Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 2821 - 2850 of 6721

Full-Text Articles in Physical Sciences and Mathematics

Reducing Technology Costs For Small Real Estate Businesses Using Cloud And Mobility, Linda Anne-Marie Mcintosh Jan 2017

Reducing Technology Costs For Small Real Estate Businesses Using Cloud And Mobility, Linda Anne-Marie Mcintosh

Walden Dissertations and Doctoral Studies

Increased client accessibility strategies, awareness of technology cost, and factors of third-party data security capabilities are elements small real estate business (SREB) owners need to know before adopting cloud and mobility technology. The purpose of this multiple case study was to explore the strategies SREB owners use to implement cloud and mobility products to reduce their technology costs. The target population consisted of 3 SREB owners who had experience implementing cloud and mobility products in their businesses in the state of Texas. The conceptual framework of this research study was the technology acceptance model theory. Semistructured interviews were conducted and …


Evaluating Sociotechnical Factors Associated With Telecom Service Provisioning: A Case Study, Fahad Iqbal Jan 2017

Evaluating Sociotechnical Factors Associated With Telecom Service Provisioning: A Case Study, Fahad Iqbal

Walden Dissertations and Doctoral Studies

Provisioning Internet services remains an area of concern for Internet service providers. Despite investments to improve resources and technology, the understanding of sociotechnical factors that influence the service-provisioning life cycle remains limited. The purpose of this case study was to evaluate the influence of sociotechnical factors associated with telecom service provisioning and to explore the critical success and failure factors, specifically in the telecommunication industry of Kuwait. Guided by sociotechnical systems theory, this qualitative exploratory case study approach examined a purposeful sample of 19 participants comprising of managers, engineers, and technicians who had the knowledge and experience of the service-provisioning …


Strategies Information And Communication Technology Managers Use To Build Employee Competencies, Thulaganyo Arnold Rabogadi Jan 2017

Strategies Information And Communication Technology Managers Use To Build Employee Competencies, Thulaganyo Arnold Rabogadi

Walden Dissertations and Doctoral Studies

The World Economic Forum (WEF) found that Botswana's information and communication technology (ICT) networked readiness index (NRI) had declined from position 89 in 2012 to 104 in 2015. A decline in Botswana's ICT NRI resulted in a modest gross domestic product (GDP) growth increasing from 4.2% in 2012 to 5.0% in 2015. The purpose of this qualitative multiple case study was to explore strategies ICT service provider managers use to build employee competencies to address ICT infrastructure performance deficiencies. The target population for this study consisted of over 120 managers from 2 ICT service providers located in Gaborone and Francistown …


Evaluating Intention To Use Remote Robotics Experimentation In Programming Courses, Pericles Leng Cheng Jan 2017

Evaluating Intention To Use Remote Robotics Experimentation In Programming Courses, Pericles Leng Cheng

Walden Dissertations and Doctoral Studies

The Digital Agenda for Europe (2015) states that there will be 825,000 unfilled vacancies for Information and Communications Technology by 2020. This lack of IT professionals stems from the small number of students graduating in computer science. To retain more students in the field, teachers can use remote robotic experiments to explain difficult concepts. This correlational study used the unified theory of acceptance and use of technology (UTAUT) to examine if performance expectancy, effort expectancy, social influence, and facilitating conditions can predict the intention of high school computer science teachers in Cyprus, to use remote robotic experiments in their classes. …


Security Strategies For Hosting Sensitive Information In The Commercial Cloud, Edward Steven Forde Jan 2017

Security Strategies For Hosting Sensitive Information In The Commercial Cloud, Edward Steven Forde

Walden Dissertations and Doctoral Studies

IT experts often struggle to find strategies to secure data on the cloud. Although current security standards might provide cloud compliance, they fail to offer guarantees of security assurance. The purpose of this qualitative case study was to explore the strategies used by IT security managers to host sensitive information in the commercial cloud. The study's population consisted of information security managers from a government agency in the eastern region of the United States. The routine active theory, developed by Cohen and Felson, was used as the conceptual framework for the study. The data collection process included IT security manager …


Improving Workflow At The Point Of Care Using The Electronic Health Record, Rox Ann Sparks Jan 2017

Improving Workflow At The Point Of Care Using The Electronic Health Record, Rox Ann Sparks

Walden Dissertations and Doctoral Studies

The electronic health record (EHR) is an important part of the effort to improve health care and reduce costs in the United States. Primary care providers, among the largest group of caregivers in the nation, often experience difficulty with implementation and utilization of EHRs. Efforts to enhance the provider's effectiveness in the use of the EHR should result in improved patient outcomes as well as decreasing the overall cost of health care. Guided by the diffusion of innovation theory, this project was initiated to develop a plan for improved usage of the EHR in a primary care setting. A survey …


Information Technology Training To Promote Collaboration Among Multiple Generations, Gregg Foster Jan 2017

Information Technology Training To Promote Collaboration Among Multiple Generations, Gregg Foster

Walden Dissertations and Doctoral Studies

The decision to implement information technology (IT) initiatives to enhance collaboration among veterans, baby boomers, Generation X, Generation Y, and Fifth Generation employees continues to challenge organizational leaders. The purpose of this nonexperimental study was to identify how the implementation of information technology initiatives, coupled with the knowledge of learning styles, might enhance collaboration among generational cohort employees. The generational cohort theory, Maslow's hierarchy of needs theory, and the technology acceptance model were the theoretical frameworks used to develop an understanding of the relationships among the cohorts and the acceptance of technology to enhance collaboration. Data were collected from a …


The Training Deficiency In Corporate America: Training Security Professionals To Protect Sensitive Information, Kenneth Tyrone Johnson Jan 2017

The Training Deficiency In Corporate America: Training Security Professionals To Protect Sensitive Information, Kenneth Tyrone Johnson

Walden Dissertations and Doctoral Studies

Increased internal and external training approaches are elements senior leaders need to know before creating a training plan for security professionals to protect sensitive information. The purpose of this qualitative case study was to explore training strategies telecommunication industry leaders use to ensure security professionals can protect sensitive information. The population consisted of 3 senior leaders in a large telecommunication company located in Dallas, Texas that has a large footprint of securing sensitive information. The conceptual framework on which this study was based was the security risk planning model. Semistructured interviews and document reviews helped to support the findings of …


Strategies To Improve Engagement Among Public Sector Information Technology Employees, Michelle Dawn Benham Jan 2017

Strategies To Improve Engagement Among Public Sector Information Technology Employees, Michelle Dawn Benham

Walden Dissertations and Doctoral Studies

Disengaged employees decrease organizations' efficiencies and profitability. Engaged employees provide greater productivity and performance while being less likely to incur job burnout and exhaustion. However, public sector organizational leaders still struggle to engage their information technology (IT) employees. Partnering with a large public sector organization in the Phoenix, Arizona, metropolitan area, in a case study design, this study explored the strategies that public sector business leaders use to increase productivity through engaging IT employees. The conceptual framework for this study was the job demands-resources framework. Four participants were selected through purposeful sampling from a population of 7 IT leaders who …


Health Portal Functionality And The Use Of Patient-Centered Technology, Anita Joyce Simmons Jan 2017

Health Portal Functionality And The Use Of Patient-Centered Technology, Anita Joyce Simmons

Walden Dissertations and Doctoral Studies

Health portals are dedicated web pages for medical practices to provide patients access to their electronic health records. The problem identified in this quality improvement project was that the health portal in the urgent care setting had not been available to staff nor patients. To provide leadership with information related to opening the portal, the first purpose of the project was to assess staff and patients' perceived use, ease of use, attitude toward using, and intention to use the portal. The second purpose was to evaluate the portal education materials for the top 5 urgent care diagnoses: diabetes, hypertension, asthma, …


High Impact Bug Report Identification With Imbalanced Learning Strategies, Xinli Yang, David Lo, Xin Xia, Qiao Huang, Jianling Sun Jan 2017

High Impact Bug Report Identification With Imbalanced Learning Strategies, Xinli Yang, David Lo, Xin Xia, Qiao Huang, Jianling Sun

Research Collection School Of Computing and Information Systems

In practice, some bugs have more impact than others and thus deserve more immediate attention. Due to tight schedule and limited human resources, developers may not have enough time to inspect all bugs. Thus, they often concentrate on bugs that are highly impactful. In the literature, high-impact bugs are used to refer to the bugs which appear at unexpected time or locations and bring more unexpected effects (i.e., surprise bugs), or break pre-existing functionalities and destroy the user experience (i.e., breakage bugs). Unfortunately, identifying high-impact bugs from thousands of bug reports in a bug tracking system is not an easy …


Safestack+: Enhanced Dual Stack To Combat Data-Flow Hijacking, Yan Lin, Xiaoxiao Tang, Debin Gao Jan 2017

Safestack+: Enhanced Dual Stack To Combat Data-Flow Hijacking, Yan Lin, Xiaoxiao Tang, Debin Gao

Research Collection School Of Computing and Information Systems

SafeStack, initially proposed as a key component of Code Pointer Integrity (CPI), separates the program stack into two distinct regions to provide a safe region for sensitive code pointers. SafeStack can prevent buffer overflow attacks that overwrite sensitive code pointers, e.g., return addresses, to hijack control flow of the program, and has been incorporated into the Clang project of LLVM as a C-based language front-end. In this paper, we propose and implement SafeStack+, an enhanced dual stack LLVM plug-in that further protects programs from data-flow hijacking. SafeStack+ locates data flow sensitive variables on the unsafe stack that could potentially affect …


Cross-Modal Recipe Retrieval: How To Cook This Dish?, Jingjing Chen, Lei Pang, Chong-Wah Ngo Jan 2017

Cross-Modal Recipe Retrieval: How To Cook This Dish?, Jingjing Chen, Lei Pang, Chong-Wah Ngo

Research Collection School Of Computing and Information Systems

In social media users like to share food pictures. One intelligent feature, potentially attractive to amateur chefs, is the recommendation of recipe along with food. Having this feature, unfortunately, is still technically challenging. First, the current technology in food recognition can only scale up to few hundreds of categories, which are yet to be practical for recognizing ten of thousands of food categories. Second, even one food category can have variants of recipes that differ in ingredient composition. Finding the best-match recipe requires knowledge of ingredients, which is a fine-grained recognition problem. In this paper, we consider the problem from …


Industrial Wireless Sensor Networks 2016, Qindong Sun, Schancang Li, Shanshan Zhao, Hongjian Sun, Li Xu, Arumugam Nallamathan Jan 2017

Industrial Wireless Sensor Networks 2016, Qindong Sun, Schancang Li, Shanshan Zhao, Hongjian Sun, Li Xu, Arumugam Nallamathan

Information Technology & Decision Sciences Faculty Publications

The industrial wireless sensor network (IWSN) is the next frontier in the Industrial Internet of Things (IIoT), which is able to help industrial organizations to gain competitive advantages in industrial manufacturing markets by increasing productivity, reducing the costs, developing new products and services, and deploying new business models.


Semantic Inference On Clinical Documents: Combining Machine Learning Algorithms With An Inference Engine For Effective Clinical Diagnosis And Treatment, Shuo Yang, Ran Wei, Jingzhi Guo, Lida Xu Jan 2017

Semantic Inference On Clinical Documents: Combining Machine Learning Algorithms With An Inference Engine For Effective Clinical Diagnosis And Treatment, Shuo Yang, Ran Wei, Jingzhi Guo, Lida Xu

Information Technology & Decision Sciences Faculty Publications

Clinical practice calls for reliable diagnosis and optimized treatment. However, human errors in health care remain a severe issue even in industrialized countries. The application of clinical decision support systems (CDSS) casts light on this problem. However, given the great improvement in CDSS over the past several years, challenges to their wide-scale application are still present, including: 1) decision making of CDSS is complicated by the complexity of the data regarding human physiology and pathology, which could render the whole process more time-consuming by loading big data related to patients; and 2) information incompatibility among different health information systems (HIS) …


Infodemiology For Syndromic Surveillance Of Dengue And Typhoid Fever In The Philippines, Ma. Regina Justina E. Estuar, Kennedy E. Espina Jan 2017

Infodemiology For Syndromic Surveillance Of Dengue And Typhoid Fever In The Philippines, Ma. Regina Justina E. Estuar, Kennedy E. Espina

Department of Information Systems & Computer Science Faculty Publications

Finding determinants of disease outbreaks before its occurrence is necessary in reducing its impact in populations. The supposed advantage of obtaining information brought by automated systems fall short because of the inability to access real-time data as well as interoperate fragmented systems, leading to longer transfer and processing of data. As such, this study presents the use of realtime latent data from social media, particularly from Twitter, to complement existing disease surveillance efforts. By being able to classify infodemiological (health-related) tweets, this study is able to produce a range of possible disease incidences of Dengue and Typhoid Fever within the …


Exploratory Analysis Of Discourses Between Students Engaged In A Debugging Task, Ma. Mercedes T. Rodrigo Jan 2017

Exploratory Analysis Of Discourses Between Students Engaged In A Debugging Task, Ma. Mercedes T. Rodrigo

Department of Information Systems & Computer Science Faculty Publications

This paper determined if and how high-performing and low-performing students differed in the language that they used as they collaborated on a debugging task. 180 students worked in pairs to debug 12 small programs with known errors. Students were segregated into high and low achievement levels based on the number of bugs they found. Chat transcripts from the pairs were analyzed using the Linguistic Inquiry and Word Count (LIWC) software. We found that high- and low-performing students only varied in terms of their use of words that implied discrepancy and sadness.


A Multi-Model Approach In Developing An Intelligent Assistant For Diagnosis Recommendation In Clinical Health Systems, Christian E. Pulmano, Ma. Regina Justina E. Estuar Jan 2017

A Multi-Model Approach In Developing An Intelligent Assistant For Diagnosis Recommendation In Clinical Health Systems, Christian E. Pulmano, Ma. Regina Justina E. Estuar

Department of Information Systems & Computer Science Faculty Publications

Clinical health information systems capture massive amounts of unstructured data from various health and medical facilities. This study utilizes unstructured patient clinical text data to develop an intelligent assistant that can identify possible related diagnoses based on a given text input. The approach applies a one-vs-rest binary classification technique wherein given an input text data, it is identified whether it can be positively or negatively classified for a given diagnosis. Multi-layer Feed-Forward Neural Network models were developed for each individual diagnosis case. The task of the intelligent assistant is to iterate over all the different models and return those that …


Discovering Conversation Spaces In The Public Discourse Of Gender Violence: A Comparative Between Two Different Contexts, Meliza M. De La Paz, Ma. Regina Justina E. Estuar, John Noel C. Victorino Jan 2017

Discovering Conversation Spaces In The Public Discourse Of Gender Violence: A Comparative Between Two Different Contexts, Meliza M. De La Paz, Ma. Regina Justina E. Estuar, John Noel C. Victorino

Department of Information Systems & Computer Science Faculty Publications

A huge factor in gender-based violence is perception and stigma, revealed by public discourse. Topic modelling is useful for discourse analysis and reveals prevalent topics and actors. This study aims to find and compare examples of collectivist and individualist conversation spaces of gendered violence by applying Principal Component Analysis, NGram analysis and word association in two gender violence cases which occured in the different contexts of the Philippines and the United States. The data from the Philippines consist of 2010-2011 articles on the 1991 Vizconde Massacre and the data from the United States consist of 2016-2017 articles from the 2015 …


Designing An Intervention For Novice Programmers Based On Meaningful Gamification: An Expert Evaluation, Jenilyn L. Agapito, Ma. Mercedes T. Rodrigo Jan 2017

Designing An Intervention For Novice Programmers Based On Meaningful Gamification: An Expert Evaluation, Jenilyn L. Agapito, Ma. Mercedes T. Rodrigo

Department of Information Systems & Computer Science Faculty Publications

Gamification is defined as the addition of game-like elements and mechanics to non-game contexts to encourage certain desired behaviors. It is becoming a popular classroom intervention used in computer science instruction, including CS1, the first course computer science students take. It is being operationalized to enhance students' learning experience and achievement. However, existing studies have mostly implemented reward-based game elements which have resulted to contrasting behaviors among the students. Meaningful gamification, characterized as the use of game design elements to encourage users build internal motivation to behave in a certain way, is contended to be a more effective approach. The …


Oasis - Identifying The Core Attributes For Rdbms Alternatives, Benjamin P. Mcpherson Jan 2017

Oasis - Identifying The Core Attributes For Rdbms Alternatives, Benjamin P. Mcpherson

Electronic Theses and Dissertations

Since their introduction in the 1970s, relational database management systems have served as the dominate data storage technology. However, the demands of big data and Web 2.0 necessitated a change in the market, sparking the beginning of the NoSQL movement in the late 2000s. NoSQL databases exchanged the relational model and the guaranteed consistency of ACID transactions for improved performance and massive scalability [1]. While the benefits NoSQL provided proved useful, the lack of sufficient SQL functionality presented a major hurdle for organizations which require it to properly operate. It was clear that new RDBMS solutions which did not compromise …


Towards An Understanding Of The Mental Model Process While Writing Sql Queries, Zahra Hatami Jan 2017

Towards An Understanding Of The Mental Model Process While Writing Sql Queries, Zahra Hatami

Student Work

SQL (Structured Query Language) is a standard language to communicate with a relational database system. SQL is a core competency for people in the data management field and is, therefore, a foundational skill taught to users in information systems. This research analyzes users’ mental models while they formulate SQL queries. The purpose of this thesis is to understand the strategies users use. These strategies both reflect and help develop the users’ mental models. This research attempts to discover users' mental models while learning SQL for the purpose of finding better ways to teach SQL skills. This research analyzes data from …


2d Vector Map And Database Design For Indoor Assisted Navigation, Luciano Caraciolo Albuquerque Jan 2017

2d Vector Map And Database Design For Indoor Assisted Navigation, Luciano Caraciolo Albuquerque

Dissertations and Theses

In this paper we implemented a 2D Vector Map, map editor and Database design intended to provide an efficient way to convert cad files from indoor environments to a set of vectors representing hallways, doors, exits, elevators, and other entities embedded in a floor plan, and save them in a database for use by other applications, such as assisted navigation for blind people.

A graphical application as developed in C++ to allow the user to input a CAD DXF file, process the file to automatically obtain nodes and edges, and save the nodes and edges to a database for posterior …


Using An Online Learning Tutorial To Teach Rea Data Modelling In Accounting Information Systems Courses, Poh Sun Seow, Gary Pan Jan 2017

Using An Online Learning Tutorial To Teach Rea Data Modelling In Accounting Information Systems Courses, Poh Sun Seow, Gary Pan

Research Collection School Of Accountancy

Online learning has been gaining widespread adoption due to its success in enhancing student-learning outcomes and improving student academic performance. This paper describes an online tutorial to teach resource-event-agent (REA) data modeling in an undergraduate accounting information systems course. The REA online tutorial reflects a self-study application designed to help students improve their understanding of the REA data model. As such, the tutorial acts as a supplement to lectures by reinforcing the concepts and incorporating practices to assess student understanding. Instructors can access the REA online tutorial at http://smu.sg/rea. An independent survey by the University's Centre for Teaching Excellence found …


Online Health Recommendation System: A Social Support Perspective, Tareq Nasralah, Cherie Noteboom, Abdullah Wahbeh, Mohammad Aref Al-Ramahi Jan 2017

Online Health Recommendation System: A Social Support Perspective, Tareq Nasralah, Cherie Noteboom, Abdullah Wahbeh, Mohammad Aref Al-Ramahi

Research & Publications

Online Health Communities (OHC) aim to support patients through offer them the opportunities to exchange support with others. However, patients have difficulties and problems locating expertise within the online health communities. In this regard, this study aims to create a patient recommender system to help users locate those with relevant experience and similar health status. Specifically, we aim to leverage the type of online social support users seek to determine the patient health status to build a patient status prediction model. Building the model will help create a peer recommendation system for online support group members to easily locate peers …


Success Stories In Knowledge Management Systems, Leila Halawi, Richard Mccarthy, Janine Aronson Jan 2017

Success Stories In Knowledge Management Systems, Leila Halawi, Richard Mccarthy, Janine Aronson

Publications

Historically, information systems have focused on capturing, storing, managing, and reporting explicit knowledge. Organizations today recognize the need to integrate both explicit and tacit knowledge in formal information systems. Knowledge management continues to be a critical strategy for an organization to achieve a sustainable competitive advantage, and consequently succeed in today's knowledge-based economy. Knowledge management systems (KMS) are a class of information systems that manage, store and distribute knowledge. Knowledge management systems have proliferated in practice. In turn, theoretical research on knowledge management and knowledge management systems has proliferated. Knowledge management systems have emerged as powerful sources of competitive advantage. …


Ansi/Niso Z39.99-2017 Resourcesync Framework Specification, Kevin Ruthen, Jill Emery, Mark Doyle, Mark Needleman, Sue Baughman, Evan Owens, Oliver Pesch, Mike Dicus, Nassib Nassar, Tim Auger, Amy Kirchhoff, Sally Mccallum, Diana Magnoni, Paul Swanson, Gregory Grazevich, Nara Newcomer, Gregory Grazevich, Juha Hakala, Barbara Rapp, Beverly Geckle, Carol Brent, Gary Van Overborg, Rick Burke, Kristin Antelman, Scott Bernier, Pascal Calarco, John Dove, Lucy Harrison, Peter Murray, Christine Stohn, Julie Zhu, Todd Carpenter, Bernhard Haslhofer, Richard Jones, Martin Klein, Graham Klyne, Carl Lagoze, Stuart Lewis, Peter Murray, Michael Nelson, Shlomo Sanders, Robert Sanderson, Herbert Van De Sompel, Paul Walk, Simeon Warner, Zhiwu Xie, Jeff Young Jan 2017

Ansi/Niso Z39.99-2017 Resourcesync Framework Specification, Kevin Ruthen, Jill Emery, Mark Doyle, Mark Needleman, Sue Baughman, Evan Owens, Oliver Pesch, Mike Dicus, Nassib Nassar, Tim Auger, Amy Kirchhoff, Sally Mccallum, Diana Magnoni, Paul Swanson, Gregory Grazevich, Nara Newcomer, Gregory Grazevich, Juha Hakala, Barbara Rapp, Beverly Geckle, Carol Brent, Gary Van Overborg, Rick Burke, Kristin Antelman, Scott Bernier, Pascal Calarco, John Dove, Lucy Harrison, Peter Murray, Christine Stohn, Julie Zhu, Todd Carpenter, Bernhard Haslhofer, Richard Jones, Martin Klein, Graham Klyne, Carl Lagoze, Stuart Lewis, Peter Murray, Michael Nelson, Shlomo Sanders, Robert Sanderson, Herbert Van De Sompel, Paul Walk, Simeon Warner, Zhiwu Xie, Jeff Young

Computer Science Faculty Publications

This ResourceSync specification describes a synchronization framework for the web consisting of various capabilities that allow third-party systems to remain synchronized with a server’s evolving resources. The capabilities may be combined in a modular manner to meet local or community requirements. This specification also describes how a server should advertise the synchronization capabilities it supports and how third-party systems may discover this information. The specification repurposes the document formats defined by the Sitemap protocol and introduces extensions for them.


Viewed By Too Many Or Viewed Too Little: Using Information Dissemination For Audience Segmentation, Bernard J. Jansen, Soon-Gyu Jung, Joni Salminen, Jisun An, Haewoon Kwak Jan 2017

Viewed By Too Many Or Viewed Too Little: Using Information Dissemination For Audience Segmentation, Bernard J. Jansen, Soon-Gyu Jung, Joni Salminen, Jisun An, Haewoon Kwak

Research Collection School Of Computing and Information Systems

The identification of meaningful audience segments, such as groups of users, consumers, readers, audience, etc., has important applicability in a variety of domains, including for content publishing. In this research, we seek to develop a technique for determining both information dissemination and information discrimination of online content in order to isolate audience segments. The benefits of the technique include identification of the most impactful content for analysis. With 4,320 online videos from a major news organization, a set of audience attributes, and more than 58 million interactions from hundreds of thousands of users, we isolate the key pieces of content …


Exploring Representativeness And Informativeness For Active Learning, Bo Du, Zengmao Wang, Lefei Zhang, Liangpei Zhang, Wei Liu, Jialie Shen, Dacheng Tao Jan 2017

Exploring Representativeness And Informativeness For Active Learning, Bo Du, Zengmao Wang, Lefei Zhang, Liangpei Zhang, Wei Liu, Jialie Shen, Dacheng Tao

Research Collection School Of Computing and Information Systems

How can we find a general way to choose the most suitable samples for training a classifier? Even with very limited prior information? Active learning, which can be regarded as an iterative optimization procedure, plays a key role to construct a refined training set to improve the classification performance in a variety of applications, such as text analysis, image recognition, social network modeling, etc. Although combining representativeness and informativeness of samples has been proven promising for active sampling, state-of-the-art methods perform well under certain data structures. Then can we find a way to fuse the two active sampling criteria without …


Avoiding Zombies In Archival Replay Using Serviceworker, Sawood Alam, Mat Kelly, Michele C. Weigle, Michael L. Nelson Jan 2017

Avoiding Zombies In Archival Replay Using Serviceworker, Sawood Alam, Mat Kelly, Michele C. Weigle, Michael L. Nelson

Computer Science Faculty Publications

[First paragraph] A Composite Memento is an archived representation of a web page with all the page requisites such as images and stylesheets. All embedded resources have their own URIs, hence, they are archived independently. For a meaningful archival replay, it is important to load all the page requisites from the archive within the temporal neighborhood of the base HTML page. To achieve this goal, archival replay systems try to rewrite all the resource references to appropriate archived versions before serving HTML, CSS, or JS. However, an effective server-side URL rewriting is difficult when URLs are generated dynamically using JavaScript. …