Nominal Computation Theory (Dagstuhl Seminar 13422), 2013 University of Warsaw
Nominal Computation Theory (Dagstuhl Seminar 13422), Mikołaj Bojanczyk, Bartek Klin, Alexander Kurz, Andrew M. Pitts
Engineering Faculty Articles and Research
This report documents the program and the outcomes of Dagstuhl Seminar 13422 “Nominal Computation Theory”. The underlying theme of the seminar was nominal sets (also known as sets with atoms or Fraenkel-Mostowski sets) and they role and applications in three distinct research areas: automata over infinite alphabets, program semantics using nominal sets and nominal calculi of concurrent processes.
Epistemic Updates On Algebras, 2013 Chapman University
Epistemic Updates On Algebras, Alexander Kurz, Alessandra Palmigiano
Engineering Faculty Articles and Research
We develop the mathematical theory of epistemic updates with the tools of duality theory. We focus on the Logic of Epistemic Actions and Knowledge (EAK), introduced by Baltag-Moss-Solecki, without the common knowledge operator. We dually characterize the product update construction of EAK as a certain construction transforming the complex algebras associated with the given model into the complex algebra associated with the updated model. This dual characterization naturally generalizes to much wider classes of algebras, which include, but are not limited to, arbitrary BAOs and arbitrary modal expansions of Heyting algebras (HAOs). As an application of this dual characterization, we …
Context Aware Privacy Preserving Clustering And Classification, 2013 University of Kentucky
Context Aware Privacy Preserving Clustering And Classification, Nirmal Thapa
Theses and Dissertations--Computer Science
Data are valuable assets to any organizations or individuals. Data are sources of useful information which is a big part of decision making. All sectors have potential to benefit from having information. Commerce, health, and research are some of the fields that have benefited from data. On the other hand, the availability of the data makes it easy for anyone to exploit the data, which in many cases are private confidential data. It is necessary to preserve the confidentiality of the data. We study two categories of privacy: Data Value Hiding and Data Pattern Hiding. Privacy is a huge concern …
A Novel Computational Framework For Transcriptome Analysis With Rna-Seq Data, 2013 University of Kentucky
A Novel Computational Framework For Transcriptome Analysis With Rna-Seq Data, Yin Hu
Theses and Dissertations--Computer Science
The advance of high-throughput sequencing technologies and their application on mRNA transcriptome sequencing (RNA-seq) have enabled comprehensive and unbiased profiling of the landscape of transcription in a cell. In order to address the current limitation of analyzing accuracy and scalability in transcriptome analysis, a novel computational framework has been developed on large-scale RNA-seq datasets with no dependence on transcript annotations. Directly from raw reads, a probabilistic approach is first applied to infer the best transcript fragment alignments from paired-end reads. Empowered by the identification of alternative splicing modules, this framework then performs precise and efficient differential analysis at automatically detected …
Accelerated Data Delivery Architecture, 2013 Georgia Southern University
Accelerated Data Delivery Architecture, Michael L. Grecol
Electronic Theses and Dissertations
This paper introduces the Accelerated Data Delivery Architecture (ADDA). ADDA establishes a framework to distribute transactional data and control consistency to achieve fast access to data, distributed scalability and non-blocking concurrency control by using a clean declarative interface. It is designed to be used with web-based business applications. This framework uses a combination of traditional Relational Database Management System (RDBMS) combined with a distributed Not Only SQL (NoSQL) database and a browser-based database. It uses a single physical and conceptual database schema designed for a standard RDBMS driven application. The design allows the architect to assign consistency levels to entities …
Decision Diagrams And Dynamic Programming, 2012 Carnegie Mellon University
Decision Diagrams And Dynamic Programming, John Hooker
John Hooker
No abstract provided.
Mixed Integer Programming Vs Logic-Based Benders Decomposition For Planning And Scheduling, 2012 Carnegie Mellon University
Mixed Integer Programming Vs Logic-Based Benders Decomposition For Planning And Scheduling, John Hooker, Andre Cire
John Hooker
No abstract provided.
Interactive Visualization Of New Jersey Gang Data, 2012 Seton Hall University
Interactive Visualization Of New Jersey Gang Data, Manfred Minimair
Manfred Minimair
This article describes the design and functionality of an online visualization software of data from a survey on gang activities in New Jersey municipalities. The visualization enables the user to explore the distribution of numbers of gang sets across different municipalities in New Jersey, and study certain derived information. The purpose of the visualization is to make data from the gang survey easily and universally accessible through some engaging visual display, to facilitate seamless exploration of the data, and to thus foster discourse on the data among experts and the general public. In order to achieve these goals, bubble charts, …
Simulations In 3d Tactics, Interdiction And Multi-Agent Modelling, 2012 University of New South Wales
Simulations In 3d Tactics, Interdiction And Multi-Agent Modelling, A. R. Green, I. C. Piper, Daniel Keep, C. J. Flaherty
Dr Ian Piper
The analysis of vulnerabilities in large complex spaces is fundamentally problematic. The lack of capacity to generate a threat assessment merely exacerbates this problem. Lacking as well, in current literature is a developed methodology. To overcome this problem, we propose an approach using multi-agent modelling, which is also melded with three dimensional (3D) tactical understandings. Our approach builds on a microsimulation decision support tool, which was developed for a behavioural simulation of CBRN events. Microsimulation is based on the individual; who as an individual has a number of attributes, and which are stochastic (when repeated within an attribute). This approach …
Application Of Web Mashup Technology To Oyster Information Services, 2012 University of New Orleans
Application Of Web Mashup Technology To Oyster Information Services, Christian Chuindja Ngniah
University of New Orleans Theses and Dissertations
Web mashup is a lightweight technology used to integrate data from remote sources without direct access to their databases. As a data consumer, a Web mashup application creates new contents by retrieving data through the Web application programming interface (API) provided by the external sources. As a data provider, the service program publishes its Web API and implements the specified functions.
In the project reported by this thesis, we have implemented two Web mashup applications to enhance the Web site oystersentinel.org: the Perkinsus marinus model and the Oil Spill model. Each model overlay geospatial data from a local database …
Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, 2012 University of Texas at Dallas
Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg
Jan Kallberg
La guerra concentrada en la red depende de la red de información global para capacidades de combate conjuntas.3 La capa fundamental crea la capacidad de combate global como la columna vertebral espacial de la red de información donde los haberes espaciales son el elemento decisivo. EE.UU. depende de las capacidades espaciales para su éxito y la seguridad nacional de EE.UU. se basa hoy en día en un número limitado de satélites muy utilizados. Estos satélites son cruciales para la disuasión estratégica, la vigilancia, la recopilación de inteligencia y las comunicaciones militares. Si la disuasión estratégica falla, los satélites forman parte …
Fuzzy-Excom Software Project Risk Assessment, 2012 University of Western Ontario
Fuzzy-Excom Software Project Risk Assessment, Luiz Fernando Capretz, Ekananta Manalif, Ali Bou Nassif, Danny Ho
Electrical and Computer Engineering Publications
A software development project can be considered to be risky project due to the uncertainty of the information (customer requirements), the complexity of the process, and the intangible nature of the product. Under these conditions, risk management in software development projects is mandatory, but often it is difficult and expensive to implement.
Expert COCOMO is an efficient approach to software project risk management, which leverages existing knowledge and expertise from previous effort estimation activities to assess the risk in a new software project. However, the original method has a limitation because it cannot effectively deal with imprecise and uncertain inputs …
Volatile Memory Message Carving: A "Per Process Basis" Approach, 2012 University of New Orleans
Volatile Memory Message Carving: A "Per Process Basis" Approach, Aisha Ibrahim Ali-Gombe
University of New Orleans Theses and Dissertations
The pace at which data and information transfer and storage has shifted from PCs to mobile devices is of great concern to the digital forensics community. Android is fast becoming the operating system of choice for these hand-held devices, hence the need to develop better forensic techniques for data recovery cannot be over-emphasized. This thesis analyzes the volatile memory for Motorola Android devices with a shift from traditional physical memory extraction to carving residues of data on a “per process basis”. Each Android application runs in a separate process within its own Dalvik Virtual Machine (JVM) instance, thus, the proposed …
Synergy And Its Limits In Managing Information Technology Professionals, 2012 University of Dayton
Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns
MIS/OM/DS Faculty Publications
We examine the effects of human resource management (HRM) practices (e.g., career development, social support, compensation, and security) on IT professionals‟ job search behavior. Job search is a relatively novel dependent variable in studies of voluntary withdrawal behavior, in general, and for IT professionals, in particular. From a universalistic perspective, HRM practices individually and in combination exhibit independently additive effects on job search behavior. Our study contrasts this perspective with configurational theory, hypothesizing that proposed idealtype configurations of HRM practices have synergistic effects on job search behavior. We contribute to the IT and broader HRM literature by theoretically explicating and …
Power Management For Cloud-Scale Data Centers, 2012 University of Tennessee, Knoxville
Power Management For Cloud-Scale Data Centers, Yanwei Zhang
Masters Theses
Recent years have seen the rapid growth of large and geographically distributed data centers deployed by Internet service operators to support various services such as cloud computing. Consequently, high electricity bills, as well as negative environmental implications (e.g., CO2 emission and global warming) come along. In this thesis, we first propose a novel electricity bill capping algorithm that not only minimizes the electricity cost, but also enforces a cost budget on the monthly bill for cloud-scale data centers that impact the power markets. Our solution first explicitly models the impacts of the power demands induced by cloud-scale data centers on …
The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, 2012 University of Texas at Dallas
The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther
Jan Kallberg
With sequestration looming—generating significant cuts to defense spending—the United States may find itself increasingly relying on nuclear and cyber deterrence as an affordable way to guarantee national sovereignty and prevent major conflict. While earlier defense planning and acquisitions were based on economic conditions that no longer exist, Congress’ options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense voters” than “social welfare voters,” according to a number of recent public opinion surveys.
Temporal Data Mining Of Uncertain Water Reservoir Data, 2012 University of Nebraska-Lincoln
Temporal Data Mining Of Uncertain Water Reservoir Data, Abhinaya Mohan, Peter Revesz
CSE Conference and Workshop Papers
This paper describes the challenges of data mining uncertain water reservoir data based on past human operations in order to learn from them reservoir policies that can be automated for the future operation of the water reservoirs. Records of human operations of water reservoirs often contain uncertain data. For example, the recorded amounts of water released and retained in the water reservoirs are typically uncertain, i.e., they are bounded by some minimum and maximum values. Moreover, the time of release is also uncertain, i.e., typically only monthly or weekly amounts are recorded. To increase the effectiveness of data mining of …
Efficacy Of Smartphone Technology On Improving Asthma Control And Compliance, 2012 Cedarville University
Efficacy Of Smartphone Technology On Improving Asthma Control And Compliance, Dustin Nelson, Lauren Macks, Gregory Paine, Forouzan Poursoltan, Tirhas Mekonnen, Melody L. Hartzler
Pharmacy and Nursing Student Research and Evidence-Based Medicine Poster Session
Asthma is the fifth most costly disease in the U.S., estimated to cost over $50 billion annually. This large cost is due to the large number of hospitalizations, ER visits, and doctor’s office visits. Improving patient adherence to asthma medications would decrease these costs significantly by preventing most hospital and doctor’s office visits. AsthmaSense® is a free to download smartphone application available on both iTunes and Android marketplaces. AsthmaSense® will allow patients to record when they take their medications, as well as send them reminders to take their medications.
Analysis - Toward A New American Military., 2012 University of Texas at Dallas
Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg
Jan Kallberg
In releasing the United States Department of Defense’s (DoD) Sustaining U.S. Global Leadership: Priorities for 21st Century Defense and Defense Budget Priorities and Choices in January 2012, President Barack Obama and Secretary of Defense Leon Panetta offered a rationale for the administration’s reductions in defense spending. By stating that the shift in strategic direction is an effort to “put our fiscal house in order” and a response to the 2011 Budget Control Act, which requires DoD to reduce spending by $487 billion between fiscal years 2012 and 2021, the United States’ NATO partners in Europe were given considerable reason for …
Sense Beauty Via Face, Dressing, And/Or Voice, 2012 University of Dayton
Sense Beauty Via Face, Dressing, And/Or Voice, Tam Nguyen, Si Liu, Bingbing Ni, Jun Tan, Yong Rui, Shuicheng Yan
Computer Science Faculty Publications
Discovering the secret of beauty has been the pursuit of artists and philosophers for centuries. Nowadays, the computational model for beauty estimation has been actively explored in computer science community, yet with the focus mainly on facial features. In this work, we perform a comprehensive study of female attractiveness conveyed by single/multiple modalities of cues, i.e., face, dressing, and/or voice, and aim to uncover how different modalities individually and collectively affect the human sense of beauty. To this end, we collect the first Multi-Modality Beauty (M2B) dataset in the world for female attractiveness study, which is thoroughly annotated …