Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 52801 - 52830 of 58244

Full-Text Articles in Physical Sciences and Mathematics

Surface Reconstruction Based On Lower Dimensional Localized Delaunay Triangulation, Gopi Meenakshisundaram Jan 2000

Surface Reconstruction Based On Lower Dimensional Localized Delaunay Triangulation, Gopi Meenakshisundaram

Link Foundation Modeling, Simulation and Training Fellowship Reports

We present a fast, memory efficient algorithm that generates a manifold triangular mesh S passing through a set of unorganized points Pc R3. Nothing is assumed about the geometry, topology or presence of boundaries in the data set except that P is sampled from a real manifold surface. The speed of our algorithm is derived from a projection-based approach we use to determine the incident faces on a point. We define our sampling criteria to sample the surface and guarantee a topologically correct mesh after surface reconstruction for such a sampled surface. We also present a new algorithm to find …


Year 2000 And The Banking Industry*, Jill Rainey Jan 2000

Year 2000 And The Banking Industry*, Jill Rainey

The Corinthian

The Federal Financial Institutions Examination Council (FFIEC) first brought the attention of the banking industry to the Year 2000 problem in 1996 (Year 2000 Project 1), but the Year 2000 problem originated many years ago. As a result of limited space, programmers in the 1960s and 1970s began using abbrevia· tions and codes to represent longer words, phrases, and numbers (FDIC Consumer News-Fall 1998 2). This shorthand method of indicating dates continued into the computer era and has worked fine until now. On January 1, 2000, things will not be so simple. If the date is recorded in a computer …


A Pairwise Key Pre-Distribution Scheme For Wireless Sensor Networks, Wenliang Kevin Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney Jan 2000

A Pairwise Key Pre-Distribution Scheme For Wireless Sensor Networks, Wenliang Kevin Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney

Electrical Engineering and Computer Science - All Scholarship

This paper, we provide a framework in which to study the security of key pre-distribution schemes, propose a new key pre-distribution scheme which substantially improves the resilience of the network compared to previous schemes, and give an in-depth analysis of our scheme in terms of network resilience and associated overhead. Our scheme exhibits a nice threshold property: when the number of compromised nodes is less than the threshold, the probability that communications between any additional nodes are compromised is close to zero. This desirable property lowers the initial payoff of smaller-scale network breaches to an adversary, and makes it necessary …


Multi-Phase Discrete Particle Swarm Optimization, Buthainah Sabeeh No'man Al-Kazemi, Chilukuri K. Mohan Jan 2000

Multi-Phase Discrete Particle Swarm Optimization, Buthainah Sabeeh No'man Al-Kazemi, Chilukuri K. Mohan

Electrical Engineering and Computer Science - All Scholarship

This paper describes a successful adaptation of the Particle Swarm Optimization algorithm to discrete optimization problems. In the proposed algorithm, particles cycle through multiple phases with differing goals. We also exploit hill climbing. On benchmark problems, this algorithm outperforms a genetic algorithm and a previous discrete PSO formulation.


On Preconditioning Schur Complement And Schur Complement Preconditioning, Jun Zhang Jan 2000

On Preconditioning Schur Complement And Schur Complement Preconditioning, Jun Zhang

Computer Science Faculty Publications

We study two implementation strategies to utilize Schur complement technique in multilevel recursive incomplete LU preconditioning techniques (RILUM) for solving general sparse matrices. The first strategy constructs a RILUM to precondition the original matrix. The second strategy solves the first Schur complement matrix using the lower level parts of the RILUM as the preconditioner. We discuss computational and memory costs of both strategies and the potential effect on grid independent convergence rate of RILUM with different implementation strategies.


An Inquiry Into The Development Of Expert Systems In Legal Reasoning, Trevor K. Sheeley Jan 2000

An Inquiry Into The Development Of Expert Systems In Legal Reasoning, Trevor K. Sheeley

Presidential Scholars Theses (1990 – 2006)

The first goal of this paper is to review some of the steps necessary in developing a system that reasons effectively in some domain of law. The paper will begin by addressing the issues of domain selection, domain analysis and knowledge acquisition, knowledge representation, and selection of an inference method. After presenting a brief argument against using rule-based reasoning as the primary mode of inference, the paper will go on to expound the virtues of Kevin Ashley's HYPO, a software model of case based legal argument. It will conclude with a short description of my experience implementing part of a …


Der Kontraktionssatz Auf Metrischen Raumen Und Verallgemeinerungen, Pascal Hitzler Jan 2000

Der Kontraktionssatz Auf Metrischen Raumen Und Verallgemeinerungen, Pascal Hitzler

Computer Science and Engineering Faculty Publications

No abstract provided.


Implementing A Virtual Reality Paradigm In Human Anatomy/Physiology College Curricula, Helen St. Aubin Jan 2000

Implementing A Virtual Reality Paradigm In Human Anatomy/Physiology College Curricula, Helen St. Aubin

CCE Theses and Dissertations

Modes of instruction in the college course called Human Anatomy/Physiology are changing. Due to ethical concerns and the ever-increasing source of new physiological data, there is a need for enhancements to assist the instructor and student. The computer science of virtual reality (VR) provides a method to electronically educate, train, prototype, and test and evaluate new enhancements to the college curricula. This study detailed the modeling and simulation of a skeletal human hand with degrees of freedom of movement, which provided the students with a physiological representation of some of the movements of the hand. The primary objectives of the …


The Incident Dispatching And Tracking System, Thomas J. Braden Jan 2000

The Incident Dispatching And Tracking System, Thomas J. Braden

UNF Graduate Theses and Dissertations

The Incident Dispatching and Tracking System (IDTS) was developed to facilitate the technical support of an organization. IDTS provides a means by which a user may submit their issue/problem to the system and receive a unique trouble ticket number. This number can then be used to view the status of that record, minimizing the need for inquiries to the technical support team. IDTS also provides a dispatching function that assigns each trouble ticket to a technician that specializes in that type of issue. Finally, there is a reporting function that allows the technical support team to view the current technical …


Vhdl Design And Simulation For Embedded Zerotree Wavelet Quantisation, Hung Huynh Jan 2000

Vhdl Design And Simulation For Embedded Zerotree Wavelet Quantisation, Hung Huynh

Theses : Honours

This thesis discusses a highly effective still image compression algorithm – The Embedded Zerotree Wavelets coding technique, as it is called. This technique is simple but achieves a remarkable result. The image is wavelet-transformed, symbolically coded and successive quantised, therefore the compression and transmission/storage saving can be achieved by utilising the structure of zerotree. The algorithm was first proposed by Jerome M. Shapiro in 1993, however to minimise the memory usage and speeding up the EZW processor, a Depth First Search method is used to transverse across the image rather than Breadth First Search method as initially discussed in Shapiro's …


[Introduction To] Schaum's Outline Programming With C++, John R. Hubbard Jan 2000

[Introduction To] Schaum's Outline Programming With C++, John R. Hubbard

Bookshelf

Tough Test Questions? Missed Lectures? Not Enough Time?

Fortunately for you, there's Schaum's Outlines. More than 40 million students have trusted Schaum's to help them succeed in the classroom and on exams. Schaum's is the key to faster learning and higher grades in every subject. Each Outline presents all the essential course information in an easy-to-follow, topic-by-topic format. You also get hundreds of examples, solved problems, and practice exercises to test your skills.

This Schaum's Outline gives you

  • Practice problems with full explanations that reinforce knowledge
  • Coverage of the most up-to-date developments in your course field
  • In-depth review of practices …


Analysis Of Intangible Factors In Waste Minimization Projects, Halvard E. Nystrom, William Ralph Kehr Jan 2000

Analysis Of Intangible Factors In Waste Minimization Projects, Halvard E. Nystrom, William Ralph Kehr

Engineering Management and Systems Engineering Faculty Research & Creative Works

Continual population growth and rising standards of living that accelerate the consumption of limited resources, are forcing society to encourage conservation of these resources. These resources not only include raw material, but also the areas to dispose of the wastes. As a result, communities are driving industries towards waste minimization by limiting waste generation and landfill availability. Firms'' environmentally friendly strategies can gain competitive advantage by leading in environmental practices. This advantage emanates from the reduction of risk of environmental regulatory overreaction, as well as improved asset utilization and landfill utilization. However, these intangible benefits are difficult to identify and …


Search For R-Parity Violating Decays Of Supersymmetric Particles In E+E- Collisions At Centre-Of-Mass Energies Near 183 Gev, R. Barate, M. Thulasidas Jan 2000

Search For R-Parity Violating Decays Of Supersymmetric Particles In E+E- Collisions At Centre-Of-Mass Energies Near 183 Gev, R. Barate, M. Thulasidas

Research Collection School Of Computing and Information Systems

Searches for pair-production of supersymmetric particles under the assumption that R-parity is violated via a single dominant LLE¯LLE¯, LQD¯LQD¯ or U¯D¯D¯U¯D¯D¯ coupling are performed using the data collected by the ALEPH collaboration at centre-of-mass energies of 181–184 GeV. The observed candidate events in the data are in agreement with the Standard Model expectations. Upper limits on the production cross-sections and lower limits on the masses of charginos, sleptons, squarks and sneutrinos are derived.


Derivation Of Secure Parallel Applications By Means Of Module Embedding, Atanas Radenski Jan 2000

Derivation Of Secure Parallel Applications By Means Of Module Embedding, Atanas Radenski

Mathematics, Physics, and Computer Science Faculty Books and Book Chapters

An enhancement to modular languages called module embedding facilitates the development and utilization of secure generic parallel algorithms.


Efficient Multicast In Heterogeneous Networks Of Workstations, Ran Libeskind-Hadas, Jeff R.K. Hartline '01 Jan 2000

Efficient Multicast In Heterogeneous Networks Of Workstations, Ran Libeskind-Hadas, Jeff R.K. Hartline '01

All HMC Faculty Publications and Research

This paper studies the problem of efficient multicast in heterogeneous networks of workstations (HNOWs) using a parameterized communication model [3]. This model associates a sending overhead and a receiving overhead with each node as well as a network latency parameter. The problem of finding optimal multicasts in this model is known to be NP-complete in the strong sense. Nevertheless, we show that for two different properties that arise in typical HNOWs, provably near-optimal and optimal solutions, respectively, can be found in polynomial time. Specifically, we show the following two results: When the ratios of receiving overhead to sending overhead among …


Personalizing The Gams Cross-Index, Saverio Perugini, Priya Lakshminarayanan, Naren Ramakrishnan Jan 2000

Personalizing The Gams Cross-Index, Saverio Perugini, Priya Lakshminarayanan, Naren Ramakrishnan

Computer Science Faculty Publications

The NIST Guide to Available Mathematical Software (GAMS) system at http://gams.nist .gov serves as the gateway to thousands of scientific codes and modules for numerical computation. We describe the PIPE personalization facility for GAMS, whereby content from the cross-index is specialized for a user desiring software recommendations for a specific problem instance. The key idea is to (i) mine structure, and (ii) exploit it in a programmatic manner to generate personalized web pages. Our approach supports both content-based and collaborative personalization and enables information integration from multiple (and complementary) web resources. We present case studies for the domain of linear, …


An Hpspmd Programming Model, Bryan Carpenter, Geoffrey C. Fox, Guansong Zhang Jan 2000

An Hpspmd Programming Model, Bryan Carpenter, Geoffrey C. Fox, Guansong Zhang

Northeast Parallel Architecture Center

Building on research carried out in the Parallel Compiler Runtime Consortium (PCRC) project, this article discusses a language model that combines characteristic data-parallel features from the HPF standard with an explicitly SPMD programming style. This model, which we call the HPspmd model, is designed to facilitate direct calls to established libraries for parallel programming with distributed data. We describe a Java-based HPspmd language called HPJava.


Mis Legitimacy And The Proposition Of A New Multi-Dimensional Model Of Mis, Gondy Leroy, Paul Benjamin Lowry, H. Wayne Anderson, Dennis C. Wilson, Lin Lin Jan 2000

Mis Legitimacy And The Proposition Of A New Multi-Dimensional Model Of Mis, Gondy Leroy, Paul Benjamin Lowry, H. Wayne Anderson, Dennis C. Wilson, Lin Lin

CGU Faculty Publications and Research

This paper addresses the definition of MIS and the legitimacy of MIS as an academic discipline. Both sides of the MIS legitimacy debate are presented, with the authors embracing the diversity of MIS as a strength that enhances the legitimacy of the MIS discipline. Based on the diversity theory of MIS, the authors propose a new-multidimensional model of MIS that presents a new way of looking at the discipline and the researchers who work in it.


Adap: A Component-Based Model Using Design Patterns With Applications In E-Commerce, Katrina Yun Ji Jan 2000

Adap: A Component-Based Model Using Design Patterns With Applications In E-Commerce, Katrina Yun Ji

Theses Digitization Project

No abstract provided.


Remote View Manager For Visual Foxpro Application, Sustanie Harding Jan 2000

Remote View Manager For Visual Foxpro Application, Sustanie Harding

Theses Digitization Project

In this project, the Remote View Mapping (RVM) tool has been developed to assist programmers in the maintenance of the Database Container (DBC). The purpose of the RVM is to establish a relationship between open applications and the DBC.


Optimization Techniques For Data Intensive Decision Flows, Richard Hull, Francois Llirbat, Bharat Kumar, Gang Zhou, Guozhu Dong, Jianwen Su Jan 2000

Optimization Techniques For Data Intensive Decision Flows, Richard Hull, Francois Llirbat, Bharat Kumar, Gang Zhou, Guozhu Dong, Jianwen Su

Kno.e.sis Publications

For an enterprise to take advantage of the opportunities afforded by electronic commerce it must be able to make decisions about business transactions in near-real-time. In the coming era of segment-of-one marketing, these decisions will be quite intricate, so that customer treatments can be highly personalized, reflecting customer preferences, the customer's history with the enterprise, and targeted business objectives. This paper describes a paradigm called “decision flows” for specifying a form of incremental decision-making that can combine diverse business factors in near-real-time.

This paper introduces and empirically analyzes a variety of optimization strategies for decision flows that are “data-intensive”, i.e. …


Separating Auxiliary Arity Hierarchy Of First-Order Incremental Evaluation Using (3+1)-Ary Input Relations, Guozhu Dong, Louxin Zhang Jan 2000

Separating Auxiliary Arity Hierarchy Of First-Order Incremental Evaluation Using (3+1)-Ary Input Relations, Guozhu Dong, Louxin Zhang

Kno.e.sis Publications

Presents a first-order incremental evaluation system that uses first-order queries to maintain a database view defined by a non-first-order query. Reduction of the arity of queries to understand the power of foies; Use of a key lemma for proving a query which encodes the multiple parity problem.


Anomalous Moisture Diffusion In Viscoelastic Polymers: Modeling And Testing, S. Roy, W. X. Xu, Seung Jong Park, K. M. Liechti Jan 2000

Anomalous Moisture Diffusion In Viscoelastic Polymers: Modeling And Testing, S. Roy, W. X. Xu, Seung Jong Park, K. M. Liechti

Computer Science Faculty Research & Creative Works

It is now well known that Fick's Law is frequently inadequate for describing moisture diffusion in polymers or polymer composites. Non-Fickian or anomalous diffusion typically occurs when the rates of diffusion and viscoelastic relaxation in a polymer are comparable, and the ambient temperature is below the glass transition temperature (Tg) of the polymer. As a result, it is necessary to take into account the time-dependent response of a polymer, analogous to viscoelastic relaxation of mechanical properties, in constructing such a model. In this paper, a simple yet robust methodology is proposed that would allow characterization of non-Fickian diffusion coefficients from …


Detecting And Representing Relevant Web Deltas Using Web Join, Sanjay Kumar Madria, Wee Keong, Ee-Peng Lim, Sourav S. Bhowmick Jan 2000

Detecting And Representing Relevant Web Deltas Using Web Join, Sanjay Kumar Madria, Wee Keong, Ee-Peng Lim, Sourav S. Bhowmick

Computer Science Faculty Research & Creative Works

We show how to detect and represent Web deltas, i.e., changes in Web information, that are relevant to a user's query in the context of our Web warehousing system called WHOWEDA (Warehouse of Web Data). In WHOWEDA, Web information are materialized views stored in Web tables and can be manipulated and analyzed using a set of Web algebraic operators. We present a mechanism to detect relevant Web deltas using Web join and outer Web join. We show how to represent these changes using delta Web tables.


Reducing Cognitive Overheads In A Web Warehouse Using Reverse-Osmosis, Sanjay Kumar Madria, Wee Keong Ng, Ee-Peng Lim, Sourav S. Bhowmick Jan 2000

Reducing Cognitive Overheads In A Web Warehouse Using Reverse-Osmosis, Sanjay Kumar Madria, Wee Keong Ng, Ee-Peng Lim, Sourav S. Bhowmick

Computer Science Faculty Research & Creative Works

This paper provides a quantitative analysis of reducing cognitive overheads in a Web warehouse using an important class of operation called reverse osmosis. The analysis is used to examine two different cognitive overheads of locating relevant nodes or information and display time of a Web table. A reverse-osmosis operation enables us to eliminate in relevant information from a collection of Web documents stored in the form of a Web table. We call such an operation reverse-osmosis because it is analogous to the reverse osmosis process in the field of water purification. We discuss a formal algorithm of the reverse-osmosis operation


Strategy Planning For Technological Discontinuities In A Changing Regulatory Environment, William Ralph Kehr, Halvard E. Nystrom Jan 2000

Strategy Planning For Technological Discontinuities In A Changing Regulatory Environment, William Ralph Kehr, Halvard E. Nystrom

Engineering Management and Systems Engineering Faculty Research & Creative Works

This paper describes an approach to the analysis of publicly available financial data for individual industries. These methods enable the analyst to assess past practices and the historical rate of technological diffusion during the transition period of discontinuous technological change. This assessment can provide a basis of comparison for current changes in their industry. These methods are applied to small rural telephone companies during the period of 1960 to 1996. Annual data is presented detailing the change from aerial distribution cable to buried cable by the roughly 600 rural telephone companies financed through loans from the Rural Utilities Services, a …


Notes On Coalgebras, Cofibrations And Concurrency, Alexander Kurz, Dirk Pattinson Jan 2000

Notes On Coalgebras, Cofibrations And Concurrency, Alexander Kurz, Dirk Pattinson

Engineering Faculty Articles and Research

We consider categories of coalgebras as (co)-fibred over a base category of parameters and analyse categorical constructions in the total category of deterministic and non-deterministic coalgebras.


An Integrated Data Mining System To Automate Discovery, Cecil Chua, Roger Hsiang-Li Chiang, Ee Peng Lim Jan 2000

An Integrated Data Mining System To Automate Discovery, Cecil Chua, Roger Hsiang-Li Chiang, Ee Peng Lim

Research Collection School Of Computing and Information Systems

Many data analysts require tools which can integrate their database management packages (e.g. Microsoft Access) with their data analysis ones (e.g. SAS, SPSS), and provide guidance for the selection of appropriate mining algorithms. In addition, the analysts need to extract and validate statistical results to facilitate data mining. In this paper, we describe an integrated data mining system called the Linear Correlation Discovery System (LCDS) that meets the above requirement. LCDS consists of four major sub-components, two of which, the selection assistant and the statistics coupler, are discussed in this paper. The former examines the schema and instances to determine …


Some Remarks On Fair Exchange Protocol, Jianying Zhou, Robert H. Deng, Feng Bao Jan 2000

Some Remarks On Fair Exchange Protocol, Jianying Zhou, Robert H. Deng, Feng Bao

Research Collection School Of Computing and Information Systems

Fair exchange turns out to be an increasingly important topic due to the rapid growth of electronic commerce. An exchange is deemed to be fair if at the end of exchange, either each party receives the expected item or neither party receives any useful information about the other’s item. Several protocols for fair exchange have been proposed in recent years. In this paper, we first examine a newly published fair exchange protocol and point out its flaws and weaknesses. We then put forward a more efficient and secure protocol and give an informal analysis.


Measurement Of The Z Resonance Parameters At Lep, R. Barate, M. Thulasidas Jan 2000

Measurement Of The Z Resonance Parameters At Lep, R. Barate, M. Thulasidas

Research Collection School Of Computing and Information Systems

The properties of the Z resonance are measured from the analysis of 4.5 million Z decays into fermion pairs collected with the ALEPH detector at LEP. The data are consistent with lepton universality. The resonance parameters are measured to be MZ=(91.1885±0.0031)GeV/c2MZ=(91.1885±0.0031)GeV/c2, ΓZ=(2.4951±0.0043)ΓZ=(2.4951±0.0043) GeV, σ0had=(41.559±0.058)σhad0=(41.559±0.058) nb and, combining the three lepton flavours, Rℓ=20.725±0.039Rℓ=20.725±0.039. The corresponding number of light neutrino species is Nν=2.983±0.013Nν=2.983±0.013 and the strong coupling constant is αs(MZ)=0.114±0.004±0.002QCD+0.005log10[MH150GeV/c2]αs(MZ)=0.114±0.004±0.002QCD+0.005log10⁡[MH150GeV/c2]. The lepton pair forward-backward asymmetry is measured to be A0,ℓFB=0.0173±0.0016AFB0,ℓ=0.0173±0.0016 from which the effective weak mixing angle is derived: sin2θlepteff=0.23089±0.00089sin2⁡θefflept=0.23089±0.00089. The measurement of the leptonic width Γℓℓ=84.02±0.15Γℓℓ=84.02±0.15 MeV leads to a determination …