Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (7312)
- China Simulation Federation (3382)
- TÜBİTAK (3020)
- Selected Works (2644)
- Wright State University (2602)
-
- Purdue University (2057)
- Old Dominion University (1458)
- Missouri University of Science and Technology (1371)
- Edith Cowan University (1173)
- Air Force Institute of Technology (1108)
- University of Texas at El Paso (1105)
- University of Nebraska - Lincoln (1073)
- Dartmouth College (1022)
- San Jose State University (995)
- Embry-Riddle Aeronautical University (853)
- City University of New York (CUNY) (819)
- Brigham Young University (812)
- Technological University Dublin (791)
- Washington University in St. Louis (785)
- California Polytechnic State University, San Luis Obispo (733)
- Kennesaw State University (714)
- University for Business and Technology in Kosovo (626)
- University of Texas at Arlington (614)
- Nova Southeastern University (535)
- Portland State University (531)
- SelectedWorks (527)
- Western University (525)
- New Jersey Institute of Technology (516)
- Syracuse University (501)
- University of Nebraska at Omaha (485)
- Keyword
-
- Machine learning (1342)
- Deep learning (801)
- Artificial intelligence (663)
- Machine Learning (652)
- Computer Science (637)
-
- Security (619)
- Computer science (434)
- Privacy (409)
- Cybersecurity (407)
- Simulation (379)
- Classification (369)
- Technical Reports (369)
- UTEP Computer Science Department (367)
- Data mining (351)
- Deep Learning (350)
- Algorithms (338)
- Optimization (337)
- Neural networks (308)
- Artificial Intelligence (299)
- Computer vision (290)
- Education (254)
- Software engineering (254)
- College for Professional Studies (253)
- Clustering (251)
- Cloud computing (244)
- Department of Computer Science and Engineering (243)
- Applied sciences (237)
- School of Computer & Information Science (236)
- Visualization (236)
- Natural language processing (233)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (6960)
- Journal of System Simulation (3382)
- Turkish Journal of Electrical Engineering and Computer Sciences (3020)
- Theses and Dissertations (2511)
- Department of Computer Science Technical Reports (1721)
-
- Computer Science & Engineering Syllabi (1312)
- Departmental Technical Reports (CS) (892)
- Master's Projects (845)
- Electronic Theses and Dissertations (738)
- Computer Science Faculty Publications (725)
- All Computer Science and Engineering Research (683)
- Computer Science Technical Reports (673)
- Computer Science Faculty Research & Creative Works (601)
- Faculty Publications (588)
- Kno.e.sis Publications (543)
- Journal of Digital Forensics, Security and Law (536)
- Computer Science Faculty Publications and Presentations (509)
- Dissertations (505)
- CCE Theses and Dissertations (488)
- All Works (478)
- Walden Dissertations and Doctoral Studies (468)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (462)
- Masters Theses (402)
- Computer Science and Engineering Theses (356)
- Electronic Thesis and Dissertation Repository (334)
- Theses (334)
- Computer Science and Software Engineering (332)
- USF Tampa Graduate Theses and Dissertations (320)
- Computer Science: Faculty Publications (318)
- Mathematics, Statistics and Computer Science Faculty Research and Publications (315)
- Publication Type
Articles 52801 - 52830 of 58244
Full-Text Articles in Physical Sciences and Mathematics
Surface Reconstruction Based On Lower Dimensional Localized Delaunay Triangulation, Gopi Meenakshisundaram
Surface Reconstruction Based On Lower Dimensional Localized Delaunay Triangulation, Gopi Meenakshisundaram
Link Foundation Modeling, Simulation and Training Fellowship Reports
We present a fast, memory efficient algorithm that generates a manifold triangular mesh S passing through a set of unorganized points Pc R3. Nothing is assumed about the geometry, topology or presence of boundaries in the data set except that P is sampled from a real manifold surface. The speed of our algorithm is derived from a projection-based approach we use to determine the incident faces on a point. We define our sampling criteria to sample the surface and guarantee a topologically correct mesh after surface reconstruction for such a sampled surface. We also present a new algorithm to find …
Year 2000 And The Banking Industry*, Jill Rainey
Year 2000 And The Banking Industry*, Jill Rainey
The Corinthian
The Federal Financial Institutions Examination Council (FFIEC) first brought the attention of the banking industry to the Year 2000 problem in 1996 (Year 2000 Project 1), but the Year 2000 problem originated many years ago. As a result of limited space, programmers in the 1960s and 1970s began using abbrevia· tions and codes to represent longer words, phrases, and numbers (FDIC Consumer News-Fall 1998 2). This shorthand method of indicating dates continued into the computer era and has worked fine until now. On January 1, 2000, things will not be so simple. If the date is recorded in a computer …
A Pairwise Key Pre-Distribution Scheme For Wireless Sensor Networks, Wenliang Kevin Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney
A Pairwise Key Pre-Distribution Scheme For Wireless Sensor Networks, Wenliang Kevin Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney
Electrical Engineering and Computer Science - All Scholarship
This paper, we provide a framework in which to study the security of key pre-distribution schemes, propose a new key pre-distribution scheme which substantially improves the resilience of the network compared to previous schemes, and give an in-depth analysis of our scheme in terms of network resilience and associated overhead. Our scheme exhibits a nice threshold property: when the number of compromised nodes is less than the threshold, the probability that communications between any additional nodes are compromised is close to zero. This desirable property lowers the initial payoff of smaller-scale network breaches to an adversary, and makes it necessary …
Multi-Phase Discrete Particle Swarm Optimization, Buthainah Sabeeh No'man Al-Kazemi, Chilukuri K. Mohan
Multi-Phase Discrete Particle Swarm Optimization, Buthainah Sabeeh No'man Al-Kazemi, Chilukuri K. Mohan
Electrical Engineering and Computer Science - All Scholarship
This paper describes a successful adaptation of the Particle Swarm Optimization algorithm to discrete optimization problems. In the proposed algorithm, particles cycle through multiple phases with differing goals. We also exploit hill climbing. On benchmark problems, this algorithm outperforms a genetic algorithm and a previous discrete PSO formulation.
On Preconditioning Schur Complement And Schur Complement Preconditioning, Jun Zhang
On Preconditioning Schur Complement And Schur Complement Preconditioning, Jun Zhang
Computer Science Faculty Publications
We study two implementation strategies to utilize Schur complement technique in multilevel recursive incomplete LU preconditioning techniques (RILUM) for solving general sparse matrices. The first strategy constructs a RILUM to precondition the original matrix. The second strategy solves the first Schur complement matrix using the lower level parts of the RILUM as the preconditioner. We discuss computational and memory costs of both strategies and the potential effect on grid independent convergence rate of RILUM with different implementation strategies.
An Inquiry Into The Development Of Expert Systems In Legal Reasoning, Trevor K. Sheeley
An Inquiry Into The Development Of Expert Systems In Legal Reasoning, Trevor K. Sheeley
Presidential Scholars Theses (1990 – 2006)
The first goal of this paper is to review some of the steps necessary in developing a system that reasons effectively in some domain of law. The paper will begin by addressing the issues of domain selection, domain analysis and knowledge acquisition, knowledge representation, and selection of an inference method. After presenting a brief argument against using rule-based reasoning as the primary mode of inference, the paper will go on to expound the virtues of Kevin Ashley's HYPO, a software model of case based legal argument. It will conclude with a short description of my experience implementing part of a …
Der Kontraktionssatz Auf Metrischen Raumen Und Verallgemeinerungen, Pascal Hitzler
Der Kontraktionssatz Auf Metrischen Raumen Und Verallgemeinerungen, Pascal Hitzler
Computer Science and Engineering Faculty Publications
No abstract provided.
Implementing A Virtual Reality Paradigm In Human Anatomy/Physiology College Curricula, Helen St. Aubin
Implementing A Virtual Reality Paradigm In Human Anatomy/Physiology College Curricula, Helen St. Aubin
CCE Theses and Dissertations
Modes of instruction in the college course called Human Anatomy/Physiology are changing. Due to ethical concerns and the ever-increasing source of new physiological data, there is a need for enhancements to assist the instructor and student. The computer science of virtual reality (VR) provides a method to electronically educate, train, prototype, and test and evaluate new enhancements to the college curricula. This study detailed the modeling and simulation of a skeletal human hand with degrees of freedom of movement, which provided the students with a physiological representation of some of the movements of the hand. The primary objectives of the …
The Incident Dispatching And Tracking System, Thomas J. Braden
The Incident Dispatching And Tracking System, Thomas J. Braden
UNF Graduate Theses and Dissertations
The Incident Dispatching and Tracking System (IDTS) was developed to facilitate the technical support of an organization. IDTS provides a means by which a user may submit their issue/problem to the system and receive a unique trouble ticket number. This number can then be used to view the status of that record, minimizing the need for inquiries to the technical support team. IDTS also provides a dispatching function that assigns each trouble ticket to a technician that specializes in that type of issue. Finally, there is a reporting function that allows the technical support team to view the current technical …
Vhdl Design And Simulation For Embedded Zerotree Wavelet Quantisation, Hung Huynh
Vhdl Design And Simulation For Embedded Zerotree Wavelet Quantisation, Hung Huynh
Theses : Honours
This thesis discusses a highly effective still image compression algorithm – The Embedded Zerotree Wavelets coding technique, as it is called. This technique is simple but achieves a remarkable result. The image is wavelet-transformed, symbolically coded and successive quantised, therefore the compression and transmission/storage saving can be achieved by utilising the structure of zerotree. The algorithm was first proposed by Jerome M. Shapiro in 1993, however to minimise the memory usage and speeding up the EZW processor, a Depth First Search method is used to transverse across the image rather than Breadth First Search method as initially discussed in Shapiro's …
[Introduction To] Schaum's Outline Programming With C++, John R. Hubbard
[Introduction To] Schaum's Outline Programming With C++, John R. Hubbard
Bookshelf
Tough Test Questions? Missed Lectures? Not Enough Time?
Fortunately for you, there's Schaum's Outlines. More than 40 million students have trusted Schaum's to help them succeed in the classroom and on exams. Schaum's is the key to faster learning and higher grades in every subject. Each Outline presents all the essential course information in an easy-to-follow, topic-by-topic format. You also get hundreds of examples, solved problems, and practice exercises to test your skills.
This Schaum's Outline gives you
- Practice problems with full explanations that reinforce knowledge
- Coverage of the most up-to-date developments in your course field
- In-depth review of practices …
Analysis Of Intangible Factors In Waste Minimization Projects, Halvard E. Nystrom, William Ralph Kehr
Analysis Of Intangible Factors In Waste Minimization Projects, Halvard E. Nystrom, William Ralph Kehr
Engineering Management and Systems Engineering Faculty Research & Creative Works
Continual population growth and rising standards of living that accelerate the consumption of limited resources, are forcing society to encourage conservation of these resources. These resources not only include raw material, but also the areas to dispose of the wastes. As a result, communities are driving industries towards waste minimization by limiting waste generation and landfill availability. Firms'' environmentally friendly strategies can gain competitive advantage by leading in environmental practices. This advantage emanates from the reduction of risk of environmental regulatory overreaction, as well as improved asset utilization and landfill utilization. However, these intangible benefits are difficult to identify and …
Search For R-Parity Violating Decays Of Supersymmetric Particles In E+E- Collisions At Centre-Of-Mass Energies Near 183 Gev, R. Barate, M. Thulasidas
Search For R-Parity Violating Decays Of Supersymmetric Particles In E+E- Collisions At Centre-Of-Mass Energies Near 183 Gev, R. Barate, M. Thulasidas
Research Collection School Of Computing and Information Systems
Searches for pair-production of supersymmetric particles under the assumption that R-parity is violated via a single dominant LLE¯LLE¯, LQD¯LQD¯ or U¯D¯D¯U¯D¯D¯ coupling are performed using the data collected by the ALEPH collaboration at centre-of-mass energies of 181–184 GeV. The observed candidate events in the data are in agreement with the Standard Model expectations. Upper limits on the production cross-sections and lower limits on the masses of charginos, sleptons, squarks and sneutrinos are derived.
Derivation Of Secure Parallel Applications By Means Of Module Embedding, Atanas Radenski
Derivation Of Secure Parallel Applications By Means Of Module Embedding, Atanas Radenski
Mathematics, Physics, and Computer Science Faculty Books and Book Chapters
An enhancement to modular languages called module embedding facilitates the development and utilization of secure generic parallel algorithms.
Efficient Multicast In Heterogeneous Networks Of Workstations, Ran Libeskind-Hadas, Jeff R.K. Hartline '01
Efficient Multicast In Heterogeneous Networks Of Workstations, Ran Libeskind-Hadas, Jeff R.K. Hartline '01
All HMC Faculty Publications and Research
This paper studies the problem of efficient multicast in heterogeneous networks of workstations (HNOWs) using a parameterized communication model [3]. This model associates a sending overhead and a receiving overhead with each node as well as a network latency parameter. The problem of finding optimal multicasts in this model is known to be NP-complete in the strong sense. Nevertheless, we show that for two different properties that arise in typical HNOWs, provably near-optimal and optimal solutions, respectively, can be found in polynomial time. Specifically, we show the following two results: When the ratios of receiving overhead to sending overhead among …
Personalizing The Gams Cross-Index, Saverio Perugini, Priya Lakshminarayanan, Naren Ramakrishnan
Personalizing The Gams Cross-Index, Saverio Perugini, Priya Lakshminarayanan, Naren Ramakrishnan
Computer Science Faculty Publications
The NIST Guide to Available Mathematical Software (GAMS) system at http://gams.nist .gov serves as the gateway to thousands of scientific codes and modules for numerical computation. We describe the PIPE personalization facility for GAMS, whereby content from the cross-index is specialized for a user desiring software recommendations for a specific problem instance. The key idea is to (i) mine structure, and (ii) exploit it in a programmatic manner to generate personalized web pages. Our approach supports both content-based and collaborative personalization and enables information integration from multiple (and complementary) web resources. We present case studies for the domain of linear, …
An Hpspmd Programming Model, Bryan Carpenter, Geoffrey C. Fox, Guansong Zhang
An Hpspmd Programming Model, Bryan Carpenter, Geoffrey C. Fox, Guansong Zhang
Northeast Parallel Architecture Center
Building on research carried out in the Parallel Compiler Runtime Consortium (PCRC) project, this article discusses a language model that combines characteristic data-parallel features from the HPF standard with an explicitly SPMD programming style. This model, which we call the HPspmd model, is designed to facilitate direct calls to established libraries for parallel programming with distributed data. We describe a Java-based HPspmd language called HPJava.
Mis Legitimacy And The Proposition Of A New Multi-Dimensional Model Of Mis, Gondy Leroy, Paul Benjamin Lowry, H. Wayne Anderson, Dennis C. Wilson, Lin Lin
Mis Legitimacy And The Proposition Of A New Multi-Dimensional Model Of Mis, Gondy Leroy, Paul Benjamin Lowry, H. Wayne Anderson, Dennis C. Wilson, Lin Lin
CGU Faculty Publications and Research
This paper addresses the definition of MIS and the legitimacy of MIS as an academic discipline. Both sides of the MIS legitimacy debate are presented, with the authors embracing the diversity of MIS as a strength that enhances the legitimacy of the MIS discipline. Based on the diversity theory of MIS, the authors propose a new-multidimensional model of MIS that presents a new way of looking at the discipline and the researchers who work in it.
Adap: A Component-Based Model Using Design Patterns With Applications In E-Commerce, Katrina Yun Ji
Adap: A Component-Based Model Using Design Patterns With Applications In E-Commerce, Katrina Yun Ji
Theses Digitization Project
No abstract provided.
Remote View Manager For Visual Foxpro Application, Sustanie Harding
Remote View Manager For Visual Foxpro Application, Sustanie Harding
Theses Digitization Project
In this project, the Remote View Mapping (RVM) tool has been developed to assist programmers in the maintenance of the Database Container (DBC). The purpose of the RVM is to establish a relationship between open applications and the DBC.
Optimization Techniques For Data Intensive Decision Flows, Richard Hull, Francois Llirbat, Bharat Kumar, Gang Zhou, Guozhu Dong, Jianwen Su
Optimization Techniques For Data Intensive Decision Flows, Richard Hull, Francois Llirbat, Bharat Kumar, Gang Zhou, Guozhu Dong, Jianwen Su
Kno.e.sis Publications
For an enterprise to take advantage of the opportunities afforded by electronic commerce it must be able to make decisions about business transactions in near-real-time. In the coming era of segment-of-one marketing, these decisions will be quite intricate, so that customer treatments can be highly personalized, reflecting customer preferences, the customer's history with the enterprise, and targeted business objectives. This paper describes a paradigm called “decision flows” for specifying a form of incremental decision-making that can combine diverse business factors in near-real-time.
This paper introduces and empirically analyzes a variety of optimization strategies for decision flows that are “data-intensive”, i.e. …
Separating Auxiliary Arity Hierarchy Of First-Order Incremental Evaluation Using (3+1)-Ary Input Relations, Guozhu Dong, Louxin Zhang
Separating Auxiliary Arity Hierarchy Of First-Order Incremental Evaluation Using (3+1)-Ary Input Relations, Guozhu Dong, Louxin Zhang
Kno.e.sis Publications
Presents a first-order incremental evaluation system that uses first-order queries to maintain a database view defined by a non-first-order query. Reduction of the arity of queries to understand the power of foies; Use of a key lemma for proving a query which encodes the multiple parity problem.
Anomalous Moisture Diffusion In Viscoelastic Polymers: Modeling And Testing, S. Roy, W. X. Xu, Seung Jong Park, K. M. Liechti
Anomalous Moisture Diffusion In Viscoelastic Polymers: Modeling And Testing, S. Roy, W. X. Xu, Seung Jong Park, K. M. Liechti
Computer Science Faculty Research & Creative Works
It is now well known that Fick's Law is frequently inadequate for describing moisture diffusion in polymers or polymer composites. Non-Fickian or anomalous diffusion typically occurs when the rates of diffusion and viscoelastic relaxation in a polymer are comparable, and the ambient temperature is below the glass transition temperature (Tg) of the polymer. As a result, it is necessary to take into account the time-dependent response of a polymer, analogous to viscoelastic relaxation of mechanical properties, in constructing such a model. In this paper, a simple yet robust methodology is proposed that would allow characterization of non-Fickian diffusion coefficients from …
Detecting And Representing Relevant Web Deltas Using Web Join, Sanjay Kumar Madria, Wee Keong, Ee-Peng Lim, Sourav S. Bhowmick
Detecting And Representing Relevant Web Deltas Using Web Join, Sanjay Kumar Madria, Wee Keong, Ee-Peng Lim, Sourav S. Bhowmick
Computer Science Faculty Research & Creative Works
We show how to detect and represent Web deltas, i.e., changes in Web information, that are relevant to a user's query in the context of our Web warehousing system called WHOWEDA (Warehouse of Web Data). In WHOWEDA, Web information are materialized views stored in Web tables and can be manipulated and analyzed using a set of Web algebraic operators. We present a mechanism to detect relevant Web deltas using Web join and outer Web join. We show how to represent these changes using delta Web tables.
Reducing Cognitive Overheads In A Web Warehouse Using Reverse-Osmosis, Sanjay Kumar Madria, Wee Keong Ng, Ee-Peng Lim, Sourav S. Bhowmick
Reducing Cognitive Overheads In A Web Warehouse Using Reverse-Osmosis, Sanjay Kumar Madria, Wee Keong Ng, Ee-Peng Lim, Sourav S. Bhowmick
Computer Science Faculty Research & Creative Works
This paper provides a quantitative analysis of reducing cognitive overheads in a Web warehouse using an important class of operation called reverse osmosis. The analysis is used to examine two different cognitive overheads of locating relevant nodes or information and display time of a Web table. A reverse-osmosis operation enables us to eliminate in relevant information from a collection of Web documents stored in the form of a Web table. We call such an operation reverse-osmosis because it is analogous to the reverse osmosis process in the field of water purification. We discuss a formal algorithm of the reverse-osmosis operation
Strategy Planning For Technological Discontinuities In A Changing Regulatory Environment, William Ralph Kehr, Halvard E. Nystrom
Strategy Planning For Technological Discontinuities In A Changing Regulatory Environment, William Ralph Kehr, Halvard E. Nystrom
Engineering Management and Systems Engineering Faculty Research & Creative Works
This paper describes an approach to the analysis of publicly available financial data for individual industries. These methods enable the analyst to assess past practices and the historical rate of technological diffusion during the transition period of discontinuous technological change. This assessment can provide a basis of comparison for current changes in their industry. These methods are applied to small rural telephone companies during the period of 1960 to 1996. Annual data is presented detailing the change from aerial distribution cable to buried cable by the roughly 600 rural telephone companies financed through loans from the Rural Utilities Services, a …
Notes On Coalgebras, Cofibrations And Concurrency, Alexander Kurz, Dirk Pattinson
Notes On Coalgebras, Cofibrations And Concurrency, Alexander Kurz, Dirk Pattinson
Engineering Faculty Articles and Research
We consider categories of coalgebras as (co)-fibred over a base category of parameters and analyse categorical constructions in the total category of deterministic and non-deterministic coalgebras.
An Integrated Data Mining System To Automate Discovery, Cecil Chua, Roger Hsiang-Li Chiang, Ee Peng Lim
An Integrated Data Mining System To Automate Discovery, Cecil Chua, Roger Hsiang-Li Chiang, Ee Peng Lim
Research Collection School Of Computing and Information Systems
Many data analysts require tools which can integrate their database management packages (e.g. Microsoft Access) with their data analysis ones (e.g. SAS, SPSS), and provide guidance for the selection of appropriate mining algorithms. In addition, the analysts need to extract and validate statistical results to facilitate data mining. In this paper, we describe an integrated data mining system called the Linear Correlation Discovery System (LCDS) that meets the above requirement. LCDS consists of four major sub-components, two of which, the selection assistant and the statistics coupler, are discussed in this paper. The former examines the schema and instances to determine …
Some Remarks On Fair Exchange Protocol, Jianying Zhou, Robert H. Deng, Feng Bao
Some Remarks On Fair Exchange Protocol, Jianying Zhou, Robert H. Deng, Feng Bao
Research Collection School Of Computing and Information Systems
Fair exchange turns out to be an increasingly important topic due to the rapid growth of electronic commerce. An exchange is deemed to be fair if at the end of exchange, either each party receives the expected item or neither party receives any useful information about the other’s item. Several protocols for fair exchange have been proposed in recent years. In this paper, we first examine a newly published fair exchange protocol and point out its flaws and weaknesses. We then put forward a more efficient and secure protocol and give an informal analysis.
Measurement Of The Z Resonance Parameters At Lep, R. Barate, M. Thulasidas
Measurement Of The Z Resonance Parameters At Lep, R. Barate, M. Thulasidas
Research Collection School Of Computing and Information Systems
The properties of the Z resonance are measured from the analysis of 4.5 million Z decays into fermion pairs collected with the ALEPH detector at LEP. The data are consistent with lepton universality. The resonance parameters are measured to be MZ=(91.1885±0.0031)GeV/c2MZ=(91.1885±0.0031)GeV/c2, ΓZ=(2.4951±0.0043)ΓZ=(2.4951±0.0043) GeV, σ0had=(41.559±0.058)σhad0=(41.559±0.058) nb and, combining the three lepton flavours, Rℓ=20.725±0.039Rℓ=20.725±0.039. The corresponding number of light neutrino species is Nν=2.983±0.013Nν=2.983±0.013 and the strong coupling constant is αs(MZ)=0.114±0.004±0.002QCD+0.005log10[MH150GeV/c2]αs(MZ)=0.114±0.004±0.002QCD+0.005log10[MH150GeV/c2]. The lepton pair forward-backward asymmetry is measured to be A0,ℓFB=0.0173±0.0016AFB0,ℓ=0.0173±0.0016 from which the effective weak mixing angle is derived: sin2θlepteff=0.23089±0.00089sin2θefflept=0.23089±0.00089. The measurement of the leptonic width Γℓℓ=84.02±0.15Γℓℓ=84.02±0.15 MeV leads to a determination …