Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 11101 - 11130 of 12808

Full-Text Articles in Physical Sciences and Mathematics

Link Layer Support For Unified Radio Power Management In Wireless Sensor Networks, Master's Thesis, May 2007, Kevin Klues Jan 2007

Link Layer Support For Unified Radio Power Management In Wireless Sensor Networks, Master's Thesis, May 2007, Kevin Klues

All Computer Science and Engineering Research

Radio power management is of paramount concern in wireless sensor networks that must achieve long lifetimes on scarce amounts of energy. While a multitude of power management protocols have been proposed in the past, the lack of system support for flexibly integrating them with a diverse set of applications and network platforms has made them difficult to use. Instead of proposing yet another power management protocol, this thesis focuses on providing link layer support towards realizing a Unified Power Management Architecture (UPMA) for flexible radio power management in wireless sensor networks. In contrast to the monolithic approaches adopted by existing …


A Fingerspelling Sign Language Visualization , Carol S. Brickman Jan 2007

A Fingerspelling Sign Language Visualization , Carol S. Brickman

All Computer Science and Engineering Research

The goal of the Fingerspell Visualization Project is to research methods to improve learning of reading skills through sign language. The techniques are centered on Fingerspelling as the method to bridge stages of skill development. Visualization of a string of text in images of a hand performing the letters of the alphabet in standardized fingerspell sign language positions provide Full Motion Learning as opposed to learning from single pictures.


Distributed Allocation Of Workflow Tasks In Manets, Rohan Sen, Gruia-Catalin Roman, Christopher Gill Jan 2007

Distributed Allocation Of Workflow Tasks In Manets, Rohan Sen, Gruia-Catalin Roman, Christopher Gill

All Computer Science and Engineering Research

When multiple participants work on a workflow that represents a large, collaborative activity, it is important to have a well defined process to determine the portions of the workflow that each participant is responsible for executing. In this paper, we describe a process and related algorithms required to assign tasks in a workflow, to hosts that are willing to carry out the execution of these tasks, and thereby contributing to the completion of the activity. This problem is a stylized form of the multi-processor scheduling algorithm which has been shown to be NP-Hard. Further complicating the issue is that we …


Perpetual: Byzantine Fault Tolerance For Federated Distributed Applications, Sajeeva L. Pallemulle, Haraldur D. Thorvaldsson, Kenneth J. Goldman Jan 2007

Perpetual: Byzantine Fault Tolerance For Federated Distributed Applications, Sajeeva L. Pallemulle, Haraldur D. Thorvaldsson, Kenneth J. Goldman

All Computer Science and Engineering Research

Modern distributed applications rely upon the functionality of services from multiple providers. Mission-critical services, possibly shared by multiple applications, must be replicated to guarantee correct execution and availability in spite of arbitrary (Byzantine) faults. Furthermore, shared services must enforce strict fault isolation policies to prevent cascading failures across organizational and application boundaries. Most existing protocols for Byzantine fault-tolerant execution do not support interoperability between replicated services while others provide poor fault isolation. Moreover, existing protocols place impractical limitations on application development by disallowing long-running threads of computation, asynchronous operation invocation, and asynchronous request processing. We present Perpetual, a protocol that …


On Optimal Survivability Design In Wdm Optical Networks Under Scheduled Traffic Models, Tianjian Li Jan 2007

On Optimal Survivability Design In Wdm Optical Networks Under Scheduled Traffic Models, Tianjian Li

Browse all Theses and Dissertations

Wavelength division multiplexing (WDM) optical networks are widely viewed as the most appropriate choice for future Internet backbone with the potential to fulfill the ever-growing demands for bandwidth. WDM divides the enormous bandwidth of an optical fiber into many non-overlapping wavelength channels, each of which may operate at the rate of 10 Gigabit per second or higher. A failure in a network such as a cable cut may result in a tremendous loss of data. Therefore, survivability is a very important issue in WDM optical networks. The objective of this dissertation is to address the survivability provisioning problem in WDM …


Role-Based Access Control For The Open Grid Services Architecture - Data Access And Integration (Ogsa-Dai), Anil L. Pereira Jan 2007

Role-Based Access Control For The Open Grid Services Architecture - Data Access And Integration (Ogsa-Dai), Anil L. Pereira

Browse all Theses and Dissertations

Grid has emerged recently as an integration infrastructure for the sharing and coordinated use of diverse resources in dynamic, distributed virtual organizations (VOs). A Data Grid is an architecture for the access, exchange, and sharing of data in the Grid environment. In this dissertation, role-based access control (RBAC) systems for heterogeneous data resources in Data Grid systems are proposed. The Open Grid Services Architecture - Data Access and Integration (OGSA-DAI) is a widely used framework for the integration of heterogeneous data resources in Grid systems.

However, in the OGSA-DAI system, access control causes substantial administration overhead for resource providers in …


Data Mining And Analysis On Multiple Time Series Object Data, Chunyu Jiang Jan 2007

Data Mining And Analysis On Multiple Time Series Object Data, Chunyu Jiang

Browse all Theses and Dissertations

Huge amount of data is available in our society and the need for turning such data into useful information and knowledge is urgent. Data mining is an important field addressing that need and significant progress has been achieved in the last decade. In several important application areas, data arises in the format of Multiple Time Series Object (MTSO) data, where each data object is an array of time series over a large set of features and each has an associated class or state. Very little research has been conducted towards this kind of data. Examples include computational toxicology, where each …


An Analysis Of Neutral Drift's Effect On The Evolution Of A Ctrnn Locomotion Controller With Noisy Fitness Evaluation, Gregory Robert Kramer Jan 2007

An Analysis Of Neutral Drift's Effect On The Evolution Of A Ctrnn Locomotion Controller With Noisy Fitness Evaluation, Gregory Robert Kramer

Browse all Theses and Dissertations

This dissertation focuses on the evolution of Continuous Time Recurrent Neural Networks (CTRNNs) as controllers for control systems. Existing research suggests that the process of neutral drift can greatly benefit evolution for problems whose fitness landscapes contain large-scale neutral networks. CTRNNs are known to be highly degenerate, providing a possible source of large-scale landscape neutrality, and existing research suggests that neutral drift benefits the evolution of simple CTRNNs. However, there has been no in-depth examination of the effects of neutral drift on complex CTRNN controllers, especially in the presence of noisy fitness evaluation. To address this problem, this dissertation presents …


Computational Methods For The Objective Review Of Forensic Dna Testing Results, Jason R. Gilder Jan 2007

Computational Methods For The Objective Review Of Forensic Dna Testing Results, Jason R. Gilder

Browse all Theses and Dissertations

Since the advent of criminal investigations, investigators have sought a "gold standard" for the evaluation of forensic evidence. Currently, deoxyribonucleic acid (DNA) technology is the most reliable method of identification. Short Tandem Repeat (STR) DNA genotyping has the potential for impressive match statistics, but the methodology not infallible. The condition of an evidentiary sample and potential issues with the handling and testing of a sample can lead to significant issues with the interpretation of DNA testing results. Forensic DNA interpretation standards are determined by laboratory validation studies that often involve small sample sizes. This dissertation presents novel methodologies to address …


Comparative Microarray Data Mining, Shihong Mao Jan 2007

Comparative Microarray Data Mining, Shihong Mao

Browse all Theses and Dissertations

As a revolutionary technology, microarrays have great potential to provide genome-wide patterns of gene expression, to make accurate medical diagnosis, and to explore genetic causes underlying diseases. It is commonly believed that suitable analysis of microarray datasets can lead to achieve the above goals. While much has been done in microarray data mining, few previous studies, if any, focused on multiple datasets at the comparative level. This dissertation aims to fill this gap by developing tools and methods for set-based comparative microarray data mining. Specifically, we mine highly differentiative gene groups (HDGGs) from given datasets/classes, evaluate the concordance of datasets …


An Ad Hoc Adaptive Hashing Technique For Non-Uniformly Distributed Ip Address Lookup In Computer Networks, Christopher Martinez, Wei-Ming Lin Jan 2007

An Ad Hoc Adaptive Hashing Technique For Non-Uniformly Distributed Ip Address Lookup In Computer Networks, Christopher Martinez, Wei-Ming Lin

Electrical & Computer Engineering and Computer Science Faculty Publications

Hashing algorithms have been widely adopted for fast address look-up, which involves a search through a database to find a record associated with a given key. Hashing algorithms transforms a key into a hash value hoping that the hashing renders the database a uniform distribution with respect to the hash value. The closer to uniform hash values, the less search time required for a query. When the database is key-wise uniformly distributed, any regular hashing algorithm (bit-extraction, bit-group XOR, etc.) leads to a statistically perfect uniform hash distribution. When the database has keys with a non-uniform distribution, performance of regular …


Design Concepts And Process Analysis For Transmuter Fuel Manufacturing, Georg F. Mauer Jan 2007

Design Concepts And Process Analysis For Transmuter Fuel Manufacturing, Georg F. Mauer

Fuels Campaign (TRP)

The safe and effective manufacturing of actinide-bearing fuels for any transmutation strategy requires that the entire manufacturing process be contained within a shielded hot cell environment. To ensure that the fabrication process is feasible, the entire process must be designed for remote operation. The equipment must be reliable enough to perform over several decades, and also easy to maintain or repair remotely. The facility must also be designed to facilitate its own decontamination and decommissioning. In addition to these design factors, the potential viability of any fuel fabrication process will also be impacted by a number of variables, such as …


Predicting Class Life Cycle Maintenance Effort Based On Class Complexity, Lindsey B. Hays Jan 2007

Predicting Class Life Cycle Maintenance Effort Based On Class Complexity, Lindsey B. Hays

UNF Graduate Theses and Dissertations

In the software industry today many programmers spend countless hours maintaining existing Java programs. The cost of code maintenance affects a company in many ways such as the budget, time management and resources. Making management decisions regarding these issues could be assisted, if maintenance cost of Java classes could be predicted.

The goal of this thesis was to create a new model predicting the maintenance effort based on the Java class complexity. It seems clear the complexity of a Java class can directly relate to the amount of time it will take to perform maintenance on the class.

To develop …


Study Of Soliton Stabilization In D+1 Dimensions Using Novel Analytical And Numerical Techniques, George Nehmetallah, Partha P. Banerjee Jan 2007

Study Of Soliton Stabilization In D+1 Dimensions Using Novel Analytical And Numerical Techniques, George Nehmetallah, Partha P. Banerjee

Electrical and Computer Engineering Faculty Publications

In this Chapter, we provide a brief review of the underlying nonlinear Schrödinger and associated equations that model spatio-temporal propagation in one and higher dimensions in a nonlinear dispersive environment. Particular attention is given to fast adaptive numerical techniques to solve such equations, and in the presence of dispersion and nonlinearity management, saturating nonlinearity and nonparaxiality. A unique variational approach is also outlined which helps in determining the ranges of nonlinearity and dispersion parameters to ensure stable solutions of the nonlinear equations. The propagation of 3+1 dimensional spatio-temporal pulses, or optical bullets is also modeled using a fast adaptive split-step …


High Performance Text Document Clustering, Yanjun Li Jan 2007

High Performance Text Document Clustering, Yanjun Li

Browse all Theses and Dissertations

Data mining, also known as knowledge discovery in database (KDD), is the process to discover interesting unknown knowledge from a large amount of data. Text mining is to apply data mining techniques to extract interesting and nontrivial information and knowledge from unstructured text. Text clustering is one of important techniques of text mining, which is the unsupervised classification of similar documents into different groups.

This research focuses on improving the performance of text clustering. We investigated the text clustering algorithms in four aspects: document representation, documents closeness measurement, high dimension reduction and parallelization. We propose a group of high performance …


Summaritive Digest For Large Document Repositories With Application To E-Rulemaking, Lijun Chen Jan 2007

Summaritive Digest For Large Document Repositories With Application To E-Rulemaking, Lijun Chen

Browse all Theses and Dissertations

Large document repositories need to be organized and summarized to make them more accessible and understandable. Such needs exist in many applications, including web search, e-rulemaking (electronic rulemaking) and document archiving. Even though much has been done in the areas of document clustering and summarization, there are still many new challenges and issues that need to be addressed as the repositories become larger, more prevalent and dynamic. In this dissertation, we investigate more informative ways to organize and summarize large document repositories, especially e-rulemaking feedback repositories (ERFRs), so that the large repositories can be managed and digested more efficiently and …


A Grounded Theory Approach To Identifying And Measuring Forensic Data Acquisition Tasks, Gregory H. Carlton Jan 2007

A Grounded Theory Approach To Identifying And Measuring Forensic Data Acquisition Tasks, Gregory H. Carlton

Journal of Digital Forensics, Security and Law

As a relatively new field of study, little empirical research has been conducted pertaining to computer forensics. This lack of empirical research contributes to problems for practitioners and academics alike.

For the community of practitioners, problems arise from the dilemma of applying scientific methods to legal matters based on anecdotal training methods, and the academic community is hampered by a lack of theory in this evolving field. A research study utilizing a multi-method approach to identify and measure tasks practitioners perform during forensic data acquisitions and lay a foundation for academic theory development was conducted in 2006 in conjunction with …


Identifying Non-Volatile Data Storage Areas: Unique Notebook Identification Information As Digital Evidence, Nikica Budimir, Jill Slay Jan 2007

Identifying Non-Volatile Data Storage Areas: Unique Notebook Identification Information As Digital Evidence, Nikica Budimir, Jill Slay

Journal of Digital Forensics, Security and Law

The research reported in this paper introduces new techniques to aid in the identification of recovered notebook computers so they may be returned to the rightful owner. We identify non-volatile data storage areas as a means of facilitating the safe storing of computer identification information. A forensic proof of concept tool has been designed to test the feasibility of several storage locations identified within this work to hold the data needed to uniquely identify a computer. The tool was used to perform the creation and extraction of created information in order to allow the analysis of the non-volatile storage locations …


Book Review: No Place To Hide, Gary C. Kessler Jan 2007

Book Review: No Place To Hide, Gary C. Kessler

Journal of Digital Forensics, Security and Law

This issue presents the second Book Review column for the JDFSL. It is an experiment to broaden the services that the journal provides to readers, so we are anxious to get your reaction. Is the column useful and interesting? Should we include more than one review per issue? Should we also review products? Do you have suggested books/products for review and/or do you want to write a review? All of this type of feedback -- and more -- is appreciated. Please feel free to send comments to Gary Kessler (gary.kessler@champlain.edu) or Glenn Dardick (gdardick@dardick.net).


Table Of Contents Jan 2007

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Information Governance: A Model For Security In Medical Practice, Patricia A. Williams Jan 2007

Information Governance: A Model For Security In Medical Practice, Patricia A. Williams

Journal of Digital Forensics, Security and Law

Information governance is becoming an important aspect of organisational accountability. In consideration that information is an integral asset of most organisations, the protection of this asset will increasingly rely on organisational capabilities in security. In the medical arena this information is primarily sensitive patient-based information. Previous research has shown that application of security measures is a low priority for primary care medical practice and that awareness of the risks are seriously underestimated. Consequently, information security governance will be a key issue for medical practice in the future. Information security governance is a relatively new term and there is little existing …


Monitoring And Surveillance In The Workplace: Lessons Learnt? – Investigating The International Legal Position, Verine Etsebeth Jan 2007

Monitoring And Surveillance In The Workplace: Lessons Learnt? – Investigating The International Legal Position, Verine Etsebeth

Journal of Digital Forensics, Security and Law

When considering the legal implications of monitoring and surveillance in the workplace, the question may be asked why companies deploy computer surveillance and monitoring in the first place. Several reasons may be put forward to justify why more than 80% of all major American firms monitor employee e-mails and Internet usage. However, what most companies forget is the fact that the absence or presence of monitoring and surveillance activities in a company holds serious legal consequences for companies. From the discussion in this paper it will become apparent that there is a vast difference in how most countries approach this …


Information Technology Act 2000 In India - Authentication Of E-Documents, R. G. Pawar, B. S. Sawant, A. Kaiwade Jan 2007

Information Technology Act 2000 In India - Authentication Of E-Documents, R. G. Pawar, B. S. Sawant, A. Kaiwade

Journal of Digital Forensics, Security and Law

The Information Technology Act 2000 has enacted in India on 9th June 2000. This Act has mentioned provision of authentication of electronic document. It is the need of hour at that time that such provision is needed in the Indian Law system, especially for electronic commerce and electronic governance. Electronic commerce”, which involve the use of alternatives to paper based methods of communication and storage information. To do electronic commerce there should be authentication of particular document. The working of internet is the documents are traveling in terms of bits from one destination to other destination, through various media like …


Book Review: Conquest In Cyberspace: National Security And Information Warfare, Gary C. Kessler Jan 2007

Book Review: Conquest In Cyberspace: National Security And Information Warfare, Gary C. Kessler

Journal of Digital Forensics, Security and Law

This is the Book Review column for the JDFSL. It is an experiment to broaden the services that the journal provides to readers, so we are anxious to get your reaction. Is the column useful and interesting? Should we include more than one review per issue? Should we also review products? Do you have suggested books/products for review and/or do you want to write a review? All of this type of feedback -- and more -- is appreciated. Please feel free to send comments to Gary Kessler (gary.kessler@champlain.edu) or Glenn Dardick (gdardick@dardick.net).


Table Of Contents Jan 2007

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Investigating Information Structure Of Phishing Emails Based On Persuasive Communication Perspective, Ki J. Lee, Il-Yeol Song Jan 2007

Investigating Information Structure Of Phishing Emails Based On Persuasive Communication Perspective, Ki J. Lee, Il-Yeol Song

Journal of Digital Forensics, Security and Law

Current approaches of phishing filters depend on classifying messages based on textually discernable features such as IP-based URLs or domain names as those features that can be easily extracted from a given phishing message. However, in the same sense, those easily perceptible features can be easily manipulated by sophisticated phishers. Therefore, it is important that universal patterns of phishing messages should be identified for feature extraction to serve as a basis for text classification. In this paper, we demonstrate that user perception regarding phishing message can be identified in central and peripheral routes of information processing. We also present a …


Providing A Foundation For Analysis Of Volatile Data Stores, Timothy Vidas Jan 2007

Providing A Foundation For Analysis Of Volatile Data Stores, Timothy Vidas

Journal of Digital Forensics, Security and Law

Current threats against typical computer systems demonstrate a need for forensic analysis of memory-resident data in addition to the conventional static analysis common today. Certain attacks and types of malware exist solely in memory and leave little or no evidentiary information on nonvolatile stores such as a hard disk drive. The desire to preserve system state at the time of response may even warrant memory acquisition independent of perceived threats and the ability to analyze the acquired duplicate.

Tools capable of duplicating various types of volatile data stores are becoming widely available. Once the data store has been duplicated, current …


Table Of Contents Jan 2007

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Securitycom: A Multi-Player Game For Researching And Teaching Information Security Teams, Douglas P. Twitchell Jan 2007

Securitycom: A Multi-Player Game For Researching And Teaching Information Security Teams, Douglas P. Twitchell

Journal of Digital Forensics, Security and Law

A major portion of government and business organizations’ attempts to counteract information security threats is teams of security personnel. These teams often consist of personnel of diverse backgrounds in specific specialties such as network administration, application development, and business administration, resulting in possible conflicts between security, functionality, and availability. This paper discusses the use of games to teach and research information security teams and outlines research to design and build a simple, team-oriented, configurable, information security game. It will be used to study how information security teams work together to defend against attacks using a multi-player game, and to study …


Education Organization Baseline Control Protection And Trusted Level Security, Wasim A. Al-Hamdani Jan 2007

Education Organization Baseline Control Protection And Trusted Level Security, Wasim A. Al-Hamdani

Journal of Digital Forensics, Security and Law

Many education organizations have adopted for security the enterprise best practices for implementation on their campuses, while others focus on ISO Standard (or/and) the National Institution of Standards and Technology.

All these adoptions are dependent on IT personal and their experiences or knowledge of the standard. On top of this is the size of the education organizations. The larger the population in an education organization, the more the problem of information and security become very clear. Thus, they have been obliged to comply with information security issues and adopt the national or international standard. The case is quite different when …