Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 53491 - 53520 of 58021

Full-Text Articles in Physical Sciences and Mathematics

A Framework For Controlling Quality Of Sessions In Multimedia Systems, Alaa S. Youssef Jan 1998

A Framework For Controlling Quality Of Sessions In Multimedia Systems, Alaa S. Youssef

Computer Science Theses & Dissertations

Collaborative multimedia systems demand overall session quality control beyond the level of quality of service (QoS) pertaining to individual connections in isolation of others. At every instant in time, the quality of the session depends on the actual QoS offered by the system to each of the application streams, as well as on the relative priorities of these streams according to the application semantics. We introduce a framework for achieving QoSess control and address the architectural issues involved in designing a QoSess control laver that realizes the proposed framework. In addition, we detail our contributions for two main components of …


An Alternative Method For Determining Adjusted Function Points As The Basis For Software Cost Estimating, William Alexander Eldred Jan 1998

An Alternative Method For Determining Adjusted Function Points As The Basis For Software Cost Estimating, William Alexander Eldred

Engineering Management & Systems Engineering Theses & Dissertations

As software costs become an increasingly higher percentage of total computer system costs, it becomes increasingly more important for software development managers to have the ability to predict development costs with reasonable accuracy early in the software development cycle. Software development cost estimates are based in large measure on software size. Function points are considered by many to be a de facto industry standard as a size metric. The function points technique, unlike lines-of-code, can be applied early in the software development cycle and is language independent. Critics claim that the function point “value adjustment factor,” which purports to capture …


A Hierarchical Filtering-Based Monitoring Architecture For Large-Scale Distributed Systems, Ehab Salem Al-Shaer Jan 1998

A Hierarchical Filtering-Based Monitoring Architecture For Large-Scale Distributed Systems, Ehab Salem Al-Shaer

Computer Science Theses & Dissertations

On-line monitoring is essential for observing and improving the reliability and performance of large-scale distributed (LSD) systems. In an LSD environment, large numbers of events are generated by system components during their execution and interaction with external objects (e.g. users or processes). These events must be monitored to accurately determine the run-time behavior of an LSD system and to obtain status information that is required for debugging and steering applications. However, the manner in which events are generated in an LSD system is complex and represents a number of challenges for an on-line monitoring system. Correlated events axe generated concurrently …


Analysis Of Algorithms For Online Routing And Scheduling In Networks, Jessen Tait Havill Jan 1998

Analysis Of Algorithms For Online Routing And Scheduling In Networks, Jessen Tait Havill

Dissertations, Theses, and Masters Projects

We study situations in which an algorithm must make decisions about how to best route and schedule data transfer requests in a communication network before each transfer leaves its source. For some situations, such as those requiring quality of service guarantees, this is essential. For other situations, doing work in advance can simplify decisions in transit and increase the speed of the network. In order to reflect realistic scenarios, we require that our algorithms be online, or make their decisions without knowing future requests. We measure the efficiency of an online algorithm by its competitive ratio, which is the maximum …


Improvements To The Color Quantization Process, Rance David Necaise Jan 1998

Improvements To The Color Quantization Process, Rance David Necaise

Dissertations, Theses, and Masters Projects

The presentation of color images on devices with limited color capabilities requires a reduction in the number of colors contained in the images. Color image quantization is the process of reducing the number of colors used in an image while maintaining its appearance as much as possible. This reduction is performed using a color image quantization algorithm. The quantization algorithm attempts to select k colors that best represent the contents of the image. The original image is then recolored using the representative colors. to improve the resulting image, a dithering process can be used in place of the recoloring.;This dissertation …


Wavelet-Based Digital Image Restoration, Viviana Sandor Jan 1998

Wavelet-Based Digital Image Restoration, Viviana Sandor

Dissertations, Theses, and Masters Projects

Digital image restoration is a fundamental image processing problem with underlying physical motivations. A digital imaging system is unable to generate a continuum of ideal pointwise measurements of the input scene. Instead, the acquired digital image is an array of measured values. Generally, algorithms can be developed to remove a significant part of the error associated with these measure image values provided a proper model of the image acquisition system is used as the basis for the algorithm development. The continuous/discrete/continuous (C/D/C) model has proven to be a better alternative compared to the relatively incomplete image acquisition models commonly used …


Dynamic Control Models As State Abstractions, Jefferson A. Coelho, Roderic Grupen Dec 1997

Dynamic Control Models As State Abstractions, Jefferson A. Coelho, Roderic Grupen

Roderic Grupen

This work proposes a methodology for the construction of state abstraction from a set of empirically derived models of system behavior. The idea is to treat the agent in its environment as a dynamical system and augment its observation space with contextual cues extracted empirically as the agent exercises each element out of the set of available control policies--the control bias. Contextual cues are provided by the correlation between dynamic features of the agent-environment interaction and agent performance. The resulting state abstraction (observations + context information) defines also a temporal abstraction, and offers interesting answers to some of the issues …


Ambiguity And Constraint In Mathematical Expression Recognition, Erik G. Learned-Miller, Paul A. Viola Dec 1997

Ambiguity And Constraint In Mathematical Expression Recognition, Erik G. Learned-Miller, Paul A. Viola

Erik G Learned-Miller

The problem of recognizing mathematical expressions differs significantly from the recognition of standard prose. While in prose significant constraints can be put on the interpretation of a character by the characters immediately preceding and following it, few such simple constraints are present in a mathematical expression. In order to make the problem tractable, effective methods of recognizing mathematical expressions will need to put intelligent constraints on the possible interpretations. The authors present preliminary results on a system for the recognition of both handwritten and typeset mathematical expressions. While previous systems perform character recognition out of context, the current system maintains …


Module Embedding, Atanas Radenski Dec 1997

Module Embedding, Atanas Radenski

Mathematics, Physics, and Computer Science Faculty Articles and Research

This paper proposes a code reuse mechanism called module embedding that enables the building of new modules from existing ones through inheritance, overriding of procedures, and overriding of types; the paper also describes an implementation scheme for this mechanism. Module embedding is beneficial when modules and classes are used in combination and need to be extended together, or when modules are more appropriate medium than classes.


Zastosowanie Modelu "Skrzynki" Do Oceny Poziomu Stężeń Zanieczyszczeń Komunikacyjnych W Przyziemnej Warstwie Atmosfery, Marek Bogacki, Marian Mazur, Robert Oleniacz Dec 1997

Zastosowanie Modelu "Skrzynki" Do Oceny Poziomu Stężeń Zanieczyszczeń Komunikacyjnych W Przyziemnej Warstwie Atmosfery, Marek Bogacki, Marian Mazur, Robert Oleniacz

Robert Oleniacz

Road transport is an essential source of nitrogen oxides (NOx), carbon monoxide (CO) and reactive hydrocarbons (RHC) emissions to atmosphere. Quantity and chemical constitution of emitted substances and meteorological conditions determine the level of ozon (O3) concentration forming as a result of photochemical reactions. The method presented in the paper consists in designation of quantity and chemical constitution of substances emitted from mo-bile sources and special mathematical modeling of physical and chemical transformations that take place in the lowest atmospheric layer.

English title: The use of box model to estimate the size of traffic pollutant concentrations in the lowest atmospheric …


Concept Vectors: A Synthesis Of Concept Mapping And Matrices For Knowledge Representation In Intelligent Tutoring Systems, Mark L. Dyson Dec 1997

Concept Vectors: A Synthesis Of Concept Mapping And Matrices For Knowledge Representation In Intelligent Tutoring Systems, Mark L. Dyson

Theses and Dissertations

A review of the literature relating to intelligent tutoring systems (ITS) reveals that the bulk of research to date is focused on the student, and on methods for representing the knowledge itself. From student models to learning schemas to presentation methods, comparatively little attention has been paid to the problem of educators attempting to build viable lesson plans for use in an ITS environment--yet when this problem is addressed in the literature, it is recognized as a potentially daunting one. This thesis addresses the problem of ITS lesson plan development by proposing a practical, computable approach for knowledge engineering that …


Electro-Deposition Of Polymer Chains On An Adsorbing Wall: Density Profiles And Wall Coverage, Grace M. Foo, Ras B. Pandey Dec 1997

Electro-Deposition Of Polymer Chains On An Adsorbing Wall: Density Profiles And Wall Coverage, Grace M. Foo, Ras B. Pandey

Faculty Publications

Growth of polymer density in an electro-deposition model of polymer chains on an impenetrable wall is studied on a two dimensional discrete lattice using a Monte Carlo simulation. Polymer-polymer repulsion and polymer-wall attraction for the adsorbing wall (along with the neutral and repulsive interactions) are considered in an external field. Effects of the field strength (B), temperature (T), and chain length (L-c) on the density profile of the polymer chains and wall coverage are investigated. The spatial density profile shows onset of oscillation near the wall at a characteristic field (B-c) which depends on chain length and temperature, In low …


Learning To See Analogies: A Connectionist Exploration, Douglas S. Blank Dec 1997

Learning To See Analogies: A Connectionist Exploration, Douglas S. Blank

Computer Science Faculty Research and Scholarship

The goal of this dissertation is to integrate learning and analogy-making. Although learning and analogy-making both have long histories as active areas of research in cognitive science, not enough attention has been given to the ways in which they may interact. To that end, this project focuses on developing a computer program, called Analogator, that learns to make analogies by seeing examples of many different analogy problems and their solutions. That is, it learns to make analogies by analogy. This approach stands in contrast to most existing computational models of analogy in which particular analogical mechanisms are assumed a priori …


Bias And The Probability Of Generalization, Tony R. Martinez, D. Randall Wilson Dec 1997

Bias And The Probability Of Generalization, Tony R. Martinez, D. Randall Wilson

Faculty Publications

In order to be useful, a learning algorithm must be able to generalize well when faced with inputs not previously presented to the system. A bias is necessary for any generalization, and as shown by several researchers in recent years, no bias can lead to strictly better generalization than any other when summed over all possible functions or applications. This paper provides examples to illustrate this fact, but also explains how a bias or learning algorithm can be “better” than another in practice when the probability of the occurrence of functions is taken into account. It shows how domain knowledge …


Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 13, Number 10, December 1997, College Of Engineering And Computer Science, Wright State University Dec 1997

Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 13, Number 10, December 1997, College Of Engineering And Computer Science, Wright State University

BITs and PCs Newsletter

A twelve page newsletter created by the Wright State University College of Engineering and Computer Science that addresses the current affairs of the college.


The Platonic Spheroids, Jörg Peters, Leif Kobbelt Dec 1997

The Platonic Spheroids, Jörg Peters, Leif Kobbelt

Department of Computer Science Technical Reports

No abstract provided.


A Parallel Algorithm For Determining Orientations Of Biological Macro- Molecules Imaged By Electron Microscopy, Timothy S. Baker, Ionana M. Boier Martin, Dan C. Marinescu Dec 1997

A Parallel Algorithm For Determining Orientations Of Biological Macro- Molecules Imaged By Electron Microscopy, Timothy S. Baker, Ionana M. Boier Martin, Dan C. Marinescu

Department of Computer Science Technical Reports

No abstract provided.


Collaborative Environments For Scientific Computing The Task Of Algorithm/Software Selection, N. Ramakrishnan, Anupam Joshi, Elias N. Houstis, John R. Rice Dec 1997

Collaborative Environments For Scientific Computing The Task Of Algorithm/Software Selection, N. Ramakrishnan, Anupam Joshi, Elias N. Houstis, John R. Rice

Department of Computer Science Technical Reports

No abstract provided.


Compact Recognizers Of Episode Sequences, Alberto Apostolico, Mikhail J. Attalah Dec 1997

Compact Recognizers Of Episode Sequences, Alberto Apostolico, Mikhail J. Attalah

Department of Computer Science Technical Reports

No abstract provided.


Interactive Visualization Of Multi- Dimensional Scientific Data (Ph.D. Thesis), Daniel R. Schikore Dec 1997

Interactive Visualization Of Multi- Dimensional Scientific Data (Ph.D. Thesis), Daniel R. Schikore

Department of Computer Science Technical Reports

No abstract provided.


Interview: Don Hearn, Karen Aardal Dec 1997

Interview: Don Hearn, Karen Aardal

About Harlan D. Mills

No abstract provided.


An Examination Of Multi-Tier Designs For Legacy Data Access, Michael L. Acker Dec 1997

An Examination Of Multi-Tier Designs For Legacy Data Access, Michael L. Acker

Theses and Dissertations

This work examines the application of Java and the Common Object Request Broker Architecture (CORBA) to support access to remote databases via the Internet. The research applies these software technologies to assist an Air Force distance learning provider in improving the capabilities of its World Wide Web-based correspondence system. An analysis of the distance learning provider's operation revealed a strong dependency on a non-collocated legacy relational database. This dependency limits the distance learning provider's future web-based capabilities. A recommendation to improve operation by data replication is proposed, and the implementation details are provided for two alternative test systems that support …


An Incompleteness Handling Methodology For Validation Of Bayesian Knowledge Bases, David J. Bawcom Dec 1997

An Incompleteness Handling Methodology For Validation Of Bayesian Knowledge Bases, David J. Bawcom

Theses and Dissertations

The PESKI (Probabilities, Expert Systems, Knowledge, and Inference) system attempts to address some of the problems in expert system design through the use of the Bayesian Knowledge Base (BKB) representation. Knowledge gathered from a domain expert is placed into this framework and inferencing is performed over it. However, by the nature of BKBs, not all knowledge is incorporated, i.e. the representation need not be a complete representation of all combinations and possibilities of the knowledge, as this would be impractical in many real-world systems. Therefore, inherent in such a system is the problem of incomplete knowledge, or spaces within the …


Developing A Corpus Specific Stoplist Using Quantitative Comparison, Craig N. Berg Dec 1997

Developing A Corpus Specific Stoplist Using Quantitative Comparison, Craig N. Berg

Theses and Dissertations

We have become overwhelmed with electronic information and it seems our situation is not going to improve. It is becoming increasingly common for people to work with information on a daily basis. We seem to spend more and more time looking for information, and it is taking longer because more information is available. This thesis will look at how we can provide faster access to the information we want to find. Today's requirements are closely related to searching for information using queries. At the heart of the query process is the removal of search terms having little or no significance …


Applications Of Unsupervised Clustering Algorithms To Aircraft Identification Using High Range Resolution Radar, Dzung Tri Pham Dec 1997

Applications Of Unsupervised Clustering Algorithms To Aircraft Identification Using High Range Resolution Radar, Dzung Tri Pham

Theses and Dissertations

Identification of aircraft from high range resolution (HRR) radar range profiles requires a database of information capturing the variability of the individual range profiles as a function of viewing aspect. This database can be a collection of individual signatures or a collection of average signatures distributed over the region of viewing aspect of interest. An efficient database is one which captures the intrinsic variability of the HRR signatures without either excessive redundancy typical of single-signature databases, or without the loss of information common when averaging arbitrary groups of signatures. The identification of 'natural' clustering of similar HRR signatures provides a …


Pseudorandom Code Generation For Communication And Navigation System Applications, John F. Brendle Jr. Dec 1997

Pseudorandom Code Generation For Communication And Navigation System Applications, John F. Brendle Jr.

Theses and Dissertations

This research project investigated the design, construction and evaluation of a pseudorandom code generator for communication and navigation system applications. These types of codes include spreading codes, Gold codes, Jet Propulsion Laboratory (JPL) ranging codes, syncopated codes, and nonlinear codes. Such waveforms are typically used in communication and navigation system applications. The code generator uses the Stanford Telecom STEL-1032 Pseudorandom Number (PRN) coder. A coder interface was designed and constructed for manual data entry to the registers of the PRN coder. The code generator is capable of independently clocking and generating all possible codes with lengths up to 4,294,967,295 bits. …


Visualization And Animation Of A Missile/Target Encounter, Jeffrey T. Bush Dec 1997

Visualization And Animation Of A Missile/Target Encounter, Jeffrey T. Bush

Theses and Dissertations

Existing missile/target encounter modeling and simulation systems focus on improving probability of kill models. Little research has been done to visualize these encounters. These systems can be made more useful to the engineers by incorporating current computer graphics technology for visualizing and animating the encounter. Our research has been to develop a graphical simulation package for visualizing both endgame and full fly-out encounters. Endgame visualization includes showing the interaction of a missile, its fuze cone proximity sensors, and its target during the final fraction of a second of the missile/target encounter. Additionally, this system displays dynamic effects such as the …


Inclusive Production Of Neutral Pions In Hadronic Z Decays, R. Barate, M. Thulasidas Dec 1997

Inclusive Production Of Neutral Pions In Hadronic Z Decays, R. Barate, M. Thulasidas

Research Collection School Of Computing and Information Systems

A measurement of the inclusive production of π0 mesons in hadronic Z decays is presented and compared to Monte Carlo model predictions. The analysis is based on approximately 2 million hadronic events recorded with the ALEPH detector at LEP at a centre-of-mass energy of ⊡s = 91.2 GeV. Neutral pions are reconstructed using photons measured in the electromagnetic calorimeter and photons from conversion pairs. The inclusive π0 momentum spectrum is measured in the range 0.025 x p = p/p beam 0 per hadronic Z is found to be 4.80 ± 0.07(stat) ± 0.31(sys). The differential inclusive π0 cross section is …


Layout For Visualizing Large Software Structures In 3d, Colin Ware, Glenn Franck, Monica Parkhi, Tim Dudley Dec 1997

Layout For Visualizing Large Software Structures In 3d, Colin Ware, Glenn Franck, Monica Parkhi, Tim Dudley

Center for Coastal and Ocean Mapping

There is increasing evidence that 3D visualization of complex structures has advantages over 2D visualization. While nested directed graphs are an important method of representing information in 2D or 3D, they must be effectively organized in order to be understood. Most work on graph layout has assumed that fully automatic layout is desirable. Through our work with graphs representing large software structures, we have found that, due to the importance of the semantic content, it is necessary to combine automatic layout with manual layout. This paper describes a system called GraphVisualizer3D, which was designed to help people understand large nested …


A Modeling And Simulation Approach To Characterize Network Layer Internet Survivability, Leif S. King Dec 1997

A Modeling And Simulation Approach To Characterize Network Layer Internet Survivability, Leif S. King

Theses and Dissertations

The Air Force Core Competency of Information Superiority will be achieved in an age of decreasing AF manpower and corporate expertise. Increased AF reliance on COTS solutions, coupled with nearly ubiquitous points of entry to communication networks, create unique challenges in maintaining the Information Superiority edge. The protection of the internet is part of this equation. The internet supports the daily business traffic of the Air Force. Personnel, finance, and supply data flow through its routers. Controlling an adversary's access to our information systems, either the data, or the hardware and software that control the data and transform it into …