Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (7242)
- China Simulation Federation (3382)
- TÜBİTAK (3020)
- Selected Works (2644)
- Wright State University (2602)
-
- Purdue University (2057)
- Old Dominion University (1458)
- Missouri University of Science and Technology (1366)
- Edith Cowan University (1173)
- Air Force Institute of Technology (1108)
- University of Texas at El Paso (1105)
- Dartmouth College (1022)
- San Jose State University (995)
- University of Nebraska - Lincoln (979)
- Embry-Riddle Aeronautical University (853)
- City University of New York (CUNY) (819)
- Technological University Dublin (792)
- Washington University in St. Louis (785)
- Brigham Young University (759)
- California Polytechnic State University, San Luis Obispo (732)
- Kennesaw State University (714)
- University for Business and Technology in Kosovo (626)
- University of Texas at Arlington (614)
- Nova Southeastern University (535)
- Portland State University (530)
- SelectedWorks (527)
- Western University (525)
- New Jersey Institute of Technology (516)
- Syracuse University (501)
- University of Nebraska at Omaha (485)
- Keyword
-
- Machine learning (1338)
- Deep learning (800)
- Artificial intelligence (659)
- Machine Learning (650)
- Computer Science (637)
-
- Security (619)
- Computer science (434)
- Privacy (409)
- Cybersecurity (407)
- Simulation (379)
- Technical Reports (369)
- Classification (368)
- UTEP Computer Science Department (367)
- Deep Learning (349)
- Data mining (348)
- Algorithms (337)
- Optimization (337)
- Neural networks (307)
- Artificial Intelligence (299)
- Computer vision (290)
- Software engineering (254)
- College for Professional Studies (253)
- Education (253)
- Clustering (251)
- Cloud computing (244)
- Department of Computer Science and Engineering (243)
- Applied sciences (237)
- School of Computer & Information Science (236)
- Visualization (236)
- Natural language processing (232)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (6890)
- Journal of System Simulation (3382)
- Turkish Journal of Electrical Engineering and Computer Sciences (3020)
- Theses and Dissertations (2498)
- Department of Computer Science Technical Reports (1721)
-
- Computer Science & Engineering Syllabi (1312)
- Departmental Technical Reports (CS) (892)
- Master's Projects (845)
- Electronic Theses and Dissertations (738)
- Computer Science Faculty Publications (725)
- All Computer Science and Engineering Research (683)
- Computer Science Technical Reports (673)
- Computer Science Faculty Research & Creative Works (601)
- Faculty Publications (588)
- Kno.e.sis Publications (543)
- Journal of Digital Forensics, Security and Law (536)
- Computer Science Faculty Publications and Presentations (508)
- Dissertations (505)
- CCE Theses and Dissertations (488)
- All Works (478)
- Walden Dissertations and Doctoral Studies (468)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (463)
- Masters Theses (402)
- Computer Science and Engineering Theses (356)
- Electronic Thesis and Dissertation Repository (334)
- Theses (334)
- Computer Science and Software Engineering (332)
- USF Tampa Graduate Theses and Dissertations (320)
- Computer Science: Faculty Publications (318)
- Mathematics, Statistics and Computer Science Faculty Research and Publications (315)
- Publication Type
Articles 53671 - 53700 of 58015
Full-Text Articles in Physical Sciences and Mathematics
Single Row Routing: Theoretical And Experimental Performance Evaluation, And New Heuristic Development, David A. Hysom
Single Row Routing: Theoretical And Experimental Performance Evaluation, And New Heuristic Development, David A. Hysom
Computer Science Theses & Dissertations
The Single Row Routing Problem (SRRP) is an abstraction arising from real-world multilayer routing concerns. While NP-Complete, development of efficient SRRP routing heuristics are of vital concern to VLSI design. Previously, researchers have introduced various heuristics for SRRP; however, a comprehensive examination of SRRP behavior has been lacking.
We are particularly concerned with the street-congestion minimization constraint, which is agreed to be the constraint of greatest interest to industry. Several theorems stating lower bounds on street congestion are known. We show that these bounds are not tight in general, and argue they may be in error by at least 50% …
Introduction To Heterogeneous Computing Including Corba (Common Object Request Broker Architecture), Matthew S. Staben
Introduction To Heterogeneous Computing Including Corba (Common Object Request Broker Architecture), Matthew S. Staben
Undergraduate University Honors Capstones
This capstone discusses the ability of two or more machines to cooperatively work to accomplish a task, called heterogeneous computing. It explores different ways for computers to connect. Ultimately, Staben determines that object request brokers compliant systems are ideal for communication across servers.
Network Servers For Multidisciplinary Problem Solving, Anupam Joshi, Sanjiva Weerawarana, Elias N. Houstis, John R. Rice, Shahani Markus
Network Servers For Multidisciplinary Problem Solving, Anupam Joshi, Sanjiva Weerawarana, Elias N. Houstis, John R. Rice, Shahani Markus
Department of Computer Science Technical Reports
No abstract provided.
On The Effect Of Traffic Self-Similarity On Network Performance, Kihong Park, Gitae Kim, Mark Crovella
On The Effect Of Traffic Self-Similarity On Network Performance, Kihong Park, Gitae Kim, Mark Crovella
Department of Computer Science Technical Reports
No abstract provided.
Faster Image Template Matching In The Sum Of The Absolute Value Of Differences Measure, Mikhail J. Atallah
Faster Image Template Matching In The Sum Of The Absolute Value Of Differences Measure, Mikhail J. Atallah
Department of Computer Science Technical Reports
No abstract provided.
Computer Vulnerability Analysis: Thesis Proposal, Ivan Krsul
Computer Vulnerability Analysis: Thesis Proposal, Ivan Krsul
Department of Computer Science Technical Reports
No abstract provided.
Investigating The Use Of Kalman Filtering Approaches For Dynamic Origin-Destination Trip Table Estimation, Pushkin Kachroo, Kaan Ozbay, Arvind Narayanan
Investigating The Use Of Kalman Filtering Approaches For Dynamic Origin-Destination Trip Table Estimation, Pushkin Kachroo, Kaan Ozbay, Arvind Narayanan
Electrical & Computer Engineering Faculty Research
This paper studies the applicability of Kalman filtering approaches for network wide traveler origin-destination estimation from link traffic volumes. The paper evaluates the modeling assumptions of the Kalman filters and examines the implications of such assumptions.
Feedback Control Solutions To Network Level User-Equilibrium Real-Time Dynamic Traffic Assignment Problems, Pushkin Kachroo, Kaan Ozbay
Feedback Control Solutions To Network Level User-Equilibrium Real-Time Dynamic Traffic Assignment Problems, Pushkin Kachroo, Kaan Ozbay
Electrical & Computer Engineering Faculty Research
A new method for performing dynamic traffic assignment (DTA) is presented which is applicable in real time, since the solution is based on feedback control. This method employs the design of nonlinear H∞ feedback control systems which is robust to certain class of uncertainties in the system. The solution aims at achieving user equilibrium on alternate routes in a network setting.
Prototype Implementation Of The Comprehensive Parallel Integration Tool Parint, Jay Ball
Prototype Implementation Of The Comprehensive Parallel Integration Tool Parint, Jay Ball
Masters Theses
The ParInt project allows users to integrate multivariate functions using parallel computers via different methods encompassed in an easy to use interface. This thesis describes the initial version of the ParInt package. Various pop up windows of the graphical user interface, program procedures, programming paradigms, integration theory, and future considerations are all described.
The Carnot Heterogeneous Database Project: Implemented Applications, Munindar Singh, Phil Cannata, Michael N. Huhns, Nigel Jacobs, Tomasz Ksiezyk, Kayliang Ong, Amit P. Sheth, Christine Tomlinson, Darrell Woelk
The Carnot Heterogeneous Database Project: Implemented Applications, Munindar Singh, Phil Cannata, Michael N. Huhns, Nigel Jacobs, Tomasz Ksiezyk, Kayliang Ong, Amit P. Sheth, Christine Tomlinson, Darrell Woelk
Kno.e.sis Publications
The Carnot project was an ambitious research project in heterogeneous databases. It integrated a variety of techniques to address a wide range of problems in achieving interoperation in heterogeneous environments. Here we describe some of the major implemented applications of this project. These applications concern(a) accessing a legacy scientific database, (b) automating a workflow involving legacy systems, (c) cleaning data, and (d) retrieving semantically appropriate information from structured databases in response to text queries. These applications support scientific decision support, business process management, data integrity enhancement, and analytical decision support, respectively. They demonstrate Carnot‘s capabilities for (a) heterogeneous query processing, …
Characterizing A Portable Subset Of Behavioral Vhdl-93, Krishnaprasad Thirunarayan, Robert Ewing
Characterizing A Portable Subset Of Behavioral Vhdl-93, Krishnaprasad Thirunarayan, Robert Ewing
Kno.e.sis Publications
Goossens defined a structural operational semantics for a subset of VHDL-87 and proved that the parallelism present in VHDL is benign. We extend this work to include VHDL-93 features such as shared variables and postponed processes that change the underlying semantic model. In the presence of shared variables, nondeterministic execution of VHDL-93 processes destroys the unique meaning property. We identify and characterize a class of portable VHDL-93 descriptions for which unique meaning property can be salvaged. Our specification can serve as a correctness criteria for a VHDL-93 simulator.
A New On-Line Cash Check Scheme, Robert H. Deng, Yongfei Han, Albert B. Jeng, Teow-Hin Ngair
A New On-Line Cash Check Scheme, Robert H. Deng, Yongfei Han, Albert B. Jeng, Teow-Hin Ngair
Research Collection School Of Computing and Information Systems
This paper presents a new on-line cash check scheme which guarantees payor anonymity and improves upon existing similar schemes in efficiency and security.
Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 13, Number 4, April 1997, College Of Engineering And Computer Science, Wright State University
Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 13, Number 4, April 1997, College Of Engineering And Computer Science, Wright State University
BITs and PCs Newsletter
A ten page newsletter created by the Wright State University College of Engineering and Computer Science that addresses the current affairs of the college.
On The Automatic Generation Of Network Protocol Simulators, Andrew Chen
On The Automatic Generation Of Network Protocol Simulators, Andrew Chen
Honors Theses
Computers communicate with each other over various communication networks via a language known as a protocol. The design of the protocol can have a significant impact on the efficiency (and effectiveness) of the network. Because building an actual network to test the performance (and reliability) of a new protocol is rather expensive and time consuming, there is an interest in simulating network protocols in order to determine how efficient the communication network is. We are therefore interested in automatically generating simulators that could measure the performance of the new protocols. There are two main parts to this project. The first …
Parallel Programming, Peter Dailey
Parallel Programming, Peter Dailey
Honors Theses
The speed of technology is always increasing, especially in the field of computing. Unfortunately, the size of the problems needing to be solved are also growing in many areas. In order to keep up with this, parallel computing has become an important research area. The term parallel computing essentially refers to using multiple processors cooperating to solve a problem. For certain problems this can speed up the solution by a factor ofN, the number of processors being used. There are algorithms, for which there is no speed increase due to certain dependencies.
Mlpq: A Linear Constraint Database System With Aggregate Operators, Yiming Li
Mlpq: A Linear Constraint Database System With Aggregate Operators, Yiming Li
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
In this project report, I will discuss a Multiple Linear Programming Query (MLPQ) system and the theoretical background of this system.The MPLQ system is developed to solve some realistic problems involving both linear programming (UP) techniques and linear constraint databases (LCDBs) theory. The MLPQ system is aimed at providing a mechanism of bridging these two important areas. system basically consists of three parts which are a linear constraint database, an LP solver, and an interface between the LCDB and the LP solver. The LCDB of the MLPQ system contains multiple linear programming problems. The LP solver used in the MPLQ …
Distributed Query Processing For Structured And Bibliographic Databases, Ee Peng Lim, Ying Lu
Distributed Query Processing For Structured And Bibliographic Databases, Ee Peng Lim, Ying Lu
Research Collection School Of Computing and Information Systems
To support future digital library systems which draw information from different sources on the internet, we have to provide integrated queries to pre-existing database servers which contain structured, semi-structured and unstructured data. In this paper, we specifically examine the problem of querying both existing structured relational databases and bibliographic databases. By adopting the well-accepted Z39.50 standard protocol to access bibliographic databases in different legacy library systems, we have developed an extended SQL model, known as HarpSQL, to support integrated queries to both SQL databases and bibliographic databases. Using HarpSQL, one can not only query bibliographic databases in an SQL manner, …
Temporal Flocking And Cacophony Simulating Agent Communication In A Noisy Environment, Jessica R. Crawford
Temporal Flocking And Cacophony Simulating Agent Communication In A Noisy Environment, Jessica R. Crawford
Honors Theses
Realistic communication is one of the most difficult aspects of simulating group behavior because the patterns produced by group communication are complex and not easily definable. In this paper, we present a model, developed using artificial life methodology, for creating simulations of group communication. Our model employs autonomous, artificial agents to produce emergent group behavior that resembles the communication patterns of a group, specifically, a flock of birds. Each agent collects information about its environment and its neighbors and follows a set of rules designed to meet both group goals and individual agent goals. Because we seek to establish emergent …
Tact Volume 4 Issue 2, Touro College Department Of Academic Computing
Tact Volume 4 Issue 2, Touro College Department Of Academic Computing
Yearbooks and Newsletters
Touro Academic Computing Technologies "The Newsletter of the Department of Academic Computing at Touro College"
Three-Dimensional Aerodynamic Design Optimization Using Discrete Sensitivity Analysis And Parallel Computing, Amidu Olawale Oloso
Three-Dimensional Aerodynamic Design Optimization Using Discrete Sensitivity Analysis And Parallel Computing, Amidu Olawale Oloso
Mechanical & Aerospace Engineering Theses & Dissertations
A hybrid automatic differentiation/incremental iterative method was implemented in the general purpose advanced computational fluid dynamics code (CFL3D Version 4.1) to yield a new code (CFL3D.ADII) that is capable of computing consistently discrete first order sensitivity derivatives for complex geometries. With the exception of unsteady problems, the new code retains all the useful features and capabilities of the original CFL3D flow analysis code. The superiority of the new code over a carefully applied method of finite-differences is demonstrated.
A coarse grain, scalable, distributed-memory, parallel version of CFL3D.ADII was developed based on "derivative stripmining". In this data-parallel approach, an identical copy …
Designing A High-Quality Network: An Application-Oriented Approach, Sudheer Dharanikota
Designing A High-Quality Network: An Application-Oriented Approach, Sudheer Dharanikota
Computer Science Theses & Dissertations
As new computer network technologies emerge, the application designers and the application users expect an increasing level of quality of service from them. Hence, it is a common practice in the newer technologies to provide more Quality of Service (QoS) components. Until now, these QoS solutions have been both network-technology specific and network-oriented solutions. In this thesis, we present an application-oriented approach to design a high quality network which is independent of the underlying communication technology. In this thesis, we propose a QoS architecture to "provide predictable performance to the end-to-end application users in a high quality networking environment." In …
Object Access Control To Enable Internet Commerce, Chengqiang Chen
Object Access Control To Enable Internet Commerce, Chengqiang Chen
FIU Electronic Theses and Dissertations
Object-Orientation defines components (objects) that encapsulate data and functionality. Modern 00 programming languages have features that specify the degree of encapsulation in much detail. This thesis extends the access control specification capabilities to objects and puts more emphasis on the objects of Internet commerce. A simple and flexible framework of access control is introduced based on the concept of "token". A prototype implemented in Java demonstrates the feasibility of the ideas and related issues.
A Toolset For The Reengineering Of Complex Computer Systems, Franz J. Kurfess, Mrinalini Lankala, Ashok Vantipalli, Lonnie R. Welch
A Toolset For The Reengineering Of Complex Computer Systems, Franz J. Kurfess, Mrinalini Lankala, Ashok Vantipalli, Lonnie R. Welch
Computer Science and Software Engineering
This paper describes a set of tools for the reengineering of computer-based systems, in particular software. The toolset is based on an abstract intermediate representation (IR) which incorporates the system software architecture at five level of granularity: program level, task level, package/object instance level, subprogram level and statement level. The toolset provides a graphical user interface that allows various views of a software architecture, including call graph, rendezvous graph, call-rendezvous graph, call-data-rendezvous graph, control flow graph and dependence graphs. The information captured by the toolset is useful in software structure, flow and interaction analysis, tasks commonly performed manually during maintenance …
Electronic Enterprise Engineering - An Outline Of An Architecture, Michael Bieber, Michael Bartolacci, Jerry Fjermestad, Franz J. Kurfess, Qianhong Liu, Marvin Nakayama, Ajaz Rana, Wilhelm Rossak, Richard Scherl, Murat Tanik, Jason Wang, Raymond Yeh, Peter Ng, Richard Sweeney, Fabio Vitali
Electronic Enterprise Engineering - An Outline Of An Architecture, Michael Bieber, Michael Bartolacci, Jerry Fjermestad, Franz J. Kurfess, Qianhong Liu, Marvin Nakayama, Ajaz Rana, Wilhelm Rossak, Richard Scherl, Murat Tanik, Jason Wang, Raymond Yeh, Peter Ng, Richard Sweeney, Fabio Vitali
Computer Science and Software Engineering
In this paper we put forth a vision for organizations to fully embrace computer support. We propose a business-process oriented architecture for Electronic Enterprise Engineering (EEE) that will enable enterprises to manage and evolve all technological and organizational processes effectively; integrate and manage all enterprise information electronically; and empower knowledge workers at all levels with broad decision support capabilities. Our goal is for the EEE architecture to empower an enterprise to make the best use of its informational assets to operate effectively in this new era of electronic commerce. As part of this project we are developing a standard-based, customizable, …
A Split-Phase Interface For Parallel File Systems, Sanjay Khanna, David Kotz
A Split-Phase Interface For Parallel File Systems, Sanjay Khanna, David Kotz
Computer Science Technical Reports
We describe the effects of a new user-level library for the Galley Parallel File System. This library allows some pre-existing sequential programs to make use of the Galley Parallel File System with minimal modification. It permits programs to efficiently use the parallel file system because the user-level library groups accesses together. We examine the performance of our library, and we show how code needs to be modified to use the library.
Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 13, Number 3, March 1997, College Of Engineering And Computer Science, Wright State University
Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 13, Number 3, March 1997, College Of Engineering And Computer Science, Wright State University
BITs and PCs Newsletter
A ten page newsletter created by the Wright State University College of Engineering and Computer Science that addresses the current affairs of the college.
Quicksort Algorithm Again Revisted, Charles Knessl, Wojciech Szpankowski
Quicksort Algorithm Again Revisted, Charles Knessl, Wojciech Szpankowski
Department of Computer Science Technical Reports
No abstract provided.
Identification Of Spherical Virus Particles In Digitized Images Of Entire Electron Micrographs, Ioana M. Boier Martin, Dan C. Marinescu, Robert E. Lynch, Timothy S. Baker
Identification Of Spherical Virus Particles In Digitized Images Of Entire Electron Micrographs, Ioana M. Boier Martin, Dan C. Marinescu, Robert E. Lynch, Timothy S. Baker
Department of Computer Science Technical Reports
No abstract provided.
Matching For Run-Length Encoded Strings, Alberto Apostolico, Gad M. Landau, Steven Skiena
Matching For Run-Length Encoded Strings, Alberto Apostolico, Gad M. Landau, Steven Skiena
Department of Computer Science Technical Reports
No abstract provided.
Algorithms For Variable Length Subnet Address Assignment, Mikhail J. Atallah, Douglas E. Comer
Algorithms For Variable Length Subnet Address Assignment, Mikhail J. Atallah, Douglas E. Comer
Department of Computer Science Technical Reports
No abstract provided.