Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Social and Behavioral Sciences

Bridges And Barriers: An Exploration Of Engagements Of The Research Community With The Openstreetmap Community, A. Yair Grinberger, Marco Minghini, Godwin Yeboah, Levente Juhasz, Peter Mooney Jan 2022

Bridges And Barriers: An Exploration Of Engagements Of The Research Community With The Openstreetmap Community, A. Yair Grinberger, Marco Minghini, Godwin Yeboah, Levente Juhasz, Peter Mooney

GIS Center

The academic community frequently engages with OpenStreetMap (OSM) as a data source and research subject, acknowledging its complex and contextual nature. However, existing literature rarely considers the position of academic research in relation to the OSM community. In this paper we explore the extent and nature of engagement between the academic research community and the larger communities in OSM. An analysis of OSM-related publications from 2016 to 2019 and seven interviews conducted with members of one research group engaged in OSM-related research are described. The literature analysis seeks to uncover general engagement patterns while the interviews are used to identify …


Insight Provenance For Spatiotemporal Visual Analytics: Theory, Review, And Guidelines, Andreas Hall, Paula Ahonen-Rainio, Kirsi Virrantaus Dec 2017

Insight Provenance For Spatiotemporal Visual Analytics: Theory, Review, And Guidelines, Andreas Hall, Paula Ahonen-Rainio, Kirsi Virrantaus

Journal of Spatial Information Science

Research on provenance, which focuses on different ways to describe and record the history of changes and advances made throughout an analysis process, is an integral part of visual analytics. This paper focuses on providing the provenance of insight and rationale through visualizations while emphasizing, first, that this entails a profound understanding of human cognition and reasoning and that, second, the special nature of spatiotemporal data needs to be acknowledged in this process. A recently proposed human reasoning framework for spatiotemporal analysis, and four guidelines for the creation of visualizations that provide the provenance of insight and rationale published in …


Review Of Principles Of Computer Science, Ed. By Donald R. Franceschetti., Michael Knee Aug 2017

Review Of Principles Of Computer Science, Ed. By Donald R. Franceschetti., Michael Knee

University Libraries Faculty Scholarship

A review of "Principles of Computer Science" edited by Donald R. Franceschetti.


Bytewise Approximate Matching: The Good, The Bad, And The Unknown, Vikram S. Harichandran, Frank Breitinger, Ibrahim Baggili Jan 2016

Bytewise Approximate Matching: The Good, The Bad, And The Unknown, Vikram S. Harichandran, Frank Breitinger, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Hash functions are established and well-known in digital forensics, where they are commonly used for proving integrity and file identification (i.e., hash all files on a seized device and compare the fingerprints against a reference database). However, with respect to the latter operation, an active adversary can easily overcome this approach because traditional hashes are designed to be sensitive to altering an input; output will significantly change if a single bit is flipped. Therefore, researchers developed approximate matching, which is a rather new, less prominent area but was conceived as a more robust counterpart to traditional hashing. Since the conception …


Bytewise Approximate Matching: The Good, The Bad, And The Unknown, Vikram S. Harichandran, Frank Breitinger, Ibrahim Baggili Jan 2016

Bytewise Approximate Matching: The Good, The Bad, And The Unknown, Vikram S. Harichandran, Frank Breitinger, Ibrahim Baggili

Journal of Digital Forensics, Security and Law

Hash functions are established and well-known in digital forensics, where they are commonly used for proving integrity and file identification (i.e., hash all files on a seized device and compare the fingerprints against a reference database). However, with respect to the latter operation, an active adversary can easily overcome this approach because traditional hashes are designed to be sensitive to altering an input; output will significantly change if a single bit is flipped. Therefore, researchers developed approximate matching, which is a rather new, less prominent area but was conceived as a more robust counterpart to traditional hashing. Since the conception …