Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (7242)
- China Simulation Federation (3382)
- TÜBİTAK (3020)
- Selected Works (2644)
- Wright State University (2602)
-
- Purdue University (2057)
- Old Dominion University (1458)
- Missouri University of Science and Technology (1371)
- Edith Cowan University (1173)
- Air Force Institute of Technology (1108)
- University of Texas at El Paso (1105)
- Dartmouth College (1022)
- San Jose State University (995)
- University of Nebraska - Lincoln (979)
- Embry-Riddle Aeronautical University (853)
- City University of New York (CUNY) (819)
- Technological University Dublin (791)
- Washington University in St. Louis (785)
- Brigham Young University (759)
- California Polytechnic State University, San Luis Obispo (732)
- Kennesaw State University (714)
- University for Business and Technology in Kosovo (626)
- University of Texas at Arlington (614)
- Nova Southeastern University (535)
- Portland State University (530)
- SelectedWorks (527)
- Western University (525)
- New Jersey Institute of Technology (516)
- Syracuse University (501)
- University of Nebraska at Omaha (485)
- Keyword
-
- Machine learning (1339)
- Deep learning (800)
- Artificial intelligence (659)
- Machine Learning (650)
- Computer Science (637)
-
- Security (619)
- Computer science (434)
- Privacy (409)
- Cybersecurity (407)
- Simulation (379)
- Technical Reports (369)
- Classification (368)
- UTEP Computer Science Department (367)
- Deep Learning (349)
- Data mining (348)
- Algorithms (337)
- Optimization (337)
- Neural networks (307)
- Artificial Intelligence (298)
- Computer vision (290)
- Software engineering (254)
- College for Professional Studies (253)
- Education (253)
- Clustering (251)
- Cloud computing (244)
- Department of Computer Science and Engineering (243)
- Applied sciences (237)
- School of Computer & Information Science (236)
- Visualization (236)
- Natural language processing (232)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (6890)
- Journal of System Simulation (3382)
- Turkish Journal of Electrical Engineering and Computer Sciences (3020)
- Theses and Dissertations (2511)
- Department of Computer Science Technical Reports (1721)
-
- Computer Science & Engineering Syllabi (1312)
- Departmental Technical Reports (CS) (892)
- Master's Projects (845)
- Electronic Theses and Dissertations (738)
- Computer Science Faculty Publications (725)
- All Computer Science and Engineering Research (683)
- Computer Science Technical Reports (673)
- Computer Science Faculty Research & Creative Works (601)
- Faculty Publications (588)
- Kno.e.sis Publications (543)
- Journal of Digital Forensics, Security and Law (536)
- Computer Science Faculty Publications and Presentations (509)
- Dissertations (505)
- CCE Theses and Dissertations (488)
- All Works (478)
- Walden Dissertations and Doctoral Studies (468)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (463)
- Masters Theses (402)
- Computer Science and Engineering Theses (356)
- Electronic Thesis and Dissertation Repository (334)
- Theses (334)
- Computer Science and Software Engineering (332)
- USF Tampa Graduate Theses and Dissertations (320)
- Computer Science: Faculty Publications (318)
- Mathematics, Statistics and Computer Science Faculty Research and Publications (315)
- Publication Type
Articles 53551 - 53580 of 58020
Full-Text Articles in Physical Sciences and Mathematics
A Control Basis For Learning Multifingered Grasps, Jefferson Coelho, Roderic Grupen
A Control Basis For Learning Multifingered Grasps, Jefferson Coelho, Roderic Grupen
Roderic Grupen
In this paper, we introduce a robust controller that uses contact position and normal feedback to generate contact configurations for statically stable grasps. The approach uses a context sensitive composition of two controllers that minimize force and moment residuals in the grasp configuration. We show that equilibria in the composite controller correspond to optimal contact configurations for 2 and 3 contacts on regular, convex polygons. The preimage is used to generalize the controller to arbitrary object geometries by learning a policy for compensation and to address object recognition, and contact (de)allocation.
Materialized View Algorithms, Yubo Fan
Materialized View Algorithms, Yubo Fan
Dissertations and Theses
A data warehouse is a stand-alone repository of integrated information available for decision support OLAP querying and analysis. Aggregate views can be materialized (stored in disk) to improve query performance in a data warehouse.
Several static and dynamic algorithms for selecting materialized aggregate views (MA V) in a data warehouse are proposed in this thesis. The algorithms are then compared by running a simulation system, which can be configured to compare several algorithms on different type of data warehouses. Simulation results for static algorithms are presented to show that several proposed algorithms perform close to an existing good algorithm (HRU …
The Impact Of Multimedia Training On Mental Models Of Simple Processes, Johnny L. Washington, Erika Rogers
The Impact Of Multimedia Training On Mental Models Of Simple Processes, Johnny L. Washington, Erika Rogers
Computer Science and Software Engineering
The purpose of this paper is to describe work in progress on a project which is designed to study how multimedia training may impact people’s mental models of sample processes. A tutorial is under development which helps people learn how to construct an abstract model of the steps needed to produce a letter on a typewriter, and how to change this model when the task moues to a computerized setting. Subjects have been recruited to participate in this study, and the current status of the project is discussed.
Outbreak Agent: Intelligent Wearable Technology For Hazardous Environments, Erika Rogers, Robin R. Murphy, Chris Thompson
Outbreak Agent: Intelligent Wearable Technology For Hazardous Environments, Erika Rogers, Robin R. Murphy, Chris Thompson
Computer Science and Software Engineering
The topic of this paper is a project to design an intelligent agent which supports humans in the domain of hazardous site investigation. This software agent will be integrated into wearable technology which is embedded in the protective clothing worn by the humans. An overview of some of the design issues is presented, with a particular emphasis on the visual problem solving component.
Approximating Disjoint-Path Problems Using Greedy Algorithms And Packing Integer Programs, Stavros G. Kolliopoulos, Clifford Stein
Approximating Disjoint-Path Problems Using Greedy Algorithms And Packing Integer Programs, Stavros G. Kolliopoulos, Clifford Stein
Computer Science Technical Reports
In the edge(vertex)-disjoint path problem we are given a graph $G$ and a set ${\cal T}$ of connection requests. Every connection request in ${\cal T}$ is a vertex pair $(s_i,t_i),$ $1 \leq i \leq K.$ The objective is to connect a maximum number of the pairs via edge(vertex)-disjoint paths. The edge-disjoint path problem can be generalized to the multiple-source unsplittable flow problem where connection request $i$ has a demand $\rho_i$ and every edge $e$ a capacity $u_e.$ All these problems are NP-hard and have a multitude of applications in areas such as routing, scheduling and bin packing. Given the hardness …
Purdue-On-Line: A Facility And Distributed Learning Framework To Develop And Deliver Internet Based Education, Elias N. Houstis, Ahmed K. Elmagarmid, Sanjiva Weerawarana, Anthony L. Peiris, Nitesh D. Dhanjani, Gordon L. Coppoc, Abdalfattah Y.M. Nour, Lefteris H. Tsoukalas, Don Jones
Purdue-On-Line: A Facility And Distributed Learning Framework To Develop And Deliver Internet Based Education, Elias N. Houstis, Ahmed K. Elmagarmid, Sanjiva Weerawarana, Anthony L. Peiris, Nitesh D. Dhanjani, Gordon L. Coppoc, Abdalfattah Y.M. Nour, Lefteris H. Tsoukalas, Don Jones
Department of Computer Science Technical Reports
No abstract provided.
Some Theory And Practice Of Greedy Off- Line Textual Substitution, Alberto Apostolico, Stefano Lonardi
Some Theory And Practice Of Greedy Off- Line Textual Substitution, Alberto Apostolico, Stefano Lonardi
Department of Computer Science Technical Reports
No abstract provided.
Selecting An Effective Task-Specific Contact Analysis Algorithm, Leo Joskowicz, Elisha Sacks, Vijay Srinivasan
Selecting An Effective Task-Specific Contact Analysis Algorithm, Leo Joskowicz, Elisha Sacks, Vijay Srinivasan
Department of Computer Science Technical Reports
No abstract provided.
Interbase (Kb): A Knowledge-Based Multidatabase System For Data Warehousing, Nick Bassiliades, Ioannis Vlahavas, Ahmed K. Elmagarmid, Elias N. Houstis
Interbase (Kb): A Knowledge-Based Multidatabase System For Data Warehousing, Nick Bassiliades, Ioannis Vlahavas, Ahmed K. Elmagarmid, Elias N. Houstis
Department of Computer Science Technical Reports
No abstract provided.
Efficient Detection Of Unusual Words, Alberto Apostolico, Mary Ellen Bock, Stefano Lonardi
Efficient Detection Of Unusual Words, Alberto Apostolico, Mary Ellen Bock, Stefano Lonardi
Department of Computer Science Technical Reports
No abstract provided.
E-Device: An Extensible Knowledge Base System With Multiple Rule Support, Nick Bassiliades, Ioannis Vlahavas, Ahmed Elmagarmid
E-Device: An Extensible Knowledge Base System With Multiple Rule Support, Nick Bassiliades, Ioannis Vlahavas, Ahmed Elmagarmid
Department of Computer Science Technical Reports
No abstract provided.
Smart Video Text: An Intelligent Video Database System, F. Kokkoras, H. Jiang, I. Vlahavas, Ahmed K. Elmagarmid, Elias N. Houstis
Smart Video Text: An Intelligent Video Database System, F. Kokkoras, H. Jiang, I. Vlahavas, Ahmed K. Elmagarmid, Elias N. Houstis
Department of Computer Science Technical Reports
No abstract provided.
Data Mining, Yongjian Fu
Data Mining, Yongjian Fu
Computer Science Faculty Research & Creative Works
Data mining is the process of identifying interesting patterns from large databases. It is the core part of the knowledge discovery in database (KDD) process. Tasks in data mining are classified into summarization, classification, clustering, association and trend analysis. Data mining techniques are adopted from many research areas including statistics, machine learning, database systems, neural networks, rough sets and visualization. The techniques have been applied successfully in many areas from business to science to sports.
Search For The Standard Model Higgs Boson In E+E- Collisions At √S = 161, 170 And 172 Gev, Barate, R.; Et Al., M. Thulasidas
Search For The Standard Model Higgs Boson In E+E- Collisions At √S = 161, 170 And 172 Gev, Barate, R.; Et Al., M. Thulasidas
Research Collection School Of Computing and Information Systems
The reaction e+ e ! HZ is used to search for the Standard Model Higgs boson. The data sample consists of integrated luminosities of 10:9 pb1 , 1:1 pb1 , and 9:5 pb1 collected by the ALEPH experiment at LEP during 1996, at centre-of-mass energies of 161, 170 and 172 GeV, respectively. No candidate events were found, in agreement with the expected background of 0.84 events from all Standard Model processes. This search results in a 95% C.L. lower limit on the Higgs boson mass of 69:4 GeV=c2 . When combined with earlier ALEPH searches performed at energies at and …
Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 13, Number 8, October 1997, College Of Engineering And Computer Science, Wright State University
Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 13, Number 8, October 1997, College Of Engineering And Computer Science, Wright State University
BITs and PCs Newsletter
A twelve page newsletter created by the Wright State University College of Engineering and Computer Science that addresses the current affairs of the college.
Modeling And Comparison Of Wormhole Routed Mesh And Torus Networks, Ronald I. Greenberg, Lee Guan
Modeling And Comparison Of Wormhole Routed Mesh And Torus Networks, Ronald I. Greenberg, Lee Guan
Computer Science: Faculty Publications and Other Works
2D-mesh and torus networks have often been proposed as the interconnection pattern for parallel computers. In addition, wormhole routing has increasingly been advocated as a method of reducing latency. Most analysis of wormhole routed networks, however, has focused on the torus and the broader class of k-ary n-cubes to which it belongs. This paper presents a performance model for the wormhole routed mesh, and it compares the performance of the mesh and torus based on theoretical and empirical analyses.
Computational Geometry Column 32, Joseph O'Rourke
Computational Geometry Column 32, Joseph O'Rourke
Computer Science: Faculty Publications
The proof of Dey's new k-set bound is illustrated.
Computing Dense Clusters On-Line For Information Organization, Javed Aslam, Katya Pelekhov, Daniela Rus
Computing Dense Clusters On-Line For Information Organization, Javed Aslam, Katya Pelekhov, Daniela Rus
Computer Science Technical Reports
We present and analyze the off-line star algorithm for clustering static information systems and the on-line star algorithm for clustering dynamic information systems. These algorithms partition a document collection into a number of clusters that is naturally induced by the collection. We show a lower bound on the accuracy of the clusters produced by these algorithms. We use the random graph model to show that both star algorithms produce correct clusters in time Theta(V + E). Finally, we provide data from extensive experiments.
Velocity Estimation Via A Neural Network Enhanced By Classical Detection Algorithms, Zeki Berk Hamşioğlu
Velocity Estimation Via A Neural Network Enhanced By Classical Detection Algorithms, Zeki Berk Hamşioğlu
Electrical & Computer Engineering Theses & Dissertations
The goal of this research is to show how to solve a velocity estimation problem using a neural network connected to an array of sensors. Motivated by biological studies involving insect vision, the neural network utilized is a member of a class of shunting neural networks. When an object moves across the face of the sensor array, the neural network's pulse response is first temporally located using classical M-ary detection techniques. Both the deterministic and stochastic cases are considered. Then the network's pulse response is post-processed via an existing velocity estimation algorithm based on a Volterra series model of the …
Formal Specification Of Fragmentation And Reassembly In Ipv6, Ibrahim Sahin
Formal Specification Of Fragmentation And Reassembly In Ipv6, Ibrahim Sahin
Electrical & Computer Engineering Theses & Dissertations
Development and implementation of a networking standard such as the new Internet Protocol (IPv6) is a very difficult process. Different implementations of the standard must be fully compatible to allow different computers to communicate with each other. However, standards are often ambiguous, frequently a result of providing specifications in the English language. A more formal specification could assist in the design of systems. This thesis demonstrates that capability using the Prototype Verification System (PVS).
In this thesis study, a formal specification for fragmentation and reassembly in IPv6 was created to provide a tool for the standardization of IPv6 using PVS. …
The Role Of The Library In The Computerized Campus, Ryan Johnson, Sonya Shepherd, A. Mccrory
The Role Of The Library In The Computerized Campus, Ryan Johnson, Sonya Shepherd, A. Mccrory
Sonya S. Gaither
No abstract provided.
Solving Pdes Using An Agent Based Architecture, John R. Rice
Solving Pdes Using An Agent Based Architecture, John R. Rice
Department of Computer Science Technical Reports
No abstract provided.
Defining And Refining Frameless Rendering, Ellen J. Scher Zagier
Defining And Refining Frameless Rendering, Ellen J. Scher Zagier
Link Foundation Modeling, Simulation and Training Fellowship Reports
Frame1ess Rendering (FR) is a rendering paradigm which performs stochastic temporal filtering by updating pixels in a random order, based on most recent available input data, and displaying them to the screen immediately (3]. It has inherent in its design, visual artifacts that come across as "spatial scatter''. Due to the asynchronicity of pixel updates, a noisy or "scattered" image is perceived if the update rate is not fast enough. We describe the fac1ors that influence the perceptual quality when Frarneless Rendering is implemented such as object and viewpoint velocities, pattern and object size, and pattern and object separation. The …
Distributed Collaborative Learning Environments, Mark C. Kilby
Distributed Collaborative Learning Environments, Mark C. Kilby
Link Foundation Modeling, Simulation and Training Fellowship Reports
The evolution of technologies for the World Wide Web (WWW), computer-supported cooperative work (CSCW) and distributed simulation provides new opportunities for education delivery as well as unique perspectives for training. Simulation follows a learn-by-doing philosophy . The WWW and CSCW provides a collaborative learning perspective by encouraging collective knowledge building. By merging these two approaches, Distributed Collaborative Learning Environments (DCLEs) can be developed to provide new approaches to training in the military, industry, and academia. Traditional approaches toward educational rely on an information transfer model. Instructors deliver the material to the students and students are tested on how well they …
Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 13, Number 7, September 1997, College Of Engineering And Computer Science, Wright State University
Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 13, Number 7, September 1997, College Of Engineering And Computer Science, Wright State University
BITs and PCs Newsletter
A ten page newsletter created by the Wright State University College of Engineering and Computer Science that addresses the current affairs of the college.
Post-Rendering 3d Image Warping, William R. Mark
Post-Rendering 3d Image Warping, William R. Mark
Link Foundation Modeling, Simulation and Training Fellowship Reports
A pair of rendered images and their Z-buffers contain almost all of the information necessary to re-render from nearby viewpoints. For the small changes in viewpoint that occur in a fraction of a second, this information is sufficient for high quality re-rendering with cost independent of scene complexity. Re-rendering from previously computed views allows an order-of-magnitude increase in apparent frame rate over that provided by conventional rendering alone. It can also compensate for system latency in local or remote display. We use McMillan and Bishop's image warping algorithm to re-render, allowing us to compensate for viewpoint translation as well as …
Information Retrieval On The World Wide Web, Venkat N. Gudivada, Vijay V. Raghavan, William I. Grosky, Rajesh Kasanagottu
Information Retrieval On The World Wide Web, Venkat N. Gudivada, Vijay V. Raghavan, William I. Grosky, Rajesh Kasanagottu
Computer Science Faculty Research & Creative Works
Effective search and retrieval are enabling technologies for realizing the full potential of the Web. The authors examine relevant issues, including methods for representing document content. They also compare available search tools and suggest methods for improving retrieval effectiveness.
From Contemporary Workflow Process Automation To Adaptive And Dynamic Work Activity Coordination And Collaboration, Amit P. Sheth
From Contemporary Workflow Process Automation To Adaptive And Dynamic Work Activity Coordination And Collaboration, Amit P. Sheth
Kno.e.sis Publications
The article outlines a research agenda for researchers in the area of workflow. We believe that today's workflow systems should evolve to what is termed as work coordination and collaboration systems (WCCSs). A WCCS will: (a) adapt to various changes in the organization (including its interactions with external organizations) and the organizational processes by being able to change the process definitions as well as change the processes and component activities while they are being enacted or executed; and (b) support a unified framework for managing coordination, collaboration, and information based decision making activities that naturally occur as part of organizational …
A Measurement Of The Qcd Colour Factors And A Limit On The Light Gluino, Barate, R.; Et Al., M. Thulasidas
A Measurement Of The Qcd Colour Factors And A Limit On The Light Gluino, Barate, R.; Et Al., M. Thulasidas
Research Collection School Of Computing and Information Systems
Using data collected from 1992 to 1995 with the ALEPH detector at LEP, a measurement of the colour factor ratios CA/CF and TF /CF and the strong coupling constant αs = CFαs(MZ)/(2π) has been performed by fitting theoretical predictions simultaneously to the measured differential two-jet rate and angular distributions in four-jet events. The result is found to be in excellent agreement with QCD, {fx4-1} Fixing CA/CF and TF/CF to the QCD values permits a determination of αs(MZ) and ηf, the number of active flavours. With this measurement the existence of a gluino with mass below 6.3 GeV/c2 is excluded at …
Extracting Functionally Equivalent Object-Oriented Designs From Legacy Imperative Code, Ricky E. Sward
Extracting Functionally Equivalent Object-Oriented Designs From Legacy Imperative Code, Ricky E. Sward
Theses and Dissertations
This research defines a methodology for automatically extracting functionally equivalent object-oriented designs from legacy imperative programs. The Parameter-Based Object Identification (PBOI) methodology is based on fundamental ideas that relate programs written in imperative languages such as C or COBOL to objects and classes written in object-oriented languages such as Ada 95 or C ++. Transformations have been developed that formalize the PBOI methodology and a formal proof is provided showing the extracted object-oriented design is functionally equivalent to the legacy imperative system. To focus the task of re-engineering, generic models of imperative programming languages and object-oriented programming languages have been …