Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

55,109 Full-Text Articles 71,815 Authors 23,088,769 Downloads 376 Institutions

All Articles in Computer Sciences

Faceted Search

55,109 full-text articles. Page 1974 of 2004.

Analyzing The Adoption Of Computer Security Utilizing The Health Belief Model, Chet L. Claar, Jeffrey Johnson 2010 Central Washington University

Analyzing The Adoption Of Computer Security Utilizing The Health Belief Model, Chet L. Claar, Jeffrey Johnson

All Faculty Scholarship for the College of the Sciences

The home Internet user faces a hostile environment abundant in potential attacks on their computers. These attacks have been increasing at an alarming rate and cause damage to individuals and organizations regularly, and have the potential to cripple the critical infrastructures of entire countries. Recent research has determined that some individuals are not utilizing additional software protections available to mitigate these potential security risks. This paper seeks to further examine the reasons by proposing a conceptual framework that utilizes the Health Belief Model as a possible way to explain why some people do not perceive a threat sufficient to prompt …


What The 2007 Tac Market Design Game Tells Us About Effective Auction Mechanisms, Jinzhong Niu, Kai Cai, Simon Parsons, Peter McBurney, Enrico Gerding 2010 CUNY Guttman Community College

What The 2007 Tac Market Design Game Tells Us About Effective Auction Mechanisms, Jinzhong Niu, Kai Cai, Simon Parsons, Peter Mcburney, Enrico Gerding

Publications and Research

This paper analyzes the entrants to the 2007 TAC Market Design Game. We present a classification of the entries to the competition, and use this classification to compare these entries. The paper also attempts to relate market dynamics to the auction rules adopted by these entries and their adaptive strategies via a set of post-tournament experiments. Based on this analysis, the paper speculates about the design of effective auction mechanisms, both in the setting of this competition and in the more general case.


Tr-2010005: Securing Bgp Through Existing Infrastructure And Contractual Chains (Ccbgp), Yuri Cantor, Nancy Griffeth, Bilal Khan, Ping Ji 2010 City University of New York (CUNY)

Tr-2010005: Securing Bgp Through Existing Infrastructure And Contractual Chains (Ccbgp), Yuri Cantor, Nancy Griffeth, Bilal Khan, Ping Ji

Computer Science Technical Reports

No abstract provided.


Tr-2010008: Knowability From A Logical Point Of View, Sergei Artemov, Tudor Protopopescu 2010 City University of New York (CUNY)

Tr-2010008: Knowability From A Logical Point Of View, Sergei Artemov, Tudor Protopopescu

Computer Science Technical Reports

No abstract provided.


Tr-2010009: Solving Linear Systems With Randomized Augmentation Ii, Victor Y. Pan, Guoliang Qian 2010 City University of New York (CUNY)

Tr-2010009: Solving Linear Systems With Randomized Augmentation Ii, Victor Y. Pan, Guoliang Qian

Computer Science Technical Reports

No abstract provided.


Tr-2010014: A Complexity Question In Justification Logic, Antonis Achilleos 2010 City University of New York (CUNY)

Tr-2010014: A Complexity Question In Justification Logic, Antonis Achilleos

Computer Science Technical Reports

No abstract provided.


Tr-2010015: New Progress In Real And Complex Polynomial Root-Finding, Victor Y. Pan, Ai-Long Zheng 2010 City University of New York (CUNY)

Tr-2010015: New Progress In Real And Complex Polynomial Root-Finding, Victor Y. Pan, Ai-Long Zheng

Computer Science Technical Reports

No abstract provided.


A Multidimensional Strategy To Detect Polypharmacological Targets In The Absence Of Structural And Sequence Homology, Jacob D. Durrant, Rommie E. Amaro, Lei Xie, Michael D. Urbaniak, Michael A. J. Ferguson, Antti Haapalainen, Zhijun Chen, Anne Marie Di Guilmi, Frank Wunder, Philip E. Bourne, J. Andrew McCammon 2010 University of California - San Diego

A Multidimensional Strategy To Detect Polypharmacological Targets In The Absence Of Structural And Sequence Homology, Jacob D. Durrant, Rommie E. Amaro, Lei Xie, Michael D. Urbaniak, Michael A. J. Ferguson, Antti Haapalainen, Zhijun Chen, Anne Marie Di Guilmi, Frank Wunder, Philip E. Bourne, J. Andrew Mccammon

Publications and Research

Conventional drug design embraces the ‘‘one gene, one drug, one disease’’ philosophy. Polypharmacology, which focuses on multi-target drugs, has emerged as a new paradigm in drug discovery. The rational design of drugs that act via polypharmacological mechanisms can produce compounds that exhibit increased therapeutic potency and against which resistance is less likely to develop. Additionally, identifying multiple protein targets is also critical for side-effect prediction. One third of potential therapeutic compounds fail in clinical trials or are later removed from the market due to unacceptable side effects often caused by off-target binding. In the current work, we introduce a multidimensional …


Geometrical Structure And Analysis Of Association Rule, Rajat Sar 2010 San Jose State University

Geometrical Structure And Analysis Of Association Rule, Rajat Sar

Master's Projects

Association rule mining helps us to identify the association between items from a large transactional data set. It has always been a time consuming process because of repeatedly scanning of the data set. Apriori Algorithm [1] and FP-Tree Algorithm [2] are the two methods to find out the association of items in a large transactional item set. Both the above algorithm works differently (Apriori follows Bottom-Up Approach & FP-Tree follows Top-Down Approach) in order to get the association. Associations of items generated from the above two algorithms can be represented in geometry. The geometrical form of associations is called Simplical …


Detecting Undetectable Computer Viruses, Sujandharan Venkatachalam 2010 San Jose State University

Detecting Undetectable Computer Viruses, Sujandharan Venkatachalam

Master's Projects

Signature-based detection relies on patterns present in viruses and provides a relatively simple and efficient method for detecting known viruses. At present, most anti-virus systems rely primarily on signature detection. Metamorphic viruses are one of the most difficult types of viruses to detect. Such viruses change their internal structure, which provides an effective means of evading signature detection. Previous work has provided a rigorous proof that a fairly simple metamorphic engine can generate viruses that will evade any signature-based detection. In this project, we first implement a metamorphic engine that is provably undetectable—in the sense of signature-based detection. We then …


Geometrical Structure And Analysis Of Association Rules, Sar Rajat 2010 San Jose State University

Geometrical Structure And Analysis Of Association Rules, Sar Rajat

Master's Projects

Association rule mining helps us to identify the association between items from a large transactional data set. It has always been a time consuming process because of repeatedly scanning of the data set. Apriori Algorithm [1] and FP-Tree Algorithm [2] are the two methods to find out the association of items in a large transactional item set. Both the above algorithm works differently (Apriori follows Bottom-Up Approach & FP-Tree follows Top-Down Approach) in order to get the association. Associations of items generated from the above two algorithms can be represented in geometry. The geometrical form of associations is called Simplical …


Automatic Grading Of Programming Assignments, Ashlesha Patil 2010 San Jose State University

Automatic Grading Of Programming Assignments, Ashlesha Patil

Master's Projects

Solving practical problems is one of the important aspects of learning programming languages. But the assessment of programming problems is not straightforward. It involves time consuming and tedious steps required to compile and test the solution. In this project, I have developed a online tool, Javabrat that allows the students and language learners to practice Java and Scala problems. Javabrat automatically assesses the user's program and provides the instant feedback to the user. The users can also contribute their own programming problems to the existing problem set. I have also developed a plugin for a learning management system, Moodle. This …


Bookmarklet Builder For Offline Data Retrieval, Sheetal Naidu 2010 San Jose State University

Bookmarklet Builder For Offline Data Retrieval, Sheetal Naidu

Master's Projects

Bookmarklet Builder for Offline Data Retrieval is a computer application which will allow users to view websites even when they are offline. It can be stored as a URL of a bookmark in the browser. Bookmarklets exist for storing single web pages in hand-held devices and these web pages are stored as PDF files. In this project we have developed a tool that can save entire web page applications as bookmarklets. This will enable users to use these applications even when they are not connected to the Internet. The main technology beyond Javascript used to achieve this is the data: …


Email Data Mining: An Approach To Construct An Organization Position-Wise Structure While Performing Email Analysis, Bhargav Vadher 2010 San Jose State University

Email Data Mining: An Approach To Construct An Organization Position-Wise Structure While Performing Email Analysis, Bhargav Vadher

Master's Projects

In this age of social networking, it is necessary to define the relationships among the members of a social network. Various techniques are already available to define user- to-user relationships across the network. Over time, many algorithms and machine learning techniques were applied to find relationships over social networks, yet very few techniques and information are available to define a relation directly over raw email data. Few educational societies have developed a way to mine the email log files and have found the inter-relation between the users by means of clusters. Again, there is no solid technique available that can …


Parallel Programming Recipes, Thuy C. Nguyenphuc 2010 San Jose State University

Parallel Programming Recipes, Thuy C. Nguyenphuc

Master's Projects

Parallel programming has become vital for the success of commercial applications since Moore’s Law will now be used to double the processors (or cores) per chip every technology generation. The performance of applications depends on how software executions can be mapped on the multi-core chip, and how efficiently they run the cores. Currently, the increase of parallelism in software development is necessary, not only for taking advantage of multi-core capability, but also for adapting and surviving in the new silicon implementation. This project will provide the performance characteristics of parallelism for some common algorithms or computations using different parallel languages. …


Mobile Search Engine Using Clustering And Query Expansion, Huy Nguyen 2010 San Jose State University

Mobile Search Engine Using Clustering And Query Expansion, Huy Nguyen

Master's Projects

Internet content is growing exponentially and searching for useful content is a tedious task that we all deal with today. Mobile phones lack of screen space and limited interaction methods makes traditional search engine interface very inefficient. As the use of mobile internet continues to grow there is a need for an effective search tool. I have created a mobile search engine that uses clustering and query expansion to find relevant web pages efficiently. Clustering organizes web pages into groups that reflect different components of a query topic. Users can ignore clusters that they find irrelevant so they are not …


Computer Science And The Liberal Arts: A Philosophical Examination, H. M. Walker, Charles F. Kelemen 2010 Swarthmore College

Computer Science And The Liberal Arts: A Philosophical Examination, H. M. Walker, Charles F. Kelemen

Computer Science Faculty Works

This article explores the philosophy and position of the discipline of computer science within the liberal arts, based upon a discussion of the nature of computer science and a review of the characteristics of the liberal arts. A liberal arts environment provides important opportunities for undergraduate programs, but also presents important constraints. A well designed program can flourish in this environment, and evidence indicates that a liberal arts program in computer science can indeed succeed well.


Using Python To Program Lego Mindstorms Robots: The Pynxc Project, Brian S. Blais 2010 Bryant University

Using Python To Program Lego Mindstorms Robots: The Pynxc Project, Brian S. Blais

Science and Technology Department Faculty Journal Articles

LEGO MINDSTORMS® NXT (Lego Group, 2006) is a perfect platform for introducing programming concepts, and is generally targeted toward children from age 8-14. The language which ships with the MINDSTORMS®, called NXTg, is a graphical language based on LabVIEW (Jeff Kodosky, 2010). Although there is much value in graphical languages, such as LabVIEW, a text-based alternative can be targeted at an older audiences and serve as part of a more general introduction to modern computing. Other languages, such as NXC (Not Exactly C) (Hansen, 2010) and PbLua (Hempel, 2010), fit this description. Here we introduce PyNXC, a subset of the …


Identifying A Computer Forensics Expert: A Study To Measure The Characteristics Of Forensic Computer Examiners, Gregory H. Carlton, Reginald Worthley 2010 California State Polytechnic University

Identifying A Computer Forensics Expert: A Study To Measure The Characteristics Of Forensic Computer Examiners, Gregory H. Carlton, Reginald Worthley

Journal of Digital Forensics, Security and Law

The usage of digital evidence from electronic devices has been rapidly expanding within litigation, and along with this increased usage, the reliance upon forensic computer examiners to acquire, analyze, and report upon this evidence is also rapidly growing. This growing demand for forensic computer examiners raises questions concerning the selection of individuals qualified to perform this work. While courts have mechanisms for qualifying witnesses that provide testimony based on scientific data, such as digital data, the qualifying criteria covers a wide variety of characteristics including, education, experience, training, professional certifications, or other special skills. In this study, we compare task …


Adaptation Of Pyflag To Efficient Analysis Of Seized Computer Data Storage, Aleksander Byrski, Wojciech Stryjewski, Bartłomiej Czechowicz 2010 AGH University of Science and Technology

Adaptation Of Pyflag To Efficient Analysis Of Seized Computer Data Storage, Aleksander Byrski, Wojciech Stryjewski, Bartłomiej Czechowicz

Journal of Digital Forensics, Security and Law

Based on existing software aimed at investigation support in the analysis of computer data storage seized during investigation (PyFlag), an extension is proposed involving the introduction of dedicated components for data identification and filtering. Hash codes for popular software contained in NIST/NSRL database are considered in order to avoid unwanted files while searching and to classify them into several categories. The extension allows for further analysis, e.g. using artificial intelligence methods. The considerations are illustrated by the overview of the system's design.


Digital Commons powered by bepress