Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 53011 - 53040 of 58261

Full-Text Articles in Physical Sciences and Mathematics

Critical It Role In Healthcare: National Agenda, Applications, And Technologies, Jack Corley, Warren Karp, Amit P. Sheth Oct 1999

Critical It Role In Healthcare: National Agenda, Applications, And Technologies, Jack Corley, Warren Karp, Amit P. Sheth

Kno.e.sis Publications

We share a widely-held vision that tomorrow's health care will be delivered by a distributed team using a knowledge based process that is focused on prevention and wellness. Caregivers will be able to treat and monitor patients where and when needed, capturing data as a natural byproduct of care delivery. Clinical teams with a wide range of skills and expertise will deliver consistent, quality care based on timely, situation-specific knowledge and guidance derived from outcomes evidence. That same knowledge will support advances in healthcare research and education. Home care and remote medicine will increase, reducing the need for high-cost hospitalization. …


Impact Of Transmission Impairments On The Teletraffic Performance Of Wavelength-Routed Optical Networks, Byrav Ramamurthy, Debasish Datta, Helena Feng, Jonathan P. Heritage, Biswanath Mukherjee Oct 1999

Impact Of Transmission Impairments On The Teletraffic Performance Of Wavelength-Routed Optical Networks, Byrav Ramamurthy, Debasish Datta, Helena Feng, Jonathan P. Heritage, Biswanath Mukherjee

School of Computing: Faculty Publications

In a wavelength-routed optical network, a transmitted signal remains in the optical domain over the entire route (lightpath) assigned to it between its source and destination nodes. The optical signal may have to traverse a number of crossconnect switches (XCS’s), fiber segments, and optical amplifiers, e.g., erbium-doped fiber amplifiers (EDFA’s). Thus, while propagating through the network, the signal may degrade in quality as it encounters crosstalk at the XCS’s and also picks up amplified spontaneous emission (ASE) noise at the EDFA’s. Since these impairments continue to degrade the signal quality as it progresses toward its destination, the received bit error …


What Is Y2k And How Did The University Of Nevada System Solve It?, Diane R. Dietrich Oct 1999

What Is Y2k And How Did The University Of Nevada System Solve It?, Diane R. Dietrich

UNLV Theses, Dissertations, Professional Papers, and Capstones

The turn of the century change from 1999 to 2000 will create chaos for the world's computer systems. This paper will discuss the causes of the Y2K problem, the reaction to this problem by the University of Nevada System Computer Services and possible repercussions of this problem for Nevada, the United States and the world.


Three-Dimensional Reconstructions Of Tadpole Chondrocrania From Histological Sections, Gary P. Radice, Mary Kate Boggiano, Mark Desantis, Peter M. Larson, Joseph Oppong, Matthew T. Smetanick, Todd M. Stevens, James Tripp, Rebecca A. Weber, Michael Kerckhove, Rafael O. De Sá Oct 1999

Three-Dimensional Reconstructions Of Tadpole Chondrocrania From Histological Sections, Gary P. Radice, Mary Kate Boggiano, Mark Desantis, Peter M. Larson, Joseph Oppong, Matthew T. Smetanick, Todd M. Stevens, James Tripp, Rebecca A. Weber, Michael Kerckhove, Rafael O. De Sá

Biology Faculty Publications

Reconstructing three dimensional structures (3DR) from histological sections has always been difficult but is becoming more accessible with the assistance of digital imaging. We sought to assemble a low cost system using readily available hardware and software to generate 3DR for a study of tadpole chondrocrania. We found that a combination of RGB camera, stereomicroscope, and Apple Macintosh PowerPC computers running NIH Image, Object Image, Rotater. and SURFdriver software provided acceptable reconstructions. These are limited in quality primarily by the distortions arising from histological protocols rather than hardware or software.


A Game-Theoretic Formulation Of Multi-Agent Resource Allocation, Jonathan Bredin, Rajiv T. Maheswaran, Cagri Imer, Tamer Basar, David Kotz, Daniela Rus Oct 1999

A Game-Theoretic Formulation Of Multi-Agent Resource Allocation, Jonathan Bredin, Rajiv T. Maheswaran, Cagri Imer, Tamer Basar, David Kotz, Daniela Rus

Computer Science Technical Reports

This paper considers resource allocation in a network with mobile agents competing for computational priority. We formulate this problem as a multi-agent game with the players being agents purchasing service from a common server. We show that there exists a computable Nash equilibrium when agents have perfect information into the future. We simulate a network of hosts and agents using our strategy to show that our resource-allocation mechanism effectively prioritizes agents according to their endowments.


Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 15, Number 7, September 1999, College Of Engineering And Computer Science, Wright State University Sep 1999

Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 15, Number 7, September 1999, College Of Engineering And Computer Science, Wright State University

BITs and PCs Newsletter

A ten page newsletter created by the Wright State University College of Engineering and Computer Science that addresses the current affairs of the college.


Notes On Learning Probabilistic Automata, Alberto Apostolico Sep 1999

Notes On Learning Probabilistic Automata, Alberto Apostolico

Department of Computer Science Technical Reports

No abstract provided.


A Multi-Plane State Machine Agent Model, Ladislau Bölöni, Dan C. Marinescu Sep 1999

A Multi-Plane State Machine Agent Model, Ladislau Bölöni, Dan C. Marinescu

Department of Computer Science Technical Reports

No abstract provided.


An Algorithm For Parallel 3d Reconstruction Of Asymmetric Objects From Electron Micrographs, Robert E. Lynch, Hong Lin, Dan C. Marinescu Sep 1999

An Algorithm For Parallel 3d Reconstruction Of Asymmetric Objects From Electron Micrographs, Robert E. Lynch, Hong Lin, Dan C. Marinescu

Department of Computer Science Technical Reports

No abstract provided.


Aerodynamic Damping Predictions For Turbomachine Blade Rows Using A Three- Dimensional Time Marching Simulatiions, Dana A. Gottfried, Sanford Fleeter Sep 1999

Aerodynamic Damping Predictions For Turbomachine Blade Rows Using A Three- Dimensional Time Marching Simulatiions, Dana A. Gottfried, Sanford Fleeter

Department of Computer Science Technical Reports

No abstract provided.


Fatigue Life Prediction Of Turbomachine Blading, Sanford Fleeter, Chem Zhou, Elias N. Houstis, John R. Rice Sep 1999

Fatigue Life Prediction Of Turbomachine Blading, Sanford Fleeter, Chem Zhou, Elias N. Houstis, John R. Rice

Department of Computer Science Technical Reports

No abstract provided.


Wedagen: A Synthetic Web Database Generator, Pallavi Priyardarshini, Fengqiong Qin, Ee Peng Lim, Wee-Keong Ng Sep 1999

Wedagen: A Synthetic Web Database Generator, Pallavi Priyardarshini, Fengqiong Qin, Ee Peng Lim, Wee-Keong Ng

Research Collection School Of Computing and Information Systems

At the Centre for Advanced Information Systems (CAIS), a Web warehousing system is being developed to store and manipulate Web information. The system named WHOWEDA (WareHouse Of WEb DAta) stores extracted Web information as Web tables and provides several Web operators, eg. Web join, Web select, global coupling, etc., to manipulate Web tables. During the implementation of WHOWEDA, it is necessary to perform systematic testing on the system and to evaluate its system performance. While it is possible for WHOWEDA to be tested or evaluated using actual Web pages downloaded from WWW, the amount of time required for such testing …


Research Issues In Web Data Mining, Sanjay Kumar Madria, Sourav S. Bhowmick, Wee-Keong Ng, Ee Peng Lim Sep 1999

Research Issues In Web Data Mining, Sanjay Kumar Madria, Sourav S. Bhowmick, Wee-Keong Ng, Ee Peng Lim

Research Collection School Of Computing and Information Systems

In this paper, we discuss mining with respect to web data referred here as web data mining. In particular, our focus is on web data mining research in context of our web warehousing project called WHOWEDA (Warehouse of Web Data). We have categorized web data mining into threes areas; web content mining, web structure mining and web usage mining. We have highlighted and discussed various research issues involved in each of these web data mining category. We believe that web data mining will be the topic of exploratory research in near future.


Non-Repudiation In An Agent-Based E-Commerce System, Chin Chuan Liew, Wee-Keong Ng, Ee Peng Lim, Beng Suang Tan, Kok-Leong Ong Sep 1999

Non-Repudiation In An Agent-Based E-Commerce System, Chin Chuan Liew, Wee-Keong Ng, Ee Peng Lim, Beng Suang Tan, Kok-Leong Ong

Research Collection School Of Computing and Information Systems

Abecos is an agent-based e-commerce system under development at the Nanyang Technological University. A key factor in making this system usable in practice is strict security controls. One aspect of security is the provision of non-repudiation services. As protocols for non-repudiation have focused on -message non-repudiation, its adaptation to afford non-repudiation in a communication session for two agents in Abecos is inefficient. In this work, we investigate and propose a protocol for enforcing non-repudiation in a session. The protocol is believed to be applicable in any e-commerce system; agent- or not agent-based.


Design Approaches To Model-Based Simulation In Intelligent Computer Assisted Instruction, Bjoern Helfesrieder, Venky Shankararaman Sep 1999

Design Approaches To Model-Based Simulation In Intelligent Computer Assisted Instruction, Bjoern Helfesrieder, Venky Shankararaman

Research Collection School Of Computing and Information Systems

Model-based simulation systems have been created in various fields of engineering to train personnel or students in operation, maintenance and troubleshooting of complex devices and systems. A review of literature indicates a lack of good overviews of the approaches to system design of model-based training simulations in Intelligent Computer Assisted Instruction (ICAI). Though single systems have to some extent been evaluated with regard to their performance, an organised evaluation, especially a comparative evaluation of the systems that have been created within the field is lacking. To be able to successfully conduct an in-depth review under these conditions, we concentrate and …


A Simplified Model Of Wound Healing (With Particular Reference To The Critical Size Defect), J. A. Adam Sep 1999

A Simplified Model Of Wound Healing (With Particular Reference To The Critical Size Defect), J. A. Adam

Mathematics & Statistics Faculty Publications

This paper is an attempt to construct a simple mathematical model of wound healing/tissue regeneration which reproduces some of the known qualitative features of those phenomena. It does not address the time development of the wound in any way, but does examine conditions (e.g., wound size) under which such healing may occur. Two related one-dimensional models are examined here. The first, and simpler of the two corresponds to a "swath" of tissue (or more realistically in this case, bone) removed from an infinite plane of tissue in which only a thin band of tissue at the wound edges takes part …


Locating Web Information Using Web Checkpoints, Aik Kee Luah, Wee-Keong Ng, Ee Peng Lim, Wee Peng Lee, Yinyan Cao Sep 1999

Locating Web Information Using Web Checkpoints, Aik Kee Luah, Wee-Keong Ng, Ee Peng Lim, Wee Peng Lee, Yinyan Cao

Research Collection School Of Computing and Information Systems

Conventional search engines locate information by letting users establish a single web checkpoint1. By specifying one or more keywords, users direct search engines to return a set of documents that contain those keywords. From the documents (links) returned by search engines, user proceed to further probe the WWW from there. Hence, these initial set of documents (contingent upon the occurrence of keyword(s)) serve as a web checkpoint. Generally, these links are numerous and may not result in much fruitful searches. By establishing multiple web checkpoints, a richer and controllable search procedure can be constructed to obtain more relevant Web information. …


Fine-Grain Period Adaptation In Soft Real-Time Environments, David Steere, Joshua Gruenberg, Dylan Mcnamee, Calton Pu, Jonathan Walpole Sep 1999

Fine-Grain Period Adaptation In Soft Real-Time Environments, David Steere, Joshua Gruenberg, Dylan Mcnamee, Calton Pu, Jonathan Walpole

Computer Science Faculty Publications and Presentations

Reservation-based scheduling delivers a proportion of the CPU to jobs over a period of time. In this paper we argue that automatically determining and assigning this period is both possible and useful in general purpose soft real-time environments such as personal computers and information appliances. The goal of period adaptation is to select the period over which a job is guaranteed to receive its portion of the CPU dynamically and automatically. The choice of period represents a trade-off between the amount of jitter observed by the job and the overall efficiency of the system. Secondary effects of period include quantization …


Qos Scalability For Streamed Media Delivery, Charles Krasic, Jonathan Walpole Sep 1999

Qos Scalability For Streamed Media Delivery, Charles Krasic, Jonathan Walpole

Computer Science Faculty Publications and Presentations

Applications with real-rate progress requirements, such as mediastreaming systems, are difficult to deploy in shared heterogenous environments such as the Internet. On the Internet, mediastreaming systems must be capable of trading off resource requirements against the quality of the media streams they deliver, in order to match wide-ranging dynamic variations in bandwidth between servers and clients. Since quality requirements tend to be user- and task-specific, mechanisms for capturing quality of service requirements and mapping them to appropriate resource-level adaptation policies are required. In this paper, we describe a general approach for automatically mapping user-level quality of service specifications onto resource …


Formal Representation And Application Of Software Design Information, Thomas M. Schorsch Sep 1999

Formal Representation And Application Of Software Design Information, Thomas M. Schorsch

Theses and Dissertations

Formal methods for developing software use mathematical frameworks to specify, develop and verify software systems, especially safety critical systems where error free software is a necessity. A transformation system is a formal method that refines a requirement specification into an implementation by successively adding design decisions in the form of precisely verified design information. Current algebraic representations of design information (specifications, morphisms, and interpretations) and methods for applying algebraic specification design information (diagram refinement) cannot correctly represent and apply design information involving higher level design information. This investigation develops innovative methods for constructing and refining structured algebraic requirement specifications, as …


Motion Tracking Of Human Mouth By Generalized Deformable Models, Syin Chan, Chong-Wah Ngo, Kok F. Lai Sep 1999

Motion Tracking Of Human Mouth By Generalized Deformable Models, Syin Chan, Chong-Wah Ngo, Kok F. Lai

Research Collection School Of Computing and Information Systems

We propose and evaluate four trackers for tracking the shape, motion and deformation of a human mouth in video sequences. The trackers are suitable for use in very low bitrate video coding systems. (C) 1999 Elsevier Science B.V. All rights reserved.


Xcert Software, Inc., Keng Siau Sep 1999

Xcert Software, Inc., Keng Siau

Research Collection School Of Computing and Information Systems

Xcert’s business is in developing Internet and Intranet security enhancement technology. Xcert was founded in April 1996 by Andrew Csinger and Pat Richard and was headquartered in Vancouver, Canada. Xcert’s solution to Internet security was a public key infrastructure (PKI). PKI is a system of digital certi® cates, certi® cate authorities (CAs) and other registration authorities that verify and authenticate the validity of each party involved in an Internet transaction. Xcert’s PKI technology allows organizations of any size to issue digital certi® cates to their members. These organizations become their own CA and are empowered to issue digital certi® cates …


Agents : Concept, Technologies & Applications And Search Engine To Compile Urls Containing Documents Related To Environment Science For Njpies, Dhaval P. Shah Aug 1999

Agents : Concept, Technologies & Applications And Search Engine To Compile Urls Containing Documents Related To Environment Science For Njpies, Dhaval P. Shah

Theses

Agents are emerging technology that is making computer systems easier to use by allowing people (computer users) to delegate work back to the computer. They act on user's behalf and achieve user's goals. The advent of these software agents gave rise to much discussion of just what such an agent is, and of how they differ from programs in general. Agents are in research area for a long time. Earlier they were considered a part of just Artificial Intelligence. Nowadays they are just not in research area anymore. Commercial agent based applications are existing in the market because of the …


Teaching Operating System Concepts Using Multimedia And Internet, Amit Narielwala Aug 1999

Teaching Operating System Concepts Using Multimedia And Internet, Amit Narielwala

Theses

The prime objective of the thesis is to research and demonstrate the benefits and advantages of using Internet and multimedia tools for an interactive educational leaning experience. As we speak Internet is developing as a mainstream communication medium via personal computer as a tool at a breathtaking speed. The information technology field is a prime reason behind such phenomenon as it continues to mature and expand. In what is described as the "information age", the students of information technology need to master and devour new complex technological concepts and ideas at faster rate than ever before. The traditional approach using …


Computational Complexity For Continuous Time Dynamics, Hava Siegelmann, Asa Ben-Hur, Shmuel Fishman Aug 1999

Computational Complexity For Continuous Time Dynamics, Hava Siegelmann, Asa Ben-Hur, Shmuel Fishman

Hava Siegelmann

Dissipative flows model a large variety of physical systems. In this Letter the evolution of such systems is interpreted as a process of computation; the attractor of the dynamics represents the output. A framework for an algorithmic analysis of dissipative flows is presented, enabling the comparison of the performance of discrete and continuous time analog computation models. A simple algorithm for finding the maximum of n numbers is analyzed, and shown to be highly efficient. The notion of tractable (polynomial) computation in the Turing model is conjectured to correspond to computation with tractable (analytically solvable) dynamical systems having polynomial complexity.


Temporal Probabilistic Logic Programs, Alex Dekhtyar, Michael I. Dekhtyar, V. S. Subrahmanian Aug 1999

Temporal Probabilistic Logic Programs, Alex Dekhtyar, Michael I. Dekhtyar, V. S. Subrahmanian

Computer Science and Software Engineering

There are many applications where the precise time at which an event will occur (or has occurred) is uncertain. Temporal probabilistic logic programs (TPLPs) allow a programmer to express knowledge about such events. In this paper, we develop a model theory, fixpoint theory, and proof theory for TPLPs, and show that the fixpoint theory may be used to enumerate consequences of a TPLP in a sound and complete manner. Likewise the proof theory provides a sound and complete inference system. Last, but not least, we provide complexity results for TPLPs, showing in particular, that reasonable classes of TPLPs have polynomial …


Some Notions Of Complex Adaptive Systems And Their Relationship To Our World, Jens G. Pohl Aug 1999

Some Notions Of Complex Adaptive Systems And Their Relationship To Our World, Jens G. Pohl

Collaborative Agent Design (CAD) Research Center

This paper assumes that the world we live in consists of many interwoven complex adaptive systems. In the literature such systems are characterized as comprising many moving parts and processes that interact significantly in a mostly non-linear manner. It is argued that the forces that act on such complex systems are not additive, and that their impact occurs along non-linear interactions within the system. In particular, many of these systems are adaptive in that they change their behavior (through their interactions) over time, so that if they are subjected to a similar force or event a second time they …


Re-Engineering A Software Development Organization As A Complex Adaptive System, Steven J. Gollery, Jens G. Pohl Aug 1999

Re-Engineering A Software Development Organization As A Complex Adaptive System, Steven J. Gollery, Jens G. Pohl

Collaborative Agent Design (CAD) Research Center

This paper proposes that it is possible and desirable to restructure a software development organization as a complex adaptive system. Such a structure would increase the possibility that the organization would be able to survive and prosper in a rapidly-changing market place by shortening response time, increasing flexibility in the face of new and unexpected circumstances, and allowing the organization to learn quickly from its experiences.

The paper shows how a common information repository can be used to provide decision support to developers and managers, and discusses the relationship between decision support systems and complex adaptive systems.


The Second Generation Integrated Collaborative Decision Making (Icdm) Model: A Three-Tier Approach To Agent-Based, Decision-Support Systems, Kym J. Pohl, Jens G. Pohl Aug 1999

The Second Generation Integrated Collaborative Decision Making (Icdm) Model: A Three-Tier Approach To Agent-Based, Decision-Support Systems, Kym J. Pohl, Jens G. Pohl

Collaborative Agent Design (CAD) Research Center

Ten years ago the CAD Research Center at California Polytechnic University in San Luis Obispo, California identified a standard framework for agent-based, decision support systems. Employing inter-process and inference engine technologies of the time, the CAD Research Center termed this ‘blueprint’ the Integrated Collaborative Decision-Making (ICDM) framework. Over the past twelve years ICDM has been successfully used as a foundation in several systems. These systems focus on a wide range of domains of application including architectural design and ship cargo stowage. Success of the ICDM framework in conjunction with the availability of newer technologies has prompted an evolutionary leap in …


Gas Turbine Spray Dynamics And Combustion Simulation Design, Chenn Zhou, Sanford Fleeter, Elias N. Houstis, John R. Rice Aug 1999

Gas Turbine Spray Dynamics And Combustion Simulation Design, Chenn Zhou, Sanford Fleeter, Elias N. Houstis, John R. Rice

Department of Computer Science Technical Reports

No abstract provided.