Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

40,958 Full-Text Articles 45,699 Authors 15,140,944 Downloads 331 Institutions

All Articles in Computer Sciences

Faceted Search

40,958 full-text articles. Page 1308 of 1325.

A Reasonable Semantic Web, Pascal Hitzler, Frank van Harmelen 2010 Wright State University - Main Campus

A Reasonable Semantic Web, Pascal Hitzler, Frank Van Harmelen

Computer Science and Engineering Faculty Publications

The realization of Semantic Web reasoning is central to substantiating the Semantic Web vision. However, current mainstream research on this topic faces serious challenges, which forces us to question established lines of research and to rethink the underlying approaches. We argue that reasoning for the Semantic Web should be understood as "shared inference," which is not necessarily based on deductive methods. Model-theoretic semantics (and sound and complete reasoning based on it) functions as a gold standard, but applications dealing with large-scale and noisy data usually cannot afford the required runtimes. Approximate methods, including deductive ones, but also approaches based on ...


Redesigning The Information Assurance Undergraduate Curriculum At Regis University, Robert L. Winter 2010 Regis University

Redesigning The Information Assurance Undergraduate Curriculum At Regis University, Robert L. Winter

Student Publications

When Regis University created the eSecurity curriculum in 2003, the lessons were pertinent to the then-current threats. Although the curriculum has slightly changed since then, the courses needed a major facelift to meet the ever changing cyber threats. The question of can Information Assurance courses at Regis University be refreshed to include virtual labs so they are based on ethical standards will be answered in this paper. Utilizing the Design Science methodology and incorporating Bloom"â„¢s Taxonomy and the Jesuit educational approach, curriculum was identified and developed for the classroom and online students. By working with the Regis Distance ...


A Framework For Multimedia Playback And Analysis Of Mpeg-2 Videos With Ffmpeg, Anand Saggi 2010 Iowa State University

A Framework For Multimedia Playback And Analysis Of Mpeg-2 Videos With Ffmpeg, Anand Saggi

Graduate Theses and Dissertations

Fast Forward Motion Pictures Expert Group (FFmpeg) is a well-known, high performance, cross platform open source library for recording, streaming, and playback of video and audio in various formats, namely, Motion Pictures Expert Group (MPEG), H.264, Audio Video Interleave (AVI), just to name a few. With FFmpeg current licensing options, it is also suitable for both open source and commercial software development. FFmpeg contains over 100 open source codecs for video encoding and decoding.

Given the complexities of MPEG standards, FFmpeg still lacks a framework for (1) seeking to a particular image frame in a video, which is needed ...


Toward A Molecular Programming Language For Algorithmic Self-Assembly, Matthew John Patitz 2010 Iowa State University

Toward A Molecular Programming Language For Algorithmic Self-Assembly, Matthew John Patitz

Graduate Theses and Dissertations

Self-assembly is the process whereby relatively simple components autonomously combine to form more complex objects. Nature exhibits self-assembly to form everything from microscopic crystals to living cells to galaxies. With a desire to both form increasingly sophisticated products and to understand the basic components of living systems, scientists have developed and studied artificial self-assembling systems. One such framework is the Tile Assembly Model introduced by Erik Winfree in 1998. In this model, simple two-dimensional square `tiles' are designed so that they self-assemble into desired shapes. The work in this thesis consists of a series of results which build toward the ...


Identifying And Eliminating Inconsistencies In Mappings Across Hierarchical Ontologies, Bhavesh Sanghvi 2010 Iowa State University

Identifying And Eliminating Inconsistencies In Mappings Across Hierarchical Ontologies, Bhavesh Sanghvi

Graduate Theses and Dissertations

Recent years have seen a rapid proliferation of information sources e.g., on the World-wide Web, in virtually every area of human endeavor. Such autonomous information sources are based on different ontologies, i.e., conceptualizations of the entities, properties, and relationships in the respective domains of discourse. However, practical applications (e.g., building predictive models from disparate data sources, assembling composite web services using components from multiple repositories) call for mechanisms that bridge the semantic gaps between disparate ontologies using mappings that express terms (concepts, properties, and relationships) in a target ontology in terms of those in one or more ...


A Framework For Safe Composition Of Heterogeneous Soa Services In A Pervasive Computing Environment With Resource Constraints, Jose Manuel Reyes Alamo 2010 Iowa State University

A Framework For Safe Composition Of Heterogeneous Soa Services In A Pervasive Computing Environment With Resource Constraints, Jose Manuel Reyes Alamo

Graduate Theses and Dissertations

The Service Oriented Computing (SOC) paradigm, defines services as software artifacts whose implementations are separated from their specifications. Application developers rely on services to simplify the design, reduce the development time and cost. Within the SOC paradigm, different Service Oriented Architectures (SOAs) have been developed. These different SOAs provide platform independence, programming-language independence, defined standards, and network support. Even when different SOAs follow the same SOC principles, in practice it is difficult to compose services from heterogeneous architectures. Automatic the process of composition of services from heterogeneous SOAs is not a trivial task.

Current composition tools usually focus on a ...


Spatio-Temporal Soil Moisture Measurement With Wireless Underground Sensor Networks, Xin Dong, Mehmet C. Vuran 2010 University of Nebraska-Lincoln

Spatio-Temporal Soil Moisture Measurement With Wireless Underground Sensor Networks, Xin Dong, Mehmet C. Vuran

CSE Conference and Workshop Papers

In this paper, the estimation distortion of distributed soil moisture measurement using Wireless Underground Sensor Networks (WUSNs) is investigated. The main focus of this paper is to analyze the impact of the environment and network parameters on the estimation distortion of the soil moisture.More specifically, the effects of rainfall, soil porosity, and vegetation root zone are investigated by exploiting a rainfall model, in addition to the effects of sampling rate, network topology, and measurement signal noise ratio. Spatio-temporal correlation is characterized to develop a measurement distortion model with respect to these factors. The evaluations reveal that with porous soil ...


Structure And Content Semantic Similarity Detection Of Extensible Markup Language Documents Using Keys, Waraporn Viyanon 2010 Missouri University of Science and Technology

Structure And Content Semantic Similarity Detection Of Extensible Markup Language Documents Using Keys, Waraporn Viyanon

Doctoral Dissertations

"XML (eXtensible Mark-up Language) has become the fundamental standard for efficient data management and exchange. Due to the widespread use of XML for describing and exchanging data on the web, XML-based comparison is central issues in database management and information retrieval. In fact, although many heterogeneous XML sources have similar content, they may be described using different tag names and structures. This work proposes a series of algorithms for detection of structural and content changes among XML data. The first is an algorithm called XDoI (XML Data Integration Based on Content and Structure Similarity Using Keys) that clusters XML documents ...


Event Detection From Click-Through Data Via Query Clustering, Prabhu Kumar Angajala 2010 Missouri University of Science and Technology

Event Detection From Click-Through Data Via Query Clustering, Prabhu Kumar Angajala

Masters Theses

"The web is an index of real-world events and lot of knowledge can be mined from the web resources and their derivatives. Event detection is one recent research topic triggered from the domain of web data mining with the increasing popularity of search engines. In the visitor-centric approach, the click-through data generated by the web search engines is the start up resource with the intuition: often such data is event-driven. In this thesis, a retrospective algorithm is proposed to detect such real-world events from the click-through data. This approach differs from the existing work as it: (i) considers the click-through ...


Population Control In Evolutionary Algorithms, Jason Edward Cook 2010 Missouri University of Science and Technology

Population Control In Evolutionary Algorithms, Jason Edward Cook

Masters Theses

"Traditional evolutionary algorithms (EAs) are powerful robust problem solvers that have several fixed parameters which require prior specification. Having to determine good values for any of these parameters can be problematic, as the performance of EAs is generally very sensitive to these parameters, requiring expert knowledge to set optimally without extensive use of trial and error. Parameter control is a promising approach to achieving this automation and has the added potential of increasing EA performance based on both theoretical and empirical evidence that the optimal values of EA strategy parameters change during the course of executing an evolutionary run. While ...


Multi Axis Slicing For Rapid Prototyping, Divya Kanakanala 2010 Missouri University of Science and Technology

Multi Axis Slicing For Rapid Prototyping, Divya Kanakanala

Masters Theses

"With multi-axis capability, direct laser deposition process can produce a metal part without the usage of support structures. In order to fully utilize such a capability, a slicing method for multi-axis metal deposition process is discussed. Using the geometry information of adjacent layers, the slicing direction and layer thickness can be changed as needed. A hierarchy structure is designed to manage the topological information which is used to determine the slicing sequence. The parallel slicing process is studied to build hollow type structure. With such a character, the hole like feature can be deposited directly to save the required machining ...


An Artificial Life Approach To Evolutionary Computation: From Mobile Cellular Algorithms To Artificial Ecosystems, Shivakar Vulli 2010 Missouri University of Science and Technology

An Artificial Life Approach To Evolutionary Computation: From Mobile Cellular Algorithms To Artificial Ecosystems, Shivakar Vulli

Masters Theses

"This thesis presents a new class of evolutionary algorithms called mobile cellular evolutionary algorithms (mcEAs). These algorithms are characterized by individuals moving around on a spatial population structure. As a primary objective, this thesis aims to show that by controlling the population density and mobility in mcEAs, it is possible to achieve much better control over the rate of convergence than what is already possible in existing cellular EAs. Using the observations and results from this investigation into selection pressure in mcEAs, a general architecture for developing agent-based evolutionary algorithms called Artificial Ecosystems (AES) is presented. A simple agent-based EA ...


Cloud Security Requirements Analysis And Security Policy Development Using A High-Order Object-Oriented Modeling Technique, Kenneth Kofi Fletcher 2010 Missouri University of Science and Technology

Cloud Security Requirements Analysis And Security Policy Development Using A High-Order Object-Oriented Modeling Technique, Kenneth Kofi Fletcher

Masters Theses

"Security continues to be a major challenge for cloud computing, and it is one that must be addressed if cloud computing is to be fully accepted. Most technological means of securing non-cloud computing systems can be either applied directly or modified to secure a cloud; however, no integrated model-based methodology is yet available to analyze cloud security requirements and develop policy to deal with both internal and external security challenges. This work proposes just such a methodology and demonstrates its application with specific cases. Cloud assets are represented by high order object models, and misuse cases together with malactivity swimlane ...


Intelligent Computational Argumentation For Evaluating Performance Scores In Multi-Criteria Decision Making, Rubal Wanchoo 2010 Missouri University of Science and Technology

Intelligent Computational Argumentation For Evaluating Performance Scores In Multi-Criteria Decision Making, Rubal Wanchoo

Masters Theses

"Multi Criteria Decision Making (MCDM) is a discipline aimed at assisting multiple stakeholders in contemplating a decision paradigm in an uncertain environment. The decision analysis to be performed involves numerous alternative positions assessed under varied criterion. A performance score is assigned for each alternative in terms of every criterion and it represents satisfaction of the criteria by that alternative. In a collaborative decision making environment, performance scores are either obtained when a consensus can be reached among stakeholders on a particular score or in some cases or controversial when stakeholders do not agree with each other about them. In the ...


Etherannotate: A Transparent Malware Analysis Tool For Integrating Dynamic And Static Examination, Joshua Michael Eads 2010 Missouri University of Science and Technology

Etherannotate: A Transparent Malware Analysis Tool For Integrating Dynamic And Static Examination, Joshua Michael Eads

Masters Theses

"Software security researchers commonly reverse engineer and analyze current malicious software (malware) to determine what the latest techniques malicious attackers are utilizing and how to protect computer systems from attack. The most common analysis methods involve examining how the program behaves during execution and interpreting its machine-level instructions. However, modern malicious applications use advanced anti-debugger, anti-virtualization, and code packing techniques to obfuscate the malware's true activities and divert security analysts. Malware analysts currently do not have a simple method for tracing malicious code activity at the instruction-level in a highly undetectable environment. There also lacks a simple method for ...


2-D Path Planning For Direct Laser Deposition Process, Swathi Routhu 2010 Missouri University of Science and Technology

2-D Path Planning For Direct Laser Deposition Process, Swathi Routhu

Masters Theses

"The zigzag and offset path have been the two most popular path patterns for tool movement in machining process. Different from the traditional machining processes, the quality of parts produced by the metal deposition process is much more dependent upon the choice of deposition paths. Due to the nature of the metal deposition processes, various tool path patterns not only change the efficiency but also affect the deposition height, a critical quality for metal deposition process. This thesis presents the research conducted on calculating zigzag pattern to improve efficiency by minimizing the idle path. The deposition height is highly dependent ...


A Pilot Study In An Application Of Text Mining To Learning System Evaluation, Nitsawan Katerattanakul 2010 Missouri University of Science and Technology

A Pilot Study In An Application Of Text Mining To Learning System Evaluation, Nitsawan Katerattanakul

Masters Theses

"Text mining concerns discovering and extracting knowledge from unstructured data. It transforms textual data into a usable, intelligible format that facilitates classifying documents, finding explicit relationships or associations between documents, and clustering documents into categories. Given a collection of survey comments evaluating the civil engineering learning system, text mining technique is applied to discover and extract knowledge from the comments. This research focuses on the study of a systematic way to apply a software tool, SAS Enterprise Miner, to the survey data. The purpose is to categorize the comments into different groups in an attempt to identify "major" concerns from ...


“Little Language” Project Modules, John Clements, Kathi Fisler 2010 California Polytechnic State University - San Luis Obispo

“Little Language” Project Modules, John Clements, Kathi Fisler

Computer Science and Software Engineering

Many computer science departments are debating the role of programming languages in the curriculum. These discussions often question the relevance and appeal of programming-languages content for today's students. In our experience, domain-specific, “little languages” projects provide a compelling illustration of the importance of programming-language concepts. This paper describes projects that prototype mainstream applications such as PowerPoint, TurboTax, and animation scripting. We have used these exercises as modules in non-programming languages courses, including courses for first year students. Such modules both encourage students to study linguistic topics in more depth and provide linguistic perspective to students who might not otherwise ...


A Novel Thread Scheduler Design For Polymorphic Embedded Systems, Viswanath Krishnamurthy 2010 Iowa State University

A Novel Thread Scheduler Design For Polymorphic Embedded Systems, Viswanath Krishnamurthy

Graduate Theses and Dissertations

A novel thread scheduler design for polymorphic embedded systems

Abstract:

The ever-increasing complexity of current day embedded systems necessitates that these systems be adaptable and scalable to user demands. With the growing use of consumer electronic devices, embedded computing is steadily approaching the desktop computing trend. End users expect their consumer electronic devices to operate faster than before and offer support for a wide range of applications. In order to accommodate a broad range of user applications, the challenge is to come up with an efficient design for the embedded system scheduler. Hence the primary goal of the thesis is ...


Modeling And Grasping Of Thin Deformable Objects, Jiang Tian 2010 Iowa State University

Modeling And Grasping Of Thin Deformable Objects, Jiang Tian

Graduate Theses and Dissertations

Deformable modeling of thin shell-like and other objects have potential application in robot grasping, medical robotics, home robots, and so on. The ability to manipulate electrical and optical cables, rubber toys, plastic bottles, ropes, biological tissues, and organs is an important feature of robot intelligence. However, grasping of deformable objects has remained an underdeveloped research area. When a robot hand applies force to grasp a soft object, deformation will result in the enlarging of the finger contact regions and the rotation of the contact normals, which in turn will result in a changing wrench space. The varying geometry can be ...


Digital Commons powered by bepress