Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- China Simulation Federation (3382)
- TÜBİTAK (3020)
- Wright State University (1729)
- Washington University in St. Louis (697)
- Embry-Riddle Aeronautical University (427)
-
- Singapore Management University (410)
- Old Dominion University (355)
- Selected Works (342)
- University of Nebraska - Lincoln (234)
- University of Dayton (163)
- Chulalongkorn University (150)
- Air Force Institute of Technology (120)
- Portland State University (117)
- Purdue University (83)
- University of Nevada, Las Vegas (77)
- Chapman University (74)
- University for Business and Technology in Kosovo (70)
- Technological University Dublin (68)
- University of New Haven (68)
- University of Arkansas, Fayetteville (62)
- University of South Florida (59)
- SelectedWorks (53)
- California Polytechnic State University, San Luis Obispo (50)
- University of South Carolina (48)
- Western University (48)
- University of New Mexico (36)
- Edith Cowan University (35)
- San Jose State University (33)
- Loyola University Chicago (29)
- University of Kentucky (28)
- Keyword
-
- Computer Science (290)
- Department of Computer Science and Engineering (237)
- Engineering (191)
- Simulation (175)
- Machine learning (169)
-
- Deep learning (162)
- College of Engineering and Computer Science (157)
- Newsletters (157)
- Science news (157)
- Technical writing (157)
- Optimization (102)
- Classification (101)
- Genetic algorithm (98)
- Particle swarm optimization (83)
- Security (78)
- Machine Learning (74)
- Artificial intelligence (59)
- Robotics (58)
- Clustering (57)
- Virtual reality (57)
- Modeling (56)
- Wireless sensor networks (56)
- Digital forensics (55)
- Support vector machine (54)
- Computer Engineering (53)
- Neural network (51)
- Feature extraction (49)
- Cybersecurity (48)
- Image processing (48)
- Path planning (48)
- Publication Year
- Publication
-
- Journal of System Simulation (3382)
- Turkish Journal of Electrical Engineering and Computer Sciences (3020)
- Computer Science & Engineering Syllabi (1312)
- All Computer Science and Engineering Research (683)
- Research Collection School Of Computing and Information Systems (394)
-
- Journal of Digital Forensics, Security and Law (298)
- Browse all Theses and Dissertations (260)
- Electrical and Computer Engineering Faculty Publications (164)
- BITs and PCs Newsletter (157)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (150)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (138)
- Theses and Dissertations (133)
- Electrical & Computer Engineering Theses & Dissertations (127)
- Annual ADFSL Conference on Digital Forensics, Security and Law (104)
- Faculty Publications (91)
- Computer Science Faculty Publications and Presentations (81)
- Dissertations (77)
- Electrical & Computer Engineering and Computer Science Faculty Publications (67)
- Engineering Faculty Articles and Research (66)
- Electronic Theses and Dissertations (58)
- Computer Science Faculty Publications (54)
- USF Tampa Graduate Theses and Dissertations (54)
- UBT International Conference (51)
- Monish R. Chatterjee (47)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (47)
- CSE Conference and Workshop Papers (45)
- Christopher N. Roman (45)
- Computer Science Theses & Dissertations (38)
- Partha Banerjee (35)
- Graduate Theses and Dissertations (32)
- Publication Type
Articles 10951 - 10980 of 12808
Full-Text Articles in Physical Sciences and Mathematics
Teams Responsibilities For Digital Forensic Process, Salma Abdalla, Sherif Hazem, Sherif Hashem
Teams Responsibilities For Digital Forensic Process, Salma Abdalla, Sherif Hazem, Sherif Hashem
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper presents a detailed digital forensics process model and the responsible teams to perform it. The discussed model presents three teams and a forensic leader who coordinate between the three teams; these teams are physical crime scene team, laboratory examination team and courtroom team. These teams are responsible of achieving the digital forensic model by applying five main phases which are preparation phase, physical forensics and investigation phase, digital forensics phase, reporting and presentation phase and closure phase.
Most of the existing models in this field are either theoretical that deals with data processing or based on a legal …
New Federal Rules And Digital Evidence, Gavin W. Manes, Elizabeth Downing, Lance Watson, Christopher Thrutchley
New Federal Rules And Digital Evidence, Gavin W. Manes, Elizabeth Downing, Lance Watson, Christopher Thrutchley
Annual ADFSL Conference on Digital Forensics, Security and Law
The newly revised Federal Rules of Civil Procedure and developments under the Federal Rules of Evidence have a significant impact on the use, collection, and treatment of digital evidence for legal proceedings. The Rules now formally grant electronic documents and digital evidence the same status as paper and other forms of tangible evidence. As a result, the availability and proper preservation of potentially relevant electronic evidence must be considered, at the very latest, in the preliminary stages of litigation and, at the earliest, as soon as litigation is reasonably anticipated. It is important for professionals to be familiar with the …
Monitoring And Surveillance In The Workplace: Lessons Learnt? – Investigating The International Legal Position, Verine Etsebeth
Monitoring And Surveillance In The Workplace: Lessons Learnt? – Investigating The International Legal Position, Verine Etsebeth
Annual ADFSL Conference on Digital Forensics, Security and Law
When considering the legal implications of monitoring and surveillance in the workplace, the question may be asked why companies deploy computer surveillance and monitoring in the first place. Several reasons may be put forward to justify why more than 80% of all major American firms monitor employee e-mails and Internet usage. However, what most companies forget is the fact that the absence or presence of monitoring and surveillance activities in a company holds serious legal consequences for companies. From the discussion in this paper it will become apparent that there is a vast difference in how most countries approach this …
An Exploratory Analysis Of Computer Mediated Communications On Cyberstalking Severity, Stephen D. Barnes, David P. Biros
An Exploratory Analysis Of Computer Mediated Communications On Cyberstalking Severity, Stephen D. Barnes, David P. Biros
Annual ADFSL Conference on Digital Forensics, Security and Law
The interaction between disjunctive interpersonal relationships, those where the parties to the relationship disagree on the goals of the relationship, and the use of computer mediated communications channels is a relatively unexplored domain. Bargh (2002) suggests that CMC channels can amplify the development of interpersonal relationships, and notes that the effect is not constant across communications activities. This proposal suggests a line of research that explores the interaction between computer mediated communications (CMC) and stalking, which is a common form of disjunctive relationships. Field data from cyberstalking cases will be used to look at the effects of CMC channels on …
The General Digital Forensics Model, Steven Rigby, Marcus K. Rogers
The General Digital Forensics Model, Steven Rigby, Marcus K. Rogers
Annual ADFSL Conference on Digital Forensics, Security and Law
The lack of a graphical representation of all of the principles, processes, and phases necessary to carry out an digital forensic investigation is a key inhibitor to effective education in this newly emerging field of study. Many digital forensic models have been suggested for this purpose but they lack explanatory power as they are merely a collection of lists or one-dimensional figures. This paper presents a new multi-dimensional model, the General Digital Forensics Model (GDFM), that shows the relationships and inter-connectedness of the principles and processes needed within the domain of digital forensics.
Keywords: process model, computer forensics, expert learning, …
Guideline Model For Digital Forensic Investigation, Salma Abdalla, Sherif Hazem, Sherif Hashem
Guideline Model For Digital Forensic Investigation, Salma Abdalla, Sherif Hazem, Sherif Hashem
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper proposes a detailed guideline model for digital forensics; the proposed model consists of five main phases, Preparation phase, Physical Forensics and Investigation Phase, Digital Forensics Phase, Reporting and Presentation Phase, and Closure Phase.
Most of the existing models in this field do not cover all aspects of digital forensic investigations, as they focus mainly on the processing of digital evidence or on the legal points. Although they gave good information to base on it a guide, but they are not detailed enough to describe fully the investigative process in a way that can be used by investigators during …
The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney
The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney
Annual ADFSL Conference on Digital Forensics, Security and Law
Internet regulation has evolved from self-regulation to the criminalization of conduct to state control of information available, accessed and submitted. Criticism has been leveled at the different forms of state control and the methods employed to enforce state control. After the terrorist attack on the USA on 11 September 2001, governments justify Internet state control as a law enforcement and national security tool against the abuse and misuse of the Internet for the commission of serious crimes, such as phishing, child pornography; terrorism and copyright infringement. Some Internet users and civil rights groups perceive state control as an abomination which …
Cs 142: Computer Programming - Ii, Eric Maston
Cs 142: Computer Programming - Ii, Eric Maston
Computer Science & Engineering Syllabi
This course provides a continuation to the general introduction of computer programming begun in CS 141. Examples from and applications to a broad range of problems are given. The concepts covered will be applied to the Java programming language. (Students must register for both lecture and laboratory sections.)
Cs 141: Computer Programming - I, Michael Ondrasek
Cs 141: Computer Programming - I, Michael Ondrasek
Computer Science & Engineering Syllabi
This course provides a general introduction to the fundamentals of computer programming. Examples from and applications to a broad range of problems are given. No prior knowledge of programming is assumed. The concepts covered will be applied to the Java programming language. Students must register for both lecture and one laboratory section. 4 credit hours. Prerequisite: MTH 127 (College Algebra) or equivalent.
Cs 206: Advanced Concepts/Techniques And Software Productivity Tools, John P. Herzog
Cs 206: Advanced Concepts/Techniques And Software Productivity Tools, John P. Herzog
Computer Science & Engineering Syllabi
By the end of this course, the students will have a greater depth of understanding in the areas of word processing, spreadsheets, databases, and presentation software and web design using Microsoft Word, Microsoft FrontPage, Microsoft Excel, Access, and PowerPoint covering the following topics.
Microsoft Excel 2003:
Tutorial 5: Working with Excel Lists
Tutorial 6: Working with Multiple Worksheets and Workbooks Tutorial 7: Working with
Excel's Editing and Web Tools Tutorial 8: Developing an Excel Application Appendix A:
Working with Logical Functions, Database Functions, and Advanced Filtering Appendix B:
Integrating Excel with Other Window Programs
Microsoft Access 2003:
Tutorial 5: Enhancing …
Cs 208: Computer Programming For Business I, Dennis Kellermeier
Cs 208: Computer Programming For Business I, Dennis Kellermeier
Computer Science & Engineering Syllabi
CS 208 is the first of a two quarter sequence in programming for business students. It is required for Management Information Science majors. The courses are designed to help students achieve a high degree of facility in intermediate level programming. This course assumes students have never written a program before.
Cs 209: Computer Programming For Business Ii, Dennis Kellermeier
Cs 209: Computer Programming For Business Ii, Dennis Kellermeier
Computer Science & Engineering Syllabi
CS 209 is the second of a two quarter sequence in programming for business students. It is required for Management Information Science majors. The courses are designed to help students achieve a high degree of facility in intermediate level programming.
Cs 214: Visual Basic Programming, Michael Ondrasek
Cs 214: Visual Basic Programming, Michael Ondrasek
Computer Science & Engineering Syllabi
This course provides a general introduction to the fundamentals of object computer programming. Examples from and applications to a broad range of problems are given. No prior knowledge of programming is assumed. However, students should have a familiarity with programming concepts. The concepts covered will be applied in the Visual Basic programming language. 4 credit hours.
Cs 241: Introduction To Computer Science Ii, Haiyun Bian
Cs 241: Introduction To Computer Science Ii, Haiyun Bian
Computer Science & Engineering Syllabi
This course is the second in the three course sequence "Introduction to Computer Science" offered by the Computer Science department, WSU. Concepts introduced in CS 240 are developed in greater detail and depth with the Java programming language. Topics include object oriented programming, basic sorting algorithms, recursion, graphics, development of user interfaces and exception handling. Student must register for one lecture section and one lab section.
Cs 242: Computer Programming Iii, Mateen M. Rizki
Cs 242: Computer Programming Iii, Mateen M. Rizki
Computer Science & Engineering Syllabi
No abstract provided.
Cs 415: Social Implications Of Computing, Leo Finkelstein
Cs 415: Social Implications Of Computing, Leo Finkelstein
Computer Science & Engineering Syllabi
CS 415 is a communication skills course using as its subject matter current salient issues associated with the social implications of computing. In addition to the course text, you will need to use certain reading materials in the library and elsewhere, and you will be responsible for using concepts and theories provided in class lectures and discussions.
Cs 470/670: System Simulation, Mateen M. Rizki
Cs 470/670: System Simulation, Mateen M. Rizki
Computer Science & Engineering Syllabi
No abstract provided.
Cs 701: Database Systems And Design I, Guozhu Dong
Cs 701: Database Systems And Design I, Guozhu Dong
Computer Science & Engineering Syllabi
An introduction to database design, database system implementation issues and techniques, and advanced data models.
Cs 790-03: Information Integration & Analysis, Amit P. Sheth
Cs 790-03: Information Integration & Analysis, Amit P. Sheth
Computer Science & Engineering Syllabi
This course deals with the integration and analysis of heterogeneous data-a topic of significant research as well as practical importance. A typical large organization spends around 30% of all its IT effort and expense for data/information integration. Furthermore, organizations can greatly increase their competitiveness by exploiting the data they collect, and discovering trends and patterns leading to insights. Hugh repositories of public data on the Web also provide opportunity to discovery undiscovered public knowledge.
Cs 801: Advanced Database Systems, Soon M. Chung
Cs 801: Advanced Database Systems, Soon M. Chung
Computer Science & Engineering Syllabi
No abstract provided.
Cs 840: Advanced Topics In The Theory Of Computation, Thomas Sudkamp
Cs 840: Advanced Topics In The Theory Of Computation, Thomas Sudkamp
Computer Science & Engineering Syllabi
No abstract provided.
Cs 865: Advanced Topics In Soft Computing, Michael L. Raymer
Cs 865: Advanced Topics In Soft Computing, Michael L. Raymer
Computer Science & Engineering Syllabi
No abstract provided.
Cs/Mth 316/516: Numerical Methods For Digital Computers - I, Ronald F. Taylor
Cs/Mth 316/516: Numerical Methods For Digital Computers - I, Ronald F. Taylor
Computer Science & Engineering Syllabi
Introduction to numerical methods used in the sciences. Methods of interpolation, data smoothing, functional approximation, numerical differentiation and integration. Solution techniques for linear and nonlinear equations. Discussion of sources of error in numerical methods. Applications to engineering, science, and applied mathematics are an integral part of the course. Special topics presented as schedule permits. 4 credit hours.
Cs 207: Advanced Office Productivity Ii, Amanda Hood
Cs 207: Advanced Office Productivity Ii, Amanda Hood
Computer Science & Engineering Syllabi
This course covers post-advanced microcomputer applications including Microsoft Office Word 2003, Excel 2003, Access 2003, and PowerPoint 2003. Topics include: creating an online form, working with macros and Visual Basic for Applications (VBA), working with a master document, and index and a table of contents, linking an Excel worksheet and charting its data in Word, formula auditing, data validation, and complex problem solving in Excel, importing data into Excel, working with PivotCharts, PivotTables, and trendlines in Excel, creating a PivotTable List, advanced Access report and form techniques, and creating a multi-page form, administering a database system, creating a self-running presentation …
Ceg 210-01: Pc Networking I, Karen Meyer
Ceg 210-01: Pc Networking I, Karen Meyer
Computer Science & Engineering Syllabi
Introduction to PC networking hardware, concepts, and technologies. Focus is on LAN administration, hardware and software configuration.
Ceg 220-01: Introduction To C Programming For Engineers, Robert Helt
Ceg 220-01: Introduction To C Programming For Engineers, Robert Helt
Computer Science & Engineering Syllabi
This course provides a general introduction to computers as a problem-solving tool using the C programming language. Emphasis is on algorithms and techniques useful to engineers. Topics include data representation, debugging, and program verification. 4 credit hours. Prerequisite: MTR 229 (Calculus I) or EGR 101 (Engineering Mathematics).
Ceg 221-01: Advanced C Programming For Engineers, Robert Helt
Ceg 221-01: Advanced C Programming For Engineers, Robert Helt
Computer Science & Engineering Syllabi
This course introduces advanced constructs, algorithms, and data structures in the C programming language. Emphasis is on problem solving and techniques useful to engineers. Topics include functions, array, pointers, structures as well as sorting algorithms, linked lists, complex numbers, stacks, queues, hash tables, and binary trees. 4 credit hours. Prerequisite: CEG220 (Introduction to C Programming for Engineers).
Ceg 320/520-01: Computer Organization And Assembly Language Programming, Sridhar Ramachandran
Ceg 320/520-01: Computer Organization And Assembly Language Programming, Sridhar Ramachandran
Computer Science & Engineering Syllabi
Terminology and understanding of functional organizations and sequential operation of a digital computer. Program structure, and machine and assembly language topics including addressing, stacks, argument passing, arithmetic operations, traps, and input/output. Macros, modularization, linkers, and debuggers are used. Three hours lecture, two hours lab. Prerequisite: CS 242, CEG 260.
Ceg 333-01: Introduction To Unix, Thomas Wischgoll
Ceg 333-01: Introduction To Unix, Thomas Wischgoll
Computer Science & Engineering Syllabi
By the end of this quarter, you should be able to:
• Describe the basic methodology of UNIX filters, including pipes and redirection of stdin/stdout
• Program simple UNIX utilities at the command-line and shell-script level
• Discuss the advantages and disadvantages of common user interfaces (such as UNIX vs. PC/Windows)
• Discuss the philosophy of UNIX development and the open source movement
• Work comfortably in the UNIX environment
• Edit and manage files and user-level security for UNIX development
• Use standard UNIX development tools for C or C++
Ceg 434/634-01: Concurrent Software Design, Yong Pei
Ceg 434/634-01: Concurrent Software Design, Yong Pei
Computer Science & Engineering Syllabi
This course provides an introduction to concurrent program design in the UNIX environment. Classical problems of synchronization, concurrency, and their solutions are examined through course projects and through readings on operating system design.