Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer science

2014

Discipline
Institution
Publication
Publication Type
File Type

Articles 1 - 25 of 25

Full-Text Articles in Physical Sciences and Mathematics

Using Class Interfaces And Mock Objects To Unit Test Aspects, Michael Bryan Snider Oct 2014

Using Class Interfaces And Mock Objects To Unit Test Aspects, Michael Bryan Snider

CCE Theses and Dissertations

In object oriented programming (OOP) class objects are individual units of code that encapsulate the desired functionality of each object. AOP is an attempt to handle the cross-cutting concerns that represent functionality needed by a class, but is not specific to that class. The cross-cutting functionality is implemented in AOP by using a class-like structure, the aspect. Aspects do not have their own context and as such are dependent upon other objects for their context. By not having their own context it is difficult to test the functionality of aspects. This study investigated the effectiveness of using class interfaces and …


Singapore Management University Establishes A New Research Centre On Secure Mobile Computing Technologies And Solutions, Singapore Management University Oct 2014

Singapore Management University Establishes A New Research Centre On Secure Mobile Computing Technologies And Solutions, Singapore Management University

SMU Press Releases

The Singapore Management University (SMU) has announced today the establishment of a new centre of research excellence that focuses on mobile computing security. Funded by Singapore’s National Research Foundation (NRF), the Secure Mobile Centre is developing efficient and scalable technologies and solutions that strengthen the security of mobile computing systems, applications and services. The Secure Mobile Centre is led by a team of five faculty members from SMU’s School of Information Systems who specialise in information security and trust: Professor Robert DENG (Centre Director), Professor PANG Hwee Hwa, Associate Professor LI Yingjiu, Associate Professor DING Xuhua and Assistant Professor Debin …


Dynamic Pricing In Heterogeneous Wireless Cellular Networks, David Shrader Aug 2014

Dynamic Pricing In Heterogeneous Wireless Cellular Networks, David Shrader

CCE Theses and Dissertations

Smart communications devices are giving users instant access to applications that consume large amounts of data. These applications have different requirements on the network for delivery of data. In order to support these different applications, operators are required to support multiple service classes.

Given the regulatory and technology constraints and the relatively high cost associated with wireless spectrum licensing and utilization, demand will exceed supply leading to congestion and overload conditions. In addition to new broadband radio technologies offering higher data rates, operators are looking at deploying alternate heterogeneous technologies, such as WLAN, to provide additional bandwidth for serving customers. …


Why It's Worth The Hassle: The Value Of In-Situ Studies When Designing Ubicomp, Tammy Toscos, Yvonne Rogers, Kay Connelly, Lenore Tedesco, William Hazlewood, Andrew Kurtz, Robert Hall, Josh Hursey Jul 2014

Why It's Worth The Hassle: The Value Of In-Situ Studies When Designing Ubicomp, Tammy Toscos, Yvonne Rogers, Kay Connelly, Lenore Tedesco, William Hazlewood, Andrew Kurtz, Robert Hall, Josh Hursey

Tammy R Toscos

No abstract provided.


Why It's Worth The Hassle: The Value Of In-Situ Studies When Designing Ubicomp, Tammy Toscos, Yvonne Rogers, Kay Connelly, Lenore Tedesco, William Hazlewood, Andrew Kurtz, Robert Hall, Josh Hursey Jul 2014

Why It's Worth The Hassle: The Value Of In-Situ Studies When Designing Ubicomp, Tammy Toscos, Yvonne Rogers, Kay Connelly, Lenore Tedesco, William Hazlewood, Andrew Kurtz, Robert Hall, Josh Hursey

Tammy R Toscos

No abstract provided.


Connecting The Disciplinary Dots: Faculty Attitudes Toward The Professionalization Of Web Development, Kathleen Mary Kalata Jun 2014

Connecting The Disciplinary Dots: Faculty Attitudes Toward The Professionalization Of Web Development, Kathleen Mary Kalata

Dissertations

Professionalization offers rewards such as prestige, financial benefits and autonomy. Fields such as nursing and social work have undergone the professionalization process. This exploratory study examined faculty attitudes regarding the professionalization of web development as defined by the Hall model of professionalism. The purpose of the study was to understand how faculty view web development as a profession. Based on the Hall’s Professionalism Scale (1968) and modified survey by Snizek (1972), the Web Development Professionalism Inventory (WDPI) was used to explore faculty attitudes toward professionalization.

This study surveyed faculty about their views on the structural and attitudinal components of web …


Principles Of Incident Response And Disaster Recovery, Michael Whitman, Herbert Mattord May 2014

Principles Of Incident Response And Disaster Recovery, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Are you ready to respond to an unauthorized intrusion to your computer network or server? Principles of Incident Response and Disaster Recovery presents methods to identify vulnerabilities and take appropriate countermeasures to prevent and mitigate failure risks for an organization. Not only does book present a foundation in disaster recovery principles and planning, but it also emphasizes the importance of incident response minimizing prolonged downtime that can potentially lead to irreparable loss. This book is the first of its kind to address the overall problem of contingency planning rather than focusing on specific tasks of incident response or disaster recovery.


Management Of Information Security, 1st Edition, Michael Whitman, Herbert Mattord May 2014

Management Of Information Security, 1st Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Management of Information Security is designed for senior and graduate-level business and information systems students who want to learn the management aspects of information security. This text takes a "view from the top" and presents important information for future managers regarding information security. The material covered in this text is often part of a capstone course in an information security.


Management Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord May 2014

Management Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Information security-driven topic coverage is the basis for this updated book that will benefit readers in the information technology and business fields alike. Management of Information Security, provides an overview of information security from a management perspective, as well as a thorough understanding of the administration of information security. Written by two Certified Information Systems Security Professionals (CISSP), this book has the added credibility of incorporating the CISSP Common Body of Knowledge (CBK), especially in the area of information security management. The second edition has been updated to maintain the industry currency and academic relevance that made the previous edition …


Guide To Firewalls And Network Security: Intrusion Detection And Vpns, 2nd Edition, Michael Whitman, Herbert Mattord, Richard Austin, Greg Holden May 2014

Guide To Firewalls And Network Security: Intrusion Detection And Vpns, 2nd Edition, Michael Whitman, Herbert Mattord, Richard Austin, Greg Holden

Herbert J. Mattord

Firewalls are among the best-known security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when they are backed by effective security planning, a well-designed security policy, and when they work in concert with anti-virus software, intrusion detection systems, and other tools. This book aims to explore firewalls in the context of these other elements, providing readers with a solid, in-depth introduction to firewalls that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file …


Principles Of Information Security, 3rd Edition, Michael Whitman, Herbert Mattord May 2014

Principles Of Information Security, 3rd Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Explore the field of information security and assurance with this valuable resource that focuses on both the managerial and technical aspects of the discipline. Principles of Information Security, Third Edition builds on internationally recognized standards and bodies of knowledge to provide the knowledge and skills that information systems students need for their future roles as business decision-makers. Coverage includes key knowledge areas of the CISSP (Certified Information Systems Security Professional), as well as risk management, cryptography, physical security, and more. The third edition has retained the real-world examples and scenarios that made previous editions so successful, but has updated the …


Management Of Information Security, 3rd Edition, Michael Whitman, Herbert Mattord May 2014

Management Of Information Security, 3rd Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Management of Information Security, Third Edition focuses on the managerial aspects of information security and assurance. Topics covered include access control models, information security governance, and information security program assessment and metrics. Coverage on the foundational and technical components of information security is included to reinforce key concepts. This new edition includes up-to-date information on changes in the field such as revised sections on national and international laws and international standards like the ISO 27000 series. With these updates, Management of Information Security continues to offer a unique overview of information security from a management perspective while maintaining a finger …


Principles Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord May 2014

Principles Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Principles of Information Security examines the field of information security to prepare information systems students for their future roles as business decision-makers. This textbook presents a balance of the managerial and the technical aspects of the discipline and addresses knowledge areas of the CISSP (Certified Information Systems Security Professional) certification throughout. The authors discuss information security within a real-world context, by including examples of issues faced by today's professionals and by including tools, such as an opening vignette and "Offline" boxes with interesting sidebar stories in each chapter. Principles of Information Security also offers extensive opportunities for hands-on work.


Roadmap To Information Security: For It And Infosec Managers, Michael Whitman, Herbert Mattord May 2014

Roadmap To Information Security: For It And Infosec Managers, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Roadmap to Information Security: For IT and Infosec Managers provides a solid overview of information security and its relationship to the information needs of an organization. Content is tailored to the unique needs of information systems professionals who find themselves brought in to the intricacies of information security responsibilities. The book is written for a wide variety of audiences looking to step up to emerging security challenges, ranging from students to experienced professionals. This book is designed to guide the information technology manager in dealing with the challenges associated with the security aspects of their role, providing concise guidance on …


Guide To Firewalls And Vpns, 3rd Edition, Michael Whitman, Herbert Mattord, Andrew Green May 2014

Guide To Firewalls And Vpns, 3rd Edition, Michael Whitman, Herbert Mattord, Andrew Green

Herbert J. Mattord

Firewalls are among the best-known network security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when backed by thoughtful security planning, well-designed security policies, and integrated support from anti-virus software, intrusion detection systems, and related tools. GUIDE TO FIREWALLS AND VPNs, THIRD EDITION explores firewalls in the context of these critical elements, providing an in-depth guide that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems. The book …


Principles Of Information Security, 4th Edition, Michael Whitman, Herbert Mattord May 2014

Principles Of Information Security, 4th Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

The fourth edition of Principles of Information Security explores the field of information security and assurance with updated content including new innovations in technology and methodologies. Students will revel in the comprehensive coverage that includes a historical overview of information security, discussions on risk management and security technology, current certification information, and more. The text builds on internationally-recognized standards and bodies of knowledge to provide the knowledge and skills students need for their future roles as business decision-makers. Information security in the modern organization is a management issue which technology alone cannot answer; it is a problem that has important …


Csilm: Interactive Learning Modules For Computer Science, Srinivasa Santosh Kumar Allu May 2014

Csilm: Interactive Learning Modules For Computer Science, Srinivasa Santosh Kumar Allu

All Graduate Plan B and other Reports, Spring 1920 to Spring 2023

CSILM is an online interactive learning management system designed to help students learn fundamental concepts of computer science. Apart from learning computer science modules using multimedia, this online system also allows students talk to professors using communication mediums like chat and implemented web analytics, enabling teachers to track student behavior and see student’s interest in learning the modules,. Integrating social media in to the existing portal also makes it possible for students to share the modules they have created, helping students work together.


Bacibeans: A Netbeans Plugin For Concurrent Programs, Ashley Broadwell Mar 2014

Bacibeans: A Netbeans Plugin For Concurrent Programs, Ashley Broadwell

Seaver College Research And Scholarly Achievement Symposium

C-- is a programming language developed by M. Ben-Ari to teach principles of concurrent and distributed programming. It is a small subset of the C language but with the added features of concurrency, semaphores, and monitors. BACI is an acronym for Ben-Ari Concurrency Interpreter. JavaBACI is an open-source command line concurrency simulator used by students to compile and run C-- programs. NetBeans is an integrated development environment (IDE) that many students use in our courses to develop Java and C++ programs. This talk describes the development of a NetBeans plug-in we call BACIBeans that integrates JavaBACI into NetBeans, combining the …


Conditional Tests On Basins Of Attraction With Finite Fields, Ian H. Dinwoodie Mar 2014

Conditional Tests On Basins Of Attraction With Finite Fields, Ian H. Dinwoodie

Mathematics and Statistics Faculty Publications and Presentations

An iterative method is given for computing the polynomials that vanish on the basin of attraction of a steady state in discrete polynomial dynamics with finite field coefficients. The algorithm is applied to dynamics of a T cell survival network where it is used to compare transition maps conditional on a basin of attraction.


Coverage And Detection In Wireless Sensor Networks., Mrinal Nandi Dr. Feb 2014

Coverage And Detection In Wireless Sensor Networks., Mrinal Nandi Dr.

Doctoral Theses

A Wireless Sensor Networks (WSNs), which are two or three dimensional systems, usually consist of a large number of small sensors equipped with some processing circuit, and a wireless transceiver. The sensors have small size, low battery capacity, non-renewable power supply, small processing power, limited buffer capacity and low-power radio. They may measure distance, direction, speed, humidity, wind speed, soil makeup, temperature, chemicals, light, and various other parameters. The sensors are autonomous devices with integrated sensing, processing, and communication capabilities.In this thesis, we consider ‘coverage problem’ and ‘detection problem’ in Wireless Sensor Networks (WSNs) in grid as well as in …


Computer-Aided Assessment For Computer Science Students, Bianca Schoen-Phelan, Brian Keegan Jan 2014

Computer-Aided Assessment For Computer Science Students, Bianca Schoen-Phelan, Brian Keegan

Other resources

No abstract provided.


Graph-Ene, James E. Torres Jan 2014

Graph-Ene, James E. Torres

Honors Projects

GRAPH-ENE is a rich internet application for building and manipulating undirected, simple graphs. It is intended for use as a classroom teaching aid, plus as a tool for students to interactively manipulate graphs for assignments. Being web based, it is portable—it can run anywhere a browser is available. Since it is interactive, it provides problem-solving capabilities that are not available using pencil and paper.


Decrease In Free Computer Science Papers Found Through Google Scholar, Lee A. Pedersen, Julie Arendt Jan 2014

Decrease In Free Computer Science Papers Found Through Google Scholar, Lee A. Pedersen, Julie Arendt

VCU Libraries Faculty and Staff Publications

Purpose - Google Scholar was used to locate free full-text versions of computer science research papers to determine what proportion could be freely accessed.
Design/methodology/approach - A sample of 1967 conference papers and periodical articles from 2003-2010, indexed in the ACM Guide to Computing Literature, was searched for manually in Google Scholar, using the paper or article title and the first author’s surname and supplementary searches as needed.
Findings - Free full-text versions were found for 52% of the conference papers and 55% of the periodical articles. Documents with older publication dates were more likely to be freely accessible than …


Moved But Not Gone: An Evaluation Of Real-Time Methods For Discovering Replacement Web Pages, Martin Klein, Michael L. Nelson Jan 2014

Moved But Not Gone: An Evaluation Of Real-Time Methods For Discovering Replacement Web Pages, Martin Klein, Michael L. Nelson

Computer Science Faculty Publications

Inaccessible Web pages and 404 “Page Not Found” responses are a common Web phenomenon and a detriment to the user’s browsing experience. The rediscovery of missing Web pages is, therefore, a relevant research topic in the digital preservation as well as in the Information Retrieval realm. In this article, we bring these two areas together by analyzing four content- and link-based methods to rediscover missing Web pages. We investigate the retrieval performance of the methods individually as well as their combinations and give an insight into how effective these methods are over time. As the main result of this work, …


Web Service Transaction Correctness, Aspen Olmsted Jan 2014

Web Service Transaction Correctness, Aspen Olmsted

Theses and Dissertations

In our research we investigate the problem of providing consistency, availability and durability for Web Service transactions. First, we show that the popular lazy replica update propagation method is vulnerable to loss of transactional updates in the presence of hardware failures. We propose an extension to the lazy update propagation approach to reduce the risk of data loss. Our approach is based on the "buddy" system, requiring that updates are preserved synchronously in two replicas, called buddies. The rest of the replicas are updated using lazy update propagation protocols. Our method provides a balance between durability (i.e., effects of the …