Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (2966)
- Wright State University (632)
- Walden University (447)
- Selected Works (287)
- New Jersey Institute of Technology (137)
-
- University of Nebraska at Omaha (119)
- California State University, San Bernardino (96)
- Old Dominion University (95)
- San Jose State University (85)
- University of Dayton (82)
- The University of Maine (67)
- City University of New York (CUNY) (65)
- University of Nebraska - Lincoln (54)
- Air Force Institute of Technology (53)
- SelectedWorks (53)
- Technological University Dublin (51)
- University of South Florida (50)
- Kennesaw State University (46)
- Nova Southeastern University (43)
- Claremont Colleges (42)
- University of Arkansas, Fayetteville (42)
- University of Wisconsin Milwaukee (42)
- Western Kentucky University (41)
- Dakota State University (39)
- Institute of Business Administration (38)
- California Polytechnic State University, San Luis Obispo (36)
- Western University (35)
- Ateneo de Manila University (34)
- Governors State University (34)
- Purdue University (34)
- Keyword
-
- Machine learning (101)
- Information technology (93)
- Data mining (89)
- Social media (78)
- Twitter (64)
-
- Machine Learning (57)
- Cybersecurity (54)
- Semantic Web (54)
- Deep learning (52)
- Artificial intelligence (49)
- Online learning (49)
- Information Technology (47)
- Classification (46)
- Cloud computing (45)
- Information retrieval (45)
- Privacy (45)
- Big data (44)
- Database (43)
- Ontology (43)
- Computer science (42)
- Information security (41)
- Algorithms (40)
- Security (40)
- Databases (39)
- Information systems (39)
- Management (37)
- Clustering (36)
- Data Mining (36)
- Northern Ohio Data and Information Service (NODIS) (36)
- Technology (35)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (2872)
- Kno.e.sis Publications (541)
- Walden Dissertations and Doctoral Studies (447)
- Theses and Dissertations (116)
- Dissertations (107)
-
- Computer Science Faculty Publications (91)
- Computer Science and Engineering Faculty Publications (91)
- Theses Digitization Project (84)
- Master's Projects (68)
- Information Systems and Quantitative Analysis Faculty Proceedings & Presentations (64)
- Electronic Theses and Dissertations (55)
- Dissertations and Theses Collection (Open Access) (50)
- Theses (46)
- USF Tampa Graduate Theses and Dissertations (46)
- CCE Theses and Dissertations (42)
- Information Systems and Quantitative Analysis Faculty Publications (41)
- Kyriakos MOURATIDIS (40)
- CGU Faculty Publications and Research (37)
- International Conference on Information and Communication Technologies (36)
- Open Educational Resources (34)
- Department of Information Systems & Computer Science Faculty Publications (33)
- Graduate Theses and Dissertations (33)
- All Capstone Projects (32)
- Masters Theses & Doctoral Dissertations (32)
- Articles (29)
- Conference papers (28)
- David LO (28)
- Journal of Spatial Information Science (28)
- All Maxine Goodman Levin School of Urban Affairs Publications (27)
- Saverio Perugini (25)
- Publication Type
Articles 3751 - 3780 of 6727
Full-Text Articles in Physical Sciences and Mathematics
Security Policies That Make Sense For Complex Systems: Comprehensible Formalism For The System Consumer, Rhonda R. Henning
Security Policies That Make Sense For Complex Systems: Comprehensible Formalism For The System Consumer, Rhonda R. Henning
CCE Theses and Dissertations
Information Systems today rarely are contained within a single user workstation, server, or networked environment. Data can be transparently accessed from any location, and maintained across various network infrastructures. Cloud computing paradigms commoditize the hardware and software environments and allow an enterprise to lease computing resources by the hour, minute, or number of instances required to complete a processing task. An access control policy mediates access requests between authorized users of an information system and the system's resources. Access control policies are defined at any given level of abstraction, such as the file, directory, system, or network, and can be …
Advances Of Scientific Research On Technology Enhanced Learning In Social Networks And Mobile Contexts: Towards High Effective Educational Platforms For Next Generation Education, Leyla Zhuhadar, Miltiadis Lytras, Jacky Xi Zhang, Eugenius Kurilovas
Advances Of Scientific Research On Technology Enhanced Learning In Social Networks And Mobile Contexts: Towards High Effective Educational Platforms For Next Generation Education, Leyla Zhuhadar, Miltiadis Lytras, Jacky Xi Zhang, Eugenius Kurilovas
Analytics & Information Systems Faculty Publications
This editorial presents the latest advances of scientific Research on Technology enhanced learning in social networks and mobile contexts. It summarizes the key finding and promotes three main pillars for future scientific contribution to the domain namely: Enabling Technologies, Educational Strategies, and Next Generation Social Networks for Educational Purposes. It can serve as a position document for scientific debate fostering international collaboration and empirical research in the various aspects of the well-defined agenda. It can also serve as a reference edition for researchers interested in the adoption of Social Networks, in the Education Sector.
Understanding Usability-Related Information Security Failures In A Healthcare Context, Edward D. Boyer
Understanding Usability-Related Information Security Failures In A Healthcare Context, Edward D. Boyer
CCE Theses and Dissertations
This research study explores how the nature and type of usability failures impact task performance in a healthcare organization. Healthcare organizations are composed of heterogeneous and disparate information systems intertwined with complex business processes that create many challenges for the users of the system. The manner in which Information Technology systems and products are implemented along with the overlapping intricate tasks the users have pose problems in the area of usability. Usability research primarily focuses on the user interface; therefore, designing a better interface often leaves security in question. When usability failures arise from the incongruence between healthcare task and …
Computational Methods For Historical Research On Wikipedia’S Archives, Jonathan Cohen
Computational Methods For Historical Research On Wikipedia’S Archives, Jonathan Cohen
e-Research: A Journal of Undergraduate Work
This paper presents a novel study of geographic information implicit in the English Wikipedia archive. This project demonstrates a method to extract data from the archive with data mining, map the global distribution of Wikipedia editors through geocoding in GIS, and proceed with a spatial analysis of Wikipedia use in metropolitan cities.
A Keyword Sense Disambiguation Based Approach For Noise Filtering In Twitter, Sanjaya Wijeratne, Bahareh R. Heravi
A Keyword Sense Disambiguation Based Approach For Noise Filtering In Twitter, Sanjaya Wijeratne, Bahareh R. Heravi
Kno.e.sis Publications
In this paper, we describe an approach to filter out noisy data generated by keywords-based tweet filtering methods by performing Word Sense Disambiguation on those keywords used to collect tweets. We present the noise filtering problem as a binary classification problem and discuss our evaluation strategy which is to be carried out in future.
Build Emotion Lexicon From Microblogs By Combining Effects Of Seed Words And Emoticons In A Heterogeneous Graph, Kaisong Song, Shi Feng, Wei Gao, Daling Wang, Ling Chen, Chengqi Zhang
Build Emotion Lexicon From Microblogs By Combining Effects Of Seed Words And Emoticons In A Heterogeneous Graph, Kaisong Song, Shi Feng, Wei Gao, Daling Wang, Ling Chen, Chengqi Zhang
Research Collection School Of Computing and Information Systems
As an indispensable resource for emotion analysis, emotion lexicons have attracted increasing attention in recent years. Most existing methods focus on capturing the single emotional effect of words rather than the emotion distributions which are helpful to model multiple complex emotions in a subjective text. Meanwhile, automatic lexicon building methods are overly dependent on seed words but neglect the effect of emoticons which are natural graphical labels of fine-grained emotion. In this paper, we propose a novel emotion lexicon building framework that leverages both seed words and emoticons simultaneously to capture emotion distributions of candidate words more accurately. Our method …
Capacity Planning With Financial And Operational Hedging In Low‐Cost Countries, Lijian Chen, Shanling Li, Letian Wang
Capacity Planning With Financial And Operational Hedging In Low‐Cost Countries, Lijian Chen, Shanling Li, Letian Wang
MIS/OM/DS Faculty Publications
The authors of this paper outline a capacity planning problem in which a risk-averse firm reserves capacities with potential suppliers that are located in multiple low-cost countries. While demand is uncertain, the firm also faces multi-country foreign currency exposures. This study develops a mean-variance model that maximizes the firm’s optimal utility and derives optimal utility and optimal decisions in capacity and financial hedging size. The authors show that when demand and exchange rate risks are perfectly correlated, a risk- averse firm, by using financial hedging, will achieve the same optimal utility as a risk-neutral firm. In this paper as well, …
Clear: A Real-Time Online Observatory For Bursty And Viral Events, Runquan Xie, Feida Zhu, Hui Ma, Wei Xie, Chen Lin
Clear: A Real-Time Online Observatory For Bursty And Viral Events, Runquan Xie, Feida Zhu, Hui Ma, Wei Xie, Chen Lin
Research Collection School Of Computing and Information Systems
We describe our demonstration of CLEar (Clairaudient Ear), a real-time online platform for detecting, monitoring, summarizing, contextualizing and visualizing bursty and viral events, those triggering a sudden surge of public interest and going viral on micro-blogging platforms. This task is challenging for existing methods as they either use complicated topic models to analyze topics in a off-line manner or define temporal structure of fixed granularity on the data stream for online topic learning, leaving them hardly scalable for real-time stream like that of Twitter. In this demonstration of CLEar, we present a three-stage system: First, we show …
Rasp-Qs: Efficient And Confidential Query Services In The Cloud, Zohreh S. Alavi, Lu Zhou, James L. Powers, Keke Chen
Rasp-Qs: Efficient And Confidential Query Services In The Cloud, Zohreh S. Alavi, Lu Zhou, James L. Powers, Keke Chen
Kno.e.sis Publications
Hosting data query services in public clouds is an attractive solution for its great scalability and significant cost savings. However, data owners also have concerns on data privacy due to the lost control of the infrastructure. This demonstration shows a prototype for efficient and confidential range/kNN query services built on top of the random space perturbation (RASP) method. The RASP approach provides a privacy guarantee practical to the setting of cloudbased computing, while enabling much faster query processing compared to the encryption-based approach. This demonstration will allow users to more intuitively understand the technical merits of the RASP approach via …
Online Probabilistic Learning For Fuzzy Inference System, Richard Jayadi Oentaryo, Meng Joo Er, San Linn, Xiang Li
Online Probabilistic Learning For Fuzzy Inference System, Richard Jayadi Oentaryo, Meng Joo Er, San Linn, Xiang Li
Research Collection School Of Computing and Information Systems
Online learning is a key methodology for expert systems to gracefully cope with dynamic environments. In the context of neuro-fuzzy systems, research efforts have been directed toward developing online learning methods that can update both system structure and parameters on the fly. However, the current online learning approaches often rely on heuristic methods that lack a formal statistical basis and exhibit limited scalability in the face of large data stream. In light of these issues, we develop a new Sequential Probabilistic Learning for Adaptive Fuzzy Inference System (SPLAFIS) that synergizes the Bayesian Adaptive Resonance Theory (BART) and Rule-Wise Decoupled Extended …
Sharing Political News: The Balancing Act Of Intimacy And Socialization In Selective Exposure, Jisun An, Daniele Quercia, Meeyoung Cha, Krishna Gummadi, Jon Crowcroft
Sharing Political News: The Balancing Act Of Intimacy And Socialization In Selective Exposure, Jisun An, Daniele Quercia, Meeyoung Cha, Krishna Gummadi, Jon Crowcroft
Research Collection School Of Computing and Information Systems
One might think that, compared to traditional media, social media sites allow people to choose more freely what to read and what to share, especially for politically oriented news. However, reading and sharing habits originate from deeply ingrained behaviors that might be hard to change. To test the extent to which this is true, we propose a Political News Sharing (PoNS) model that holistically captures four key aspects of social psychology: gratification, selective exposure, socialization, and trust & intimacy. Using real instances of political news sharing in Twitter, we study the predictive power of these features. As one might expect, …
Graph Matching By Simplified Convex-Concave Relaxation Procedure, Zhiyong Liu, Hong Qiao, Xu Yang, Steven C. H. Hoi
Graph Matching By Simplified Convex-Concave Relaxation Procedure, Zhiyong Liu, Hong Qiao, Xu Yang, Steven C. H. Hoi
Research Collection School Of Computing and Information Systems
The convex and concave relaxation procedure (CCRP) was recently proposed and exhibited state-of-the-art performance on the graph matching problem. However, CCRP involves explicitly both convex and concave relaxations which typically are difficult to find, and thus greatly limit its practical applications. In this paper we propose a simplified CCRP scheme, which can be proved to realize exactly CCRP, but with a much simpler formulation without needing the concave relaxation in an explicit way, thus significantly simplifying the process of developing CCRP algorithms. The simplified CCRP can be generally applied to any optimizations over the partial permutation matrix, as long as …
The Use Of Geospatial Clustering In Analysing Health Risk Profile, Sue-Mae Yeo, Tin Seong Kam, Kai Xin Thia, Dan Wu
The Use Of Geospatial Clustering In Analysing Health Risk Profile, Sue-Mae Yeo, Tin Seong Kam, Kai Xin Thia, Dan Wu
Research Collection School Of Computing and Information Systems
Background & Hypothesis: The first law of geography states that “everything is related to everything else, but near things are more related than distant things”. This study aims to demonstrate how local indicator of spatial association (LISA) statistics are used to group patients with similar chronic diseases into natural clusters of hotspots found within northern Singapore by incorporating the proximity of their home locations explicitly. Methods: Anonymised chronic patient data collected from Khoo Teck Puat Hospital in 2013 were used for analyses. The data was mapped based on patients' residential addresses. A layer of hexagonal grid objects, each with a …
Press: A Novel Framework Of Trajectory Compression In Road Networks, Renchu Song, Weiwei Sun, Baihua Zheng, Yu Zheng
Press: A Novel Framework Of Trajectory Compression In Road Networks, Renchu Song, Weiwei Sun, Baihua Zheng, Yu Zheng
Research Collection School Of Computing and Information Systems
Location data becomes more and more important. In this paper, we focus on the trajectory data, and propose a new framework, namely PRESS (Paralleled Road-Network-Based Trajectory Compression), to effectively compress trajectory data under road network constraints. Different from existing work, PRESS proposes a novel representation for trajectories to separate the spatial representation of a trajectory from the temporal representation, and proposes a Hybrid Spatial Compression (HSC) algorithm and error Bounded Temporal Compression (BTC) algorithm to compress the spatial and temporal information of trajectories respectively. PRESS also supports common spatial-temporal queries without fully decompressing the data. Through an extensive experimental study …
Interestingness-Driven Diffussion Process Summarization In Dynamic Networks, Qiang Qu, Siyuan Liu, Christian Jensen, Feida Zhu, Christos Faloutsos
Interestingness-Driven Diffussion Process Summarization In Dynamic Networks, Qiang Qu, Siyuan Liu, Christian Jensen, Feida Zhu, Christos Faloutsos
Research Collection School Of Computing and Information Systems
The widespread use of social networks enables the rapid diffusion of information, e.g., news, among users in very large communities. It is a substantial challenge to be able to observe and understand such diffusion processes, which may be modeled as networks that are both large and dynamic. A key tool in this regard is data summarization. However, few existing studies aim to summarize graphs/networks for dynamics. Dynamic networks raise new challenges not found in static settings, including time sensitivity and the needs for online interestingness evaluation and summary traceability, which render existing techniques inapplicable. We study the topic of dynamic …
A Study Of Age Gaps Between Online Friends, Lizi Liao, Jing Jiang, Ee Peng Lim, Heyan Huang
A Study Of Age Gaps Between Online Friends, Lizi Liao, Jing Jiang, Ee Peng Lim, Heyan Huang
Research Collection School Of Computing and Information Systems
User attribute extraction on social media has gain considerable attention, while existing methods are mostly supervised which suffer great diffi- culty in insufficient gold standard data. In this paper, we validate a strong hypothesis based on homophily and adapt it to ensure the certainty of user attribute we extracted via weakly supervised propagation. Homophily, the theory which states that people who are similar tend to become friends, has been well studied in the setting of online social networks. When we focus on age attribute, based on this theory, online friends tend to have similar age. In this work, we take …
An Exploratory Study On Software Microblogger Behaviors, Yuan Tian, David Lo
An Exploratory Study On Software Microblogger Behaviors, Yuan Tian, David Lo
Research Collection School Of Computing and Information Systems
Microblogging services are growing rapidly in the recent years. Twitter, one of the most popular microblogging sites, has gained more than 500 millions users. Thousands of developers are also using Twitter to communicate with one another and microblog about software-related topics such as programming languages, code libraries, etc. Understanding the behaviors of software microbloggers is one of the needed first steps toward building automated tools to encourage software microblogging activities and harness software microblogging to improve various software engineering activities. In this paper, we investigate the behaviors of software microbloggers in terms of their microblogging frequency, generated contents, and interactions …
Intent-Based User Segmentation With Query Enhancement, Wei Xiong
Intent-Based User Segmentation With Query Enhancement, Wei Xiong
Dissertations
With the rapid advancement of the internet, accurate prediction of user's online intent underlying their search queries has received increasing attention from the online advertising community. As a rich source of information on web user's behavior, query logs have been leveraged by advertising companies to deliver personalized advertisements. However, a typical query usually contains very few terms, which only carry a small amount of information about a user's interest. The tendency of users to use short and ambiguous queries makes it difficult to fully describe and distinguish a user's intent. In addition, the query feature space is sparse, as only …
Implementation Of A Segmented, Transactional Database Caching System, Benjamin J. Sandmann
Implementation Of A Segmented, Transactional Database Caching System, Benjamin J. Sandmann
Journal of Undergraduate Research at Minnesota State University, Mankato
Research on algorithms and concepts regarding memory-based data caching can help solve the performance bottleneck in current Database Management Systems. Problems such as data concurrency, persistent storage, and transaction management have limited most memory cache’s capabilities. It has also been tough to develop a proper user- oriented and business friendly way of implementing such a system. The research of this project focused on code implementation, abstract methodologies and how to best prepare such an application for common business usage.
Application Of Risk Metrics For Role Mining, Sharmin Ahmed
Application Of Risk Metrics For Role Mining, Sharmin Ahmed
Electronic Thesis and Dissertation Repository
Incorporating risk consideration in access control systems has recently become a popular research topic. Related to this is risk awareness which is needed to enable access control in an agile and dynamic way. While risk awareness is probably known for an established access control system, being aware of risk even before the access control system is defined can mean identification of users and permissions that are most likely to lead to dangerous or error-prone situations from an administration point of view. Having this information available during the role engineering phase allows data analysts and role engineers to highlight potentially risky …
An Automatic Dialog System For Student Advising, Brian Mcmahan
An Automatic Dialog System For Student Advising, Brian Mcmahan
Journal of Undergraduate Research at Minnesota State University, Mankato
Automatic dialog systems are an implementation of natural language processing theory with the goal of allowing the use of natural sentences to communicate with a computer system. The general purpose of this project was to design and implement an automatic dialog system for augmenting university student advising. Student advising is a relatively narrow domain of possible questions and responses. The automatic dialog system focused on prescriptive advising rather than developmental advising to further narrow the domain to scheduling and registration matters. A student advisor was interviewed and recorded during a mock advising session in order to model the interaction between …
Reconstructing A Large-Scale Attribute-Based Social Network, Weijia Luo, Mario Ventresca
Reconstructing A Large-Scale Attribute-Based Social Network, Weijia Luo, Mario Ventresca
The Summer Undergraduate Research Fellowship (SURF) Symposium
An epidemic occurs when a disease rapidly infects substantially more people than expected compared to past experience of similar diseases. If an epidemic is not contained, it could turn into a pandemic, which will cause a worldwide crisis. Therefore, it is critical to determine and implement epidemic policies that are promising and effective within a short period of time. In this paper, we will develop tools that will allow us to recreate large-scale real-world social networks. Using such networks will enable us to simulate disease spread and determine critical personal and social factors that will be the key to containing …
Document Retrieval Using Predication Similarity, Kalpa Gunaratna
Document Retrieval Using Predication Similarity, Kalpa Gunaratna
Kno.e.sis Publications
Document retrieval has been an important research problem over many years in the information retrieval community. State-of-the-art techniques utilize various methods in matching documents to a given document including keywords, phrases, and annotations. In this paper, we propose a new approach for document retrieval that utilizes predications (subject-predicate-object triples) extracted from the documents. We represent documents as sets of predications. We measure the similarity between predications to compute the similarity between documents. Our approach utilizes the hierarchical information available in ontologies in computing concept-concept similarity, making the approach flexible. Predication-based document similarity is more precise and forms the basis for …
Adam: Automated Detection And Attribution Of Malicious Webpages, Ahmed E. Kosba, Aziz Mohaisen, Andrew G. West, Trevor Tonn, Huy Kang Kim
Adam: Automated Detection And Attribution Of Malicious Webpages, Ahmed E. Kosba, Aziz Mohaisen, Andrew G. West, Trevor Tonn, Huy Kang Kim
Andrew G. West
Malicious webpages are a prevalent and severe threat in the Internet security landscape. This fact has motivated numerous static and dynamic techniques to alleviate such threats. Building on this existing literature, this work introduces the design and evaluation of ADAM, a system that uses machine-learning over network metadata derived from the sandboxed execution of webpage content. ADAM aims to detect malicious webpages and identify the nature of those vulnerabilities using a simple set of features. Machine-trained models are not novel in this problem space. Instead, it is the dynamic network artifacts (and their subsequent feature representations) collected during rendering that …
#Mplp: A Comparison Of Domain Novice And Expert User-Generated Tags In A Minimally Processed Digital Archive, Edward A. Benoit Iii
#Mplp: A Comparison Of Domain Novice And Expert User-Generated Tags In A Minimally Processed Digital Archive, Edward A. Benoit Iii
Theses and Dissertations
The high costs of creating and maintaining digital archives precluded many archives from providing users with digital content or increasing the amount of digitized materials. Studies have shown users increasingly demand immediate online access to archival materials with detailed descriptions (access points). The adoption of minimal processing to digital archives limits the access points at the folder or series level rather than the item-level description users' desire. User-generated content such as tags, could supplement the minimally processed metadata, though users are reluctant to trust or use unmediated tags. This dissertation project explores the potential for controlling/mediating the supplemental metadata from …
A Novel Web-Based Depth Video Rewind Approach Toward Fall Preventive Interventions In Hospitals, Moein Enayati, Tanvi Banerjee, Mihail Popescu, Marjorie Skubic, Marilyn J. Rantz
A Novel Web-Based Depth Video Rewind Approach Toward Fall Preventive Interventions In Hospitals, Moein Enayati, Tanvi Banerjee, Mihail Popescu, Marjorie Skubic, Marilyn J. Rantz
Kno.e.sis Publications
Falls in the hospital rooms are considered a huge burden on healthcare costs. They can lead to injuries, extended length of stay, and increase in cost for both the patients and the hospital. It can also lead to emotional trauma for the patients and their families [1]. Having Microsoft Kinects installed in the hospital rooms to capture and process every movement in the room, we deployed our previously developed fall-detection system to detect naturally occurring falls, generate a real-time fall alarm and broadcast it to hospital nurses for immediate intervention. These systems also store a processed and reduced version …
Integrating Motivated Learning And K-Winner-Take-All To Coordinate Multi-Agent Reinforcement Learning, Teck-Hou Teng, Ah-Hwee Tan, Janusz Starzyk, Yuan-Sin Tan, Loo-Nin Teow
Integrating Motivated Learning And K-Winner-Take-All To Coordinate Multi-Agent Reinforcement Learning, Teck-Hou Teng, Ah-Hwee Tan, Janusz Starzyk, Yuan-Sin Tan, Loo-Nin Teow
Research Collection School Of Computing and Information Systems
This work addresses the coordination issue in distributed optimization problem (DOP) where multiple distinct and time-critical tasks are performed to satisfy a global objective function. The performance of these tasks has to be coordinated due to the sharing of consumable resources and the dependency on non-consumable resources. Knowing that it can be sub-optimal to predefine the performance of the tasks for large DOPs, the multi-agent reinforcement learning (MARL) framework is adopted wherein an agent is used to learn the performance of each distinct task using reinforcement learning. To coordinate MARL, we propose a novel coordination strategy integrating Motivated Learning (ML) …
Direct Neighbor Search, Jilian Zhang, Kyriakos Mouratidis, Hwee Hwa Pang
Direct Neighbor Search, Jilian Zhang, Kyriakos Mouratidis, Hwee Hwa Pang
Research Collection School Of Computing and Information Systems
In this paper we study a novel query type, called direct neighbor query. Two objects in a dataset are direct neighbors (DNs) if a window selection may exclusively retrieve these two objects. Given a source object, a DN search computes all of its direct neighbors in the dataset. The DNs define a new type of affinity that differs from existing formulations (e.g., nearest neighbors, nearest surrounders, reverse nearest neighbors, etc.) and finds application in domains where user interests are expressed in the form of windows, i.e., multi-attribute range selections. Drawing on key properties of the DN relationship, we develop an …
Gta-M: Greedy Trajectory-Aware (M Copies) Routing For Airborne Networks, Xiaoping Ma, Hwee Xian Tan, Alvin C. Valera
Gta-M: Greedy Trajectory-Aware (M Copies) Routing For Airborne Networks, Xiaoping Ma, Hwee Xian Tan, Alvin C. Valera
Research Collection School Of Computing and Information Systems
Airborne networks have potential applications in both civilian and military domains - such as passenger in-flight Internet connectivity, air traffic control and in intelligence, surveillance and reconnaissance (ISR) activities. However, airborne networks suffer from frequent disruptions due to high node mobility, ad hoc connectivity and line-of-sight blockages. These challenges can be alleviated through the use of disruption-tolerant networking (DTN) techniques. In this paper, we propose GTA-m, a multi-copy greedy trajectory-aware routing protocol for airborne networks. GTA-m employs DTN capabilities and exploits the use of flight information to forwarded bundles greedily to intended destination(s). To alleviate the local minima issues that …
Urban Planning Process: Can Technology Enhance Participatory Communication?, Rojin Vishkaie, Richard Levy, Anthony Tang
Urban Planning Process: Can Technology Enhance Participatory Communication?, Rojin Vishkaie, Richard Levy, Anthony Tang
Research Collection School Of Computing and Information Systems
Oftentimes, within the urban planning process, urban planners and GIS experts must work together using desktop Computer-Aided Design (CAD) and Geographic Information System (GIS). However, participatory communication and visualization which are important in the urban planning process, are not a central focus in the design of current computer-aided planning technologies. This study tends to provide an understanding of technological challenges and complexities urban planners and GIS experts encounter while engaging in a participatory environment during the urban planning process. This study also explores the perceptions of urban planners and GIS experts about the potential impact and usefulness of interactive surfaces …