commerce, social activities etc. Not surprisingly, the problems that exist in the real world such as theft, fraud, vandalism and terrorism, also exist in the virtual worlds. The more developed these virtual worlds become the greater the breaches of security will be …
A Single Channel Attack On 915mhz Radio Frequency Identification Systems, Christopher Bolan
A Single Channel Attack On 915mhz Radio Frequency Identification Systems, Christopher Bolan
Australian Information Security Management Conference
There has been some speculation as to the protection offered by the Frequency Hopping Spread Spectrum utilised by RFID technology. This paper explores the construction of an attack based on the broadcast of an attack signal in a single channel. The study details an experiment on two groups of tags where the experimental group are exposed to an attack signal broadcast on a single channel. With consistent findings across both control and experimental groups the experiment clearly demonstrates that FHSS offers no protection against such an attack.
Teaching Php With Security In Mind, Greg Baatard
Teaching Php With Security In Mind, Greg Baatard
Australian Information Security Management Conference
The PHP server-side scripting language has found significant popularity due to its accessibility, simplicity and affordability. With the deployment of PHP-inclusive web development environments becoming easier, universities have begun to offer units of study in the language. However, students coming from a background of HTML-based web development will often not be adequately prepared to consider the security implications associated with a powerful scripting language. It is important that students are taught to recognise and respond to the security implications of their code from an early stage, as a matter of good programming practice. This paper demonstrates how security teachings can …
Evolution Of A Database Security Course: Using Non-Enterprise Teaching Tools, Justin Brown
Evolution Of A Database Security Course: Using Non-Enterprise Teaching Tools, Justin Brown
Australian Information Security Management Conference
This paper examines the issues in delivering a university unit of teaching in database security, examining problems in database environment selection and the ability to provide hands on training for students via oncampus and online modes. Initial problems with Linux and then Windows based enterprise database environments prompted the adoption of Microsoft Access as a database tool that was easier to deliver in-class and online. Though Access is file based and has fundamental flaws in its security implementation (within the enterprise context) it can be tweaked to emulate RDBMS level security, allowing students to see how a properly designed security …
The Impact Of Security Surveys Within Australia And New Zealand, Matthew J. Warren, Shona Leitch
The Impact Of Security Surveys Within Australia And New Zealand, Matthew J. Warren, Shona Leitch
Australian Information Security Management Conference
Information security is portrayed as a global problem that impacts all countries that are considered as part of the Information Society. Recent surveys show that there are increased concerns about computer crime. The paper will focus upon recent national security surveys from Australia and New Zealand and the trends that this research shows. Is it fair to assume the security practices are the same all over the world? The paper looks at security practices from a number of different countries perspectives and shows that security practices are not generic and vary from country to country. The paper will also evaluate …
An Investigation Into The Usability Of Graphical Authentication Using Authentigraph, Paul Minne, Jason Wells, Damien Hutchinson, Justin Pierce
An Investigation Into The Usability Of Graphical Authentication Using Authentigraph, Paul Minne, Jason Wells, Damien Hutchinson, Justin Pierce
Australian Information Security Management Conference
There is increasing coverage in the literature relating to the different facets surrounding the security service of authentication, but there is a need for further research into the usability of graphical authentication. Specifically, the usability and viability of graphical authentication techniques for providing increased security needs to be further explored. There is a significant amount of evidence relating to traditional authentication techniques which highlight the fact that as technological advances grip modern societies, the requirement for more advanced authentication and security approaches increases. The exponential growth in the number of people using the Internet carries with it the high potential …
The Importance Of Human Factors When Assessing Outsourcing Security Risks, Carl Colwill, Andy Jones
The Importance Of Human Factors When Assessing Outsourcing Security Risks, Carl Colwill, Andy Jones
Australian Information Security Management Conference
The word is becoming increasingly interconnected and ways of doing business are evolving rapidly. Communications technology is ubiquitous and reliable and businesses are continuously seeking ways in which systems can be exploited to improve resilience, become more efficient and reduce costs. One way in which organisations seek to achieve this is by concentrating their efforts on core business processes and outsourcing non-core functions. However, outsourcing - and particularly offshoring - presents many security issues that must be considered throughout the lifetime of contracts. The scale of outsourcing and increasing technological and security complexity is making this task more difficult. Often …
How Safe Is Azeroth, Or, Are Mmorpgs A Security Risk?, An Hilven, Andrew Woodward
How Safe Is Azeroth, Or, Are Mmorpgs A Security Risk?, An Hilven, Andrew Woodward
Australian Information Security Management Conference
Massive Multiplayer Online Role Playing Games (MMORPGs) are at a basic level a networked application. Blizzard’s World of Warcraft is currently the largest example of such a type of application, with over nine million subscribers at last count. Whilst the idea of researching a game for network security may sound trivial, nine million potential backdoors into home and business computers is not. The ports used by the game, as well as authentication methods and client update programs were examined using packet analysis software. No obvious vulnerabilities were discovered as a result of this analysis. In addition to this analysis, an …
A Conceptual Model For Security Outsourcing, K. Samarasinghe, M. Warren, G. Pye
A Conceptual Model For Security Outsourcing, K. Samarasinghe, M. Warren, G. Pye
Australian Information Security Management Conference
This research analyses the current literature on IT security outsourcing and the organisational attitudes towards this approach to determine the applicability of outsourcing IT security in a commercial environment. A conceptual model is developed as the main goal of research which provides guidance in the process of outsourcing IT security functions to a third-party security service provider. The research conducted has established a complete process for outsourcing IT security.
Information Security Surveys: A Review Of The Methodologies, The Critics And A Pragmatic Approach To Their Purposes And Usage, Alexis Guillot, Sue Kennedy
Information Security Surveys: A Review Of The Methodologies, The Critics And A Pragmatic Approach To Their Purposes And Usage, Alexis Guillot, Sue Kennedy
Australian Information Security Management Conference
Each year the latest information security surveys are released to the computing and business communities. Often their findings and their methodologies are subject to criticism from the information security community, professional bodies and others in the profession. This paper looks at the viewpoints of both the producers and the critics of the surveys. The criticisms cover such issues as the methodologies, the response rates, the experience of the respondents, the design of the questions and the interpretation of the results. This paper looks at these issues and discusses the validity of these criticisms, the impact of the surveys and their …
Network Security – Is Ip Telephony Helping The Cause?, Paul Hansen, Andrew Woodward
Network Security – Is Ip Telephony Helping The Cause?, Paul Hansen, Andrew Woodward
Australian Information Security Management Conference
The major players in the Public Branch Exchange (PBX) market are moving rapidly towards the implementation of IP Telephony. What will be the effect on network security overall? Will the push to IP Telephony damage the good work already devoted to security networks? As more doorways open up on our networks there is an increased chance we have opened another unseen vector for hackers and other malicious organisation or individuals to access the data stored on server and users workstations, corrupting that data or destroying it. Is it better from a security perspective to have IP telephony only between PBX …