Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 10621 - 10650 of 12808

Full-Text Articles in Physical Sciences and Mathematics

Extending The Network Life Time In Wsn Using Energy Efficient Algorithm, Venkata Sesha Sai Koundinya Goparaju Jul 2008

Extending The Network Life Time In Wsn Using Energy Efficient Algorithm, Venkata Sesha Sai Koundinya Goparaju

Electrical & Computer Engineering Theses & Dissertations

Wireless Sensor networks have many potential applications. These wireless sensor networks necessitate specific design requirements of which energy efficiency is vital. The sensor networks consist of sensor nodes that operate on battery power, and replacement of these batteries is very often a strenuous task, since networks are deployed in areas where the act of replacing the batteries proves impractical.

With the limited available energy of sensor nodes, most of the energy is drained during communication. An energy efficient routing algorithm can prolong the lifetime of the network by gradually depleting the nodes in the network. Many of the routing protocols …


Integrating Preservation Functions Into The Web Server, Joan A. Smith Jul 2008

Integrating Preservation Functions Into The Web Server, Joan A. Smith

Computer Science Theses & Dissertations

Digital preservation of theWorldWideWeb poses unique challenges, different fromthe preservation issues facing professional Digital Libraries. The complete list of a website’s resources cannot be cited with confidence, and the descriptive metadata available for the resources is so minimal that it is sometimes insufficient for a browser to recognize. In short, the Web suffers from a counting problem and a representation problem. Refreshing the bits, migrating from an obsolete file format to a newer format, and other classic digital preservation problems also affect the Web. As digital collections devise solutions to these problems, the Web will also benefit. But the core …


Bag-Of-Visual-Words Expansion Using Visual Relatedness For Video Indexing, Yu-Gang Jiang, Chong-Wah Ngo Jul 2008

Bag-Of-Visual-Words Expansion Using Visual Relatedness For Video Indexing, Yu-Gang Jiang, Chong-Wah Ngo

Research Collection School Of Computing and Information Systems

Bag-of-visual-words (BoW) has been popular for visual classification in recent years. In this paper, we propose a novel BoW expansion method to alleviate the effect of visual word correlation problem. We achieve this by diffusing the weights of visual words in BoW based on visual word relatedness, which is rigorously defined within a visual ontology. The proposed method is tested in video indexing experiment on TRECVID-2006 video retrieval benchmark, and an improvement of 7% over the traditional BoW is reported.


Searching Blogs And News: A Study On Popular Queries, Aixin Sun, Meishan Hu, Ee Peng Lim Jul 2008

Searching Blogs And News: A Study On Popular Queries, Aixin Sun, Meishan Hu, Ee Peng Lim

Research Collection School Of Computing and Information Systems

Blog/news search engines are very important channels to reach information about the real-time happenings. In this paper, we study the popular queries collected over one year period and compare their search results returned by a blog search engine (i.e., Technorati) and a news search engine (i.e., Google News). We observed that the numbers of hits returned by the two search engines for the same set of queries were highly correlated, suggesting that blogs often provide commentary to current events reported in news. As many popular queries are related to some events, we further observed a high cohesiveness among the returned …


Congestion Mitigation In Wireless Sensor Networks Using Single-Hop Backpressure Algorithm, Vijay Shekar Mangilipalli Gangu Sham Jul 2008

Congestion Mitigation In Wireless Sensor Networks Using Single-Hop Backpressure Algorithm, Vijay Shekar Mangilipalli Gangu Sham

Electrical & Computer Engineering Theses & Dissertations

Wireless sensor networks consist of a group of small components with limited resources allocated to sense the environment and transmit data to the user or interpreter. This concept is technically evolved from Sensors that are basically used to sense the environment around and collect data based on the sensing application incorporated in them. An extension to functionality of the sensors leads to the concept of sensor networks, where, in addition to gathering information at individual sensors, the data is processed and transmitted to a central station or Base station. This concept of transmitting the information from one node to the …


High-Resolution Optical Imaging For Deep-Water Archaeology, Hanumant Singh, Christopher Roman, Oscar Pizarro, Brendan Foley, Ryan Eustice, Ali Can Jun 2008

High-Resolution Optical Imaging For Deep-Water Archaeology, Hanumant Singh, Christopher Roman, Oscar Pizarro, Brendan Foley, Ryan Eustice, Ali Can

Christopher N. Roman

No abstract provided.


An Analysis Of Botnet Vulnerabilities, Sean W. Hudson Jun 2008

An Analysis Of Botnet Vulnerabilities, Sean W. Hudson

Theses and Dissertations

Botnets are a significant threat to computer networks and data stored on networked computers. The ability to inhibit communication between servers controlling the botnet and individual hosts would be an effective countermeasure. The objective of this research was to find vulnerabilities in Unreal IRCd that could be used to shut down the server. Analysis revealed that Unreal IRCd is a very mature and stable IRC server and no significant vulnerabilities were found. While this research does not eliminate the possibility that a critical vulnerability is present in the Unreal IRCd software, none were identified during this effort.


Verifying Semantic Business Process Models In Inter-Operation, George Koliadis, Aditya Ghose Jun 2008

Verifying Semantic Business Process Models In Inter-Operation, George Koliadis, Aditya Ghose

Professor Aditya K. Ghose

Process inter-operation is characterized as cooperative interactions among loosely coupled autonomous constituents to adaptively fulfill system-wide purpose. Issues of inconsistency can be anticipated in inter-operating processes given their independent management and design. To reduce inconsistency (that may contribute to failures) effective methods for statically verifying behavioral interoperability are required. This paper contributes a method for practical, semantic verification of interoperating processes (as represented with BPMN models). We provide methods to evaluate consistency during process design where annotation of the immediate effect of tasks and sub-processes has been provided. Furthermore, some guidelines are defined against common models of inter-operation for scoping …


Verifying Semantic Business Process Models In Inter-Operation, George Koliadis, Aditya K. Ghose May 2008

Verifying Semantic Business Process Models In Inter-Operation, George Koliadis, Aditya K. Ghose

Professor Aditya K. Ghose

Process inter-operation is characterized as cooperative interactions among loosely coupled autonomous constituents to adaptively fulfill system-wide purpose. Issues of inconsistency can be anticipated in inter-operating processes given their independent management and design. To reduce inconsistency (that may contribute to failures) effective methods for statically verifying behavioral interoperability are required. This paper contributes a method for practical, semantic verification of interoperating processes (as represented with BPMN models). We provide methods to evaluate consistency during process design where annotation of the immediate effect of tasks and sub-processes has been provided. Furthermore, some guidelines are defined against common models of inter-operation for scoping …


Hclp Based Service Composition, Ying Guan, Aditya K. Ghose, Zheng Lu May 2008

Hclp Based Service Composition, Ying Guan, Aditya K. Ghose, Zheng Lu

Professor Aditya K. Ghose

A key impediment to the widespread adoption of web services is the relatively limited set of tools available to deal with Quality-of-Service (QoS) factors. QoS factors pose several difficult challenges in how they may be articulated. While the functional requirements of a service can be represented as predicates to be satisfied by the target system, QoS factors are effectively statements of objectives to be maximized or minimized. QoS requirements occur naturally as local specifications of preference. Dealing with QoS factors is therefore a multi-objective optimization problem. In effect, these objectives are never fully satisfied, but satisficed to varying degrees. In …


Auditing Business Process Compliance, Aditya K. Ghose, George Koliadis May 2008

Auditing Business Process Compliance, Aditya K. Ghose, George Koliadis

Professor Aditya K. Ghose

Compliance issues impose significant management and reporting requirements upon organizations.We present an approach to enhance business process modeling notations with the capability to detect and resolve many broad compliance related issues. We provide a semantic characterization of a minimal revision strategy that helps us obtain compliant process models from models that might be initially non-compliant, in a manner that accommodates the structural and semantic dimensions of parsimoniously annotated process models. We also provide a heuristic approach to compliance resolution using a notion of compliance patterns. This allows us to partially automate compliance resolution, leading to reduced levels of analyst involvement …


Using Constraint Hierarchies To Support Qos-Guided Service Composition, Ying Guan, Aditya K. Ghose, Zheng Lu May 2008

Using Constraint Hierarchies To Support Qos-Guided Service Composition, Ying Guan, Aditya K. Ghose, Zheng Lu

Professor Aditya K. Ghose

A key impediment to the widespread adoption of web services is the is the relatively limited set of tools available to deal with Quality-of-Service (QoS) factors [12]. QoS factors pose several difficult challenges in how they may be articulated. While the functional requirements of a service can be represented as predicates to be satisfied by the target system, QoS factors are effectively statements of objectives to be maximized or minimized. QoS requirements occur naturally as local specifications of preference. Dealing with QoS factors is therefore a multi-objective optimization problem. In effect, these objectives are never fully satisfied, but satisficed to …


Process Discovery From Model And Text Artefacts, Aditya K. Ghose, George Koliadis, Arthur Cheung May 2008

Process Discovery From Model And Text Artefacts, Aditya K. Ghose, George Koliadis, Arthur Cheung

Professor Aditya K. Ghose

Modeling is an important and time consuming part of the Business Process Management life-cycle. An analyst reviews existing documentation and queries relevant domain experts to construct both mental and concrete models of the domain. To aid this exercise, we propose the Rapid Business Process Discovery (R-BPD) framework and prototype tool that can query heterogeneous information resources (e.g. corporate documentation, web-content, code e.t.c.) and rapidly construct proto-models to be incrementally adjusted to correctness by an analyst. This constitutes a departure from building and constructing models toward just editing them. We believe this rapid mixed-initiative modeling will increase analyst productivity by significant …


Combining Agent-Oriented Conceptual Modelling With Formal Methods, S. A. Vilkomir, Aditya K. Ghose, A. Krishna May 2008

Combining Agent-Oriented Conceptual Modelling With Formal Methods, S. A. Vilkomir, Aditya K. Ghose, A. Krishna

Professor Aditya K. Ghose

Agent-oriented conceptual modelling notations such as i* have received considerable recent attention as a useful approach to early-phase requirements engineering. Agent-oriented conceptual modelling notations are highly effective in representing requirements from an intentional stance and answering questions such as what goals exist, how key actors depend on each other and what alternatives must be considered. Formal methods such as those based on the Z notation offer a complementary set of representational facilities. We explore how these two otherwise disparate approaches might be used in a synergistic fashion.


Executable Specifications For Agent Oriented Conceptual Modelling, Y. Guan, Aditya K. Ghose May 2008

Executable Specifications For Agent Oriented Conceptual Modelling, Y. Guan, Aditya K. Ghose

Professor Aditya K. Ghose

Agent-oriented conceptual modelling (AoCM) notations such as i* have received considerable recent attention as a useful approach to early-phase requirements engineering. AoCM notations are useful in modeling organizational context and in offering high-level anthropomorphic abstractions as modeling constructs. AoCM notations such as i* help answer questions such as what goals exist, how key actors depend on each other and what alternatives must be considered. In this paper, we suggest an approach to executing i* models by translating these into set of interacting agents implemented in the 3APL language. In addition, we suggest a hybrid modeling, or co-evolution, approach in which …


Hierarchic Decomposition In Agent Oriented Conceptual Modelling, R. B. Brown, Aditya K. Ghose May 2008

Hierarchic Decomposition In Agent Oriented Conceptual Modelling, R. B. Brown, Aditya K. Ghose

Professor Aditya K. Ghose

Software development processes requires a thorough understanding of stakeholder objectives and requirements. Product-centrism is an insufficient stance from which to achieve greater efficiencies and reduce reengineering. Stakeholder requirement elicitation is thus worthy of formalization. A suite of tools, notably the i* model, provides a framework for early-phase requirements capture. These tools currently are at best only semiautomated and essentially consist of a notational glossary and sets of mark-up symbols. Increasing formalization may lead to greater automation of the process in the future, but currently there is a degree of flexibility that presents pitfalls for the unwary practitioner. A notion of …


Co-Evolution Of Agent Oriented Conceptual Models And Use Case Diagrams, Moshiur Bhuiyan, M. M. Zahidul Islam, Aneesh Krishna, Aditya K. Ghose May 2008

Co-Evolution Of Agent Oriented Conceptual Models And Use Case Diagrams, Moshiur Bhuiyan, M. M. Zahidul Islam, Aneesh Krishna, Aditya K. Ghose

Professor Aditya K. Ghose

Agent--oriented conceptual modeling notations such as i* represents an interesting approach for modeling early phase requirements which includes organizational contexts, stakeholder intentions and rationale. On the other hand Use Case diagram is used for capturing functional requirements of the system. The integration of i* model and Use Case diagram closes the gap of capturing organizational requirements and system requirements. But in both contexts the requirements might change at any time. Any change made in one model must be reflected in the other. This paper proposes a methodology supporting the co-evolution of these two otherwise disparate approaches in a synergistic fashion.


Co-Evolution Of Agent-Oriented Conceptual Models And Caso Agent Programs, A. Dasgupta, Aneesh Krishna, Aditya K. Ghose May 2008

Co-Evolution Of Agent-Oriented Conceptual Models And Caso Agent Programs, A. Dasgupta, Aneesh Krishna, Aditya K. Ghose

Professor Aditya K. Ghose

Agent-Oriented conceptual modelling notations are highly effective in representing requirements from an intentional stance and answering questions such as what goals exist, how key actors depend on each other and what alternatives must be considered. In this paper, we suggest an approach to executing i* models by translating these into set of interacting agents implemented in the CASO language. In addition, we suggest a hybrid modelling, or co-evolution, approach in which i* models and CASO agent programs are concurrently maintained and updated, while retaining some modicum of loose consistency between the two. This allows us to benefit from the complementary …


A Combined Approach For Supporting The Business Process Model Lifecycle, George Koliadis, Aleksander Vranesevic, Moshiur Bhuiyan, Aneesh Krishna, Aditya K. Ghose May 2008

A Combined Approach For Supporting The Business Process Model Lifecycle, George Koliadis, Aleksander Vranesevic, Moshiur Bhuiyan, Aneesh Krishna, Aditya K. Ghose

Professor Aditya K. Ghose

Business processes evolve throughout their lifecycle of change. Business Process Modeling (BPM2) notations such as BPMN are used to effectively conceptualize and communicate important process characteristics to relevant stakeholders. Agent-oriented conceptual modeling notations, such as i*, effectively capture and communicate organizational context. In this paper we argue that the management of change throughout the business process model lifecycle can be more effectively supported by combining notations. In particular, we identify two potential sources of process change, one occurring within the organizational context and the other within the operational context. As such the focus in this paper is on the co-evolution …


Location-Based Hashing For Querying And Searching, Felix Ching May 2008

Location-Based Hashing For Querying And Searching, Felix Ching

Computer Science and Computer Engineering Undergraduate Honors Theses

The rapidly growing information technology in modern days demands an efficient searching scheme to search for desired data. Locality Sensitive Hashing (LSH) is a method for searching similar data in a database. LSH achieves high accuracy and precision for locating desired data, but consumes a significant amount of memory and time. Based on LSH, this thesis presents two novel schemes for efficient and accurate data searching: Locality Sensitive Hashing-SmithWaterman (LSH-SmithWaterman) and Secure Min-wise Locality Sensitive Hashing (SMLSH). Both methods dramatically reduce the memory and time consumption and exhibit high accuracy in data searching. Simulation results demonstrate the efficiency of the …


Visualization Of An Approach To Data Clustering, Marisabel Guevara May 2008

Visualization Of An Approach To Data Clustering, Marisabel Guevara

Computer Science and Computer Engineering Undergraduate Honors Theses

Using visualization and clustering goals as guidelines, this thesis explores a graphic implementation of a data clustering technique that repositions vertices by applying physical laws of charges and springs to the components of the graph. The resulting visualizations are evidence of the success of the approach as well as of the data sets that lend themselves to a clustering routine. Due to the visual product of the implementation, the algorithm is most useful as an aid in understanding the grouping pattern of a data set. Either for a rapid analysis or to assist in presentation, the visual result of the …


Pitch Correction On The Human Voice, Suzanne Ownbey May 2008

Pitch Correction On The Human Voice, Suzanne Ownbey

Computer Science and Computer Engineering Undergraduate Honors Theses

No abstract provided.


Criteria On Utility Designing Of Convex Optimization In Fdma Networks, Zheng Sun, Wenjun Xu, Zhiqiang He, Kai Niu Apr 2008

Criteria On Utility Designing Of Convex Optimization In Fdma Networks, Zheng Sun, Wenjun Xu, Zhiqiang He, Kai Niu

Zheng Sun

In this paper, we investigate the network utility maximization problem in FDMA systems. We summarize with a suite of criteria on designing utility functions so as to achieve the global optimization convex. After proposing the general form of the utility functions, we present examples of commonly used utility function forms that are consistent with the criteria proposed in this paper, which include the well-known proportional fairness function and the sigmoidal-like functions. In the second part of this paper, we use numerical results to demonstrate a case study based on the criteria mentioned above, which deals with the subcarrier scheduling problem …


The Cyber-Workplace – Identifying Liability Issues In The Information Age And Managing E-Risk, Nigel Wilson Apr 2008

The Cyber-Workplace – Identifying Liability Issues In The Information Age And Managing E-Risk, Nigel Wilson

Annual ADFSL Conference on Digital Forensics, Security and Law

The information age provides numerous opportunities for modern society but also presents significant challenges in identifying liability issues and in managing risk. Technological change has occurred rapidly and is continuing at the same time as other major trends and changes are taking place in society and, in particular, in the workplace. The prospect of global liability and the complexity of jurisdictional differences present a considerable hurdle to the uniform regulation of liability issues. General legislation and legal principles have been readily applied to the cyber-world and to modern business practices and the workplace. Where necessary, legislatures have introduced specific legislation …


Data Mining Techniques For Fraud Detection, Rekha Bhowmik Apr 2008

Data Mining Techniques For Fraud Detection, Rekha Bhowmik

Annual ADFSL Conference on Digital Forensics, Security and Law

The paper presents application of data mining techniques to fraud analysis. We present some classification and prediction data mining techniques which we consider important to handle fraud detection. There exist a number of data mining algorithms and we present statistics-based algorithm, decision tree-based algorithm and rule-based algorithm. We present Bayesian classification model to detect fraud in automobile insurance. Naïve Bayesian visualization is selected to analyze and interpret the classifier predictions. We illustrate how ROC curves can be deployed for model assessment in order to provide a more intuitive analysis of the models.

Keywords: Data Mining, Decision Tree, Bayesian Network, ROC …


Simple - Rethinking The Monolithic Approach To Digital Forensic Software, Craig Valli Apr 2008

Simple - Rethinking The Monolithic Approach To Digital Forensic Software, Craig Valli

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper outlines a collaborative project nearing completion between the sec.au Security Research Group at Edith Cowan University and Western Australian Police Computer Crime Squad. The primary goal of this project is to create a software tool for use by non-technical law enforcement officers during the initial investigation and assessment of an electronic crime scene. This tool will be designed as an initial response tool, to quickly and easily find, view and export any relevant files stored on a computer, establishing if further expert investigation of that computer is warranted. When fully developed, the tool will allow investigators unprecedented real …


How Virtualized Environments Affect Computer Forensics, Diane Barrett Apr 2008

How Virtualized Environments Affect Computer Forensics, Diane Barrett

Annual ADFSL Conference on Digital Forensics, Security and Law

Virtualized environments can make forensics investigation more difficult. Technological advances in virtualization tools essentially make removable media a PC that can be carried around in a pocket or around a neck. Running operating systems and applications this way leaves very little trace on the host system. This paper will explore all the newest methods for virtualized environments and the implications they have on the world of forensics. It will begin by describing and differentiating between software and hardware virtualization. It will then move on to explain the various methods used for server and desktop virtualization. Next, it will describe the …


The Virtual Digital Forensics Lab - Expanding Law Enforcement Capabilities, Mark Mccoy, Sean A. Ensz Apr 2008

The Virtual Digital Forensics Lab - Expanding Law Enforcement Capabilities, Mark Mccoy, Sean A. Ensz

Annual ADFSL Conference on Digital Forensics, Security and Law

Law enforcement is attempting to respond to the growing and complex need to examine all manner of digital evidence using stand-alone forensic workstations and limited storage solutions. Digital forensic investigators often find their cases stalled by cumbersome and inflexible technology limiting their effectiveness. The Virtual Digital Forensics Lab (VDFL) is a new concept that applies existing enterprise host, storage, and network virtualization technologies to current forensic investigative methods. This paper details the concept of the VDFL, the technology solutions it employs, and the flexibility it provides for digital forensic investigators.

Keywords: Virtual Digital Forensics, digital forensic investigations, law enforcement, virtual …


Digital Forensic Certification Versus Forensic Science Certification, Nena Lim Apr 2008

Digital Forensic Certification Versus Forensic Science Certification, Nena Lim

Annual ADFSL Conference on Digital Forensics, Security and Law

Companies often rely on certifications to select appropriate individuals in disciplines such as accounting and engineering. The general public also tends to have confidence in a professional who has some kinds of certification because certification implies a standard of excellence and that the individual has expert knowledge in a specific discipline. An interesting question to the digital forensic community is: How is a digital forensic certification compared to a forensic science certification? The objective of this paper is to compare the requirements of a digital forensic certification to those of a forensic science certification. Results of the comparison shed lights …


Location Constraints In Digital Rights Management, Adam Muhlbauer, Reihaneh Safavi-Naini, Farzad Salim, Nicholas Paul Sheppard, Martin Jan Surminen Apr 2008

Location Constraints In Digital Rights Management, Adam Muhlbauer, Reihaneh Safavi-Naini, Farzad Salim, Nicholas Paul Sheppard, Martin Jan Surminen

Faculty of Informatics - Papers (Archive)

Digital rights management allows information owners to control the use and dissemination of electronic documents via a machine-readable licence. This paper describes the design and implementation of a system for creating and enforcing licences containing location constraints that can be used to restrict access to sensitive documents to a defined area. Documents can be loaded onto a portable device and used in the approved areas, but cannot be used if the device moves to another area. Our contribution includes a taxonomy for access control in the presence of requests to perform non-instantaneous controlled actions.