Open Access. Powered by Scholars. Published by Universities.®

Other Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

1,908 Full-Text Articles 2,799 Authors 1,435,520 Downloads 174 Institutions

All Articles in Other Computer Sciences

Faceted Search

1,908 full-text articles. Page 78 of 88.

Nominal Computation Theory (Dagstuhl Seminar 13422), Mikołaj Bojanczyk, Bartek Klin, Alexander Kurz, Andrew M. Pitts 2013 University of Warsaw

Nominal Computation Theory (Dagstuhl Seminar 13422), Mikołaj Bojanczyk, Bartek Klin, Alexander Kurz, Andrew M. Pitts

Engineering Faculty Articles and Research

This report documents the program and the outcomes of Dagstuhl Seminar 13422 “Nominal Computation Theory”. The underlying theme of the seminar was nominal sets (also known as sets with atoms or Fraenkel-Mostowski sets) and they role and applications in three distinct research areas: automata over infinite alphabets, program semantics using nominal sets and nominal calculi of concurrent processes.


Epistemic Updates On Algebras, Alexander Kurz, Alessandra Palmigiano 2013 Chapman University

Epistemic Updates On Algebras, Alexander Kurz, Alessandra Palmigiano

Engineering Faculty Articles and Research

We develop the mathematical theory of epistemic updates with the tools of duality theory. We focus on the Logic of Epistemic Actions and Knowledge (EAK), introduced by Baltag-Moss-Solecki, without the common knowledge operator. We dually characterize the product update construction of EAK as a certain construction transforming the complex algebras associated with the given model into the complex algebra associated with the updated model. This dual characterization naturally generalizes to much wider classes of algebras, which include, but are not limited to, arbitrary BAOs and arbitrary modal expansions of Heyting algebras (HAOs). As an application of this dual characterization, we …


Context Aware Privacy Preserving Clustering And Classification, Nirmal Thapa 2013 University of Kentucky

Context Aware Privacy Preserving Clustering And Classification, Nirmal Thapa

Theses and Dissertations--Computer Science

Data are valuable assets to any organizations or individuals. Data are sources of useful information which is a big part of decision making. All sectors have potential to benefit from having information. Commerce, health, and research are some of the fields that have benefited from data. On the other hand, the availability of the data makes it easy for anyone to exploit the data, which in many cases are private confidential data. It is necessary to preserve the confidentiality of the data. We study two categories of privacy: Data Value Hiding and Data Pattern Hiding. Privacy is a huge concern …


A Novel Computational Framework For Transcriptome Analysis With Rna-Seq Data, Yin Hu 2013 University of Kentucky

A Novel Computational Framework For Transcriptome Analysis With Rna-Seq Data, Yin Hu

Theses and Dissertations--Computer Science

The advance of high-throughput sequencing technologies and their application on mRNA transcriptome sequencing (RNA-seq) have enabled comprehensive and unbiased profiling of the landscape of transcription in a cell. In order to address the current limitation of analyzing accuracy and scalability in transcriptome analysis, a novel computational framework has been developed on large-scale RNA-seq datasets with no dependence on transcript annotations. Directly from raw reads, a probabilistic approach is first applied to infer the best transcript fragment alignments from paired-end reads. Empowered by the identification of alternative splicing modules, this framework then performs precise and efficient differential analysis at automatically detected …


Accelerated Data Delivery Architecture, Michael L. Grecol 2013 Georgia Southern University

Accelerated Data Delivery Architecture, Michael L. Grecol

Electronic Theses and Dissertations

This paper introduces the Accelerated Data Delivery Architecture (ADDA). ADDA establishes a framework to distribute transactional data and control consistency to achieve fast access to data, distributed scalability and non-blocking concurrency control by using a clean declarative interface. It is designed to be used with web-based business applications. This framework uses a combination of traditional Relational Database Management System (RDBMS) combined with a distributed Not Only SQL (NoSQL) database and a browser-based database. It uses a single physical and conceptual database schema designed for a standard RDBMS driven application. The design allows the architect to assign consistency levels to entities …


Decision Diagrams And Dynamic Programming, John Hooker 2012 Carnegie Mellon University

Decision Diagrams And Dynamic Programming, John Hooker

John Hooker

No abstract provided.


Mixed Integer Programming Vs Logic-Based Benders Decomposition For Planning And Scheduling, John Hooker, Andre Cire 2012 Carnegie Mellon University

Mixed Integer Programming Vs Logic-Based Benders Decomposition For Planning And Scheduling, John Hooker, Andre Cire

John Hooker

No abstract provided.


Interactive Visualization Of New Jersey Gang Data, Manfred Minimair 2012 Seton Hall University

Interactive Visualization Of New Jersey Gang Data, Manfred Minimair

Manfred Minimair

This article describes the design and functionality of an online visualization software of data from a survey on gang activities in New Jersey municipalities. The visualization enables the user to explore the distribution of numbers of gang sets across different municipalities in New Jersey, and study certain derived information. The purpose of the visualization is to make data from the gang survey easily and universally accessible through some engaging visual display, to facilitate seamless exploration of the data, and to thus foster discourse on the data among experts and the general public. In order to achieve these goals, bubble charts, …


Simulations In 3d Tactics, Interdiction And Multi-Agent Modelling, A. R. Green, I. C. Piper, Daniel Keep, C. J. Flaherty 2012 University of New South Wales

Simulations In 3d Tactics, Interdiction And Multi-Agent Modelling, A. R. Green, I. C. Piper, Daniel Keep, C. J. Flaherty

Dr Ian Piper

The analysis of vulnerabilities in large complex spaces is fundamentally problematic. The lack of capacity to generate a threat assessment merely exacerbates this problem. Lacking as well, in current literature is a developed methodology. To overcome this problem, we propose an approach using multi-agent modelling, which is also melded with three dimensional (3D) tactical understandings. Our approach builds on a microsimulation decision support tool, which was developed for a behavioural simulation of CBRN events. Microsimulation is based on the individual; who as an individual has a number of attributes, and which are stochastic (when repeated within an attribute). This approach …


Application Of Web Mashup Technology To Oyster Information Services, Christian Chuindja Ngniah 2012 University of New Orleans

Application Of Web Mashup Technology To Oyster Information Services, Christian Chuindja Ngniah

University of New Orleans Theses and Dissertations

Web mashup is a lightweight technology used to integrate data from remote sources without direct access to their databases. As a data consumer, a Web mashup application creates new contents by retrieving data through the Web application programming interface (API) provided by the external sources. As a data provider, the service program publishes its Web API and implements the specified functions.

In the project reported by this thesis, we have implemented two Web mashup applications to enhance the Web site oystersentinel.org: the Perkinsus marinus model and the Oil Spill model. Each model overlay geospatial data from a local database …


Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg 2012 University of Texas at Dallas

Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg

Jan Kallberg

La guerra concentrada en la red depende de la red de información global para capacidades de combate conjuntas.3 La capa fundamental crea la capacidad de combate global como la columna vertebral espacial de la red de información donde los haberes espaciales son el elemento decisivo. EE.UU. depende de las capacidades espaciales para su éxito y la seguridad nacional de EE.UU. se basa hoy en día en un número limitado de satélites muy utilizados. Estos satélites son cruciales para la disuasión estratégica, la vigilancia, la recopilación de inteligencia y las comunicaciones militares. Si la disuasión estratégica falla, los satélites forman parte …


Fuzzy-Excom Software Project Risk Assessment, Luiz Fernando Capretz, Ekananta Manalif, Ali Bou Nassif, Danny Ho 2012 University of Western Ontario

Fuzzy-Excom Software Project Risk Assessment, Luiz Fernando Capretz, Ekananta Manalif, Ali Bou Nassif, Danny Ho

Electrical and Computer Engineering Publications

A software development project can be considered to be risky project due to the uncertainty of the information (customer requirements), the complexity of the process, and the intangible nature of the product. Under these conditions, risk management in software development projects is mandatory, but often it is difficult and expensive to implement.

Expert COCOMO is an efficient approach to software project risk management, which leverages existing knowledge and expertise from previous effort estimation activities to assess the risk in a new software project. However, the original method has a limitation because it cannot effectively deal with imprecise and uncertain inputs …


Volatile Memory Message Carving: A "Per Process Basis" Approach, Aisha Ibrahim Ali-Gombe 2012 University of New Orleans

Volatile Memory Message Carving: A "Per Process Basis" Approach, Aisha Ibrahim Ali-Gombe

University of New Orleans Theses and Dissertations

The pace at which data and information transfer and storage has shifted from PCs to mobile devices is of great concern to the digital forensics community. Android is fast becoming the operating system of choice for these hand-held devices, hence the need to develop better forensic techniques for data recovery cannot be over-emphasized. This thesis analyzes the volatile memory for Motorola Android devices with a shift from traditional physical memory extraction to carving residues of data on a “per process basis”. Each Android application runs in a separate process within its own Dalvik Virtual Machine (JVM) instance, thus, the proposed …


Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns 2012 University of Dayton

Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns

MIS/OM/DS Faculty Publications

We examine the effects of human resource management (HRM) practices (e.g., career development, social support, compensation, and security) on IT professionals‟ job search behavior. Job search is a relatively novel dependent variable in studies of voluntary withdrawal behavior, in general, and for IT professionals, in particular. From a universalistic perspective, HRM practices individually and in combination exhibit independently additive effects on job search behavior. Our study contrasts this perspective with configurational theory, hypothesizing that proposed idealtype configurations of HRM practices have synergistic effects on job search behavior. We contribute to the IT and broader HRM literature by theoretically explicating and …


Power Management For Cloud-Scale Data Centers, Yanwei Zhang 2012 University of Tennessee, Knoxville

Power Management For Cloud-Scale Data Centers, Yanwei Zhang

Masters Theses

Recent years have seen the rapid growth of large and geographically distributed data centers deployed by Internet service operators to support various services such as cloud computing. Consequently, high electricity bills, as well as negative environmental implications (e.g., CO2 emission and global warming) come along. In this thesis, we first propose a novel electricity bill capping algorithm that not only minimizes the electricity cost, but also enforces a cost budget on the monthly bill for cloud-scale data centers that impact the power markets. Our solution first explicitly models the impacts of the power demands induced by cloud-scale data centers on …


The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther 2012 University of Texas at Dallas

The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther

Jan Kallberg

With sequestration looming—generating significant cuts to defense spending—the United States may find itself increasingly relying on nuclear and cyber deterrence as an affordable way to guarantee national sovereignty and prevent major conflict. While earlier defense planning and acquisitions were based on economic conditions that no longer exist, Congress’ options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense voters” than “social welfare voters,” according to a number of recent public opinion surveys.


Temporal Data Mining Of Uncertain Water Reservoir Data, Abhinaya Mohan, Peter Revesz 2012 University of Nebraska-Lincoln

Temporal Data Mining Of Uncertain Water Reservoir Data, Abhinaya Mohan, Peter Revesz

CSE Conference and Workshop Papers

This paper describes the challenges of data mining uncertain water reservoir data based on past human operations in order to learn from them reservoir policies that can be automated for the future operation of the water reservoirs. Records of human operations of water reservoirs often contain uncertain data. For example, the recorded amounts of water released and retained in the water reservoirs are typically uncertain, i.e., they are bounded by some minimum and maximum values. Moreover, the time of release is also uncertain, i.e., typically only monthly or weekly amounts are recorded. To increase the effectiveness of data mining of …


Efficacy Of Smartphone Technology On Improving Asthma Control And Compliance, Dustin Nelson, Lauren Macks, Gregory Paine, Forouzan Poursoltan, Tirhas Mekonnen, Melody L. Hartzler 2012 Cedarville University

Efficacy Of Smartphone Technology On Improving Asthma Control And Compliance, Dustin Nelson, Lauren Macks, Gregory Paine, Forouzan Poursoltan, Tirhas Mekonnen, Melody L. Hartzler

Pharmacy and Nursing Student Research and Evidence-Based Medicine Poster Session

Asthma is the fifth most costly disease in the U.S., estimated to cost over $50 billion annually. This large cost is due to the large number of hospitalizations, ER visits, and doctor’s office visits. Improving patient adherence to asthma medications would decrease these costs significantly by preventing most hospital and doctor’s office visits. AsthmaSense® is a free to download smartphone application available on both iTunes and Android marketplaces. AsthmaSense® will allow patients to record when they take their medications, as well as send them reminders to take their medications.


Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg 2012 University of Texas at Dallas

Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg

Jan Kallberg

In releasing the United States Department of Defense’s (DoD) Sustaining U.S. Global Leadership: Priorities for 21st Century Defense and Defense Budget Priorities and Choices in January 2012, President Barack Obama and Secretary of Defense Leon Panetta offered a rationale for the administration’s reductions in defense spending. By stating that the shift in strategic direction is an effort to “put our fiscal house in order” and a response to the 2011 Budget Control Act, which requires DoD to reduce spending by $487 billion between fiscal years 2012 and 2021, the United States’ NATO partners in Europe were given considerable reason for …


Sense Beauty Via Face, Dressing, And/Or Voice, Tam Nguyen, Si Liu, Bingbing Ni, Jun Tan, Yong Rui, Shuicheng Yan 2012 University of Dayton

Sense Beauty Via Face, Dressing, And/Or Voice, Tam Nguyen, Si Liu, Bingbing Ni, Jun Tan, Yong Rui, Shuicheng Yan

Computer Science Faculty Publications

Discovering the secret of beauty has been the pursuit of artists and philosophers for centuries. Nowadays, the computational model for beauty estimation has been actively explored in computer science community, yet with the focus mainly on facial features. In this work, we perform a comprehensive study of female attractiveness conveyed by single/multiple modalities of cues, i.e., face, dressing, and/or voice, and aim to uncover how different modalities individually and collectively affect the human sense of beauty. To this end, we collect the first Multi-Modality Beauty (M2B) dataset in the world for female attractiveness study, which is thoroughly annotated …


Digital Commons powered by bepress