Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- China Simulation Federation (3382)
- TÜBİTAK (3020)
- Wright State University (1729)
- Washington University in St. Louis (697)
- Embry-Riddle Aeronautical University (427)
-
- Singapore Management University (410)
- Old Dominion University (355)
- Selected Works (342)
- University of Nebraska - Lincoln (234)
- University of Dayton (163)
- Chulalongkorn University (150)
- Air Force Institute of Technology (120)
- Portland State University (117)
- Purdue University (83)
- University of Nevada, Las Vegas (77)
- Chapman University (74)
- University for Business and Technology in Kosovo (70)
- Technological University Dublin (68)
- University of New Haven (68)
- University of Arkansas, Fayetteville (62)
- University of South Florida (59)
- SelectedWorks (53)
- California Polytechnic State University, San Luis Obispo (50)
- University of South Carolina (48)
- Western University (48)
- University of New Mexico (36)
- Edith Cowan University (35)
- San Jose State University (33)
- Loyola University Chicago (30)
- University of Kentucky (28)
- Keyword
-
- Computer Science (290)
- Department of Computer Science and Engineering (237)
- Engineering (191)
- Simulation (175)
- Machine learning (169)
-
- Deep learning (162)
- College of Engineering and Computer Science (157)
- Newsletters (157)
- Science news (157)
- Technical writing (157)
- Optimization (102)
- Classification (101)
- Genetic algorithm (98)
- Particle swarm optimization (83)
- Security (78)
- Machine Learning (74)
- Artificial intelligence (59)
- Robotics (58)
- Clustering (57)
- Virtual reality (57)
- Modeling (56)
- Wireless sensor networks (56)
- Digital forensics (55)
- Support vector machine (54)
- Computer Engineering (53)
- Neural network (51)
- Feature extraction (49)
- Cybersecurity (48)
- Image processing (48)
- Path planning (48)
- Publication Year
- Publication
-
- Journal of System Simulation (3382)
- Turkish Journal of Electrical Engineering and Computer Sciences (3020)
- Computer Science & Engineering Syllabi (1312)
- All Computer Science and Engineering Research (683)
- Research Collection School Of Computing and Information Systems (394)
-
- Journal of Digital Forensics, Security and Law (298)
- Browse all Theses and Dissertations (260)
- Electrical and Computer Engineering Faculty Publications (164)
- BITs and PCs Newsletter (157)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (150)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (138)
- Theses and Dissertations (133)
- Electrical & Computer Engineering Theses & Dissertations (127)
- Annual ADFSL Conference on Digital Forensics, Security and Law (104)
- Faculty Publications (91)
- Computer Science Faculty Publications and Presentations (81)
- Dissertations (77)
- Electrical & Computer Engineering and Computer Science Faculty Publications (67)
- Engineering Faculty Articles and Research (66)
- Electronic Theses and Dissertations (58)
- Computer Science Faculty Publications (54)
- USF Tampa Graduate Theses and Dissertations (54)
- UBT International Conference (51)
- Monish R. Chatterjee (47)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (47)
- CSE Conference and Workshop Papers (45)
- Christopher N. Roman (45)
- Computer Science Theses & Dissertations (38)
- Partha Banerjee (35)
- Graduate Theses and Dissertations (32)
- Publication Type
Articles 11611 - 11640 of 12809
Full-Text Articles in Physical Sciences and Mathematics
Mobility-Pattern Based Localization Update Algorithm For Mobile Wireless Sensor Networks, Mohammad Yacoub Al-Laho
Mobility-Pattern Based Localization Update Algorithm For Mobile Wireless Sensor Networks, Mohammad Yacoub Al-Laho
Electrical & Computer Engineering Theses & Dissertations
In mobile wireless sensor networks, sensors move in the monitored area at any direction and speed. Unlike many other networking hosts, sensor nodes do not have global addresses. They are often identified by using a location-based addressing scheme. Therefore, it is important to have the knowledge of the sensor location indicating where the data came from. In this thesis, three localization update algorithms were designed, Specifically, a sensor movement is divided into three states: Pause, Linear, and Random. Each state adopts different localization update algorithm. Since complex movement involves different mobility patterns, a state transition model is developed to …
A Feature Specific Modular Approach For Pose And Illumination Invariant Face Recognition, Praveen Sankaran
A Feature Specific Modular Approach For Pose And Illumination Invariant Face Recognition, Praveen Sankaran
Electrical & Computer Engineering Theses & Dissertations
A feature specific modular-PCA (Principal Component Analysis) approach on face images in multiple views for pose and illumination invariant face recognition is presented in this thesis. Principal components are extracted from different sub-modules of the image and are concatenated to make a single signature vector to represent a face region in a particular viewing angle. Additional principal components are extracted horn image regions representing key facial feature and are added as an extension of the signature vector. Feature specific modular-PCA approach is capable of recognizing faces in varying illumination conditions and facial expressions as the modular components represent the local …
Non-Linear And Linear Transformations Of Features For Robust Speech Recognition And Speaker Identification, Saurabh Prasad
Non-Linear And Linear Transformations Of Features For Robust Speech Recognition And Speaker Identification, Saurabh Prasad
Electrical & Computer Engineering Theses & Dissertations
Automatic speech recognizers perform poorly when training and test data are systematically different in terms of noise and channel characteristics. One manifestation of such differences is variations in the probability density functions (pdfs) between training and test features. Consequently, both automatic speech recognition and automatic speaker identification may be severely degraded. Previous attempts to mm1m1ze this problem include Cepstral Mean and Variance Normalization and transforming all speech features to a uni-variate Gaussian pdf. In this thesis, two techniques are presented for non-linearly scaling speech features to fit them to a target pdf - the first is based on the principles …
Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 21, Number 9, June 2005, College Of Engineering And Computer Science, Wright State University
Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 21, Number 9, June 2005, College Of Engineering And Computer Science, Wright State University
BITs and PCs Newsletter
A ten page newsletter created by the Wright State University College of Engineering and Computer Science that addresses the current affairs of the college.
Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 20, Number 8, June 2004, College Of Engineering And Computer Science, Wright State University
Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 20, Number 8, June 2004, College Of Engineering And Computer Science, Wright State University
BITs and PCs Newsletter
A ten page newsletter created by the Wright State University College of Engineering and Computer Science that addresses the current affairs of the college.
Auto-Pipe: A Pipeline Design And Evaluation System, Mark A. Franklin, John Maschmeyer, Eric Tyson, James Buckley, Patrick Crowley
Auto-Pipe: A Pipeline Design And Evaluation System, Mark A. Franklin, John Maschmeyer, Eric Tyson, James Buckley, Patrick Crowley
All Computer Science and Engineering Research
Auto-Pipe is a tool that aids in the design, evaluation, and implementation of pipelined applications that are distributed across a set of heterogeneous devices including multiple processors and FPGAs. It has been developed to meet the needs arising in the domains of communications, computation on large datasets, and real time streaming data applications. In this paper, the Auto-Pipe design flow is introduced and two sample applications, developed for compatibility with the Auto-Pipe system, are presented. The sample applications are the Triple-DES encryption standard and a subset of the signal-processing pipeline for VERITAS, a high-energy gamma-ray astrophysics experiment. These applications are …
Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 21, Number 8, May 2005, College Of Engineering And Computer Science, Wright State University
Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 21, Number 8, May 2005, College Of Engineering And Computer Science, Wright State University
BITs and PCs Newsletter
An eight page newsletter created by the Wright State University College of Engineering and Computer Science that addresses the current affairs of the college.
Architectures For Rule Processing Intrusion Detection And Prevention Systems, Michael E. Attig
Architectures For Rule Processing Intrusion Detection And Prevention Systems, Michael E. Attig
All Computer Science and Engineering Research
High-performance intrusion detection and prevention systems are needed by network administrators in order to protect Internet systems from attack. Researchers have been working to implement components of intrusion detection and prevention systems for the highly popular Snort system in reconfigurable hardware. While considerable progress has been made in the areas of string matching and header processing, complete systems have not yet been demonstrated that effectively combine all of the functionality necessary to perform intrusion detection and prevention for real network systems. In this thesis, three architectures to perform rule processing, the heart of intrusion detection and prevention, are presented. The …
Improving The Performance Of Internet Data Transport, Anshul Kantawala, Jonathan S. Turner
Improving The Performance Of Internet Data Transport, Anshul Kantawala, Jonathan S. Turner
All Computer Science and Engineering Research
With the explosion of the World Wide Web, the Internet infrastructure faces new challenges in providing high performance for data traffic. First, it must be able to pro-vide a fair-share of congested link bandwidth to every flow. Second, since web traffic is inherently interactive, it must minimize the delay for data transfer. Recent studies have shown that queue management algorithms such as Tail Drop, RED and Blue are deficient in providing high throughput, low delay paths for a data flow. Two major shortcomings of the current algorithms are: they allow TCP flows to get synchronized and thus require large buffers …
Hide It Or Unbundle It: A Comparison Of The Antitrust Investigations Against Microsoft In The U.S. And The E.U., Sue Ann Mota
Hide It Or Unbundle It: A Comparison Of The Antitrust Investigations Against Microsoft In The U.S. And The E.U., Sue Ann Mota
The University of New Hampshire Law Review
[Excerpt] "Microsoft Corporation, the world’s largest software company, has been facing antitrust scrutiny globally. In the U.S., after what’s been called the antitrust trial of the century, a consent decree was reached between Microsoft, the United States government, and several states, that closely resembled the litigated remedy that the remaining states received. Only Massachusetts appealed the litigated remedy, which was approved by the appeals court on June 30, 2004. In the United States, Microsoft was required to hide, but not remove, the Internet Explorer browser on the Windows Operating System. While antitrust litigation was ongoing in the United States against …
Static Determination Of Allocation Rates To Support Real-Time Garbage Collection, Tobias Mann
Static Determination Of Allocation Rates To Support Real-Time Garbage Collection, Tobias Mann
All Computer Science and Engineering Research
While it is generally accepted that garbage-collected languages offer advantages over languages in which objects must be explicitly deallocated, real-time developers are leery of the adverse effects a garbage collector might have on real-time performance. Semiautomatic approaches based on regions have been proposed, but incorrect usage could cause unbounded storage leaks or program failure. Moreover, correct usage cannot be guaranteed at compile-time. Recently, real-time garbage collectors have been developed that provide a guaranteed fraction of the CPU to the application, and the correct operation of those collectors has been proven, subject only to the specification of certain statistics related to …
Composable Timed Automata Models For Real-Time Embedded Systems Middleware, Venkita Subramonian, Christopher Gill, Cesar Sanchez, Henny Sipma
Composable Timed Automata Models For Real-Time Embedded Systems Middleware, Venkita Subramonian, Christopher Gill, Cesar Sanchez, Henny Sipma
All Computer Science and Engineering Research
Middleware for distributed real-time embedded (DRE) systems has grown more and more complex in recent years, to address functional and temporal requirements of complex real-time applications. While current approaches for modeling middleware have eased the task of assembling, deploying and configuring middleware and applications, a more formal, fundamental and lower-level set of models is needed to be able to uncover subtle safety and timing errors introduced by interference between computations, particularly in the face of alternative concurrency strategies in the middleware layer. In this paper, we examine how formal models of lower-level middleware building blocks provide an appropriate level of …
What A Mesh: Dependent Data Types For Correct Mesh Manipulation Algorithms, Joel R. Brandt
What A Mesh: Dependent Data Types For Correct Mesh Manipulation Algorithms, Joel R. Brandt
All Computer Science and Engineering Research
The Edinburgh Logical Framework (LF) has been proposed as a system for expressing inductively defined sets. I will present an inductive definition of the set of manifold meshes in LF. This definition takes into account the topological characteri-zation of meshes, namely their Euler Characteristic. I will then present a set of dependent data types based on this inductive def-inition. These data types are defined in a programming language based on LF. The language’s type checking guarantees that any typeable expression represents a correct manifold mesh. Furthermore, any mesh can be represented using these data types. Hence, the encoding is sound …
Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 21, Number 7, April 2005, College Of Engineering And Computer Science, Wright State University
Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 21, Number 7, April 2005, College Of Engineering And Computer Science, Wright State University
BITs and PCs Newsletter
A six page newsletter created by the Wright State University College of Engineering and Computer Science that addresses the current affairs of the college.
Cs 207: Advanced Office Productivity Ii, Louis A. Benavides
Cs 207: Advanced Office Productivity Ii, Louis A. Benavides
Computer Science & Engineering Syllabi
This course covers post-advanced microcomputer applications including Microsoft Office Word 2003, Microsoft Office Excel 2003, Microsoft Office Access 2003, and Microsoft Office PowerPoint 2003. Topics include: creating an online form; working with macros and Visual Basic for Applications (VBA); working with a master document, an index and a table of contents; linking an Excel worksheet and charting its data in Word; formula auditing, data validation, and complex problem solving in Excel; importing data into Excel; working with PivotCharts, PivotTables, and trendlines in Excel; creating a PivotTable List; advanced Access report and form techniques, and creating multi-page forms; administering a database …
Cs 241: Computer Science Ii, L. Jane Lin
Cs 241: Computer Science Ii, L. Jane Lin
Computer Science & Engineering Syllabi
This course is the second in the three course sequence "Introduction to Computer Science" offered by the Computer Science department, WSU. It focuses on tools for building abstract data types (using structure and class concepts in C++)
and Object-Oriented Programming. We also begin the study of data structures in this course. For All CS 241 students, concurrent registration into CS 241 lab is a must.
Cs 240-02: Introduction To Computer Science, Eric Maston
Cs 240-02: Introduction To Computer Science, Eric Maston
Computer Science & Engineering Syllabi
We will develop basic techniques to design, develop and implement programs using the C++ language. This course focuses on basic elements of programming and assumes no knowledge of programming in C++.
Cs 241-02: Introduction To Computer Science Ii, Praveen Kakumanu
Cs 241-02: Introduction To Computer Science Ii, Praveen Kakumanu
Computer Science & Engineering Syllabi
This course is the second in the three course sequence "Introduction to Computer Science" offered by the Computer Science department, WSU. It focuses on tools for building abstract data types {using structure and class concepts in C++) and Object-Oriented Programming. We also begin the study of data structures in this course. Note: For all CS 241 students, concurrent registration into CS 241 lab is a must
Cs/Mth 316/516: Numerical Methods For Digital Computers - I, Ronald F. Taylor
Cs/Mth 316/516: Numerical Methods For Digital Computers - I, Ronald F. Taylor
Computer Science & Engineering Syllabi
Introduction to numerical methods used in the sciences. Methods of interpolation, data smoothing, functional approximation, numerical differentiation and integration. Solution techniques for linear and nonlinear equations. Discussion of sources of error in numerical methods. Applications of interest to engineering, science, and applied mathematics students are an integral part of the course. Special topics presented as schedule permits. 4 credit hours. Prerequisites: CS 142 or EGR 153 or CEG 220 or CS 241, MTH 231, MTH 253 or 255.
Bio/Cs 271: Introduction To Bioinformatics, Dan E. Krane, Travis E. Doom
Bio/Cs 271: Introduction To Bioinformatics, Dan E. Krane, Travis E. Doom
Computer Science & Engineering Syllabi
BIO/CS 271 Introduction to Bioinformatics: Introduction to DNA as an information storage system, data searches and pairwise alignments, substitution patterns, protein folding, and proteomics. Prerequisite: CS 240 or equivalent, BIO 112
Cs 340: Programming Language Workshop In Java, Krishnaprasad Thirunarayan
Cs 340: Programming Language Workshop In Java, Krishnaprasad Thirunarayan
Computer Science & Engineering Syllabi
This course is designed as a self-study in Java. You are expected to learn the Java language and solve a set of programming problems assigned to you using it. (You may develop your code using any IDE you like, but you must ensure that it eventually runs using JDK 5). There are no exams. We officially meet only once in a quarter. However, I will be available in the posted office hours for clarifications and discussions about the programming problems.
Cs 242-02: Introduction To Computer Science Iii, Praveen Kakumanu
Cs 242-02: Introduction To Computer Science Iii, Praveen Kakumanu
Computer Science & Engineering Syllabi
This is the final course in the three course sequence "Introduction to Computer Science" offered by the Computer Science department, WSU. It focuses on building a number of abstract data types such as stacks, queues, trees and tables. We continue to study the C++ object-oriented concepts such as Inheritance, polymorphism and template handling. We also start learning to analyze the complexity of algorithms in this course. Note: For all CS 242 students, concurrent registration into CS 242 lab is a must.
Cs 466/666: Introduction To Formal Languages, Thomas Sudkamp
Cs 466/666: Introduction To Formal Languages, Thomas Sudkamp
Computer Science & Engineering Syllabi
CS 466/666 is an introduction to formal language and automata theory. In this course we will examine methods for defining syntax of languages and recognizing patterns: the syntax of languages can be defined using grammars and patterns accepted by finite state machines. Along with presenting the fundamentals of these two topics, the course will develop and investigate the relationships between language definition and pattern recognition. The text will be the third edition of Languages and Machines: An Introduction to the Theory of Computer Science.
Cs 405/605-01: Introduction To Database Management Systems, Guozhu Dong
Cs 405/605-01: Introduction To Database Management Systems, Guozhu Dong
Computer Science & Engineering Syllabi
Survey of logical and physical aspects of database management systems. Data models including entity-relationship (ER) and relational are presented. Physical implementation (data organization and indexing) methods are discussed. Query languages including SQL, relational algebra, relational calculus, and QBE are introduced. Students will also gain experience in creating and manipulating a database. The course is mostly concerned with the design and querying of databases. A follow up course, CS701, is concerned with the design of system functions for managing databases.
Cs 776: Functional Programming, Krishnaprasad Thirunarayan
Cs 776: Functional Programming, Krishnaprasad Thirunarayan
Computer Science & Engineering Syllabi
This course will discuss important concepts of functional programming such as recursive definitions, higher-order functions, type inference, polymorphism, abstract data types, modules etc. The programming exercises will illustrate the utility of list-processing, pattern matching, abstraction of data/control, strong typing, and parameterized modules (functors). We also study the mathematical reasoning involved in the design of functional programs and techniques for proving properties about functions so defined.
Cs 801: Advanced Database Systems, Soon M. Chung
Cs 801: Advanced Database Systems, Soon M. Chung
Computer Science & Engineering Syllabi
Introduction of current trends and research issues in database systems.
Cs 790-02: Information Security, Guozhu Dong
Cs 790-02: Information Security, Guozhu Dong
Computer Science & Engineering Syllabi
This course is a survey of fundamentals of information security. Topics include: confidentiality, integrity, availability; authentication models; protection models; audit; intrusion and masquerader detection; control policies; access control; release control; information flow; legal and social issues, privacy; risk assessment and vulnerabilities; encryption; digital watermarking; insider risks; computer forensics; additional topics of interest.
Cs 884: Advanced Topics In Programming Languages, Krishnaprasad Thirunarayan
Cs 884: Advanced Topics In Programming Languages, Krishnaprasad Thirunarayan
Computer Science & Engineering Syllabi
The primary focus of this course is the design and specification of the Object-Oriented language Java.
Cs 840: Advanced Topics In The Theory Of Computation, Thomas Sudkamp
Cs 840: Advanced Topics In The Theory Of Computation, Thomas Sudkamp
Computer Science & Engineering Syllabi
No abstract provided.
Ceg 210-01: Pc Networking I, Karen Meyer
Ceg 210-01: Pc Networking I, Karen Meyer
Computer Science & Engineering Syllabi
Introduction to PC networking hardware, concepts, and technologies. Focus is on LAN Administration.