Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 52321 - 52350 of 58244

Full-Text Articles in Physical Sciences and Mathematics

Hidden Markov Models For Visual Speech Synthesis In Limited Data, Harold A. Arb Mar 2001

Hidden Markov Models For Visual Speech Synthesis In Limited Data, Harold A. Arb

Theses and Dissertations

This work presents a new approach for estimating control points (facial locations that control movement) to allow the artificial generation of video with apparent mouth movement (visual speech) time-synced with recorded audio. First, Hidden Markov Models (HMMs) are estimated for each visual speech category (viseme) present in stored video data, where a category is defined as the mouth movement corresponding to a given sound and where the visemes are further categorized as trisemes (a viseme in the context of previous and following visemes). Next, a decision tree is used to cluster and relate states in the HMMs that are similar …


Little Languages And Their Programming Environments, John Clements, Paul Graunke, Shriram Krishnamurthi, Matthias Felleisen Mar 2001

Little Languages And Their Programming Environments, John Clements, Paul Graunke, Shriram Krishnamurthi, Matthias Felleisen

Computer Science and Software Engineering

Programmers constantly design, implement, and program in little languages. Two different approaches to the implementation of little languages have evolved. One emphasizes the design of little languages from scratch, using conventional technology to implement interpreters and compilers. The other advances the idea of extending a general-purpose host language; that is, the little language shares the host language's features (variables, data, loops, functions) where possible; its interpreters and compilers; and even its type soundness theorem. The second approach is often called a language embedding.

This paper directs the attention of little language designers to a badly neglected area: the programming environments …


Icdm: An Architecture And Toolkit In Support Of Agent-Based, Decision-Support Applications, Kym J. Pohl, Jens G. Pohl Mar 2001

Icdm: An Architecture And Toolkit In Support Of Agent-Based, Decision-Support Applications, Kym J. Pohl, Jens G. Pohl

Collaborative Agent Design (CAD) Research Center

Agent-based, decision-support systems provide human decision-makers with a means of solving complex problems through collaboration with heterogeneous collections of both human and computer-based expert agents. Over the past decade the Collaborative Agent Design (CAD) Research Center has developed several proof-of-concept and production-oriented agent-based, decision-support systems for both commercial and Department of Defense applications. These applications range in domain from engineering design to tactical command and control. While diverse in application, each of these systems is predicated on the same set of fundamental principles derived from years of experience in this area. Primary among these principles are the notions of high-level …


Probabilistic Temporal Databases, I: Algebra, Alex Dekhtyar, Robert Ross, V. S. Subrahmanian Mar 2001

Probabilistic Temporal Databases, I: Algebra, Alex Dekhtyar, Robert Ross, V. S. Subrahmanian

Computer Science and Software Engineering

Dyreson and Snodgrass have drawn attention to the fact that in many temporal database applications, there is often uncertainty present about the start time of events, the end time of events, the duration of events, etc. When the granularity of time is small (e.g. milliseconds), a statement such as "Packet p was shipped sometime during the first 5 days of January, 1998" leads to a massive amount of uncertainty (5 X 24 X 60 X 60 X 1000) possibilities. As noted in [41], past attempts to deal with uncertainty in databases have been restricted to relatively small amounts of uncertainty …


Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 17, Number 6, March 2001, College Of Engineering And Computer Science, Wright State University Mar 2001

Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 17, Number 6, March 2001, College Of Engineering And Computer Science, Wright State University

BITs and PCs Newsletter

An eight page newsletter created by the Wright State University College of Engineering and Computer Science that addresses the current affairs of the college.


Outbound Authentication For Programmable Secure Coprocessors, S W. Smith Mar 2001

Outbound Authentication For Programmable Secure Coprocessors, S W. Smith

Computer Science Technical Reports

A programmable secure coprocessor platform can help solve many security problems in distributed computing. These solutions usually require that coprocessor applications be able to participate as full-fledged parties in distributed cryptographic protocols. Thus, to fully enable these solutions, a generic platform must not only provide programmability, maintenance, and configuration in the hostile field---it must also provide outbound authentication for the entities that result. A particular application on a particular untampered device must be able to prove who it is to a party on the other side of the Internet. To be effective, a secure outbound authentication service must closely mesh …


Scalable Qos-Aware Disk Scheduling, Walid G. Aref, Kaled El-Bassyouni, Ibrahim Kamel, Mohamed F. Mokbel Mar 2001

Scalable Qos-Aware Disk Scheduling, Walid G. Aref, Kaled El-Bassyouni, Ibrahim Kamel, Mohamed F. Mokbel

Department of Computer Science Technical Reports

No abstract provided.


Survivability Architecture For Workflow Management Systems, Jorge Cardoso, Zongwei Luo, John A. Miller, Amit P. Sheth, Krzysztof J. Kochut Mar 2001

Survivability Architecture For Workflow Management Systems, Jorge Cardoso, Zongwei Luo, John A. Miller, Amit P. Sheth, Krzysztof J. Kochut

Kno.e.sis Publications

The survivability of critical infrastructure systems has been gaining increasing concern from the industry. The survivability research area addresses the issue of infrastructure systems that continues to provide pre-established service levels to users in the face of disorders and react to changes in the surrounding environment. Workflow management systems need to be survivable since they are used to support critical and sensitive business processes. They require a high level of dependability and should not allow process instances to be interrupted or aborted due to failures. Moreover, due to their sensitivity, business process should reflect any change in the environment. In …


A Radial Basis Function Neural Network Approach To Two-Color Infrared Missile Detection, Kin-Weng Chan Mar 2001

A Radial Basis Function Neural Network Approach To Two-Color Infrared Missile Detection, Kin-Weng Chan

Theses and Dissertations

Multicolor infrared imaging missile-warning systems require real-time detection techniques that can process the wide instantaneous field of regard of focal plane array sensors with a low false alarm rate. Current technology applies classical statistical methods to this problem and ignores neural network techniques. Thus the research reported here is novel in that it investigates the use of radial basis function (RBF) neural networks to detect sub-pixel missile signatures. An RBF neural network is designed and trained to detect targets in two-color infrared imagery using a recently developed regression tree algorithm. Features are calculated for 3 by 3 pixel sub-images in …


An Analysis Of The Computer And Network Attack Taxonomy, Richard C. Daigle Mar 2001

An Analysis Of The Computer And Network Attack Taxonomy, Richard C. Daigle

Theses and Dissertations

The Air Force's dependence on the Internet continues to increase daily. However, this increased dependence comes with risks. The popularity and potential of the Internet attracts users with illegal as well as legal intentions. Since the Air Force considers the Internet an integral component of its information Operations strategy, the Air Force must be confident that it can trust the security of this component. Therefore, reliable methods and information that helps the Air Force classify the risks associated with the Internet can help the Air Force determine the best processes to assure the security of its use of this resource. …


Empirical Studies Of A Prediction Model For Regression Test Selection, Mary Jean Harrold, David Rosenblum, Gregg Rothermel, Elaine Weyuker Mar 2001

Empirical Studies Of A Prediction Model For Regression Test Selection, Mary Jean Harrold, David Rosenblum, Gregg Rothermel, Elaine Weyuker

School of Computing: Faculty Publications

Regression testing is an important activity that can account for a large proportion of the cost of software maintenance. One approach to reducing the cost of regression testing is to employ a selective regression testing technique that 1) chooses a subset of a test suite that was used to test the software before the modifications, then 2) uses this subset to test the modified software. Selective regression testing techniques reduce the cost of regression testing if the cost of selecting the subset from the test suite together with the cost of running the selected subset of test cases is less …


Models For Data Source Tracking With Xml, Teoman Yoruk Mar 2001

Models For Data Source Tracking With Xml, Teoman Yoruk

Theses and Dissertations

The Air Force Research arch Laboratory, Sensors Directorate Electronic Warfare Simulation Branch (APRL/SNZW) is responsible for developing and maintaining real-world and hypothetical scenarios for an array of threat engagement simulation systems. The general for scenario creation involves mapping from real-world databases and operations plans to specific fields in the input files represent the scenario. As part of the AFRL/SNZW's overall initiative for the development of a Concurrent Engineering Real-Time database CORrelation tool (CERCORT), as important to the scenario files themselves is the capability to trace hack to the source of data for the scenario fields. Acquiring this capability consequently results …


A Process For Vectoring Offensive Information Warfare As A Primary Weapon Option Within The United States Air Force, Sheila G. Bennett Mar 2001

A Process For Vectoring Offensive Information Warfare As A Primary Weapon Option Within The United States Air Force, Sheila G. Bennett

Theses and Dissertations

Consistently and comprehensively using Information Operations (IO) capabilities as primary weapon option within the Air Force is the next step to operationalizing IO within the Air Force. Doctrine and official guidance has set the variables of mission and concepts of operations, organizational structure, and IW players in place. The missing variable to operationalizing IO and probably the most difficult is the 'how' or process of the equation. This research will introduce a useable process that can be incorporated within the Air Force for integrating offensive IW activities into the current and given environment. The process is the basis for further …


Malicious Hackers: A Framework For Analysis And Case Study, Laura J. Kleen Mar 2001

Malicious Hackers: A Framework For Analysis And Case Study, Laura J. Kleen

Theses and Dissertations

Recent years have seen an increase in the number and severity of Information Operations (IO) attacks upon DoD resources. At a higher level, the US as a whole has come under cyber attack by individuals and groups seeking thrills, monetary gain, publicity for their causes, and myriad other goals. This effort develops a first cut model of individual hacker mentality that can be utilized to improve threat assessment, mitigate Information Assurance (IA) vulnerabilities, and improve risk assessment. Further, it is a first step toward automated characterization of Information Warfare (IW) attacks based upon hacker types. All hackers are not the …


The Effect Of Contextual-Based Training On Artifact-Based Deception Detection, Elizabeth A. Autrey Mar 2001

The Effect Of Contextual-Based Training On Artifact-Based Deception Detection, Elizabeth A. Autrey

Theses and Dissertations

Air Force dependence on information technology (IT) creates vulnerabilities that it cannot ignore. With global availability of commercial IT and the Internet, the Air Force does not necessarily have the high technological advantage over potential adversaries that it once had. Furthermore, it is possible to directly and covertly manipulate information within information systems, or artifacts, without notice. This directly affects decision makers since the availability and integrity of information is critical. Air Force physical and network security measures taken to protect its information do not guarantee detection of direct information manipulation. This leaves it to information artifact users to detect …


A Semantic Interface To Scenario Component Reuse In Dod Simulation Systems, Lawrence A. Breighner Mar 2001

A Semantic Interface To Scenario Component Reuse In Dod Simulation Systems, Lawrence A. Breighner

Theses and Dissertations

The Department of Defense utilizes various simulation systems to model employment of forces and weapons systems in operational environments. The data files that model these environments and weapons systems are extremely large and complex, and require many person-hours to develop. Compounding the problem, these data files are distributed across multiple systems in a heterogeneous environment. Currently, there is no automated means of identifying and retrieving reusable portions of these files for reuse in a new scenario under development. This work develops a multi-agent system that catalogs the files, and provides the user with a means of identifying and retrieving reusable …


A Traffic Pattern-Based Comparison Of Bulk Image Request Response Times For A Virtual Distributed Laboratory, David B. Hooten Mar 2001

A Traffic Pattern-Based Comparison Of Bulk Image Request Response Times For A Virtual Distributed Laboratory, David B. Hooten

Theses and Dissertations

Various agencies throughout the Department of Defense possess intelligence imagery and electrooptical signature data required by researchers in the field of automatic target recognition (ATR). The Air Force Research Laboratory, Sensors Directorate, as been tasked with creating a virtual distributed laboratory (VDL) which will make this data available to ATR researchers via high speed networks such as the defense research and engineering network (DREN). For this research, a model for simulating potential operational network configurations and collaboration scenarios was developed and implemented using OPNET. The results of the simulations were analyzed using statistical methods to determine the impact on performance …


Selecting A Software Engineering Methodology Using Multiobjective Decision Analysis, Scott A. O'Malley Mar 2001

Selecting A Software Engineering Methodology Using Multiobjective Decision Analysis, Scott A. O'Malley

Theses and Dissertations

With the emergence of agent-oriented software engineering methodologies, software developers have a new set of tools to solve complex software requirements. One problem software developers face is to determine which methodology is the best approach to take to developing a solution. A number of factors go into the decision process. This thesis defines a decision making process that can be used by a software engineer to determine whether or not a software engineering approach is an appropriate system development strategy. This decision analysis process allows the software engineer to classify and evaluate a set of methodologies while specifically considering the …


Using A Distributed Object-Oriented Database Management System In Support Of A High-Speed Network Intrusion Detection System Data Repository, Phillip W. Polk Mar 2001

Using A Distributed Object-Oriented Database Management System In Support Of A High-Speed Network Intrusion Detection System Data Repository, Phillip W. Polk

Theses and Dissertations

The Air Force has multiple initiatives to develop data repositories for high-speed network intrusion detection systems (IDS). All of the developed systems utilize a relational database management system (RDBMS) as the primary data storage mechanism. The purpose of this thesis is to replace the RDBMS in one such system developed by AFRL, the Automated Intrusion Detection Environment (AIDE), with a distributed object-oriented database management system (DOODBMS) and observe a number of areas: its performance against the RDBMS in terms of IDS event insertion and retrieval, the distributed aspects of the new system, and the resulting object-oriented architecture. The resulting system, …


Transforming Analysis Models Into Design Models For The Multiagent Engineering Systems (Mase) Methodology, Clint H. Sparkman Mar 2001

Transforming Analysis Models Into Design Models For The Multiagent Engineering Systems (Mase) Methodology, Clint H. Sparkman

Theses and Dissertations

Agent technology has received much attention in the last few years because of the advantages that multiagent systems have in complex, distributed environments. For multiagent systems are to be effective, they must be reliable, robust, and secure. AFIT's Agent Research Group has developed a complete lifecycle methodology, called Multiagent Systems Engineering (MaSE), for analyzing, designing, and developing heterogeneous multiagent systems. However, developing multiagent systems is a complicated process, and there is no guarantee that the resulting system meets the initial requirements and will operate reliably with the desired behavior. The purpose of this research was to develop a semi-automated formal …


The Effects Of Budgetary Constraints, Multiple Strategy Selection, And Rationality On Equilibrium Attainment In An Information Warfare Simulation, Steven W. Tait Mar 2001

The Effects Of Budgetary Constraints, Multiple Strategy Selection, And Rationality On Equilibrium Attainment In An Information Warfare Simulation, Steven W. Tait

Theses and Dissertations

Information warfare (IW) has developed into a significant threat to the national security of the United States. Our critical infrastructures, linked together by information systems, are increasingly vulnerable to information attack. This study seeks to understand some of those factors which affect the ability of an individual to make accurate decisions in an IW environment. The study used game theory to analyze the behavior of decision-makers within an IW simulation. The IW game model is based on a set of games known as infinitely repeated games of incomplete information. It uses the Bayesian Nash equilibrium concept to determine the strategy …


Multicast Algorithms For Mobile Satellite Communication Networks, Ryan W. Thomas Mar 2001

Multicast Algorithms For Mobile Satellite Communication Networks, Ryan W. Thomas

Theses and Dissertations

With the rise of mobile computing and an increasing need for ubiquitous high speed data connections, Internet-in-the-sky solutions are becoming increasingly viable. To reduce the network overhead of one-to-many transmissions, the multicast protocol has been devised. The implementation of multicast in these Low Earth Orbit (LEO) constellations is a critical component to achieving an omnipresent network environment. This research examines the system performance associated with two terrestrial-based multicast mobility solutions, Distance Vector Multicast Routing Protocol (DVMRP) with mobile IP and On Demand Multicast Routing Protocol (ODMRP). These protocols are implemented and simulated in a six plane, 66 satellite LEO constellation. …


Gss Technology As A Moderator Of Influence And Perceived Expertise, Kevin V. Thompson Mar 2001

Gss Technology As A Moderator Of Influence And Perceived Expertise, Kevin V. Thompson

Theses and Dissertations

Group Support System (355) research has found this content and process anonymity influence problem solving groups. However, previous studies report mixed results on how OSS technology changes social influence processes and recognition of expertise which affect group performance. This thesis explored content and process anonymity's affect on influence and perceived expertise using three treatments to derive possible explanations for the mixed results found in previous GSS research. The study developed a theoretical model of influence, perceived expertise, and performance. Using structural equation modeling the study tested the relationships between expertise and participation rates, and overall group performance. An experiment was …


An Objective Evaluation Of Four Sar Image Segmentation Algorithms, Jason B. Gregga Mar 2001

An Objective Evaluation Of Four Sar Image Segmentation Algorithms, Jason B. Gregga

Theses and Dissertations

Because of the large number of SAR images the Air Force generates and the dwindling number of available human analysts, automated methods must be developed. A key step towards automated SAR image analysis is image segmentation. There are many segmentation algorithms, but they have not been tested on a common set of images, and there are no standard test methods. This thesis evaluates four SAR image segmentation algorithms by running them on a common set of data and objectively comparing them to each other and to human segmentors. This objective comparison uses a multi-metric a approach with a set of …


Solving The Protein Structure Prediction Problem With Fast Messy Genetic Algorithms (Scaling The Fast Messy Genetic Algorithm To Medium-Sized Peptides By Detecting Secondary Structures), Steven R. Michaud Mar 2001

Solving The Protein Structure Prediction Problem With Fast Messy Genetic Algorithms (Scaling The Fast Messy Genetic Algorithm To Medium-Sized Peptides By Detecting Secondary Structures), Steven R. Michaud

Theses and Dissertations

The ability to accurately predict a polypeptide's molecular structure given its amino acid sequence is important to numerous scientific, medical, and engineering applications. Studies have been conducted in the application of Genetic Algorithms (GAs) to this problem with promising initial results. In this thesis report, we use the fast messy Genetic Algorithm (fmGA) to attempt to find the minimization of an empirical CHARMM energy model and generation of the associated conformation. Previous work has shown that the fmGA provided favorable results, at least when applied to the pentapeptide Met-Enkephalin. We extend these results to a larger Polyalinine peptide by utilizing …


Software Domain Model Integration Methodology For Formal Specifications, Joel C. Nonnweiler Mar 2001

Software Domain Model Integration Methodology For Formal Specifications, Joel C. Nonnweiler

Theses and Dissertations

Using formal methods to create automatic code generation systems is one of the goals of Knowledge Based Software Engineering (KBSE) groups. The research of the Air Force Institute of Technology KBSE group has focused on the utilization of formal languages to represent domain model knowledge within this process. The code generation process centers around correctness preserving transformations that convert domain models from their analysis representations through design to the resulting implementation code. The diversity of the software systems that can be developed in this manner is limited only by the availability of suitable domain models. Therefore it should be possible …


Influence Of Anonymity In A Group Problem-Solving Environment, Robert A. Sylvester Mar 2001

Influence Of Anonymity In A Group Problem-Solving Environment, Robert A. Sylvester

Theses and Dissertations

A group support system (GSS) uses a combination of networked personal computers, software that collects, manipulates, and aggregates member's individual input, and human facilitation to improve the group decision-making process. Prior GSS research has found that content and process anonymity influence problem solving groups. However, previous studies report mixed results on which levels of anonymity positively influence group performance. This thesis looked at content and process anonymity using four treatments to explore possible explanations for the mixed results found in previous GSS research. The study examined numerous theories including anonymity, identification, social loafing, and social comparison. An experiment was developed …


Modeling Information Assurance, Joseph E. Beauregard Mar 2001

Modeling Information Assurance, Joseph E. Beauregard

Theses and Dissertations

The ever-increasing speed of information systems allows decision-makers around the world to gather, process, and disseminate information almost instantaneously. However, with this benefit there comes a price. Information is valuable and therefore a target to those who do not have it or wish to destroy it. The Internet has allowed information to flow freely, but it has also made information vulnerable to many forms of corruption. The U. S. military controls much of the world's most sensitive information, and since it cannot sacrifice losing the speed at which this information is currently processed and disseminated, it must find a way …


A Flexible Framework For Collaborative Visualization Applications Using Java Spaces, Sean C. Butler Mar 2001

A Flexible Framework For Collaborative Visualization Applications Using Java Spaces, Sean C. Butler

Theses and Dissertations

The complexity of modern tasks is rising along with the level of technology. Two techniques commonly used to deal with complexity are collaboration and information visualization. Recently, computer networks have arisen as a powerful means of collaboration, and many new technologies are being developed to better utilize them. Among the newer, more promising of these technologies is Sun Microsystems' JavaSpaces ™, a high-level network programming API. This thesis describes a tool for developing collaborative visualization software using JavaSpaces-an application framework and accompanying toolkit. In addition to a detailed description of the framework, the thesis also describes an application implemented using …


Traveling Salesman Problem For Surveillance Mission Using Particle Swarm Optimization, Barry R. Secrest Mar 2001

Traveling Salesman Problem For Surveillance Mission Using Particle Swarm Optimization, Barry R. Secrest

Theses and Dissertations

The surveillance mission requires aircraft to fly from a starting point through defended terrain to targets and return to a safe destination (usually the starting point). The process of selecting such a flight path is known as the Mission Route Planning (MRP) Problem and is a three-dimensional, multi-criteria (fuel expenditure, time required, risk taken, priority targeting, goals met, etc.) path search. Planning aircraft routes involves an elaborate search through numerous possibilities, which can severely task the resources of the system being used to compute the routes. Operational systems can take up to a day to arrive at a solution due …