Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (7242)
- China Simulation Federation (3382)
- TÜBİTAK (3020)
- Selected Works (2644)
- Wright State University (2602)
-
- Purdue University (2057)
- Old Dominion University (1458)
- Missouri University of Science and Technology (1366)
- Edith Cowan University (1173)
- Air Force Institute of Technology (1108)
- University of Texas at El Paso (1105)
- Dartmouth College (1022)
- San Jose State University (995)
- University of Nebraska - Lincoln (979)
- Embry-Riddle Aeronautical University (853)
- City University of New York (CUNY) (819)
- Technological University Dublin (792)
- Washington University in St. Louis (785)
- Brigham Young University (759)
- California Polytechnic State University, San Luis Obispo (732)
- Kennesaw State University (714)
- University for Business and Technology in Kosovo (626)
- University of Texas at Arlington (614)
- Nova Southeastern University (535)
- Portland State University (530)
- SelectedWorks (527)
- Western University (525)
- New Jersey Institute of Technology (516)
- Syracuse University (501)
- University of Nebraska at Omaha (485)
- Keyword
-
- Machine learning (1338)
- Deep learning (800)
- Artificial intelligence (659)
- Machine Learning (650)
- Computer Science (637)
-
- Security (619)
- Computer science (434)
- Privacy (409)
- Cybersecurity (407)
- Simulation (379)
- Technical Reports (369)
- Classification (368)
- UTEP Computer Science Department (367)
- Deep Learning (349)
- Data mining (348)
- Algorithms (337)
- Optimization (337)
- Neural networks (307)
- Artificial Intelligence (299)
- Computer vision (290)
- Software engineering (254)
- College for Professional Studies (253)
- Education (253)
- Clustering (251)
- Cloud computing (244)
- Department of Computer Science and Engineering (243)
- Applied sciences (237)
- School of Computer & Information Science (236)
- Visualization (236)
- Natural language processing (232)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (6890)
- Journal of System Simulation (3382)
- Turkish Journal of Electrical Engineering and Computer Sciences (3020)
- Theses and Dissertations (2498)
- Department of Computer Science Technical Reports (1721)
-
- Computer Science & Engineering Syllabi (1312)
- Departmental Technical Reports (CS) (892)
- Master's Projects (845)
- Electronic Theses and Dissertations (738)
- Computer Science Faculty Publications (725)
- All Computer Science and Engineering Research (683)
- Computer Science Technical Reports (673)
- Computer Science Faculty Research & Creative Works (601)
- Faculty Publications (588)
- Kno.e.sis Publications (543)
- Journal of Digital Forensics, Security and Law (536)
- Computer Science Faculty Publications and Presentations (508)
- Dissertations (505)
- CCE Theses and Dissertations (488)
- All Works (478)
- Walden Dissertations and Doctoral Studies (468)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (463)
- Masters Theses (402)
- Computer Science and Engineering Theses (356)
- Electronic Thesis and Dissertation Repository (334)
- Theses (334)
- Computer Science and Software Engineering (332)
- USF Tampa Graduate Theses and Dissertations (320)
- Computer Science: Faculty Publications (318)
- Mathematics, Statistics and Computer Science Faculty Research and Publications (315)
- Publication Type
Articles 53761 - 53790 of 58015
Full-Text Articles in Physical Sciences and Mathematics
Resource Access Control For An Internet User Agent, Nataraj Nagaratnam, Steven B. Byrne
Resource Access Control For An Internet User Agent, Nataraj Nagaratnam, Steven B. Byrne
Electrical Engineering and Computer Science - All Scholarship
The rapid increase in the Internet's connectivity has lead to proportional increase in the development of Web-based applications. Usage of downloadable content has proved effective in a number of emerging applications including electronic commerce, software components on-demand, and collaborative systems. In all these cases, Internet user agents (like browsers, tuners) are widely used by the clients to utilize and execute such downloadable content. With this new technology of using downloadable content comes the problem of the downloaded content obtaining unauthorized access to the client's resources. In effect, granting a hostile remote principal the requested access to client's resources may lead …
The Software Architecture Of A Virtual Distributed Computing Environment, Haluk Topcuoglu, Salim Hariri, Wojtek Furmanski, Jon Valente
The Software Architecture Of A Virtual Distributed Computing Environment, Haluk Topcuoglu, Salim Hariri, Wojtek Furmanski, Jon Valente
Electrical Engineering and Computer Science - All Scholarship
The requirements of grand challenge problems and the deployment of gigabit networks makes the network computing framework an attractive and cost effective computing environment with which to interconnect geographically distributed processing and storage resources. Our project, Virtual Distributed Computing Environment (VDCE), provides a problem-solving environment for high-performance distributed computing over wide area networks. VDCE delivers well-defined library functions that relieve end-users of tedious task implementations and also support reusability. In this paper we present the conceptual design of VDCE software architecture, which is defined in three modules: a) the Application Editor, a user-friendly application development environment that generates the Application …
A Compiler Algorithm For Optimizing Locality In Loop Nests, Mahmut Kandemir, J. Ramanujam, Alok Choudhary
A Compiler Algorithm For Optimizing Locality In Loop Nests, Mahmut Kandemir, J. Ramanujam, Alok Choudhary
Electrical Engineering and Computer Science - All Scholarship
This paper describes an algorithm to optimize cache locality in scientific codes on uniprocessor and multiprocessor machines. A distinctive characteristic of our algorithm is that it considers loop and data layout transformations in a unified framework. We illustrate through examples that our approach is very effective at reducing cache misses and tile size sensitivity of blocked loop nests; and can optimize nests for which optimization techniques based on loop transformations alone are not successful. An important special case is the one in which data layouts of some arrays are fixed and cannot be changed. We show how our algorithm can …
Parallel Domain Decomposition And Load Balancing Using Space-Filling Curves, Srinivas Aluru, Faith E. Sevilgen
Parallel Domain Decomposition And Load Balancing Using Space-Filling Curves, Srinivas Aluru, Faith E. Sevilgen
Electrical Engineering and Computer Science - All Scholarship
Partitioning techniques based on space-filling curves have received much recent attention due to their low running time and good load balance characteristics. The basic idea underlying these methods is to order the multidimensional data according to a space-filling curve and partition the resulting one-dimensional order. However, space-filling curves are defined for points that lie on a uniform grid of a particular resolution. It is typically assumed that the coordinates of the points are representable using a fixed number of bits, and the run-times of the algorithms depend upon the number of bits used. In this paper, we present a simple …
An Efficient K-Means Clustering Algorithm, Khaled Alsabti, Sanjay Ranka, Vineet Singh
An Efficient K-Means Clustering Algorithm, Khaled Alsabti, Sanjay Ranka, Vineet Singh
Electrical Engineering and Computer Science - All Scholarship
In this paper, we present a novel algorithm for performing k-means clustering. It organizes all the patterns in a k-d tree structure such that one can find all the patterns which are closest to a given prototype efficiently. The main intuition behind our approach is as follows. All the prototypes are potential candidates for the closest prototype at the root level. However, for the children of the root node, we may be able to prune the candidate set by using simple geometrical constraints. This approach can be applied recursively until the size of the candidate set is one for each …
Selective Crossover: Towards Fitter Offspring, Chilukuri K. Mohan
Selective Crossover: Towards Fitter Offspring, Chilukuri K. Mohan
Electrical Engineering and Computer Science - All Scholarship
A new general-purpose crossover operator is proposed. The representation of a candidate solution is slightly perturbed, and the ensuing changes in fitness are calculated. Such fitness changes (for parents) are used in constructing the offspring resulting from crossover. Experiments with several sets of problems demonstrate that this approach leads to rapid increases in average and best fitness, and performs much better than traditional general-purpose crossover operators.
A Global Computing Environment For Networked Resources, Haluk Topcuoglu, Salim Hariri
A Global Computing Environment For Networked Resources, Haluk Topcuoglu, Salim Hariri
Electrical Engineering and Computer Science - All Scholarship
Current advances in high-speed networks and WWW technologies have made network computing a cost-effective, high-performance computing alternative. New software tools are being developed to utilize efficiently the network computing environment. Our project, called Virtual Distributed Computing Environment (VDCE), is a high-performance computing environment that allows users to write and evaluate networked applications for different hardware and software configurations using a web interface. In this paper we present the software architecture of VDCE by emphasizing application development and specification, scheduling, and execution/runtime aspects.
Simulated Annealing And Genetic Algorithms For Partial Shape Matching, Ender Ozcan, Chilukuri K. Mohan
Simulated Annealing And Genetic Algorithms For Partial Shape Matching, Ender Ozcan, Chilukuri K. Mohan
Electrical Engineering and Computer Science - All Scholarship
Partial shape matching may be viewed as an optimization problem, to be solved using methods such as simulated annealing (SA) and genetic algorithms (GAs). We apply and compare both these methods for matching input shapes with model shapes described in terms of features such as line segments and angles. The quality of matching is gauged using a measure derived from attributed shape grammars [10, 11]. Current results show that both SA and GA succeed in the shape matching task; the GA is faster and yields the global optimum more often than the versions of SA implemented.
Standardization Of A Communication Middleware For High-Performance Real-Time Systems, Arkady Kanevsky, Anthony Skjellum, Jerrell Watts
Standardization Of A Communication Middleware For High-Performance Real-Time Systems, Arkady Kanevsky, Anthony Skjellum, Jerrell Watts
Electrical Engineering and Computer Science - All Scholarship
The last several years saw an emergence of standardization activities for real-time systems including standardization of operating systems (series of POSIX standards [1]), of communication for distributed (POSIX.21 [10]) and parallel systems (MPI/RT [5]) and real-time object management (realtime CORBA [9]). This article describes the ongoing standardization work and implementation of communication middleware for high performance real-time computing. The real-time message passing interface (MPI/RT) advances the non-real-time high-performance communication standard Message Passing Interface Standard (MPI), emphasizing changes that enable and support real-time communication, and is targeted for embedded, fault-tolerant and other real-time systems. MPI/RT is the only communication middleware layer …
Topology And Logic Programming Semantics, Pascal Hitzler
Topology And Logic Programming Semantics, Pascal Hitzler
Computer Science and Engineering Faculty Publications
Logic programming employs logic as a programming language. Thus a logic program consists of a set of clauses of a certain form most often a subset of the clauses of first order logic viewed as axioms. Computation in this paradigm is deduction from these axioms via some interpreter.
Logic programming semantics is concerned with background theory for logic programming. It tries to provide models for logic programs to give them their intended meaning and to connect them with practically implementable interpreters.
Multiprocessor Out-Of-Core Ffts With Distributed Memory And Parallel Disks, Thomas H. Cormen, Jake Wegmann, David M. Nicol
Multiprocessor Out-Of-Core Ffts With Distributed Memory And Parallel Disks, Thomas H. Cormen, Jake Wegmann, David M. Nicol
Computer Science Technical Reports
This paper extends an earlier out-of-core Fast Fourier Transform (FFT) method for a uniprocessor with the Parallel Disk Model (PDM) to use multiple processors. Four out-of-core multiprocessor methods are examined. Operationally, these methods differ in the size of "mini-butterfly" computed in memory and how the data are organized on the disks and in the distributed memory of the multiprocessor. The methods also perform differing amounts of I/O and communication. Two of them have the remarkable property that even though they are computing the FFT on a multiprocessor, all interprocessor communication occurs outside the mini-butterfly computations. Performance results on a small …
A Proposed Solution For Word-Recognition Deficit In The Computer Environment, Hyacinth Williams
A Proposed Solution For Word-Recognition Deficit In The Computer Environment, Hyacinth Williams
CCE Theses and Dissertations
Most college students with reading disabilities have difficulty with word recognition. The purpose of this study was to use an investigator-made cue word list to increase low word recognition skills among college students while creating slides for a university curriculum using a simple presentation tool. The investigator randomly divided fourteen subjects into two groups. One group received the treatment and the other did not. Subjects received fifty minutes to complete a five-slide presentation. The investigator used four different data collection processes for data collection. Beyond this, the investigator presented the results using rank correlation. Results from this study indicated that …
Financial Prediction And Trading Strategies Using Neurofuzzy Approaches, K. N. Pantazopoulos, L. H. Tsoukalas, N. G. Bourbakis, M. J. Brün, Elias N. Houstis
Financial Prediction And Trading Strategies Using Neurofuzzy Approaches, K. N. Pantazopoulos, L. H. Tsoukalas, N. G. Bourbakis, M. J. Brün, Elias N. Houstis
Department of Computer Science Technical Reports
No abstract provided.
Computing Volumes Of Solids Enclosed By Recursive Subdivision Surfaces, Jörg Peters, Ahmad Nasri
Computing Volumes Of Solids Enclosed By Recursive Subdivision Surfaces, Jörg Peters, Ahmad Nasri
Department of Computer Science Technical Reports
No abstract provided.
Future Scientific Software Systems, John R. Rice
Future Scientific Software Systems, John R. Rice
Department of Computer Science Technical Reports
No abstract provided.
Videotext Database System, Haitao Jiang, Danilo Montesi, Ahmed K. Elmagarmid
Videotext Database System, Haitao Jiang, Danilo Montesi, Ahmed K. Elmagarmid
Department of Computer Science Technical Reports
No abstract provided.
Computing Moments Of Piecewise Polynomial Surfaces, Carlos Gonzalez-Ochoa, Scott Mccammon, Jörg Peters
Computing Moments Of Piecewise Polynomial Surfaces, Carlos Gonzalez-Ochoa, Scott Mccammon, Jörg Peters
Department of Computer Science Technical Reports
No abstract provided.
Performance Analysis And Visualization Tools For Parallel Computing, K. N. Pantazopoulos, Elias N. Houstis
Performance Analysis And Visualization Tools For Parallel Computing, K. N. Pantazopoulos, Elias N. Houstis
Department of Computer Science Technical Reports
No abstract provided.
Semantic Analysis Of The Postscript Page Description Language, Ben Knuth
Semantic Analysis Of The Postscript Page Description Language, Ben Knuth
Honors Theses, 1963-2015
The Postscript page description language is a functional programming language. Central to the effective use of the language are the functional properties of delayed evaluation and referential transparency. Postscript performs all of its operations via distinct, multiple stacks which stores function binding lists, function parameters, and function code. By way of these stacks, Postscript creates dynamic computational states which leads identical expressions to evaluate to different results. This hints towards the polymorphic quality of an object-oriented language, even though it contradicts the functional precept of manifest interfaces thereby introducing a nonorthogonality. One other streak of object-orientation that shows up in …
How Secure Transactions Are Achieved On The Internet Using Ssl: An Honors Presentation Of Internet Security Practices And Protocols, Julie Klinefelter
How Secure Transactions Are Achieved On The Internet Using Ssl: An Honors Presentation Of Internet Security Practices And Protocols, Julie Klinefelter
Honors Theses, 1963-2015
The goal of this project is to research and present the security protocol "Secure Sockets Layer" or as it is more commonly referred to, "SSL." SSL is one of the main encryption techniques used by the internet industry to help ensure the secure transfer of information across the internet. It is one of the main encryption techniques currently under review by Internet Engineering Task Force. SSL is comprised of a strict protocol that initiates a secure "session" between two computing devices. The session is established above the transport level (on the OSI model) and encrypts from the session up. Therefore …
Examining Locally Varying Weights For Nearest Neighbor Algorithms, Nicholas Howe, Claire Cardie
Examining Locally Varying Weights For Nearest Neighbor Algorithms, Nicholas Howe, Claire Cardie
Computer Science: Faculty Publications
Previous work on feature weighting for case-based learning algorithms has tended to use either global weights or weights that vary over extremely local regions of the case space. This paper examines the use of coarsely local weighting schemes, where feature weights are allowed to vary but are identical for groups or clusters of cases. We present a new technique, called class distribution weighting (CDW), that allows weights to vary at the class level. We further extend CDW into a family of related techniques that exhibit varying degrees of locality, from global to local. The class distribution techniques are then applied …
Computer-Aided Mechanical Assembly Design Using Configuration Spaces, Leo Joskowicz, Elisha Sacks
Computer-Aided Mechanical Assembly Design Using Configuration Spaces, Leo Joskowicz, Elisha Sacks
Department of Computer Science Technical Reports
No abstract provided.
Interface Relaxation Methods For Elliptic Differential Equations, John R. Rice, P. Tsompanopoulou, E. Vavalis
Interface Relaxation Methods For Elliptic Differential Equations, John R. Rice, P. Tsompanopoulou, E. Vavalis
Department of Computer Science Technical Reports
No abstract provided.
Adaptive Multicast Routing In Wormhole Networks, Ran Libeskind-Hadas, Tom Hehre '96, Andrew Hutchings '98, Mark Reyes '98, Kevin Watkins '97
Adaptive Multicast Routing In Wormhole Networks, Ran Libeskind-Hadas, Tom Hehre '96, Andrew Hutchings '98, Mark Reyes '98, Kevin Watkins '97
All HMC Faculty Publications and Research
Multicast communication has applications in a number of fundamental operations in parallel computing. An effective multicast routing algorithm must be free from both livelock and deadlock while minimizing communication latency. We describe two classes of multicast wormhole routing algorithms that employ the multi-destination wormhole hardware mechanism proposed by Lin et al. [12] and Panda et al. [17]. Specific examples of these classes of algorithms are described and experimental results suggests that such algorithms enjoy low communication latencies across a range of network loads.
Microlanguages For Operating System Specialization, Calton Pu, Andrew P. Black, Crispin Cowan, Jonathan Walpole, Charles Consel
Microlanguages For Operating System Specialization, Calton Pu, Andrew P. Black, Crispin Cowan, Jonathan Walpole, Charles Consel
Computer Science Faculty Publications and Presentations
Specialization is a technique that has the potential to provide operating system clients with the performance and functionality that they need, while still retaining the advantages of a simple generic code base for the operating system maintainer. However, at present the specialization process is labor-intensive and requires the knowledge of an expert in the domain of application behavior. In order to realize the full advantages of specialization, we believe that the process must be automated. This means building tools for specialization, and also making the domain knowledge explicit in some form or other. A specialization toolkit has been developed jointly …
The Recursive Multi-Threaded Software Life-Cycle, Scott James Simon
The Recursive Multi-Threaded Software Life-Cycle, Scott James Simon
Theses Digitization Project
No abstract provided.
International Student Services Opportunity Database (Issodb), Sailaja Malireddy
International Student Services Opportunity Database (Issodb), Sailaja Malireddy
Theses Digitization Project
No abstract provided.
Response Surface Methodology: An Analytical Method For Locating Migrated Contaminant Sources, Orlando J. Dona Jr.
Response Surface Methodology: An Analytical Method For Locating Migrated Contaminant Sources, Orlando J. Dona Jr.
Theses and Dissertations
The use and storage of hazardous chemicals at U.S. military facilities often adversely affect the groundwater when contaminants infiltrate the subsurface as a result of leaks and accidental spills. These contaminants, if not located and remediated in a relatively short time, may move and settle unpredictably, essentially creating a source some distance from the original leak or spill. An example of this phenomenon is found with migrating dense nonaqueous phase liquid (DNAPL) contaminants. Although various methods for estimating the present day locations of these migrated contaminants are in use, accurately pinpointing the source of contaminants remains a difficult problem in …
Review Of Personal Identification Systems, J. M. Cross
Review Of Personal Identification Systems, J. M. Cross
Research outputs pre 2011
The growth of the use of biometric personal identification systems has been relatively steady over the last 20 years. The expected biometric revolution which was forecast since the mid 1970's has not yet occurred. The main factor for lower than expected growth has been the cost and user acceptance of the systems. During the last few years, however, a new generation of more reliable, less expensive and better designed biometric devices have come onto the market. This combined with the anticipated expansion of new reliable, user friendly inexpensive systems provides a signal that the revolution is about to begin. This …
Timestamp-Based Approach For The Detection And Resolution Of Mutual Conflicts In Distributed Systems, Sanjay Kumar Madria
Timestamp-Based Approach For The Detection And Resolution Of Mutual Conflicts In Distributed Systems, Sanjay Kumar Madria
Computer Science Faculty Research & Creative Works
We present a timestamp based algorithm for the detection of both write-write and read-write conflicts for a single file in distributed systems during network partitions. Our algorithm allows operations to occur in different network partitions simultaneously. When the sites from different partitions merge, the algorithm detects and resolves both read-write and write-write conflicts without taking into account the semantics of the transactions. Once the conflicts have been detected some reconciliation steps for the resolution of conflicts have also been proposed. Our algorithm will be useful in real-time systems where timeliness of operations is more important than response time (delayed commit)