Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (23)
- Databases and Information Systems (12)
- Business (10)
- OS and Networks (10)
- Management Information Systems (9)
-
- Mathematics (3)
- Social and Behavioral Sciences (3)
- Library and Information Science (2)
- Analysis (1)
- Applied Mathematics (1)
- Archival Science (1)
- Art and Design (1)
- Arts and Humanities (1)
- Asian Studies (1)
- Education (1)
- Graphic Design (1)
- Higher Education (1)
- International and Area Studies (1)
- Numerical Analysis and Scientific Computing (1)
- Technology and Innovation (1)
- Institution
- Publication
-
- Herbert J. Mattord (10)
- CCE Theses and Dissertations (2)
- Tammy R Toscos (2)
- All Graduate Plan B and other Reports, Spring 1920 to Spring 2023 (1)
- Computer Science Faculty Publications (1)
-
- Dissertations (1)
- Doctoral Theses (1)
- Honors Projects (1)
- Mathematics and Statistics Faculty Publications and Presentations (1)
- Other resources (1)
- SMU Press Releases (1)
- Seaver College Research And Scholarly Achievement Symposium (1)
- Theses and Dissertations (1)
- VCU Libraries Faculty and Staff Publications (1)
- Publication Type
Articles 1 - 25 of 25
Full-Text Articles in Physical Sciences and Mathematics
Using Class Interfaces And Mock Objects To Unit Test Aspects, Michael Bryan Snider
Using Class Interfaces And Mock Objects To Unit Test Aspects, Michael Bryan Snider
CCE Theses and Dissertations
In object oriented programming (OOP) class objects are individual units of code that encapsulate the desired functionality of each object. AOP is an attempt to handle the cross-cutting concerns that represent functionality needed by a class, but is not specific to that class. The cross-cutting functionality is implemented in AOP by using a class-like structure, the aspect. Aspects do not have their own context and as such are dependent upon other objects for their context. By not having their own context it is difficult to test the functionality of aspects. This study investigated the effectiveness of using class interfaces and …
Singapore Management University Establishes A New Research Centre On Secure Mobile Computing Technologies And Solutions, Singapore Management University
Singapore Management University Establishes A New Research Centre On Secure Mobile Computing Technologies And Solutions, Singapore Management University
SMU Press Releases
The Singapore Management University (SMU) has announced today the establishment of a new centre of research excellence that focuses on mobile computing security. Funded by Singapore’s National Research Foundation (NRF), the Secure Mobile Centre is developing efficient and scalable technologies and solutions that strengthen the security of mobile computing systems, applications and services. The Secure Mobile Centre is led by a team of five faculty members from SMU’s School of Information Systems who specialise in information security and trust: Professor Robert DENG (Centre Director), Professor PANG Hwee Hwa, Associate Professor LI Yingjiu, Associate Professor DING Xuhua and Assistant Professor Debin …
Dynamic Pricing In Heterogeneous Wireless Cellular Networks, David Shrader
Dynamic Pricing In Heterogeneous Wireless Cellular Networks, David Shrader
CCE Theses and Dissertations
Smart communications devices are giving users instant access to applications that consume large amounts of data. These applications have different requirements on the network for delivery of data. In order to support these different applications, operators are required to support multiple service classes.
Given the regulatory and technology constraints and the relatively high cost associated with wireless spectrum licensing and utilization, demand will exceed supply leading to congestion and overload conditions. In addition to new broadband radio technologies offering higher data rates, operators are looking at deploying alternate heterogeneous technologies, such as WLAN, to provide additional bandwidth for serving customers. …
Why It's Worth The Hassle: The Value Of In-Situ Studies When Designing Ubicomp, Tammy Toscos, Yvonne Rogers, Kay Connelly, Lenore Tedesco, William Hazlewood, Andrew Kurtz, Robert Hall, Josh Hursey
Why It's Worth The Hassle: The Value Of In-Situ Studies When Designing Ubicomp, Tammy Toscos, Yvonne Rogers, Kay Connelly, Lenore Tedesco, William Hazlewood, Andrew Kurtz, Robert Hall, Josh Hursey
Tammy R Toscos
No abstract provided.
Why It's Worth The Hassle: The Value Of In-Situ Studies When Designing Ubicomp, Tammy Toscos, Yvonne Rogers, Kay Connelly, Lenore Tedesco, William Hazlewood, Andrew Kurtz, Robert Hall, Josh Hursey
Why It's Worth The Hassle: The Value Of In-Situ Studies When Designing Ubicomp, Tammy Toscos, Yvonne Rogers, Kay Connelly, Lenore Tedesco, William Hazlewood, Andrew Kurtz, Robert Hall, Josh Hursey
Tammy R Toscos
No abstract provided.
Connecting The Disciplinary Dots: Faculty Attitudes Toward The Professionalization Of Web Development, Kathleen Mary Kalata
Connecting The Disciplinary Dots: Faculty Attitudes Toward The Professionalization Of Web Development, Kathleen Mary Kalata
Dissertations
Professionalization offers rewards such as prestige, financial benefits and autonomy. Fields such as nursing and social work have undergone the professionalization process. This exploratory study examined faculty attitudes regarding the professionalization of web development as defined by the Hall model of professionalism. The purpose of the study was to understand how faculty view web development as a profession. Based on the Hall’s Professionalism Scale (1968) and modified survey by Snizek (1972), the Web Development Professionalism Inventory (WDPI) was used to explore faculty attitudes toward professionalization.
This study surveyed faculty about their views on the structural and attitudinal components of web …
Principles Of Incident Response And Disaster Recovery, Michael Whitman, Herbert Mattord
Principles Of Incident Response And Disaster Recovery, Michael Whitman, Herbert Mattord
Herbert J. Mattord
Are you ready to respond to an unauthorized intrusion to your computer network or server? Principles of Incident Response and Disaster Recovery presents methods to identify vulnerabilities and take appropriate countermeasures to prevent and mitigate failure risks for an organization. Not only does book present a foundation in disaster recovery principles and planning, but it also emphasizes the importance of incident response minimizing prolonged downtime that can potentially lead to irreparable loss. This book is the first of its kind to address the overall problem of contingency planning rather than focusing on specific tasks of incident response or disaster recovery.
Management Of Information Security, 1st Edition, Michael Whitman, Herbert Mattord
Management Of Information Security, 1st Edition, Michael Whitman, Herbert Mattord
Herbert J. Mattord
Management of Information Security is designed for senior and graduate-level business and information systems students who want to learn the management aspects of information security. This text takes a "view from the top" and presents important information for future managers regarding information security. The material covered in this text is often part of a capstone course in an information security.
Management Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord
Management Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord
Herbert J. Mattord
Information security-driven topic coverage is the basis for this updated book that will benefit readers in the information technology and business fields alike. Management of Information Security, provides an overview of information security from a management perspective, as well as a thorough understanding of the administration of information security. Written by two Certified Information Systems Security Professionals (CISSP), this book has the added credibility of incorporating the CISSP Common Body of Knowledge (CBK), especially in the area of information security management. The second edition has been updated to maintain the industry currency and academic relevance that made the previous edition …
Guide To Firewalls And Network Security: Intrusion Detection And Vpns, 2nd Edition, Michael Whitman, Herbert Mattord, Richard Austin, Greg Holden
Guide To Firewalls And Network Security: Intrusion Detection And Vpns, 2nd Edition, Michael Whitman, Herbert Mattord, Richard Austin, Greg Holden
Herbert J. Mattord
Firewalls are among the best-known security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when they are backed by effective security planning, a well-designed security policy, and when they work in concert with anti-virus software, intrusion detection systems, and other tools. This book aims to explore firewalls in the context of these other elements, providing readers with a solid, in-depth introduction to firewalls that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file …
Principles Of Information Security, 3rd Edition, Michael Whitman, Herbert Mattord
Principles Of Information Security, 3rd Edition, Michael Whitman, Herbert Mattord
Herbert J. Mattord
Explore the field of information security and assurance with this valuable resource that focuses on both the managerial and technical aspects of the discipline. Principles of Information Security, Third Edition builds on internationally recognized standards and bodies of knowledge to provide the knowledge and skills that information systems students need for their future roles as business decision-makers. Coverage includes key knowledge areas of the CISSP (Certified Information Systems Security Professional), as well as risk management, cryptography, physical security, and more. The third edition has retained the real-world examples and scenarios that made previous editions so successful, but has updated the …
Management Of Information Security, 3rd Edition, Michael Whitman, Herbert Mattord
Management Of Information Security, 3rd Edition, Michael Whitman, Herbert Mattord
Herbert J. Mattord
Management of Information Security, Third Edition focuses on the managerial aspects of information security and assurance. Topics covered include access control models, information security governance, and information security program assessment and metrics. Coverage on the foundational and technical components of information security is included to reinforce key concepts. This new edition includes up-to-date information on changes in the field such as revised sections on national and international laws and international standards like the ISO 27000 series. With these updates, Management of Information Security continues to offer a unique overview of information security from a management perspective while maintaining a finger …
Principles Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord
Principles Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord
Herbert J. Mattord
Principles of Information Security examines the field of information security to prepare information systems students for their future roles as business decision-makers. This textbook presents a balance of the managerial and the technical aspects of the discipline and addresses knowledge areas of the CISSP (Certified Information Systems Security Professional) certification throughout. The authors discuss information security within a real-world context, by including examples of issues faced by today's professionals and by including tools, such as an opening vignette and "Offline" boxes with interesting sidebar stories in each chapter. Principles of Information Security also offers extensive opportunities for hands-on work.
Roadmap To Information Security: For It And Infosec Managers, Michael Whitman, Herbert Mattord
Roadmap To Information Security: For It And Infosec Managers, Michael Whitman, Herbert Mattord
Herbert J. Mattord
Roadmap to Information Security: For IT and Infosec Managers provides a solid overview of information security and its relationship to the information needs of an organization. Content is tailored to the unique needs of information systems professionals who find themselves brought in to the intricacies of information security responsibilities. The book is written for a wide variety of audiences looking to step up to emerging security challenges, ranging from students to experienced professionals. This book is designed to guide the information technology manager in dealing with the challenges associated with the security aspects of their role, providing concise guidance on …
Guide To Firewalls And Vpns, 3rd Edition, Michael Whitman, Herbert Mattord, Andrew Green
Guide To Firewalls And Vpns, 3rd Edition, Michael Whitman, Herbert Mattord, Andrew Green
Herbert J. Mattord
Firewalls are among the best-known network security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when backed by thoughtful security planning, well-designed security policies, and integrated support from anti-virus software, intrusion detection systems, and related tools. GUIDE TO FIREWALLS AND VPNs, THIRD EDITION explores firewalls in the context of these critical elements, providing an in-depth guide that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems. The book …
Principles Of Information Security, 4th Edition, Michael Whitman, Herbert Mattord
Principles Of Information Security, 4th Edition, Michael Whitman, Herbert Mattord
Herbert J. Mattord
The fourth edition of Principles of Information Security explores the field of information security and assurance with updated content including new innovations in technology and methodologies. Students will revel in the comprehensive coverage that includes a historical overview of information security, discussions on risk management and security technology, current certification information, and more. The text builds on internationally-recognized standards and bodies of knowledge to provide the knowledge and skills students need for their future roles as business decision-makers. Information security in the modern organization is a management issue which technology alone cannot answer; it is a problem that has important …
Csilm: Interactive Learning Modules For Computer Science, Srinivasa Santosh Kumar Allu
Csilm: Interactive Learning Modules For Computer Science, Srinivasa Santosh Kumar Allu
All Graduate Plan B and other Reports, Spring 1920 to Spring 2023
CSILM is an online interactive learning management system designed to help students learn fundamental concepts of computer science. Apart from learning computer science modules using multimedia, this online system also allows students talk to professors using communication mediums like chat and implemented web analytics, enabling teachers to track student behavior and see student’s interest in learning the modules,. Integrating social media in to the existing portal also makes it possible for students to share the modules they have created, helping students work together.
Bacibeans: A Netbeans Plugin For Concurrent Programs, Ashley Broadwell
Bacibeans: A Netbeans Plugin For Concurrent Programs, Ashley Broadwell
Seaver College Research And Scholarly Achievement Symposium
C-- is a programming language developed by M. Ben-Ari to teach principles of concurrent and distributed programming. It is a small subset of the C language but with the added features of concurrency, semaphores, and monitors. BACI is an acronym for Ben-Ari Concurrency Interpreter. JavaBACI is an open-source command line concurrency simulator used by students to compile and run C-- programs. NetBeans is an integrated development environment (IDE) that many students use in our courses to develop Java and C++ programs. This talk describes the development of a NetBeans plug-in we call BACIBeans that integrates JavaBACI into NetBeans, combining the …
Conditional Tests On Basins Of Attraction With Finite Fields, Ian H. Dinwoodie
Conditional Tests On Basins Of Attraction With Finite Fields, Ian H. Dinwoodie
Mathematics and Statistics Faculty Publications and Presentations
An iterative method is given for computing the polynomials that vanish on the basin of attraction of a steady state in discrete polynomial dynamics with finite field coefficients. The algorithm is applied to dynamics of a T cell survival network where it is used to compare transition maps conditional on a basin of attraction.
Coverage And Detection In Wireless Sensor Networks., Mrinal Nandi Dr.
Coverage And Detection In Wireless Sensor Networks., Mrinal Nandi Dr.
Doctoral Theses
A Wireless Sensor Networks (WSNs), which are two or three dimensional systems, usually consist of a large number of small sensors equipped with some processing circuit, and a wireless transceiver. The sensors have small size, low battery capacity, non-renewable power supply, small processing power, limited buffer capacity and low-power radio. They may measure distance, direction, speed, humidity, wind speed, soil makeup, temperature, chemicals, light, and various other parameters. The sensors are autonomous devices with integrated sensing, processing, and communication capabilities.In this thesis, we consider ‘coverage problem’ and ‘detection problem’ in Wireless Sensor Networks (WSNs) in grid as well as in …
Computer-Aided Assessment For Computer Science Students, Bianca Schoen-Phelan, Brian Keegan
Computer-Aided Assessment For Computer Science Students, Bianca Schoen-Phelan, Brian Keegan
Other resources
No abstract provided.
Graph-Ene, James E. Torres
Graph-Ene, James E. Torres
Honors Projects
GRAPH-ENE is a rich internet application for building and manipulating undirected, simple graphs. It is intended for use as a classroom teaching aid, plus as a tool for students to interactively manipulate graphs for assignments. Being web based, it is portable—it can run anywhere a browser is available. Since it is interactive, it provides problem-solving capabilities that are not available using pencil and paper.
Decrease In Free Computer Science Papers Found Through Google Scholar, Lee A. Pedersen, Julie Arendt
Decrease In Free Computer Science Papers Found Through Google Scholar, Lee A. Pedersen, Julie Arendt
VCU Libraries Faculty and Staff Publications
Purpose - Google Scholar was used to locate free full-text versions of computer science research papers to determine what proportion could be freely accessed.
Design/methodology/approach - A sample of 1967 conference papers and periodical articles from 2003-2010, indexed in the ACM Guide to Computing Literature, was searched for manually in Google Scholar, using the paper or article title and the first author’s surname and supplementary searches as needed.
Findings - Free full-text versions were found for 52% of the conference papers and 55% of the periodical articles. Documents with older publication dates were more likely to be freely accessible than …
Moved But Not Gone: An Evaluation Of Real-Time Methods For Discovering Replacement Web Pages, Martin Klein, Michael L. Nelson
Moved But Not Gone: An Evaluation Of Real-Time Methods For Discovering Replacement Web Pages, Martin Klein, Michael L. Nelson
Computer Science Faculty Publications
Inaccessible Web pages and 404 “Page Not Found” responses are a common Web phenomenon and a detriment to the user’s browsing experience. The rediscovery of missing Web pages is, therefore, a relevant research topic in the digital preservation as well as in the Information Retrieval realm. In this article, we bring these two areas together by analyzing four content- and link-based methods to rediscover missing Web pages. We investigate the retrieval performance of the methods individually as well as their combinations and give an insight into how effective these methods are over time. As the main result of this work, …
Web Service Transaction Correctness, Aspen Olmsted
Web Service Transaction Correctness, Aspen Olmsted
Theses and Dissertations
In our research we investigate the problem of providing consistency, availability and durability for Web Service transactions. First, we show that the popular lazy replica update propagation method is vulnerable to loss of transactional updates in the presence of hardware failures. We propose an extension to the lazy update propagation approach to reduce the risk of data loss. Our approach is based on the "buddy" system, requiring that updates are preserved synchronously in two replicas, called buddies. The rest of the replicas are updated using lazy update propagation protocols. Our method provides a balance between durability (i.e., effects of the …