Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (7311)
- China Simulation Federation (3382)
- TÜBİTAK (3020)
- Selected Works (2644)
- Wright State University (2602)
-
- Purdue University (2057)
- Old Dominion University (1458)
- Missouri University of Science and Technology (1371)
- Edith Cowan University (1173)
- Air Force Institute of Technology (1109)
- University of Texas at El Paso (1105)
- University of Nebraska - Lincoln (1072)
- Dartmouth College (1022)
- San Jose State University (995)
- Embry-Riddle Aeronautical University (853)
- City University of New York (CUNY) (819)
- Brigham Young University (812)
- Technological University Dublin (791)
- Washington University in St. Louis (785)
- California Polytechnic State University, San Luis Obispo (733)
- Kennesaw State University (714)
- University for Business and Technology in Kosovo (626)
- University of Texas at Arlington (614)
- Nova Southeastern University (535)
- Portland State University (531)
- SelectedWorks (527)
- Western University (526)
- New Jersey Institute of Technology (516)
- Syracuse University (501)
- University of Nebraska at Omaha (485)
- Keyword
-
- Machine learning (1342)
- Deep learning (801)
- Artificial intelligence (664)
- Machine Learning (653)
- Computer Science (637)
-
- Security (619)
- Computer science (434)
- Privacy (409)
- Cybersecurity (407)
- Simulation (379)
- Classification (369)
- Technical Reports (369)
- UTEP Computer Science Department (367)
- Deep Learning (350)
- Data mining (349)
- Algorithms (338)
- Optimization (337)
- Neural networks (309)
- Artificial Intelligence (300)
- Computer vision (290)
- Education (254)
- Software engineering (254)
- College for Professional Studies (253)
- Clustering (251)
- Cloud computing (244)
- Department of Computer Science and Engineering (243)
- Applied sciences (237)
- School of Computer & Information Science (236)
- Visualization (236)
- Natural language processing (233)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (6959)
- Journal of System Simulation (3382)
- Turkish Journal of Electrical Engineering and Computer Sciences (3020)
- Theses and Dissertations (2512)
- Department of Computer Science Technical Reports (1721)
-
- Computer Science & Engineering Syllabi (1312)
- Departmental Technical Reports (CS) (892)
- Master's Projects (845)
- Electronic Theses and Dissertations (738)
- Computer Science Faculty Publications (725)
- All Computer Science and Engineering Research (683)
- Computer Science Technical Reports (673)
- Computer Science Faculty Research & Creative Works (601)
- Faculty Publications (588)
- Kno.e.sis Publications (543)
- Journal of Digital Forensics, Security and Law (536)
- Computer Science Faculty Publications and Presentations (514)
- Dissertations (505)
- CCE Theses and Dissertations (488)
- All Works (478)
- Walden Dissertations and Doctoral Studies (468)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (462)
- Masters Theses (402)
- Computer Science and Engineering Theses (356)
- Electronic Thesis and Dissertation Repository (334)
- Theses (334)
- Computer Science and Software Engineering (332)
- USF Tampa Graduate Theses and Dissertations (320)
- Computer Science: Faculty Publications (318)
- Mathematics, Statistics and Computer Science Faculty Research and Publications (315)
- Publication Type
Articles 51631 - 51660 of 58253
Full-Text Articles in Physical Sciences and Mathematics
Design And Implementation Of Interactive Tutorials For Data Structures, Ross Gore, Lewis Barnett Iii
Design And Implementation Of Interactive Tutorials For Data Structures, Ross Gore, Lewis Barnett Iii
Department of Math & Statistics Technical Report Series
The Tutorial Generation Toolkit (TGT) is a set of Java classes that supports authoring of interactive tutorial applications. This paper describes extensions to the capabilities of the TGT and several new tutorials aimed at the Data Structures course which were built using the toolkit.
Evaluating Probabilistic Queries Over Imprecise Data, Reynold Cheng, Dmitri V. Kalashnikov, Sunil Prabhakar
Evaluating Probabilistic Queries Over Imprecise Data, Reynold Cheng, Dmitri V. Kalashnikov, Sunil Prabhakar
Department of Computer Science Technical Reports
No abstract provided.
The Capacity Of Multi-Hop Wireless Networks With Tcp Regulated Traffic, Sorav Bansal, Rajeev Shorey, Shobhit Chugh, Anurag Goel, Kapil Kumar, Archan Misra
The Capacity Of Multi-Hop Wireless Networks With Tcp Regulated Traffic, Sorav Bansal, Rajeev Shorey, Shobhit Chugh, Anurag Goel, Kapil Kumar, Archan Misra
Research Collection School Of Computing and Information Systems
We study the dependence of the capacity of multi-hop wireless networks on the transmission range of nodes in the network with TCP regulated traffic. Specifically, we examine the sensitivity of the capacity to the speed of the nodes and the number of TCP connections in an ad hoc network. By incorporating the notion of a minimal acceptable QoS metric (loss) for an individual session, we argue that the QoS-aware capacity is a more accurate model of the TCP-centric capacity of an ad-hoc network. We study the dependence of capacity on the source application (Telnet or FTP) and on the choice …
Defending Against Redirect Attacks In Mobile Ip, Robert H. Deng, Jianying Zhou, Feng Bao
Defending Against Redirect Attacks In Mobile Ip, Robert H. Deng, Jianying Zhou, Feng Bao
Research Collection School Of Computing and Information Systems
The route optimization operation in Mobile IP Version 6 (MIPv6) allows direct routing from any correspondent node to any mobile node and thus eliminates the problem of "triangle routing" present in the base Mobile IP Version 4 (MIPv4) protocol. Route optimization, however, requires that a mobile node constantly inform its correspondent nodes about its new care-of addresses by sending them binding update messages. Unauthenticated or malicious binding updates open the door for intruders to perform redirect attacks, i.e., malicious acts which redirect traffic from correspondent nodes to locations chosen by intruders. How to protect binding update messages to defend against …
A Visual Tool For Building Logical Data Models Of Websites, Zehua Liu, Wee-Keong Ng, Feifei Li, Ee Peng Lim
A Visual Tool For Building Logical Data Models Of Websites, Zehua Liu, Wee-Keong Ng, Feifei Li, Ee Peng Lim
Research Collection School Of Computing and Information Systems
Information sources over the WWW contain a large amount of data organized according to different interests and values. Thus, it is important that facilities are there to enable users to extract information of interest in a simple and effective manner. To do this, We propose the Wiccap Data Model, an XML data model that maps Web information sources into commonly perceived logical models, so that information can be extracted automatically according to users' interests. To accelerate the creation of data models, we have implemented a visual tool, called the Mapping Wizard, to facilitate and automate the process of producing Wiccap …
Motion-Based Video Representation For Scene Change Detection, Chong-Wah Ngo, Ting-Chuen Pong, Hong-Jiang Zhang
Motion-Based Video Representation For Scene Change Detection, Chong-Wah Ngo, Ting-Chuen Pong, Hong-Jiang Zhang
Research Collection School Of Computing and Information Systems
In this paper, we present a new framework to automatically group similar shots into one scene, where a scene is generally referred to as a group of shots taken place in the same site. Two major components in this framework are based on the motion characterization and background segmentation. The former component leads to an effective video representation scheme by adaptively selecting and forming keyframes. The later is considered novel in that background reconstruction is incorporated into the detection of scene change. These two components, combined with the color histogram intersection, establish our basic concept on assessing the similarity of …
Predicting Bottleneck Bandwidth Sharing By Generalized Tcp Flows, Archan Misra, Teunis Ott, John Baras
Predicting Bottleneck Bandwidth Sharing By Generalized Tcp Flows, Archan Misra, Teunis Ott, John Baras
Research Collection School Of Computing and Information Systems
The paper presents a technique for computing the individual throughputs and the average queue occupancy when multiple TCP connections share a single bottleneck buffer. The bottleneck buffer is assumed to perform congestion feedback via randomized packet marking or drops. We first present a fixed point-based analytical technique to compute the mean congestion window sizes, the mean queue occupancy and the individual throughputs when the TCP flows perform idealized congestion avoidance. We subsequently extend the technique to analyze the case where TCP flows perform generalized congestion avoidance and demonstrate the use of this technique under the Assured Service model, where each …
Mining Of Correlated Rules In Genome Sequences, L. Lin, L. Wong, Tze-Yun Leong, P. S. Lai
Mining Of Correlated Rules In Genome Sequences, L. Lin, L. Wong, Tze-Yun Leong, P. S. Lai
Research Collection School Of Computing and Information Systems
With the huge amount of data collected by scientists in the molecular genetics community in recent years, there exists a need to develop some novel algorithms based on existing data mining techniques to discover useful information from genome databases. We propose an algorithm that integrates the statistical method, association rule mining, and classification rule mining in the discovery of allelic combinations of genes that are peculiar to certain phenotypes of diseased patients.
Modeling The Multicast Address Allocation Problem, Daniel Zappala, Chris Gauthierdickey, Virginia Lo
Modeling The Multicast Address Allocation Problem, Daniel Zappala, Chris Gauthierdickey, Virginia Lo
Faculty Publications
To support IP multicast, domains must assign a unique multicast address to each application from a limited, globally-shared address space. We examine the performance of several classes of address allocation algorithms withln the context of the MASC architecture. This study is the first of its kind to model the generalized multicast address allocation problem and consider non-contiguous allocation algorithms. We find that prefix-based allocation outperforms our non-contiguous algorithm, despite the apparent advantages of non-contiguous allocation. We also verify the benefits of using worst-fit for new allocations.
A Theoretical Framework For The Multicast Address Allocation Problem, Daniel Zappala, Chris Gauthierdickey, Virginia Lo, Timothy Singer
A Theoretical Framework For The Multicast Address Allocation Problem, Daniel Zappala, Chris Gauthierdickey, Virginia Lo, Timothy Singer
Faculty Publications
The multicast address allocation problem requires Internet domains to allocate unique addresses to multicast applications from a globally-shared space. We develop a theoretical framework for multicast allocation algorithms that is influenced by subcube allocation in hypercube computer systems. Based on this framework we derive complexity results for the address allocation problem and describe several new allocation algorithms that use a hypercube model for address representation.
Web Classification Using Support Vector Machine, Aixin Sun, Ee Peng Lim
Web Classification Using Support Vector Machine, Aixin Sun, Ee Peng Lim
Research Collection School Of Computing and Information Systems
In web classification, web pages from one or more web sites are assigned to pre-defined categories according to their content. Since web pages are more than just plain text documents, web classification methods have to consider using other context features of web pages, such as hyperlinks and HTML tags. In this paper, we propose the use of Support Vector Machine (SVM) classifiers to classify web pages using both their text and context feature sets. We have experimented our web classification method on the WebKB data set. Compared with earlier Foil-Pilfs method on the same data set, our method has been …
A Pseudo Nearest-Neighbor Approach For Missing Data Recovery On Gaussian Random Data Sets, Xiaolu Huang, Qiuming Zhu
A Pseudo Nearest-Neighbor Approach For Missing Data Recovery On Gaussian Random Data Sets, Xiaolu Huang, Qiuming Zhu
Computer Science Faculty Publications
Missing data handling is an important preparation step for most data discrimination or mining tasks. Inappropriate treatment of missing data may cause large errors or false results. In this paper, we study the effect of a missing data recovery method, namely the pseudo- nearest neighbor substitution approach, on Gaussian distributed data sets that represent typical cases in data discrimination and data mining applications. The error rate of the proposed recovery method is evaluated by comparing the clustering results of the recovered data sets to the clustering results obtained on the originally complete data sets. The results are also compared with …
Knowledge Discovery From Texts: A Concept Frame Graph Approach, Kanagasabai Rajaraman, Ah-Hwee Tan
Knowledge Discovery From Texts: A Concept Frame Graph Approach, Kanagasabai Rajaraman, Ah-Hwee Tan
Research Collection School Of Computing and Information Systems
We address the text content mining problem through a concept based framework by constructing a conceptual knowledge base and discovering knowledge therefrom. Defining a novel representation called the Concept Frame Graph (CFG), we propose a learning algorithm for constructing a CFG knowledge base from text documents. An interactive concept map visualization technique is presented for user-guided knowledge discovery from the knowledge base. Through experimental studies on real life documents, we observe that the proposed approach is promising for mining deeper knowledge.
Horizon Occlusion Culling For Real-Time Rendering Of Hierarchical Terrains, Parris K. Egbert, Brandon Lloyd
Horizon Occlusion Culling For Real-Time Rendering Of Hierarchical Terrains, Parris K. Egbert, Brandon Lloyd
Faculty Publications
We present a technique to perform occlusion culling for hierarchical terrains at run-time. The algorithm is simple to implement and requires minimal pre-processing and additional storage, yet leads to 2-4 times improvement in framerate for views with high degrees of occlusion. Our method is based on the well-known occlusion horizon algorithm. We show how to adapt the algorithm for use with hierarchical terrains. The occlusion horizon is constructed as the terrain is traversed in an approximate front to back ordering. Regions of the terrain are compared to the horizon to determine when they are completely occluded from the viewpoint. Culling …
Toward Dynamic Interoperability Of Mobile Agent Systems, Arne Grimstrup, Robert Gray, David Kotz, Maggie Breedy, Marco Carvalho, Thomas Cowin, Daria Chacon, Joyce Barton, Chris Garrett, Martin Hofmann
Toward Dynamic Interoperability Of Mobile Agent Systems, Arne Grimstrup, Robert Gray, David Kotz, Maggie Breedy, Marco Carvalho, Thomas Cowin, Daria Chacon, Joyce Barton, Chris Garrett, Martin Hofmann
Dartmouth Scholarship
Mobile agents are an increasingly popular paradigm and in recent years there has been a proliferation of mobile-agent systems. These systems are, however, largely incompatible with each other. In particular, agents cannot migrate to a host that runs a different mobile-agent system. Prior approaches to interoperability have tried to force agents to use a common API and so far none have succeeded. This goal led to our efforts to develop mechanisms that support dynamic runtime interoperability of mobile-agent systems. This paper describes the \em Grid Mobile-Agent System, which allows agents to migrate to different mobile-agent systems.
Oral History Interview With Stephen Cook, Philip L. Frana
Oral History Interview With Stephen Cook, Philip L. Frana
Philip L Frana
Cook recounts his early interest in electronics and association with electronic cardiac pacemaker inventor Wilson Greatbatch, and his education at the University of Michigan and Harvard University. He describes his first position as an assistant professor of mathematics at the University of California, Berkeley, and his growing interest in problems of computational complexity preceding an influential 1971 presentation on “The Complexity of Theorem Proving Procedures” at the ACM SIGACT Symposium on the Theory of ...
Biodiversity And Ecosystem Informatics - Bdei - Planning Workshop On Biodiversity And Ecosystem Informatics For The Indian River Lagoon, Florida, Mohamad T. Musavi
Biodiversity And Ecosystem Informatics - Bdei - Planning Workshop On Biodiversity And Ecosystem Informatics For The Indian River Lagoon, Florida, Mohamad T. Musavi
University of Maine Office of Research Administration: Grant Reports
This proposal solicits funding to organize and conduct a planning workshop that will establish and facilitate research on the informatics needed to address complex issues of biodiversity and ecosystem processes within the Indian River Lagoon. This workshop will provide the opportunity and resources for collaboration and discussion among scientists from diverse fields of biodiversity, ecological sciences, remote sensing, geographic information systems, computer science and intelligent systems. The topics to be discussed will include investigation of novel computational intelligence techniques for modeling, prediction, analysis and database management of the disparate and complex data for the Indian River Lagoon. The explicit products …
Rf Rendez-Blue: Reducing Power And Inquiry Costs In Bluetooth-Enabled Mobile Systems, Eric S. Hall, Charles D. Knutson, David K. Vawdrey
Rf Rendez-Blue: Reducing Power And Inquiry Costs In Bluetooth-Enabled Mobile Systems, Eric S. Hall, Charles D. Knutson, David K. Vawdrey
Faculty Publications
In resource-limited mobile computing devices, Bluetooth wireless technology imposes a weighty burden due to inefficient power utilization and a sluggish device discovery process. Buttressing Bluetooth with Radio Frequency Identification (RFID) technology by performing an operation we call “Rendez-Blue” alleviates these limitations. In the Rendez-Blue process, an RFID signal is used as a cue to “wake-up” a sleeping Bluetooth radio. This ensures that the Bluetooth radio is active only when needed, significantly reducing power consumption. In addition, RFID is used to communicate Bluetooth device information, allowing the user to bypass the traditional 10.24-second discovery process.
Kinematic Path-Planning For Formations Of Mobile Robots With A Nonholonomic Constraint, Timothy D. Barfoot, Christopher M. Clark, Stephen M. Rock, Gabriele M.T. D'Eleuterio
Kinematic Path-Planning For Formations Of Mobile Robots With A Nonholonomic Constraint, Timothy D. Barfoot, Christopher M. Clark, Stephen M. Rock, Gabriele M.T. D'Eleuterio
Computer Science and Software Engineering
A method of planning paths for formations of mobile robots with nonholonomic constraints is presented. The kinematics equations presented in this paper allow a general geometrical formation of mobile robots to be maintained while the group as a whole travels an arbitrary path. It is possible to represent a formation of mobile robots by a single entity with the same type of nonholonomic constraint as the individual members. Thus, any path-planner or control method may be used with the formation as would be applied to an individual robot. Equations are developed for changing the geometrical formation and hardware results are …
Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 19, Number 1, October 2002, College Of Engineering And Computer Science, Wright State University
Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 19, Number 1, October 2002, College Of Engineering And Computer Science, Wright State University
BITs and PCs Newsletter
A sixteen page newsletter created by the Wright State University College of Engineering and Computer Science that addresses the current affairs of the college.
Semantic Web Services And Processes: Semantic Composition And Quality Of Service, Jorge Cardoso, Chistoph Bussler, Amit P. Sheth, Dieter Fensel
Semantic Web Services And Processes: Semantic Composition And Quality Of Service, Jorge Cardoso, Chistoph Bussler, Amit P. Sheth, Dieter Fensel
Kno.e.sis Publications
Web Services are increasingly being adapted by Enterprises as the new approach to component-based solutions for enterprise applications. They hold potential to transform Web from a collection of information resources to a distributed computing platform. Many enterprise applications, including those supporting e-commerce take a form of processes, which need to be created from individual Web Services and other software components.
Distributed Algorithms For Guiding Navigation Across A Sensor Network, Qun Li, Michael Derosa, Daniela Rus
Distributed Algorithms For Guiding Navigation Across A Sensor Network, Qun Li, Michael Derosa, Daniela Rus
Computer Science Technical Reports
We develop distributed algorithms for self-reconfiguring sensor networks that respond to directing a target through a region. The sensor network models the danger levels sensed across its area and has the ability to adapt to changes. It represents the dangerous areas as obstacles. A protocol that combines the artificial potential field of the sensors with the goal location for the moving object guides the object incrementally across the network to the goal, while maintaining the safest distance to the danger areas. We report on hardware experiments using a physical sensor network consisting of Mote sensors.
Querying Imprecise Data In Moving Object Environments, Reynold Cheng, Sunil Prabhakar, Dmitri V. Kalashnikov
Querying Imprecise Data In Moving Object Environments, Reynold Cheng, Sunil Prabhakar, Dmitri V. Kalashnikov
Department of Computer Science Technical Reports
No abstract provided.
Synthesizing Distributed Controllers For The Safe Operation Of Connectedspaces, Baskar Sridharan, Aditya P. Mathur, Kai-Yuan Cai
Synthesizing Distributed Controllers For The Safe Operation Of Connectedspaces, Baskar Sridharan, Aditya P. Mathur, Kai-Yuan Cai
Department of Computer Science Technical Reports
No abstract provided.
Development Of An Infrastructure For The Management Of Smart Homes, Ramkumar Natarajan, Aditya P. Mathur
Development Of An Infrastructure For The Management Of Smart Homes, Ramkumar Natarajan, Aditya P. Mathur
Department of Computer Science Technical Reports
No abstract provided.
Synthesizing A Safety Controller For Connectedspaces Using Supervisory Control, Baskar Sridharan, Aditya P. Mathur, Kai-Yuan Cai
Synthesizing A Safety Controller For Connectedspaces Using Supervisory Control, Baskar Sridharan, Aditya P. Mathur, Kai-Yuan Cai
Department of Computer Science Technical Reports
No abstract provided.
Toward A Theory Of Differentiated Services, Huan Ren, Kihong Park
Toward A Theory Of Differentiated Services, Huan Ren, Kihong Park
Department of Computer Science Technical Reports
No abstract provided.
Similarity Joins For Low-And-High Dimensional Data, Dmitri V. Kalashnikov, Sunil Prabhakar
Similarity Joins For Low-And-High Dimensional Data, Dmitri V. Kalashnikov, Sunil Prabhakar
Department of Computer Science Technical Reports
No abstract provided.
Understanding And Measuring Corporate Is Sophistication: An Exploratory Investigation Using Ground Theory, Deepak Khazanchi
Understanding And Measuring Corporate Is Sophistication: An Exploratory Investigation Using Ground Theory, Deepak Khazanchi
Information Systems and Quantitative Analysis Faculty Publications
This paper describes the results of an exploratory study that culminated in the development of a set of theoretical dimensions for “Corporate IS Sophistication”. These indicators were developed utilizing grounded theory to analyze archival corporate data and data from in-depth interviews with functional IT executives in two Norwegian and one North American firm.
Cache Invalidation And Replacement Strategies For Location-Dependent Data In Mobile Environments, Baihua Zheng, Jianliang Xu, Dik Lun Lee
Cache Invalidation And Replacement Strategies For Location-Dependent Data In Mobile Environments, Baihua Zheng, Jianliang Xu, Dik Lun Lee
Research Collection School Of Computing and Information Systems
Mobile location-dependent information services (LDISs) have become increasingly popular in recent years. However, data caching strategies for LDISs have thus far received little attention. In this paper, we study the issues of cache invalidation and cache replacement for location-dependent data under a geometric location model. We introduce a new performance criterion, called caching efficiency, and propose a generic method for location-dependent cache invalidation strategies. In addition, two cache replacement policies, PA and PAID, are proposed. Unlike the conventional replacement policies, PA and PAID take into consideration the valid scope area of a data value. We conduct a series of simulation …