Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Communication (3)
- Engineering (3)
- Social and Behavioral Sciences (3)
- Artificial Intelligence and Robotics (2)
- Databases and Information Systems (2)
-
- Mathematics (2)
- OS and Networks (2)
- Systems Architecture (2)
- Theory and Algorithms (2)
- Algebra (1)
- Arts and Humanities (1)
- Business (1)
- Business Law, Public Responsibility, and Ethics (1)
- Communication Technology and New Media (1)
- Computer Engineering (1)
- Discrete Mathematics and Combinatorics (1)
- Epistemology (1)
- Gender, Race, Sexuality, and Ethnicity in Communication (1)
- Graphics and Human Computer Interfaces (1)
- International Business (1)
- International and Intercultural Communication (1)
- Logic and Foundations (1)
- Mechanical Engineering (1)
- Meteorology (1)
- Numerical Analysis and Scientific Computing (1)
- Oceanography and Atmospheric Sciences and Meteorology (1)
- Operational Research (1)
- Institution
- Keyword
-
- Applied sciences (1)
- Artificial neural network (1)
- Cancer prognosis (1)
- Communication (1)
- Computer Security (1)
-
- Computers (1)
- Covert (1)
- Finite element (1)
- Hacking (1)
- Information technology. (1)
- Integrated optimization methods - Books (1)
- Internet (1)
- Natural resources (1)
- Pathfinding (1)
- Psychopolitics (1)
- Pure sciences (1)
- Rural women (1)
- Security (1)
- Shells (1)
- Survival analysis (1)
- Thermal analysis (1)
- Thin film (1)
- Utilization (1)
- Video game (1)
- Walkability (1)
- Weather forecasting (1)
- Western Australia (1)
- XML (Document markup language) (1)
- Publication
- Publication Type
- File Type
Articles 1 - 10 of 10
Full-Text Articles in Other Computer Sciences
Covert Shells, John Christian Smith
Covert Shells, John Christian Smith
John Christian Smith
The potential for covert communications exist anywhere that legitimate communication channels are in use. In order to maintain control of the channel once exploited, the insertion of a backdoor Trojan horse server, to be used with a client that provides shell access, is often a necessary prerequisite to establishing and using a covert channel long term.
We discuss covert channel communications methods ranging from embedded channels to disguised protocols. What follows is a review of available covert shell tools. The underground, historical evolution of covert shells is reviewed, focusing on selected, available tools, which range from simple encapsulation methods to …
Baldur's Gate Ii - Maps & Benchmark Problems, Nathan R. Sturtevant, Bioware Corp
Baldur's Gate Ii - Maps & Benchmark Problems, Nathan R. Sturtevant, Bioware Corp
Moving AI Lab: 2D Maps and Benchmark Problems
Maps extracted by Yngvi Björnsson from Baldur's Gate II with explicit permission from BioWare Corp. for use and distribution as benchmark problems.
Contains 75 maps and benchmark problem sets scaled to 512 x 512 and 120 original scale maps.
A Hybrid Finite Element-Finite Difference Method For Thermal Analysis In A Double-Layered Thin Film, Teng Zhu
A Hybrid Finite Element-Finite Difference Method For Thermal Analysis In A Double-Layered Thin Film, Teng Zhu
Doctoral Dissertations
Thin film technology is of vital importance in microtechnology applications. For instance, thin films of metals, of dielectrics such as SiO2, or Si semiconductors are important components of microelectronic devices. The reduction of the device size to the microscale has the advantage of enhancing the switching speed of the device. The reduction, on the other hand, increases the rate of heat generation that leads to a high thermal load on the microdevice. Heat transfer at the microscale with an ultrafast pulsed-laser is also a very important process for thin films. Hence, studying the thermal behavior of thin films or of …
Extensible Markup Language As A Weather Tool, Michael J. Calidonna
Extensible Markup Language As A Weather Tool, Michael J. Calidonna
Theses and Dissertations
This thesis is a proof of concept work that will extend the Core Mapping Application Program Interface (CMAPI) components to include weather data. The CMAPI project is headed by Air Force Research Lab (AFRL)/Information Directorate Information Handling Branch (IFEB) at Rome labs in Rome, New York. This work extends the CMAPI project in two distinct areas. The first goal is to figure out how to overlay and display weather data on a dynamically linked Internet platform. This was accomplished by incorporating existing data from the Air Force Weather Agency (AFWA) into the CMAPI program in a static environment. The other …
Two Schools Of Thought About The Political Psychology Of The Internet, Ibpp Editor
Two Schools Of Thought About The Political Psychology Of The Internet, Ibpp Editor
International Bulletin of Political Psychology
This article describes and critiques two common assumptions about the psychopolitical consequences of continual modification and dispersal of the Internet.
Ann As A Tool For Medical Prognosis, Sameem Abdul Kareem
Ann As A Tool For Medical Prognosis, Sameem Abdul Kareem
Sameem Abdul Kareem
The analysis of cancer survival is used to determine the efficiency of treatment programmes and protocols; it is also used to determine the type of treatment. At the individual level a prediction of cancer survival can help patients make informed decisions with regards to their quality of life and future finances. Currently available prediction methods apply to groups of people, and may not be adequate to predict treatment outcome for individual patients. This paper presents a conceptual model of a cancer knowledge base incorporating a computer-based predictor for survival. It proposes the use of an artificial neural network (ANN) as …
Personalizing The Gams Cross-Index, Saverio Perugini, Priya Lakshminarayanan, Naren Ramakrishnan
Personalizing The Gams Cross-Index, Saverio Perugini, Priya Lakshminarayanan, Naren Ramakrishnan
Computer Science Faculty Publications
The NIST Guide to Available Mathematical Software (GAMS) system at http://gams.nist .gov serves as the gateway to thousands of scientific codes and modules for numerical computation. We describe the PIPE personalization facility for GAMS, whereby content from the cross-index is specialized for a user desiring software recommendations for a specific problem instance. The key idea is to (i) mine structure, and (ii) exploit it in a programmatic manner to generate personalized web pages. Our approach supports both content-based and collaborative personalization and enables information integration from multiple (and complementary) web resources. We present case studies for the domain of linear, …
Main Issues Rural Women Experience With Information & Communication Technology, Teresa Maiolo
Main Issues Rural Women Experience With Information & Communication Technology, Teresa Maiolo
All other publications
This brief report will outline the main issues rural women encountered with information and communications technology. This information was derived from interviewing twenty-one rural women from the South West, Eastern Goldfields, Murchison, Gascoyne, and Kimberley regions of Western Australia.
Notes On Coalgebras, Cofibrations And Concurrency, Alexander Kurz, Dirk Pattinson
Notes On Coalgebras, Cofibrations And Concurrency, Alexander Kurz, Dirk Pattinson
Engineering Faculty Articles and Research
We consider categories of coalgebras as (co)-fibred over a base category of parameters and analyse categorical constructions in the total category of deterministic and non-deterministic coalgebras.
Logic-Based Methods For Optimization: Combining Optimization And Constraint Satisfaction, John Hooker
Logic-Based Methods For Optimization: Combining Optimization And Constraint Satisfaction, John Hooker
John Hooker
No abstract provided.