Open Access. Powered by Scholars. Published by Universities.®

Other Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

1,826 Full-Text Articles 2,652 Authors 1,393,215 Downloads 171 Institutions

All Articles in Other Computer Sciences

Faceted Search

1,826 full-text articles. Page 81 of 83.

Towards Nominal Formal Languages, Alexander Kurz, Tomoyuki Suzuki, Emilio Tuosto 2011 Chapman University

Towards Nominal Formal Languages, Alexander Kurz, Tomoyuki Suzuki, Emilio Tuosto

Engineering Faculty Articles and Research

We introduce formal languages over infinite alphabets where words may contain binders.We define the notions of nominal language, nominal monoid, and nominal regular expressions. Moreover, we extend history-dependent automata (HD-automata) by adding stack, and study the recognisability of nominal languages.


Generic Trace Logics, Christian Kissig, Alexander Kurz 2011 University of Leicester

Generic Trace Logics, Christian Kissig, Alexander Kurz

Engineering Faculty Articles and Research

We combine previous work on coalgebraic logic with the coalgebraic traces semantics of Hasuo, Jacobs, and Sokolova.


Java Smell Detector, Nitin Mathur 2011 San Jose State University

Java Smell Detector, Nitin Mathur

Master's Projects

“Code Smell” or “Bad Smell”, at the very least, is an indicator of badly written code and is often indicative of deeper problems in software design. In layman terms, it signals flaws in the core foundation or architecture of the software that can cause any number of more serious problems – from usability and runtime performance to supportability and enhancement. These problems can mostly be prevented by the systematic refactoring of the code. Refactoring is the process (and according to some, an ‘art’) of making incremental changes to existing source code to improve its nonfunctional attributes, without modifying its external …


Evaluation Of Interfaces For Senior Citizens: Bigscreenlive, Eldy And Pointerware, Bella Manoim 2011 Bard College

Evaluation Of Interfaces For Senior Citizens: Bigscreenlive, Eldy And Pointerware, Bella Manoim

Senior Projects Spring 2011

Senior Project submitted to The Division of Science, Mathematics, and Computing of Bard College.


Locating Mineral Exploration Targets Using A Geographical Information System, Finnian O'Connor 2011 Technological University Dublin

Locating Mineral Exploration Targets Using A Geographical Information System, Finnian O'Connor

Conference papers

This paper outlines the research and development of a complete open source geographic information system (GIS) that offers real-time geoprocessing over the Internet. The premise of the geoprocessing is to locate mineral exploration targets that have high potential for success based on parameters chosen by the end-user of the system.

Components integrated in the system include a spatial database PostGIS, a GIS processing engine GRASS, a GIS server GeoServer, a web server Apache, and front-end technologies OpenLayers and GeoExt. Appropriate data was sourced from the Geological Survey of Ireland to be used for the geoprocessing.

With all the components of …


In-Degree Dynamics Of Large-Scale P2p Systems, Zhongmei Yao, Daren B. H. Cline, Dmitri Loguinov 2011 University of Dayton

In-Degree Dynamics Of Large-Scale P2p Systems, Zhongmei Yao, Daren B. H. Cline, Dmitri Loguinov

Computer Science Faculty Publications

This paper builds a complete modeling framework for understanding user churn and in-degree dynamics in unstructured P2P systems in which each user can be viewed as a stationary alternating renewal process. While the classical Poisson result on the superposition of n stationary renewal processes for n→∞ requires that each point process become sparser as n increases, it is often difficult to rigorously show this condition in practice. In this paper, we first prove that despite user heterogeneity and non-Poisson arrival dynamics, a superposition of edge-arrival processes to a live user under uniform selection converges to a Poisson process when …


Supporting Introductory Test-Driven Labs With Webide, Thomas C. Dvornik 2011 California Polytechnic State University, San Luis Obispo

Supporting Introductory Test-Driven Labs With Webide, Thomas C. Dvornik

Master's Theses

WebIDE is a new web-based development environment for entry-level programmers with two primary goals: minimize tool barriers to writing computer programs and introduce software engineering best practices early in a student's educational career. Currently, WebIDE focuses on Test-Driven Learning (TDL) by using small iterative examples and introducing lock-step labs, which prevent the student from moving forward until they finish the current step. An initial set of labs and evaluators were created as examples of how to use WebIDE and were used in a pilot study in a CS0 course where students were split into two groups, one that used WebIDE …


Business Ethics As Rational Choice, John Hooker 2010 Carnegie Mellon University

Business Ethics As Rational Choice, John Hooker

John Hooker

No abstract provided.


Computational Mirna Target Prediction In Animals, Leyan Tang 2010 San Jose State University

Computational Mirna Target Prediction In Animals, Leyan Tang

Master's Projects

miRNAs are a class of small RNA molecules about 22 nucleotides long that regulate gene expression at the post-transcriptional level. The discovery of the second miRNA 10 years ago was as much a surprise in its own way as the very structure of DNA discovered a half century earlier[1]. How could these small molecules regulate so many genes? During the past decade the complex cascade of regulation has been investigated and reported in detail[2]. The regions of the genome called untranslated regions, or UTRs, proved true to their name: they were indeed untranslated, but certainly not unimportant: they act as …


Online Application Monitoring Tool, Sathya Anandan 2010 San Jose State University

Online Application Monitoring Tool, Sathya Anandan

Master's Projects

In some classes, students take online tests and some types of network activity (for example trying to find the answers in www.google.com) will be considered as cheating during the exam. It would be useful if instructor could monitor online activities of each student to detect cheating. The goal of this project is to develop such a tool using client/server architecture. Tool should display the student's hostname and the website visited during unauthorized web activity. Professor should able to see the applications opened by all students and he will have an option to view the log files of all the students …


A Study On Masquerade Detection, Lin Huang 2010 San Jose State University

A Study On Masquerade Detection, Lin Huang

Master's Projects

In modern computer systems, usernames and passwords have been by far the most common forms of authentication. A security system relying only on password protection is defenseless when the passwords of legitimate users are compromised. A masquerader can impersonate a legitimate user by using a compromised password.

An intrusion detection system (IDS) can provide an additional level of protection for a security system by inspecting user behavior. In terms of detection techniques, there are two types of IDSs: signature-based detection and anomaly-based detection. An anomaly-based intrusion detection technique consists of two steps: 1) creating a normal behavior model for legitimate …


Improved Worm Simulator And Simulations, Arnold Suvatne 2010 San Jose State University

Improved Worm Simulator And Simulations, Arnold Suvatne

Master's Projects

According to the latest Microsoft Security Intelligence Report (SIR), worms were the second most prevalent information security threat detected in the first half of 2010 – the top threat being Trojans. Given the prevalence and damaging effects of worms, research and development of worm counter strategies are garnering an increased level of attention. However, it is extremely risky to test and observe worm spread behavior on a public network. What is needed is a packet level worm simulator that would allow researchers to develop and test counter strategies against rapidly spreading worms in a controlled and isolated environment. Jyotsna Krishnaswamy, …


Automatic Execution Path Finding Tool, Fan Yang 2010 San Jose State University

Automatic Execution Path Finding Tool, Fan Yang

Master's Projects

Today, there are many hackers trying to break software using reverse engineering tech- niques. To better protect software, we need to understand reverse engineering methods. This project presents a tool that automatically analyzes executable code in a manner simi- lar to the way an attack might analyze code.

Using reverse engineering techniques, executables can be disassembled to yield an as- sembly code representation of the program. Assembly code is much more human reada- ble than binary code. With assembly code, an attacker can attempt to modify the program to do something other than what was intended by the developer.

The …


Approximate Disassembly Using Dynamic Programming, Abhishek Shah 2010 San Jose State University

Approximate Disassembly Using Dynamic Programming, Abhishek Shah

Master's Projects

Most commercial anti-virus software uses signature based techniques to detect whether a file is infected by a virus or not. However, signature based detection systems are unable to detect metamorphic viruses, since such viruses change their internal structure from generation to generation. Previous work has shown that hidden Markov models (HMMs) can be used to detect metamorphic viruses. In this technique, the code is disassembled and the resulting opcode sequences are used for training and detection. Due to the disassembly step, this process is not efficient enough to use when a decision has to be made in real time.

In …


A Microrna Target Prediction Algorithm, Rupinder Singh 2010 San Jose State University

A Microrna Target Prediction Algorithm, Rupinder Singh

Master's Projects

MicroRNA target prediction using the experimental methods is a challenging task. To accelerate the process of miRNA target validation, many computational methods are used. Computational methods yield many potential candidates for experimental validation. This project is about developing a new computational method using dynamic programming to predict miRNA targets with more accuracy. The project discusses the currently available computational methods and develops a new algorithm using the currently available knowledge about miRNA interactions.


Intrusion Detection And Prevention System: Sql-Injection Attacks, Varian Luong 2010 San Jose State University

Intrusion Detection And Prevention System: Sql-Injection Attacks, Varian Luong

Master's Projects

Personally identifiable information (PII) is information regarding things such as bank accounts, retirement or stock investment accounts, credit card accounts, medical records, or insurance claims. There is a need to protect the PII in databases that are connected to the ubiquitous, global network that is the Internet. If there is any vulnerability in the protection in a system that holds PII, then it presents an opportunity for an unauthorized person to access this PII. One of the techniques available to would- be information thieves is SQL injection (SQL-I). In this project, a system is developed to analyze the values submitted …


A Visual Approach To Automated Text Mining And Knowledge Discovery, Andrey A. Puretskiy 2010 University of Tennessee, Knoxville

A Visual Approach To Automated Text Mining And Knowledge Discovery, Andrey A. Puretskiy

Doctoral Dissertations

The focus of this dissertation has been on improving the non-negative tensor factorization technique of text mining. The improvements have been made in both pre-processing and post-processing stages, with the goal of making the non-negative tensor factorization algorithm accessible to the casual user. The improved implementation allows the user to construct and modify the contents of the tensor, experiment with relative term weights and trust measures, and experiment with the total number of algorithm output features. Non-negative tensor factorization output feature production is closely integrated with a visual post-processing tool, FutureLens, that allows the user to perform in depth analysis …


Geophysical Study At Old Stone Fort State Archaeological Park, Manchester, Tennessee, Stephen Jay Yerka 2010 University of Tennessee - Knoxville

Geophysical Study At Old Stone Fort State Archaeological Park, Manchester, Tennessee, Stephen Jay Yerka

Masters Theses

The Old Stone Fort State Archaeological Park covers over 800 acres within Manchester, Tennessee, and is owned and managed by the Tennessee Division of State Parks. The central archaeological site within the park boundary is The Old Stone Fort mounds that enclose about 50 acres on a plateau above the convergence of the Big Duck and the Little Duck Rivers. The hilltop enclosure dates to the Middle Woodland Period, and radiocarbon dates obtained at the site range from the first to the fifth century A. D. Because of its size and apparent complexity, previous investigations of the site have been …


Functional Reactive Musical Performers, Justin M. Phillips 2010 California Polytechnic State University, San Luis Obispo

Functional Reactive Musical Performers, Justin M. Phillips

Master's Theses

Computers have been assisting in recording, sound synthesis and other fields of music production for quite some time. The actual performance of music continues to be an area in which human players are chosen over computer performers. Musical performance is an area in which personalization is more important than consistency. Human players play with each other, reacting to phrases and ideas created by the players that they are playing with. Computer performers lack the ability to react to the changes in the performance that humans perceive naturally, giving the human players an advantage over the computer performers.

This thesis creates …


Automated Breast Profile Segmentation For Roi Detection Using Digital Mammograms, Sameem Abdul Kareem 2010 University of Malaya

Automated Breast Profile Segmentation For Roi Detection Using Digital Mammograms, Sameem Abdul Kareem

Sameem Abdul Kareem

Mammography is currently the most effective imaging modality used by radiologists for the screening of breast cancer. Finding an accurate, robust and efficient breast profile segmentation technique still remains a challenging problem in digital mammography. Extraction of the breast profile region and the pectoral muscle is an essential pre-processing step in the process of computer-aided detection. Primarily it allows the search for abnormalities to be limited to the region of the breast tissue without undue influence from the background of the mammogram. The presence of pectoral muscle in mammograms biases detection procedures, which recommends removing the pectoral muscle during mammogram …


Digital Commons powered by bepress