Open Access. Powered by Scholars. Published by Universities.®

Other Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

External Link

Discipline
Keyword
Publication Year
Publication

Articles 1 - 22 of 22

Full-Text Articles in Other Computer Sciences

Production Planning And Control Systems-State Of The Art And New Directions, V. Sridharan, John Kanet Sep 2015

Production Planning And Control Systems-State Of The Art And New Directions, V. Sridharan, John Kanet

John J. Kanet

This chapter begins with a description of the role of production planning and control (PPC) within the manufacturing function. After discussing the impact of the operating environment on the choice a system for PPC, we describe some recent empirical evidence regarding the use and performance results of various PPC systems. This is followed by a brief overview of the two most widely used systems for production planning and control. We then describe a recent development in the area of short-term detailed scheduling exploiting the latest developments in computing technology. The chapter concludes with a discussion of an emerging paradigm for …


Operations Research For Freight Train Routing And Scheduling, Steven Harrod, Michael Gorman Sep 2015

Operations Research For Freight Train Routing And Scheduling, Steven Harrod, Michael Gorman

Michael F. Gorman

This article describes the service design activities that plan and implement the rail freight operating plan. Elements of strategic service design include the setting of train frequency, the routing of cars among trains, and the consolidation of cars, called blocking. At the operational level, trains are dispatched either according to train paths configured in advance, called timetables, or according to priority rules. We describe the North American and European practice along with selected modeling and problem solving methodologies appropriate for each of the operating conditions described.


Operations Research Approaches In Asset Management In Freight Rail, Michael Gorman, Steven Harrod Sep 2015

Operations Research Approaches In Asset Management In Freight Rail, Michael Gorman, Steven Harrod

Michael F. Gorman

This article describes operations research methodologies as they apply to asset management in freight rail. We describe state-of-the-art methods for locomotive, crew, rail-car, line and yard planning and management. We conclude with emerging areas of research in rail.


Information Technology, Ying Chen Dec 2014

Information Technology, Ying Chen

Ying Chen

This research guide includes lists and links for recommended databases, journals, and web resources on Information Technology. It also provides helpful information for citation and writing with emphasis on the science disciplines.


Randomized Detection Of Extraneous Factors, Manfred Minimair Jun 2014

Randomized Detection Of Extraneous Factors, Manfred Minimair

Manfred Minimair

A projection operator of a system of parametric polynomials is a polynomial in the coefficients of the system that vanishes if the system has a common root. The projection operator is a multiple of the resultant of the system, and the factors of the projection operator that are not contained in the resultant are called extraneous factors. The main contribution of this work is to provide a randomized algorithm to check whether a factor is extraneous, which is an important task in applications. A lower bound for the success probability is determined which can be set arbitrarily close to one. …


Link Spamming Wikipedia For Profit, Andrew West, Jian Chang, Krishna Venkatasubramanian, Oleg Sokolsky, Insup Lee Jun 2014

Link Spamming Wikipedia For Profit, Andrew West, Jian Chang, Krishna Venkatasubramanian, Oleg Sokolsky, Insup Lee

Oleg Sokolsky

Collaborative functionality is an increasingly prevalent web technology. To encourage participation, these systems usually have low barriers-to-entry and permissive privileges. Unsurprisingly, ill-intentioned users try to leverage these characteristics for nefarious purposes. In this work, a particular abuse is examined -- link spamming -- the addition of promotional or otherwise inappropriate hyperlinks.

Our analysis focuses on the "wiki" model and the collaborative encyclopedia, Wikipedia, in particular. A principal goal of spammers is to maximize *exposure*, the quantity of people who view a link. Creating and analyzing the first Wikipedia link spam corpus, we find that existing spam strategies perform quite poorly …


From Question Context To Answer Credibility: Modeling Semantic Structures For Question Answering Using Statistical Methods, Protima Banerjee, Hyoil Han Jun 2014

From Question Context To Answer Credibility: Modeling Semantic Structures For Question Answering Using Statistical Methods, Protima Banerjee, Hyoil Han

Hyoil Han

Within a Question Answering (QA) framework, Question Context plays a vital role. We define Question Context to be background knowledge that can be used to represent the user’s information need more completely than the terms in the query alone. This paper proposes a novel approach that uses statistical language modeling techniques to develop a semantic Question Context which we then incorporate into the Information Retrieval (IR) stage of QA. Our approach proposes an Aspect-Based Relevance Language Model as basis of the Question Context Model. This model proposes that the sparse vocabulary of a query can be supplemented with semantic information …


Language Modeling Approaches To Information Retrieval, Protima Banerjee, Hyoil Han Jun 2014

Language Modeling Approaches To Information Retrieval, Protima Banerjee, Hyoil Han

Hyoil Han

This article surveys recent research in the area of language modeling (sometimes called statistical language modeling) approaches to information retrieval. Language modeling is a formal probabilistic retrieval framework with roots in speech recognition and natural language processing. The underlying assumption of language modeling is that human language generation is a random process; the goal is to model that process via a generative statistical model. In this article, we discuss current research in the application of language modeling to information retrieval, the role of semantics in the language modeling framework, cluster-based language models, use of language modeling for XML retrieval and …


Decision Diagrams And Dynamic Programming, John Hooker Dec 2012

Decision Diagrams And Dynamic Programming, John Hooker

John Hooker

No abstract provided.


Mixed Integer Programming Vs Logic-Based Benders Decomposition For Planning And Scheduling, John Hooker, Andre Cire Dec 2012

Mixed Integer Programming Vs Logic-Based Benders Decomposition For Planning And Scheduling, John Hooker, Andre Cire

John Hooker

No abstract provided.


Designing A Small-Footprint Curriculum In Computer Science, Allen Downey, Lynn Stein Jul 2012

Designing A Small-Footprint Curriculum In Computer Science, Allen Downey, Lynn Stein

Lynn Andrea Stein

We describe an innovative computing curriculum that combines elements of computer science, engineering and design. Although it is tailored to the constraints we face at Olin College, it contains elements that are applicable to the design of a CS major at a small school, a CS minor, or an interdisciplinary program that includes computing. We present the core courses in the program as well as several courses that are meant to connect the computing curriculum to other fields. We summarize the lessons we have learned from the first few years of this program.


Integrated Methods For Optimization, 2nd Ed, John Hooker Dec 2011

Integrated Methods For Optimization, 2nd Ed, John Hooker

John Hooker

No abstract provided.


Moving Targets: Geographically Routed Human Movement Networks, Adam Aviv, Micah Sherr, Matt Blaze, Jonathan Smith Sep 2011

Moving Targets: Geographically Routed Human Movement Networks, Adam Aviv, Micah Sherr, Matt Blaze, Jonathan Smith

Jonathan M Smith

We introduce a new communication paradigm, Human-to-human Mobile Ad hoc Networking (HuManet), that exploits smartphone capabilities and human behavior to create decentralized networks for smartphone-to-smartphone message delivery. HuManets support stealth command-and-control messaging for mobile BotNets, covert channels in the presence of an observer who monitors all cellular communication, and distributed protocols for querying the state or content of targeted mobile devices. In this paper, we introduce techniques for constructing HumaNets and describe protocols for efficiently routing and addressing messages. In contrast to flooding or broadcast schemes that saturate the network and aggressively consume phone resources (e.g., batteries), our protocols exploit …


Business Ethics As Rational Choice, John Hooker Dec 2010

Business Ethics As Rational Choice, John Hooker

John Hooker

No abstract provided.


Ssrn As An Initial Revolution In Academic Knowledge Aggregation And Dissemination, David Bray, Sascha Vitzthum, Benn Konsynski Jan 2010

Ssrn As An Initial Revolution In Academic Knowledge Aggregation And Dissemination, David Bray, Sascha Vitzthum, Benn Konsynski

Sascha Vitzthum

Within this paper we consider our results of using the Social Science Research Network (SSRN) over a period of 18 months to distribute our working papers to the research community. Our experiences have been quite positive, with SSRN serving as a platform both to inform our colleagues about our research as well as inform us about related research (through email and telephoned conversations of colleagues who discovered our paper on SSRN). We then discuss potential future directions for SSRN to consider, and how SSRN might well represent an initial revolution in 21st century academic knowledge aggregation and dissemination. Our paper …


Towards Self-Organizing, Smart Business Networks: Let’S Create ‘Life’ From Inert Information, David Bray, Benn Konsynski Nov 2008

Towards Self-Organizing, Smart Business Networks: Let’S Create ‘Life’ From Inert Information, David Bray, Benn Konsynski

David A. Bray

We review three different theories that can inform how researchers can determine the performance of smart business networks, to include: (1) the Theory of Evolution, (2) the Knowledge-Based Theory of the Firm, and (3) research insights into computers and cognition. We suggest that each of these theories demonstrate that to be generally perceived as smart, an organism needs to be self-organizing, communicative, and tool-making. Consequentially, to determine the performance of a smart business network, we suggest that researchers need to determine the degree to which it is self-organizing, communicative, and tool-making. We then relate these findings to the Internet and …


Constraint Programming, John Hooker Dec 2004

Constraint Programming, John Hooker

John Hooker

No abstract provided.


Working Across Cultures, John Hooker Dec 2002

Working Across Cultures, John Hooker

John Hooker

No abstract provided.


Logic, Optimization And Constraint Programming, John Hooker Dec 2001

Logic, Optimization And Constraint Programming, John Hooker

John Hooker

No abstract provided.


Logic-Based Methods For Optimization: Combining Optimization And Constraint Satisfaction, John Hooker Dec 1999

Logic-Based Methods For Optimization: Combining Optimization And Constraint Satisfaction, John Hooker

John Hooker

No abstract provided.


Optimization Methods For Logical Inference, Vijay Chandru, John Hooker Dec 1998

Optimization Methods For Logical Inference, Vijay Chandru, John Hooker

John Hooker

No abstract provided.


Constraint Satisfaction Methods For Generating Valid Cuts, John Hooker Dec 1996

Constraint Satisfaction Methods For Generating Valid Cuts, John Hooker

John Hooker

No abstract provided.