Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 52951 - 52980 of 58262

Full-Text Articles in Physical Sciences and Mathematics

Logic-Based Methods For Optimization: Combining Optimization And Constraint Satisfaction, John Hooker Dec 1999

Logic-Based Methods For Optimization: Combining Optimization And Constraint Satisfaction, John Hooker

John Hooker

No abstract provided.


Collaborative Activity Between Parietal And Dorso-Lateral Prefrontal Cortex In Dynamic Spatial Working Memory Revealed By Fmri, Vaibhav A. Diwadkar, Patricia A. Carpenter, Marcel Adam Just Dec 1999

Collaborative Activity Between Parietal And Dorso-Lateral Prefrontal Cortex In Dynamic Spatial Working Memory Revealed By Fmri, Vaibhav A. Diwadkar, Patricia A. Carpenter, Marcel Adam Just

Marcel Adam Just

No abstract provided.


Automatic Segmentation And Indexing In A Database Of Bird Images, Madirakshi Das, R. Manmatha Dec 1999

Automatic Segmentation And Indexing In A Database Of Bird Images, Madirakshi Das, R. Manmatha

R. Manmatha

The aim of this work is to index images in domain specific databases using colors computed from the object of interest only, instead of the whole image. The main problem in this task is the segmentation of the region of interest from the background. Viewing segmentation as a figure/ground segregation problem leads to a new approach - eliminating the background leaves the figure or object of interest. To find possible object colors, we first find background colors and eliminate them. We then use an edge image at an appropriate scale to eliminate those parts of the image which are not …


The Neural Basis Of Strategy And Skill In Sentence-Picture Verification, Erik D. Reichle, Patricia A. A. Carpenter, Marcel Adam Just Dec 1999

The Neural Basis Of Strategy And Skill In Sentence-Picture Verification, Erik D. Reichle, Patricia A. A. Carpenter, Marcel Adam Just

Marcel Adam Just

No abstract provided.


Working Memory And Executive Function: Evidence From Neuroimaging, Patricia A. Carpenter, Marcel Adam Just, Erik D. Reichle Dec 1999

Working Memory And Executive Function: Evidence From Neuroimaging, Patricia A. Carpenter, Marcel Adam Just, Erik D. Reichle

Marcel Adam Just

No abstract provided.


Reflexive Autopoietic Systems Theory, Kent D. Palmer Dec 1999

Reflexive Autopoietic Systems Theory, Kent D. Palmer

Kent D. Palmer

Exploring the Meta-systems of Emergent Worlds


Experiments To Assess The Cost-Benefits Of Test-Suite Reduction, Gregg Rothermel, Mary Jean Harrold, Jeffery Von Ronne, Christie Hang, Jeffery Ostrin Dec 1999

Experiments To Assess The Cost-Benefits Of Test-Suite Reduction, Gregg Rothermel, Mary Jean Harrold, Jeffery Von Ronne, Christie Hang, Jeffery Ostrin

CSE Technical Reports

Test-suite reduction techniques attempt to reduce the cost of saving and reusing test cases during software maintenance by eliminating redundant test cases from test suites. A potential drawback of these techniques is that in reducing a test suite they might reduce the ability of that test suite to reveal faults in the software. Previous studies suggested that test-suite reduction techniques can reduce test suite size without significantly reducing the fault-detection capabilities of test suites. To further investigate this issue we performed experiments in which we examined the costs and benefits of reducing test suites of various sizes for several programs …


Grundlagenreflexionen Zur Thematik Anthropomorpher Schnittstellen, Rudolf Kaehr Dec 1999

Grundlagenreflexionen Zur Thematik Anthropomorpher Schnittstellen, Rudolf Kaehr

Rudolf Kaehr

Report for the EMBASSI Project


Characterizations Of Classes Of Programs By Three-Valued Operators, Anthony K. Seda, Pascal Hitzler Dec 1999

Characterizations Of Classes Of Programs By Three-Valued Operators, Anthony K. Seda, Pascal Hitzler

Computer Science and Engineering Faculty Publications

Several important classes of normal logic programs, including the classes of acyclic, acceptable, and locally hierarchical programs, have the property that every program in the class has a unique two-valued supported model. In this paper, we call such classes unique supported model classes. We analyse and characterize these classes by means of operators on three-valued logics. Our studies will motivate the definition of a larger unique supported model class which we call the class of Phi-accessible programs. Finally, we show that the class of Phi -accessible programs is computationally adequate in that every partial recursive function can be implemented by …


Towards The Evaluation Of Netcentric Scientific Applications, Shanhani Markus, Elias N. Houstis Dec 1999

Towards The Evaluation Of Netcentric Scientific Applications, Shanhani Markus, Elias N. Houstis

Department of Computer Science Technical Reports

No abstract provided.


Off-Line Compression By Greedy Textual Substitution, Alberto Apostolico, Stefano Lonardi Dec 1999

Off-Line Compression By Greedy Textual Substitution, Alberto Apostolico, Stefano Lonardi

Department of Computer Science Technical Reports

No abstract provided.


String Pattern Matching For A Deluge Survival Kit, Alberto Apostolico, Maxime Crochemore Dec 1999

String Pattern Matching For A Deluge Survival Kit, Alberto Apostolico, Maxime Crochemore

Department of Computer Science Technical Reports

No abstract provided.


Experimental Evaluation Of Design Tradeoff In Specialized Virtual Machine For Multimedia Traffic In Active Networks, Sheng-Yih Wang, Bharat Bhargava Dec 1999

Experimental Evaluation Of Design Tradeoff In Specialized Virtual Machine For Multimedia Traffic In Active Networks, Sheng-Yih Wang, Bharat Bhargava

Department of Computer Science Technical Reports

No abstract provided.


An Adaptable Network Architecture For Multimedia Traffic Management And Control, Sheng-Yih Wang, Bharat Bhargava Dec 1999

An Adaptable Network Architecture For Multimedia Traffic Management And Control, Sheng-Yih Wang, Bharat Bhargava

Department of Computer Science Technical Reports

No abstract provided.


A Model For Active Techniques For Compressed Video Transmission, Sheng-Yih Wang, Bharat Bhargava Dec 1999

A Model For Active Techniques For Compressed Video Transmission, Sheng-Yih Wang, Bharat Bhargava

Department of Computer Science Technical Reports

No abstract provided.


Disclosure Detection In Multivariate Categorical Databases: Auditing Confidentiality Protection Through Two New Matrix Operators, Sumit Dutta Chowdhury, George T. Duncan, Ramayya Krishnan, Stephen F. Roehrig, Sumitra Mukherjee Dec 1999

Disclosure Detection In Multivariate Categorical Databases: Auditing Confidentiality Protection Through Two New Matrix Operators, Sumit Dutta Chowdhury, George T. Duncan, Ramayya Krishnan, Stephen F. Roehrig, Sumitra Mukherjee

CCE Faculty Articles

As databases grow more prevalent and comprehensive, database administrators seek to limit disclosure of confidential information while still providing access to data. Practical databases accommodate users with heterogeneous needs for access. Each class of data user is accorded access to only certain views. Other views are considered confidential, and hence to be protected. Using illustrations from health care and education, this article addresses inferential disclosure of confidential views in multidimensional categorical databases. It demonstrates that any structural, so data-value-independent method for detecting disclosure can fail. Consistent with previous work for two-way tables, it presents a data-value-dependent method to obtain tight …


On-Line Bayesian Tree-Structured Transformation Of Hidden Markov Models For Speaker Adaptation, Shaojun Wang, Yunxin Zhao Dec 1999

On-Line Bayesian Tree-Structured Transformation Of Hidden Markov Models For Speaker Adaptation, Shaojun Wang, Yunxin Zhao

Kno.e.sis Publications

This paper presents a new recursive Bayesian learning approach for transformation parameter estimation in speaker adaptation. Our goal is to incrementally transform (or adapt) the entire set of HMM parameters for a new speaker or new acoustic enviroment from a small amount of adaptation data. By establishing a clustering tree of HMM Gaussian mixture components, the finest affine transformation parameters for individual HMM Gaussian mixture components can be dynamically searched. The on-line Bayesian learning technique proposed in our recent work is used for recursive maximum a posteriori estimation of affine transformation parameters. Speaker adaptation experiments using a 26-letter English alphabet …


Optimal Power Allocation In Cdma Forward Link Using Dependency Between Pilot And Traffic Channels, Seung Jong Park, Dongwoo Kim, Chang Yeon Kim Dec 1999

Optimal Power Allocation In Cdma Forward Link Using Dependency Between Pilot And Traffic Channels, Seung Jong Park, Dongwoo Kim, Chang Yeon Kim

Computer Science Faculty Research & Creative Works

This paper shows a new method for minimizing the transmit power on CDMA forward link channels. Different from previous works, the proposed method uses the dependency that exists between the respective signal qualities of the pilot channel and traffic channels. Since present CDMA forward link exploits coherent demodulation with continuously transmitting pilot signals, the stronger the pilot channel is, the less traffic power may be required while the same transmission quality is maintained. With laboratory tests, the dependency is graphed. And then an optimal pilot signal quality is found, which minimizes the total transmit power. Considering various mobile environments, -10 …


A Comparison Of Training Algorithms For Dhp Adaptive Critic Neuro-Control, George G. Lendaris, Thaddeus T. Shannon, Andres Rustan Dec 1999

A Comparison Of Training Algorithms For Dhp Adaptive Critic Neuro-Control, George G. Lendaris, Thaddeus T. Shannon, Andres Rustan

Systems Science Faculty Publications and Presentations

A variety of alternate training strategies for implementing the Dual Heuristic Programming (DHP) method of approximate dynamic programming in the neuro-control context are explored. The DHP method of controller training has been successfully demonstrated by a number of authors on a variety of control problems in recent years, but no unified view of the implementation details of the method has yet emerged. A number of options are here described for sequencing the training of the Controller and Critic networks in DHP implementations. Results are given about their relative efficiency and the quality of the resulting controllers for two benchmark control …


Computational Geometry Column 36, Joseph O'Rourke Dec 1999

Computational Geometry Column 36, Joseph O'Rourke

Computer Science: Faculty Publications

Two results in "computational origami" are illustrated.


The Window Distribution Of Multiple Tcps With Random Loss Queues, Archan Misra, Teunis Ott, John Baras Dec 1999

The Window Distribution Of Multiple Tcps With Random Loss Queues, Archan Misra, Teunis Ott, John Baras

Research Collection School Of Computing and Information Systems

Two approximate techniques for analyzing the window size distribution of TCP flows sharing a RED-like bottleneck queue are presented. Both methods presented first use a fixed point algorithm to obtain the mean window sizes of the flows, and the mean queue length in the bottleneck buffer. The simpler of the two methods then uses the ‘square root formula’ for TCP; the other method is more complicated. More often than not, the simpler method is slightly more accurate; this is probably due to the fact that window sizes of the different flows are negatively correlated.


Implementation Of Speech Recognition Software For Text Processing: An Exploratory Analysis, Sean P. Abell Dec 1999

Implementation Of Speech Recognition Software For Text Processing: An Exploratory Analysis, Sean P. Abell

Theses and Dissertations

The rationale behind implementing new information technologies is often to gain productivity improvements associated with the substitution of machinery for labor. However, the literature shows little direct evidence of a positive relationship between information technology investment and subsequent productivity benefits. This thesis reports on the examination into the productivity implications of implementing speech recognition software in a text processing environment. More specifically, research was conducted to compare text processing speeds and error rates using speech recognition software versus the keyboard and mouse. Of interest was the time required to input and proofread text processing tasks as well as the number …


Towards A Game Theory Model Of Information Warfare, David A. Burke Dec 1999

Towards A Game Theory Model Of Information Warfare, David A. Burke

Theses and Dissertations

The repeated game of incomplete information model, a subclass of game theory models, was modified to include aspects of information warfare. The repeated game of incomplete information model was first developed to analyze nuclear weapons disarmament negotiations. The central role of information in this model suggested its applicability to IW, which focuses on the defense and acquisition of information. A randomized experimental design was utilized to determine how people behave in a laboratory IW setting and to test the IW game model's basic predictions. The impact of experience and learning on IW performance was also assessed during the experiment. IW …


Mining Multiple-Level Association Rules In Large Databases, Jiawei Han, Yongjian Fu Dec 1999

Mining Multiple-Level Association Rules In Large Databases, Jiawei Han, Yongjian Fu

Computer Science Faculty Research & Creative Works

A top-down progressive deepening method is developed for efficient mining of multiple-level association rules from large transaction databases based on the Apriori principle. A group of variant algorithms is proposed based on the ways of sharing intermediate results, with the relative performance tested and analyzed. The enforcement of different interestingness measurements to find more interesting rules, and the relaxation of rule conditions for finding `level-crossing' association rules, are also investigated in the paper. Our study shows that efficient algorithms can be developed from large databases for the discovery of interesting and strong multiple-level association rules.


Information System Incidents: The Development Of A Damage Assessment Model, Mark D. Horony Dec 1999

Information System Incidents: The Development Of A Damage Assessment Model, Mark D. Horony

Theses and Dissertations

Information system (IS) incidents are on the rise. With low manning and undertrained information security specialists it is difficult for organizations to stop IS incidents from occurring. Once an incident has occurred it is the IS manager's responsibility to ensure that a full and accurate damage assessment has been accomplished. However, most IS managers lack the necessary tools to assess the damage from an incident. This exploratory thesis developed an IS incident damage assessment model (DAM) that can be part of the IS manager's tool kit. During the development of the model, it became apparent that the model was supported …


Network Security Versus Network Connectivity: A Framework For Addressing The Issues Facing The Air Force Medical Community, Franklin E. Cunningham Jr. Dec 1999

Network Security Versus Network Connectivity: A Framework For Addressing The Issues Facing The Air Force Medical Community, Franklin E. Cunningham Jr.

Theses and Dissertations

The Air Force has instituted Barrier Reef to protect its networks. The Air Force medical community operates network connections that are incompatible with Barrier Reef. To overcome this problem, OASD(HA) directed the Tri-Service Management Program Office (TIMPO) to develop an architecture that protects all military health systems and allows them to link with all three services and outside partners. This research studied the underlying networking issues and formed a framework based on data from network experts from the Air Force's medical centers and their base network organizations. The findings were compared TIMPO and a composite framework was developed that more …


Work In Progress: Automating Proportion/Period Scheduling, David Steere, Jonathan Walpole, Calton Pu Dec 1999

Work In Progress: Automating Proportion/Period Scheduling, David Steere, Jonathan Walpole, Calton Pu

Computer Science Faculty Publications and Presentations

The recent effort to define middleware capable of supporting real-time applications creates the opportunity to raise the level of abstraction presented to the programmer. We propose that proportion/period is a better abstraction for specifying resource needs and allocation than priorities. We are currently investigating techniques to address some issues that are restricting use of proportion/period scheduling to research real-time prototypes. In particular, we are investigating techniques to automate the task of selecting proportion and period, and that allow proportion/period to incorporate job importance under overload conditions.


A Simplified Model Of Wound Healing - Ii: The Critical Size Defect In Two Dimensions, J. S. Arnold, John A. Adam Dec 1999

A Simplified Model Of Wound Healing - Ii: The Critical Size Defect In Two Dimensions, J. S. Arnold, John A. Adam

Mathematics & Statistics Faculty Publications

Recently, a one-dimensional model was developed which gives a reasonable explanation for the existence of a Critical Size Defect (CSD) in certain animals [1]. In this paper, we examine the more realistic two-dimensional model of a circular wound of uniform depth to see what modifications are to be found, as compared with the one-dimensional model, in studying the CSD phenomenon. It transpires that the range of CSD sizes for a reasonable estimate of parameter values is 1 mm-1 cm. More realistic estimates await the appropriate experimental data.


Power, Performance, And Perception (P3): Integrating Usability Metrics And Technology Acceptance Determinants To Validate A New Model For Predicting System Usage, Alan P. Fiorello Dec 1999

Power, Performance, And Perception (P3): Integrating Usability Metrics And Technology Acceptance Determinants To Validate A New Model For Predicting System Usage, Alan P. Fiorello

Theses and Dissertations

Currently, there are two distinct approaches to assist information technology managers in the successful implementation of office automation software. The first approach resides within the field of usability engineering, while the second approach is derived from the discipline of management information systems (MIS). However, neither approach has successfully produced conclusive evidence that explains what characteristics facilitate system use as well as influence user acceptance of the system. This study reports on the validity of a new model, entitled the Power, Performance, Perception (P3) model, that links the constructs of usability engineering to user acceptance. Additionally, speech recognition software (SRS) was …


A Hierarchy Of Maps Between Compacta, Paul Bankston Dec 1999

A Hierarchy Of Maps Between Compacta, Paul Bankston

Mathematics, Statistics and Computer Science Faculty Research and Publications

Let CH be the class of compacta (i.e., compact Hausdorff spaces), with BS the subclass of Boolean spaces. For each ordinal α and pair $\langle K,L\rangle$ of subclasses of CH, we define Lev≥α K,L), the class of maps of level at least α from spaces in K to spaces in L, in such a way that, for finite α, Lev≥α (BS,BS) consists of the Stone duals of Boolean lattice embeddings that preserve all prenex first-order formulas of quantifier rank α. Maps of level ≥ 0 are just the continuous surjections, and the maps of level ≥ 1 are …