Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 53461 - 53490 of 58021

Full-Text Articles in Physical Sciences and Mathematics

Percentile Blobs For Image Similarity, Nicholas Howe Jan 1998

Percentile Blobs For Image Similarity, Nicholas Howe

Computer Science: Faculty Publications

We present a new algorithm called PBSIM for computing image similarity, based upon a novel method of extracting bloblike features from images. In tests on a classification task using a data set of over 1000 images, PBSIM shows significantly higher accuracy than algorithms based upon color histograms, as well as previously reported results for another approach based upon bloblike features.


Stackguard: Automatic Adaptive Detection And Prevention Of Buffer-Overflow Attacks, Crispin Cowan, Calton Pu, David Maier, Heather Hinton, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle, Qian Zhang Jan 1998

Stackguard: Automatic Adaptive Detection And Prevention Of Buffer-Overflow Attacks, Crispin Cowan, Calton Pu, David Maier, Heather Hinton, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle, Qian Zhang

Computer Science Faculty Publications and Presentations

This paper presents a systematic solution to the persistent problem of buffer overflow attacks. Buffer overflow attacks gained notoriety in 1988 as part of the Morris Worm incident on the Internet. While it is fairly simple to fix individual buffer overflow vulnerabilities, buffer overflow attacks continue to this day. Hundreds of attacks have been discovered, and while most of the obvious vulnerabilities have now been patched, more sophisticated buffer overflow attacks continue to emerge.

We describe StackGuard: a simple compiler technique that virtually eliminates buffer overflow vulnerabilities with only modest performance penalties. Privileged programs that are recompiled with the StackGuard …


Statistical Dynamics Of The Royal Road Genetic Algorithm, Erik Van Nimwegen, James P. Crutchfield, Melanie Mitchell Jan 1998

Statistical Dynamics Of The Royal Road Genetic Algorithm, Erik Van Nimwegen, James P. Crutchfield, Melanie Mitchell

Computer Science Faculty Publications and Presentations

Metastability is a common phenomenon. Many evolutionary processes, both natural and artificial, alternate between periods of stasis and brief periods of rapid change in their behavior. In this paper an analytical model for the dynamics of a mutation-only genetic algorithm (GA) is introduced that identifies a new and general mechanism causing metastability in evolutionary dynamics. The GA’s population dynamics is described in terms of flows in the space of fitness distributions. The trajectories through fitness distribution space are derived in closed form in the limit of infinite populations. We then show how finite populations induce metastability, even in regions where …


A Complex-Systems Perspective On The “Computation Vs. Dynamics” Debate In Cognitive Science, Melanie Mitchell Jan 1998

A Complex-Systems Perspective On The “Computation Vs. Dynamics” Debate In Cognitive Science, Melanie Mitchell

Computer Science Faculty Publications and Presentations

I review the purported opposition between computational and dynamical approaches in cognitive science. I argue that both computational and dynamical notions will be necessary for a full explanatory account of cognition, and give a perspective on how recent research in complex systems can lead to a much needed rapprochement between computational and dynamical styles of explanation.


Adaptive Prefetching For Device-Independent File I/O, Dan Revel, Dylan Mcnamee, David Steere, Jonathan Walpole Jan 1998

Adaptive Prefetching For Device-Independent File I/O, Dan Revel, Dylan Mcnamee, David Steere, Jonathan Walpole

Computer Science Faculty Publications and Presentations

Device independent I/O has been a holy grail to operating system designers since the early days of UNIX. Unfortunately, existing operating systems fall short of this goal for multimedia applications. Techniques such as caching and sequential read-ahead can help mask I/O latency in some cases, but in others they increase latency and add substantial jitter. Multimedia applications, such as video players, are sensitive to vagaries in performance since I/O latency and jitter affect the quality of presentation. Our solution uses adaptive prefetching to reduce both latency and jitter. Applications submit file access plans to the prefetcher, which then generates I/O …


Object-Oriented Computer Simulations Of Physical Systems Using Dual Reciprocity Boundary Element Methodology, J. Friedrich Jan 1998

Object-Oriented Computer Simulations Of Physical Systems Using Dual Reciprocity Boundary Element Methodology, J. Friedrich

Turkish Journal of Electrical Engineering and Computer Sciences

Models of physical systems are essential in every engineering field. This work deals with computer simulations of physical systems that can be mathematically modelled by differential equations together with sufficient boundary conditions. The computer simulations are based on object-oriented technology and the dual reciprocity boundary element method which is a universal solution scheme for various types of partial differential equations (e.g. Laplace, Poisson, diffusion, convection-diffusion, and steady Navier-Stokes equation). This technique fulfills efficiency criteria like precision, robustness, versatility, programmability, user-friendliness, need of computational time and computer memory to a very high degree. This is demonstrated by three examples: Laplace's solution …


Analysis Of Nonlinear Sustained Oscillations In Discrete Systems With Backlash And Resolution By Using A Discretization-Oriented Describing Function, M. De La Sen, A. Pena, J. Esnaola Jan 1998

Analysis Of Nonlinear Sustained Oscillations In Discrete Systems With Backlash And Resolution By Using A Discretization-Oriented Describing Function, M. De La Sen, A. Pena, J. Esnaola

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, a discretization-oriented describing function is derived for nonlinear devices combining backlash and quantization (resolution) while being subject to discretization through a sampler and zero-order hold. Such a describing function is frequency-dependent so that the overall nonlinearity, which includes both resolution and backlash, is interpreted as possessing nonlinear inertia. That nonlinear inertia is generated by the sampling process, since it does not appear if the system is continuous. The presence of nonlinear sustained oscillations (limit cycles) is investigated through simulations.


Adaptive Shape From Shading, Ati̇lla Gülteki̇n, Muhi̇tti̇n Gökmen Jan 1998

Adaptive Shape From Shading, Ati̇lla Gülteki̇n, Muhi̇tti̇n Gökmen

Turkish Journal of Electrical Engineering and Computer Sciences

Extracting surface orientation and surface depth from one or more images is one of the classic problems in computer vision. Shape-from-shading (SFS) deals with the recovery of 3-D shape from a single shaded image. The shape is recovered by minimizing an energy functional involving constraints such as smoothness. In this constrained problem, although the smoothness constraint helps to stabilize the minimization process, it pushes the reconstruction toward a smooth surface. In this paper, we present a new adaptive shape-from-shading method which reduces this oversmoothing by controlling the smoothness spatially over the image space. In order to improve the quality of …


A Parallel Pipelined Computer Architecture For Digital Signal Processing, Haluk Gümüşkaya, Bülent Örenci̇k Jan 1998

A Parallel Pipelined Computer Architecture For Digital Signal Processing, Haluk Gümüşkaya, Bülent Örenci̇k

Turkish Journal of Electrical Engineering and Computer Sciences

This paper presents a parallel pipelined computer architecture and its six network configurations targeted for the implementation of a wide range of digital signal processing (DSP) algorithms described by both atomic and large grain data flow graphs. The proposed architecture is considered together with programmability, yielding a system solution that combines extensive concurrency with simple programming. It is an SSIMD (Skewed Single Instruction Multiple Data) or MIMD (Multiple Instruction Multiple Data) machine depending on the algorithms implemented and the programming methodologies. The concurrency that can be exploited by the algorithms using this Parallel pipelined architecture is both temporal and spatial …


Hierarchical Interconnection Network Architecture For Real-Time Systems, Bülent Örenci̇k Jan 1998

Hierarchical Interconnection Network Architecture For Real-Time Systems, Bülent Örenci̇k

Turkish Journal of Electrical Engineering and Computer Sciences

A hierarchical network suitable for interconnection of real-time client processes in a distributed multiprocessor environment is presented in this paper. A multi-layer {\it Communication Unit} (CU) prototype is developed for this purpose. This unit offers the client processes communication services for real-time operation. These services are structured in such a way that they do not depend on the characteristics of the communication medium. The basic hardware of the CU consists of a PC compatible card connected to the VME Bus. Client processes run on target cards (Motorola MVME-162) which are attached to the same bus. Target cards together with a …


State Of Art In Realistic Head Modeling For Electro-Magnetic Source Imaging Of The Human Brain, Nevzat G. Gençer, İ. Oğuz Tanzer, M. Kemal Özdemi̇r, Can E. Acar, Mert Sungur Jan 1998

State Of Art In Realistic Head Modeling For Electro-Magnetic Source Imaging Of The Human Brain, Nevzat G. Gençer, İ. Oğuz Tanzer, M. Kemal Özdemi̇r, Can E. Acar, Mert Sungur

Turkish Journal of Electrical Engineering and Computer Sciences

Electric currents produced by the neural activity in the brain create electric potentials on the scalp and magnetic field distribution outside the scalp. Measuring electric and magnetic fields provides a means to understand the spatio-temporal distribution of the neural activity. The representations of the intracellular electric current of active cell populations based on bimodal data are called electro-magnetic source image (EMSI). With the recent development of large arrays of magnetic sensors, and systems for measuring scalp voltages at more than 100 locations, it is now feasible to implement computational methods that employ numerical models which incorporate the correct geometry and …


Fdtd Evaluation Of The Sar Distribution In A Human Head Near A Mobile Cellular Phone, Selçuk Paker, Levent Sevgi̇ Jan 1998

Fdtd Evaluation Of The Sar Distribution In A Human Head Near A Mobile Cellular Phone, Selçuk Paker, Levent Sevgi̇

Turkish Journal of Electrical Engineering and Computer Sciences

In this study, Finite-Difference Time-Domain (FDTD) method is used to calculate the Specific Absorbtion Rate (SAR; defined as the power absorbed by unit mass of the tissue) distribution in a human head near a hand-held cellular phone. A three dimensional FDTD algorithm is built in cartesian coordinates. A discrete human head model, derived from a Nuclear Magnetic Resonance (NMR) image by semi-automatic algorithm, is located within FDTD volume together with a discrete hand-held receiver model. FDTD simulations are carried out for both european GSM (operating at 900MHz) and DECT (operating at 1.8GHz) systems with a quarter-wavelength antenna, mounted on top …


Cardiac Passive Acoustic Localization: Cardiopal, Yildirim Bahadirlar, Hali̇l Özcan Gülçür Jan 1998

Cardiac Passive Acoustic Localization: Cardiopal, Yildirim Bahadirlar, Hali̇l Özcan Gülçür

Turkish Journal of Electrical Engineering and Computer Sciences

A novel non-invasive system is proposed as an adjunct diagnostic tool for cardiac disorders, which is based on processing of the heart sounds acquired using a specially designed 2-D passive acoustic array. In addition to the acoustic array, the system consists of a personal computer, specially developed instrumentation and interface hardware and an adaptive array processing scheme. A signal model is constructed in accordance with the basic assumptions made for very near-field low frequency sources. The multiple signal characterization (MUSIC) method together with the model is used for the localization of assumed point sources in the heart. Locations of the …


Functional Radionuclide Imaging Algorithm Based On The Appended Curve Deconvolution Technique And Its Use In The Diagnosis Of Renovascular Hypertension, İrfan Karagöz, Hi̇kmet Bayhan Jan 1998

Functional Radionuclide Imaging Algorithm Based On The Appended Curve Deconvolution Technique And Its Use In The Diagnosis Of Renovascular Hypertension, İrfan Karagöz, Hi̇kmet Bayhan

Turkish Journal of Electrical Engineering and Computer Sciences

In this study, a new method called the pixel basis functional radionuclide imaging (PBFRI) algorithm based on the appended curve deconvolution technique, in order to be able to increase the medical diagnostic capability of a conventional gamma camera, is presented together with the clinical results. In the PBFRI method, retention function of each pixel is obtained from the renograms and cardiac curves generated by processing the filtered segments of the kidney and heart, using a special deconvolution method. The deconvolution operation is done by using the Fourier transform technique. High frequency artifacts presented by the Fourier transform are removed by …


Creating A Canonical Scientific And Technical Information Classification System For Ncstrl+, Melissa E. Tiffany, Michael L. Nelson Jan 1998

Creating A Canonical Scientific And Technical Information Classification System For Ncstrl+, Melissa E. Tiffany, Michael L. Nelson

Computer Science Faculty Publications

The purpose of this paper is to describe the new subject classification system for the NCSTRL+ project. NCSTRL+ is a canonical digital library (DL) based on the Networked Computer Science Technical Report Library (NCSTRL). The current NCSTRL+ classification system uses the NASA Scientific and Technical (STI) subject classifications, which has a bias towards the aerospace, aeronautics, and engineering disciplines. Examination of other scientific and technical information classification systems showed similar discipline-centric weaknesses. Traditional, library-oriented classification systems represented all disciplines, but were too generalized to serve the needs of a scientific and technically oriented digital library. Lack of a suitable existing …


An Upper Limit On The Τ Neutrino Mass From Three- And Five-Prong Tau Decays, R. Barate, M. Thulasidas Jan 1998

An Upper Limit On The Τ Neutrino Mass From Three- And Five-Prong Tau Decays, R. Barate, M. Thulasidas

Research Collection School Of Computing and Information Systems

A bound on the tau neutrino mass is established using the data collected from 1991 to 1995 at s√≃mZ with the ALEPH detector. Two separate limits are derived by fitting the distribution of visible energy vs invariant mass in τ−→2π−π+ντ and τ−→3π−2π+(π0)ντ decays. The two results are combined to obtain a 95% confidence level upper limit of 18.2 MeV/c2 on the mass of the tau neutrino.


Buckets: Aggregative, Intelligent Agents For Publishing, Michael L. Nelson, Kurt Maly, Stewart N. T. Shen, Mohammad Zubair Jan 1998

Buckets: Aggregative, Intelligent Agents For Publishing, Michael L. Nelson, Kurt Maly, Stewart N. T. Shen, Mohammad Zubair

Computer Science Faculty Publications

Buckets are an aggregative, intelligent construct for publishing in digital libraries. The goal of research projects is to produce information. This information is often instantiated in several forms, differentiated by semantic types (report, software, video, datasets, etc.). A given semantic type can be further differentiated by syntactic representations as well (PostScript version, PDF version, Word version, etc.). Although the information was created together and subtle relationships can exist between them, different semantic instantiations are generally segregated along currently obsolete media boundaries. Reports are placed in report archives, software might go into a software archive, but most of the data and …


A Fast Parallel Algorithm To Recognize P4-Sparse Graphs, Rong Lin, Stephan Olariu Jan 1998

A Fast Parallel Algorithm To Recognize P4-Sparse Graphs, Rong Lin, Stephan Olariu

Computer Science Faculty Publications

A number of problems in mobile computing, group-based collaboration, automated theorem proving, networking, scheduling, and cluster analysis suggested the study of graphs featuring certain “local density” characteristics. Typically, the notion of local density is equated with the absence of chordless paths of length three or more. Recently, a new metric for local density has been proposed, allowing a number of such induced paths to occur. More precisely, a graphG is called P4-sparse if no set of five vertices inG induces more than one chordless path of length three. P4-sparse graphs generalize the well-known class of cographs corresponding to …


Exploiting Cache Locality At Run-Time, Yong Yan Jan 1998

Exploiting Cache Locality At Run-Time, Yong Yan

Dissertations, Theses, and Masters Projects

With the increasing gap between the speeds of the processor and memory system, memory access has become a major performance bottleneck in modern computer systems. Recently, Symmetric Multi-Processor (SMP) systems have emerged as a major class of high-performance platforms. Improving the memory performance of Parallel applications with dynamic memory-access patterns on Symmetric Multi-Processors (SMP) is a hard problem. The solution to this problem is critical to the successful use of the SMP systems because dynamic memory-access patterns occur in many real-world applications. This dissertation is aimed at solving this problem.;Based on a rigorous analysis of cache-locality optimization, we propose a …


A Probability Programming Language: Development And Applications, Andrew Gordon Glen Jan 1998

A Probability Programming Language: Development And Applications, Andrew Gordon Glen

Dissertations, Theses, and Masters Projects

A probability programming language is developed and presented; applications illustrate its use. Algorithms and generalized theorems used in probability are encapsulated into a programming environment with the computer algebra system Maple to provide the applied community with automated probability capabilities. Algorithms of procedures are presented and explained, including detailed presentations on three of the most significant procedures. Applications that encompass a wide range of applied topics including goodness-of-fit testing, probabilistic modeling, central limit theorem augmentation, generation of mathematical resources, and estimation are presented.


Asymptotically Tight Bounds For Performing Bmmc Permutations On Parallel Disk Systems, Thomas H. Cormen, Thomas Sundquist, Leonard F. Wisniewski Jan 1998

Asymptotically Tight Bounds For Performing Bmmc Permutations On Parallel Disk Systems, Thomas H. Cormen, Thomas Sundquist, Leonard F. Wisniewski

Dartmouth Scholarship

This paper presents asymptotically equal lower and upper bounds for the number of parallel I/O operations required to perform bit-matrix-multiply/complement (BMMC) permutations on the Parallel Disk Model proposed by Vitter and Shriver. A BMMC permutation maps a source index to a target index by an affine transformation over GF(2), where the source and target indices are treated as bit vectors. The class of BMMC permutations includes many common permutations, such as matrix transposition (when dimensions are powers of 2), bit-reversal permutations, vector-reversal permutations, hypercube permutations, matrix reblocking, Gray-code permutations, and inverse Gray-code permutations. The upper bound improves upon the asymptotic …


Vector Geometry And Applications To Three-Dimensional Computer Graphics, Rory Morrison Jan 1998

Vector Geometry And Applications To Three-Dimensional Computer Graphics, Rory Morrison

Theses : Honours

The mathematics behind algorithms involved in generating three-dimensional images on a computer has stemmed from the analysis of the processes of sight and vision. These processes have been modeled to provide methods of visualising three-dimensional data sets. The applications of such visualisations are varied. This project will study some of the mathematics that IS used in three-dimensional graphics applications


Pathfinding In Vrml, Jason Richard Pearce Jan 1998

Pathfinding In Vrml, Jason Richard Pearce

Theses : Honours

Virtual Reality Modelling Language (VRML) is a scene description language which describes three dimensional (3D) space to a computer. Thus the three axis of space that is inherent in our dimension X Y and Z is represented inside a computer. To many people VRML represents a new beginning for the World Wide Web (WWW) because it behaves more like the real world. VRML is experimental, interactive, continuous and of course, three dimensional. Algorithms in computing have been designed for 2D problem solving and this does not necessarily translate to problem solving on a 3D level. The aim of this project …


Software Flexibility In A Web Environment, Michael Layng Jan 1998

Software Flexibility In A Web Environment, Michael Layng

Theses : Honours

Flexible software systems are designed to be able to adapt to changes in their environment without the need for programmer intervention. This allows companies and institutions to avoid the cost of hiring a programmer every time a business rule changes or a data structure is modified. The techniques of designing and implementing flexible 3GL software systems have been proven as a means of reducing the high cost of software maintenance caused by the changing of systems requirements. Such systems have been in operation in the European finance sector since the early 1980's. Edith Cowan University is participating in current research …


Good Software Development Processes Lead To Harmonious Project Teams Which In Turn Lead To Effective Project Performance, Rweyunga Kazaura Jan 1998

Good Software Development Processes Lead To Harmonious Project Teams Which In Turn Lead To Effective Project Performance, Rweyunga Kazaura

Theses : Honours

The modem world relies on computers in almost every facet of life. With the explosion of Information Technology, software development has become an important process. However, from the beginning, this process has suffered and continues to suffer from a number of problems. If these problems are not rectified, they can jeopardise projects and lead to project failure. Project failure results in a project being delivered: • without satisfying the functional and non-functional requirements requested by the user or customer • beyond the agreed schedule and/or • over budget. Research indicates that practising good software development processes (SDPs) can override these …


An Experimental Study Into The Effect Of Varying The Join Selectivity Factor On The Performance Of Join Methods In Relational Databases, Ada Mallet Jan 1998

An Experimental Study Into The Effect Of Varying The Join Selectivity Factor On The Performance Of Join Methods In Relational Databases, Ada Mallet

Theses : Honours

Relational database systems use join queries to retrieve data from two relations. Several join methods can be used to execute these queries. This study investigated the effect of varying join selectivity factors on the performance of the join methods. Experiments using the ORACLE environment were set up to measure the performance of three join methods: nested loop join, sort merge join and hash join. The performance was measured in terms of total elapsed time, CPU time and the number of I/O reads. The study found that the hash join performs better than the nested loop and the sort merge under …


An Implementation Of The El Gamal Elliptic Curve Cryptosystem Over A Finite Field Of Characteristic P, Samuel Thomas Arslanian Jan 1998

An Implementation Of The El Gamal Elliptic Curve Cryptosystem Over A Finite Field Of Characteristic P, Samuel Thomas Arslanian

Electronic Theses and Dissertations

Since the earliest times, individuals and groups of individuals have been interested in communicating sensitive information in a manner which would guarantee that such information could not be arbitrarily received. Further, such information was to be received by select recipients and this required that a means of secure information transmission be found and employed. To these ends, methods of information encryption have ever since been sought and employed. The entire study and practice of this activity, cryptology, the science of message encryption and decryption, provides a framework for this thesis. In particular, the development of cryptology has been influenced by …


Performing Cooperative Work And Conferencing On An Intranet Using Java, Thaveeporn Limpanyalers Jan 1998

Performing Cooperative Work And Conferencing On An Intranet Using Java, Thaveeporn Limpanyalers

Theses: Doctorates and Masters

The process of organising, preparing and conducting a meeting is a time consuming one. Additionally, geographic separation compounds the amount of effort required. Within this study, an electronic conferencing system in an Intranet environment is designed and implemented, thus enabling employees in the same organisation to meet up electronically without the dual constraints of time and space. Specifically, the study investigates incorporation of facial expressions and an ongoing polling system. The results demonstrate that a presence of facial expressions helps users to better engage in on-line discussion and that users find an ongoing poll to be useful in determining direction …


Network Security: An Evaluation Of Security Policies And Firewall Implementations, Melanie L. Abbas Jan 1998

Network Security: An Evaluation Of Security Policies And Firewall Implementations, Melanie L. Abbas

Dissertations and Theses @ UNI

This paper begins focusing on network security issues. The areas of physical security, access security, and connection security are explored. Connection security provides the biggest need for improvement in the entire security field. This type of security is managed best with firewall implementations. Various firewall models are discussed.

Software evaluations were performed on three different commercial Internet security tools. The software was compared on the basis of ease of installation, functionality, level of security provided, and output available. In summary, the value of the firewall is dependent on the need to implement a firewall in an organization.

However, a security …


An Efficient Library For Parallel Ray Tracing And Animation, John Edward Stone Jan 1998

An Efficient Library For Parallel Ray Tracing And Animation, John Edward Stone

Masters Theses

"A parallel ray tracing library is presented for rendering high detail images of three dimensional geometry and computational fields. The library has been developed for use on distributed memory and shared memory parallel computers and can also run on sequential computers. Parallelism is achieved through the use of message passing and threads. It is shown that the library achieves almost linear scalability when run on large distributed memory parallel computers as well as large shared memory parallel computers.

Several applications of parallel rendering are explored including rendering of CAD models, animation, magnetic resonance imaging, and visualization of volumetric flow fields. …