Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer science

2006

Discipline
Institution
Publication
Publication Type
File Type

Articles 1 - 13 of 13

Full-Text Articles in Physical Sciences and Mathematics

Properties Of Some Matrix Classes In Linear Complementarity Theory., Arup Kumar Das Dr. Nov 2006

Properties Of Some Matrix Classes In Linear Complementarity Theory., Arup Kumar Das Dr.

Doctoral Theses

The linear complementarity problem is a fundamental problem that arises in optimization, game theory, economics, and engineering. It can be stated as follows:Given a square matrix A of order n with real entries and an n dimensional vector q, find n dimensional vectors w and z satisfying w − Az = q, w ≥ 0, z ≥ 0 (1.1.1) w t z = 0. (1.1.2)This problem is denoted as LCP(q, A). The name comes from the condition (1.1.2), the complementarity condition which requires that at least one variable in the pair (wj , zj ) should be equal to 0 …


Modeling Heterogeneous User Churn And Local Resilience Of Unstructured P2p Networks, Zhongmei Yao, Derek Leonard, Dmitri Loguinov, Xiaoming Wang Nov 2006

Modeling Heterogeneous User Churn And Local Resilience Of Unstructured P2p Networks, Zhongmei Yao, Derek Leonard, Dmitri Loguinov, Xiaoming Wang

Computer Science Faculty Publications

Previous analytical results on the resilience of unstructured P2P systems have not explicitly modeled heterogeneity of user churn (i.e., difference in online behavior) or the impact of in-degree on system resilience. To overcome these limitations, we introduce a generic model of heterogeneous user churn, derive the distribution of the various metrics observed in prior experimental studies (e.g., lifetime distribution of joining users, joint distribution of session time of alive peers, and residual lifetime of a randomly selected user), derive several closed-form results on the transient behavior of in-degree, and eventually obtain the joint in/out degree isolation probability as a simple …


Image Up-Sampling Using The Discrete Wavelet Transform, Laleh Asgharian Aug 2006

Image Up-Sampling Using The Discrete Wavelet Transform, Laleh Asgharian

Theses and Dissertations - UTB/UTPA

Image up-sampling is an effective technique, useful in today's digital image processing applications and rendering devices. In image up-sampling, an image is enhanced from a lower resolution to a higher resolution with the degree of enhancement depending upon application requirements. It is known that the traditional interpolation based approaches for up-sampling, such as the Bilinear or Bicubic interpolations, blur the resultant images along edges and image features. Furthermore, in color imagery, these interpolation-based up-sampling methods may have color infringing artifacts in the areas where the images contain sharp edges and fine textures. We present an interesting up-sampling algorithm based on …


Improving Record Linkage Through Pedigrees, Burdette N. Pixton Jul 2006

Improving Record Linkage Through Pedigrees, Burdette N. Pixton

Theses and Dissertations

Record linkage, in a genealogical context, is the process of identifying individuals from multiple sources which refer to the same real-world entity. Current solutions focus on the individuals in question and on complex rules developed by human experts. Genealogical databases are highly-structured with relationships existing between the individuals and other instances. These relationships can be utilized and human involvement greatly minimized by using a filtered structured neural network. These neural networks, using traditional back-propagation methods, are biased in a way to make the network human readable. The results show an increase in precision and recall when pedigree data is available …


Design Of Iteration On Hash Functions And Its Cryptanalysis., Mridul Nandi Dr. May 2006

Design Of Iteration On Hash Functions And Its Cryptanalysis., Mridul Nandi Dr.

Doctoral Theses

No abstract provided.


Scalable Approaches For Supporting Mpi-Io Atomicity, Peter Aarestad, George K. Thiruvathukal, Avery Ching, Alok Choudhary May 2006

Scalable Approaches For Supporting Mpi-Io Atomicity, Peter Aarestad, George K. Thiruvathukal, Avery Ching, Alok Choudhary

Computer Science: Faculty Publications and Other Works

Scalable atomic and parallel access to noncontiguous regions of a file is essential to exploit high performance I/O as required by large-scale applications. Parallel I/O frameworks such as MPI I/O conceptually allow I/O to be defined on regions of a file using derived datatypes. Access to regions of a file can be automatically computed on a perprocessor basis using the datatype, resulting in a list of (offset, length) pairs. We describe three approaches for implementing lock serving (whole file, region locking, and byterange locking) and compare the various approaches using three noncontiguous I/O benchmarks. We present the details of the …


Abstracts Of Papers, 84th Annual Meeting Of The Virginia Academy Of Science Apr 2006

Abstracts Of Papers, 84th Annual Meeting Of The Virginia Academy Of Science

Virginia Journal of Science

Full abstracts of papers for the 84th Annual Meeting of the Virginia Academy of Science, May 25-26, 2006, Virginia Polytechnic Institute and State University, Blacksburg, VA


Studies On Pairing-Based And Constant Round Dynamic Group Key Agreement., Ratna Dutta Dr. Feb 2006

Studies On Pairing-Based And Constant Round Dynamic Group Key Agreement., Ratna Dutta Dr.

Doctoral Theses

This thesis describes research that I conducted during the course of my Ph.D. study at Indian Statistical Institute (ISI), Kolkata. I hope that this work is of use and will be carried on.I would like to begin by thanking my supervisor, Prof. Rana Barua for his support and endless patience. He has provided me background in Cryptography, Combinatorics and Theory of Automata during the period 2000-2002 of my course work of M.Tech in Computer Science at Indian Statistical Institute. I really appreciate his extraordinary patience in reading my numerous inferior drafts, for listening and analyzing all my ideas, forcing me …


Automatic Solar Feature Detection Using Image Processing And Pattern Recognition Techniques, Ming Qu Jan 2006

Automatic Solar Feature Detection Using Image Processing And Pattern Recognition Techniques, Ming Qu

Dissertations

The objective of the research in this dissertation is to develop a software system to automatically detect and characterize solar flares, filaments and Corona Mass Ejections (CMEs), the core of so-called solar activity. These tools will assist us to predict space weather caused by violent solar activity. Image processing and pattern recognition techniques are applied to this system.

For automatic flare detection, the advanced pattern recognition techniques such as Multi-Layer Perceptron (MLP), Radial Basis Function (RBF), and Support Vector Machine (SVM) are used. By tracking the entire process of flares, the motion properties of two-ribbon flares are derived automatically. In …


The Hydra Filesystem: A Distrbuted Storage Famework, Benjamin Gonzalez, George K. Thiruvathukal Jan 2006

The Hydra Filesystem: A Distrbuted Storage Famework, Benjamin Gonzalez, George K. Thiruvathukal

Computer Science: Faculty Publications and Other Works

Hydra File System (HFS) is an experimental framework for constructing parallel and distributed filesystems. While parallel and distributed applications requiring scalable and flexible access to storage and retrieval are becoming more commonplace, parallel and distributed filesystems remain difficult to deploy easily and configure for different needs. HFS aims to be different by being true to the tradition of high-performance computing while employing modern design patterns to allow various policies to be configured on a per instance basis (e.g. storage, communication, security, and indexing schemes). We describe a working prototype (available for public download) that has been implemented in the Python …


Rhode Island College Mobile Course Catalog, Lianne Elsner Jan 2006

Rhode Island College Mobile Course Catalog, Lianne Elsner

Honors Projects

Consists of a suite of computer programs written in Visual Basic.net and embedded Visual Basic 3.0, whose purpose is to display the RIC course catalog on a Pocket PC device running Windows Mobile. The program package allows major course requirements and information to be viewed on a single screen. Included is a desktop computer program which allows faculty and staff to make changes to the database of courses.


Journey To The Center Of The Core: Computers And The Internet In The Core Curriculum, Jorge Pérez, Meg C. Murray Jan 2006

Journey To The Center Of The Core: Computers And The Internet In The Core Curriculum, Jorge Pérez, Meg C. Murray

Faculty and Research Publications

Computers, digitalization and the Internet have transformed modern society. Commerce, education, communication and socialization will never be the same. Surprisingly, many universities do not require a computing course in the core curriculum. Critical information technology (IT) competencies are often taken for granted, to the detriment of students who lack computing and Internet skills. This paper describes an initiative undertaken by a computer science and information systems department to assess and remediate IT skills needed by all university students, regardless of major. The project is evolving along several dimensions: identification of discipline-independent IT competencies, assessment of IT skills among current and …


Computer Skills, Gender, And Technostress In Higher Education, Sonya Shepherd Dec 2005

Computer Skills, Gender, And Technostress In Higher Education, Sonya Shepherd

Sonya S. Gaither

The creation of computer software and hardware, telecommunications, databases, and the Internet has affected society as a whole, and particularly higher education by giving people new productivity options and changing the way they work (Hulbert, 1998). In the so-called “information age” the increasing use of technology has become the driving force in the way people work, learn, and play (Drake, 2000). As this force evolves, the people using technology change also (Nelson, 1990). Adapting to technology is not simple. Some people tend to embrace change while others resist change (Wolski & Jackson, 1999). Before making a decision on whether to …