Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 4771 - 4800 of 6727

Full-Text Articles in Physical Sciences and Mathematics

Cloudvista: Visual Cluster Exploration For Extreme Scale Data In The Could, Keke Chen, Huiqi Xi, Fengguang Tian, Shumin Guo Jan 2011

Cloudvista: Visual Cluster Exploration For Extreme Scale Data In The Could, Keke Chen, Huiqi Xi, Fengguang Tian, Shumin Guo

Kno.e.sis Publications

The problem of efficient and high-quality clustering of extreme scale datasets with complex clustering structures continues to be one of the most challenging data analysis problems. An innovate use of data cloud would provide unique opportunity to address this challenge. In this paper, we propose the CloudVista framework to address (1) the problems caused by using sampling in the existing approaches and (2) the problems with the latency caused by cloud-side processing on interactive cluster visualization. The CloudVista framework aims to explore the entire large data stored in the cloud with the help of the data structure visual frame and …


Citizen Sensor Data Mining, Social Media Analytics And Development Centric Web Applications, Meenakshi Nagarajan, Amit P. Sheth, Selvam Velmuru Jan 2011

Citizen Sensor Data Mining, Social Media Analytics And Development Centric Web Applications, Meenakshi Nagarajan, Amit P. Sheth, Selvam Velmuru

Kno.e.sis Publications

With the rapid rise in the popularity of social media (500M+ Facebook users, 100M+ twitter users), and near ubiquitous mobile access (4.1 billion actively-used mobile phones), the sharing of observations and opinions has become common-place (nearly 100M tweets a day, 1.8 trillion SMSs in US last year). This has given us an unprecedented access to the pulse of a populace and the ability to perform analytics on social data to support a variety of socially intelligent applications -- be it towards targeted online content delivery, crisis management, organizing revolutions or promoting social development in underdeveloped and developing countries. This tutorial …


Semantic Social Mashup Approach For Designing Citizen Diplomacy, Amit P. Sheth Jan 2011

Semantic Social Mashup Approach For Designing Citizen Diplomacy, Amit P. Sheth

Kno.e.sis Publications

Advancement in technology has brought exceptional connectivity, easy and open access to communication mediums via Internet. Everyday millions of people are interactively communicating to each other and sharing multimedia content through Social Media/Networks, Web-based and mobile-based technologies. Social media provides variety of interesting, engaging applications such as Twitter, Facebook, YouTube, Flicker, Blogs. People interested in contributing to global welfare and improving humanity are connected to various NGO's like Red Cross, Ushahidi (www.ushahidi.com), eMoksha (emoksha.org), etc. Social media and NGOs are acting as an excellent medium of communication and sharing, connected diverse people irrespective of their nationality, religion, culture, etc. Social …


Demonstration: Real-Time Semantic Analysis Of Sensor Streams, Harshal Kamlesh Patni, Cory Andrew Henson, Michael Cooney, Amit P. Sheth, Krishnaprasad Thirunarayan Jan 2011

Demonstration: Real-Time Semantic Analysis Of Sensor Streams, Harshal Kamlesh Patni, Cory Andrew Henson, Michael Cooney, Amit P. Sheth, Krishnaprasad Thirunarayan

Kno.e.sis Publications

The emergence of dynamic information sources - including sensor networks - has led to large streams of real-time data on the Web. Research studies suggest, these dynamic networks have created more data in the last three years than in the entire history of civilization, and this trend will only increase in the coming years. With this coming data explosion, real-time analytics software must either adapt or die. This paper focuses on the task of integrating and analyzing multiple heterogeneous streams of sensor data with the goal of creating meaningful abstractions, or features. These features are then temporally aggregated into feature …


The Cloud Agnostic E-Science Analysis Platform, Ajith Harshana Ranabahu, Paul E. Anderson, Amit P. Sheth Jan 2011

The Cloud Agnostic E-Science Analysis Platform, Ajith Harshana Ranabahu, Paul E. Anderson, Amit P. Sheth

Kno.e.sis Publications

The amount of data being generated for e-Science domains has grown exponentially in the past decade, yet the adoption of new computational techniques in these fields hasn't seen similar improvements. The presented platform can exploit the power of cloud computing while providing abstractions for scientists to create highly scalable data processing workflows.


Overview And Guidance On Agile Development In Large Organizations, Jordan B. Barlow, Justin Scott Giboney, Mark Jeffrey Keith, David W. Wilson, Ryan Schuetzler, Paul Benjamin Lowry, Anthony Vance Jan 2011

Overview And Guidance On Agile Development In Large Organizations, Jordan B. Barlow, Justin Scott Giboney, Mark Jeffrey Keith, David W. Wilson, Ryan Schuetzler, Paul Benjamin Lowry, Anthony Vance

Information Systems and Quantitative Analysis Faculty Publications

A continual debate surrounds the effectiveness of agile software development practices. Some organizations adopt agile practices to become more competitive, improve processes, and reduce costs. Other organizations are skeptical about whether agile development is beneficial. Large organizations face an additional challenge in integrating agile practices with existing standards and business processes. To examine the effects of agile development practices in large organizations, we review and integrate scientific literature and theory on agile software development. We further organize our theory and observations into a framework with guidelines for large organizations considering agile methodologies. Based on this framework, we present recommendations that …


Biometrics Technology: Understanding Dynamics Influencing Adoption For Control Of Identification Deception Within Nigeria, Gideon U. Nwatu Jan 2011

Biometrics Technology: Understanding Dynamics Influencing Adoption For Control Of Identification Deception Within Nigeria, Gideon U. Nwatu

Walden Dissertations and Doctoral Studies

One of the objectives of any government is the establishment of an effective solution to significantly control crime. Identity fraud in Nigeria has generated global attention and negative publicity toward its citizens. The research problem addressed in this study was the lack of understanding of the dynamics that influenced the adoption and usability of biometrics technology for reliable identification and authentication to control identity deception. The support for this study was found in the theoretical framework of the technology acceptance model (TAM). The purpose of the study was to provide scholarly research about the factors that influenced the adoption of …


The Effect Of Interactive Technology On Informal Learning And Performance In A Social Setting, Timothy Clay Boileau Jan 2011

The Effect Of Interactive Technology On Informal Learning And Performance In A Social Setting, Timothy Clay Boileau

Wayne State University Dissertations

This study is based on a qualitative multiple case study research design using a mixed methods approach to provide insight into the effect of interactive technology on informal learning and performance in a social business setting inhabited by knowledge workers. The central phenomenon examined is the variance in behavioral intention towards interactive Web 2.0 technologies in learning and performance-related activities, depending on social and cultural setting, observable in individual and group usage patterns.

The theoretical foundation for this study is drawn primarily from the activity theory model developed by Engeström (1987) and related research enabled by an ongoing review of …


A Cultural Analysis Of Information Technology Offshore Outsourcing: An Exercise In Multi-Sited Ethnography Of Virtual Work, Tara Eaton Jan 2011

A Cultural Analysis Of Information Technology Offshore Outsourcing: An Exercise In Multi-Sited Ethnography Of Virtual Work, Tara Eaton

Wayne State University Dissertations

This study is an exploration of how ethnography and anthropological analysis can provide new understanding of transnational, multi-sited research phenomena. Research focused on the work activities of one American client organization and its Indian IT service provider situated in the global virtual field of Information Technology (IT) offshore outsourcing. The Principal Investigator adapted and applied an ethnographic approach for her fieldwork in order to understand the norms, beliefs, and values about work, as well as the relationship between cultural differences and virtual communication. Dissertation findings offer new insight for anthropological discussions of globalization as well as suggest further development of …


Locating Mineral Exploration Targets Using A Geographical Information System, Finnian O'Connor Jan 2011

Locating Mineral Exploration Targets Using A Geographical Information System, Finnian O'Connor

Conference papers

This paper outlines the research and development of a complete open source geographic information system (GIS) that offers real-time geoprocessing over the Internet. The premise of the geoprocessing is to locate mineral exploration targets that have high potential for success based on parameters chosen by the end-user of the system.

Components integrated in the system include a spatial database PostGIS, a GIS processing engine GRASS, a GIS server GeoServer, a web server Apache, and front-end technologies OpenLayers and GeoExt. Appropriate data was sourced from the Geological Survey of Ireland to be used for the geoprocessing.

With all the components of …


How Cios Overcome The Competing Values Challenge: Irish Cios’ Perspectives, Harvey Enns, Dean B. Mcfarlin, Paul B. Sweeney Jan 2011

How Cios Overcome The Competing Values Challenge: Irish Cios’ Perspectives, Harvey Enns, Dean B. Mcfarlin, Paul B. Sweeney

MIS/OM/DS Faculty Publications

Competing values are a fact of organizational life. However, there are gaps in our understanding about how these opposing beliefs hinder influence processes. This article draws on interview data to demonstrate how Irish Chief Information Officers (CIOs) are able to convince their colleagues to support new projects within their firms in the face of competing values. Focused interviews were used to explore the influence process and the competing values phenomenon, since this type of research is at an early stage and qualitative methods and analysis serve as a rich source of theory development.

The data showed that the CIOs who …


A Usability Study Of A Mobile Content Sharing System, Alton Yeow-Kuan Chua, Dion Hoe-Lian Goh, Khasfariyati Razikin, Ee Peng Lim Jan 2011

A Usability Study Of A Mobile Content Sharing System, Alton Yeow-Kuan Chua, Dion Hoe-Lian Goh, Khasfariyati Razikin, Ee Peng Lim

Research Collection School Of Computing and Information Systems

We investigate the usability of MobiTOP (Mobile Tagging of Objects and People), a mobile location-based content sharing system. MobiTOP allows users to annotate real world locations with both multimedia and textual content and concurrently, share the annotations among its users. In addition, MobiTOP provides additional functionality such as clustering of annotations and advanced search and filtering options. A usability evaluation of the system was conducted in the context of a travel companion for tourists. The results suggested the potential of the system in terms of functionality for mobile content sharing. Participants agreed that the features in MobiTOP were generally usable …


Identity-Based Strong Designated Verifier Signature Revisited, Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo Jan 2011

Identity-Based Strong Designated Verifier Signature Revisited, Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo

Research Collection School Of Computing and Information Systems

Designated verifier signature (DVS) allows the signer to persuade a verifier the validity of a statement but prevent the verifier from transferring the conviction. Strong designated verifier signature (SDVS) is a variant of DVS, which only allows the verifier to privately check the validity of the signer’s signature. In this work we observe that the unforgeability model considered in the existing identity-based SDVS schemes is not strong enough to capture practical attacks, and propose to consider another model which is shown to be strictly stronger than the old one. We then propose a new efficient construction of identity-based SDVS scheme, …


Near-Duplicate Keyframe Retrieval By Semi-Supervised Learning And Nonrigid Image Matching, Jianke Zhu, Steven C. H. Hoi, Michael R. Lyu, Shuicheng Yan Jan 2011

Near-Duplicate Keyframe Retrieval By Semi-Supervised Learning And Nonrigid Image Matching, Jianke Zhu, Steven C. H. Hoi, Michael R. Lyu, Shuicheng Yan

Research Collection School Of Computing and Information Systems

Near-duplicate keyframe (NDK) retrieval techniques are critical to many real-world multimedia applications. Over the last few years, we have witnessed a surge of attention on studying near-duplicate image/keyframe retrieval in multimedia community. To facilitate an effective approach to NDK retrieval on large-scale data, we suggest an effective Multi-Level Ranking (MLR) scheme that effectively retrieves NDKs in a coarse-to-fine manner. One key stage of the MLR ranking scheme is how to learn an effective ranking function with extremely small training examples in a near-duplicate detection task. To attack this challenge, we employ a semi-supervised learning method, semi-supervised support vector machines, which …


Enhancing Bag-Of-Words Models By Efficient Semantics-Preserving Metric Learning, Lei Wu, Steven C. H. Hoi Jan 2011

Enhancing Bag-Of-Words Models By Efficient Semantics-Preserving Metric Learning, Lei Wu, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

The authors present an online semantics preserving, metric learning technique for improving the bag-of-words model and addressing the semantic-gap issue. This article investigates the challenge of reducing the semantic gap for building BoW models for image representation; propose a novel OSPML algorithm for enhancing BoW by minimizing the semantic loss, which is efficient and scalable for enhancing BoW models for large-scale applications; apply the proposed technique for large-scale image annotation and object recognition; and compare it to the state of the art.


Development Of Visualization Facility At The Gis And Remote Sensing Core Lab, University Of Nevada, Las Vegas, Haroon Stephen, William J. Smith, Zhongwei Liu Jan 2011

Development Of Visualization Facility At The Gis And Remote Sensing Core Lab, University Of Nevada, Las Vegas, Haroon Stephen, William J. Smith, Zhongwei Liu

Public Policy and Leadership Faculty Presentations

Visualization using advanced computational and graphic equipment has become a standard way of present day research. Availability of low cost and fast processing units, high resolution displays with graphic processing units, and specialized software has brought complex visualization capabilities to an office desktop. Nevertheless, when dealing with large datasets such as, global climate, geospatial, and social data the office desktop falls short and calls for a centralized visualization facility with high end computing and graphics equipment.

Visualization Facility at GIS and Remote Sensing Core Lab would be a useful and important addition to the UNLV IT infrastructure. It would provide …


Ohio's Use Of Geographic Information Systems To Demonstrate Public Participation In The Redistricting Process, Mark Salling Jan 2011

Ohio's Use Of Geographic Information Systems To Demonstrate Public Participation In The Redistricting Process, Mark Salling

All Maxine Goodman Levin School of Urban Affairs Publications

No abstract provided.


Public Participation Geographic Information Systems For Redistricting A Case Study In Ohio, Mark Salling Jan 2011

Public Participation Geographic Information Systems For Redistricting A Case Study In Ohio, Mark Salling

All Maxine Goodman Levin School of Urban Affairs Publications

Public Participation Geographic Information Systems for Redistricting A Case Study in Ohio, Journal of the Urban and Regional Information Systems Association, Vol. 23, Number 1, forthcoming.


A Unit Test Approach For Database Schema Evolution, Katarina Grolinger, Miriam A M Capretz Jan 2011

A Unit Test Approach For Database Schema Evolution, Katarina Grolinger, Miriam A M Capretz

Electrical and Computer Engineering Publications

Context: The constant changes in today’s business requirements demand continuous database revisions. Hence, database structures, not unlike software applications, deteriorate during their lifespan and thus require refactoring in order to achieve a longer life span. Although unit tests support changes to application programs and refactoring, there is currently a lack of testing strategies for database schema evolution.

Objective: This work examines the challenges for database schema evolution and explores the possibility of using various testing strategies to assist with schema evolution. Specifically, the work proposes a novel unit test approach for the application code that accesses databases with the objective …


Efficient Strong Designated Verifier Signature Schemes Without Random Oracle Or With Non-Delegatability, Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo Jan 2011

Efficient Strong Designated Verifier Signature Schemes Without Random Oracle Or With Non-Delegatability, Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo

Research Collection School Of Computing and Information Systems

Designated verifier signature (DVS) allows a signer to convince a designated verifier that a signature is generated by the signer without letting the verifier transfer the conviction to others, while the public can still tell that the signature must be generated by one of them. Strong DVS (SDVS) strengthens the latter part by restricting the public from telling whether the signature is generated by one of them or by someone else. In this paper, we propose two new SDVS schemes. Compared with existing SDVS schemes, the first new scheme has almost the same signature size and meanwhile, is proven secure …


Combining Natural Language Processing And Statistical Text Mining: A Study Of Specialized Versus Common Languages, Jay Jarman Jan 2011

Combining Natural Language Processing And Statistical Text Mining: A Study Of Specialized Versus Common Languages, Jay Jarman

USF Tampa Graduate Theses and Dissertations

This dissertation focuses on developing and evaluating hybrid approaches for analyzing free-form text in the medical domain. This research draws on natural language processing (NLP) techniques that are used to parse and extract concepts based on a controlled vocabulary. Once important concepts are extracted, additional machine learning algorithms, such as association rule mining and decision tree induction, are used to discover classification rules for specific targets. This multi-stage pipeline approach is contrasted with traditional statistical text mining (STM) methods based on term counts and term-by-document frequencies. The aim is to create effective text analytic processes by adapting and combining individual …


Finding Haystacks With Needles: Ranked Search For Data Using Geospatial And Temporal Characteristics, Veronika Margaret Megler, David Maier Jan 2011

Finding Haystacks With Needles: Ranked Search For Data Using Geospatial And Temporal Characteristics, Veronika Margaret Megler, David Maier

Computer Science Faculty Publications and Presentations

The past decade has seen an explosion in the number and types of environmental sensors deployed, many of which provide a continuous stream of observations. Each individual observation consists of one or more sensor measurements, a geographic location, and a time. With billions of historical observations stored in diverse databases and in thousands of datasets, scientists have difficulty finding relevant observations. We present an approach that creates consistent geospatial-temporal metadata from large repositories of diverse data by blending curated and automated extracts. We describe a novel query method over this metadata that returns ranked search results to a query with …


Relativistic Red-Black Trees, Philip William Howard, Jonathan Walpole Jan 2011

Relativistic Red-Black Trees, Philip William Howard, Jonathan Walpole

Computer Science Faculty Publications and Presentations

Operating system performance and scalability on sharedmemory many-core systems depends critically on efficient access to shared data structures. Scalability has proven difficult to achieve for many data structures. In this paper we present a novel and highly scalable concurrent red-black tree. Red-black trees are widely used in operating systems, but typically exhibit poor scalability. Our red-black tree has linear read scalability, uncontended read performance that is at least 25% faster than other known approaches, and deterministic lookup times for a given tree size, making it suitable for realtime applications.


User Experiments Of A Social, Faceted Multimedia Classification System, Liuliu Fu, Kurt Maly, Elizabeth Rasnick, Harris Wu, Mohammad Zubair Jan 2011

User Experiments Of A Social, Faceted Multimedia Classification System, Liuliu Fu, Kurt Maly, Elizabeth Rasnick, Harris Wu, Mohammad Zubair

Computer Science Faculty Publications

Internet document sharing systems such as Flickr store billions of user-contributed images. Many collections on the Web contain large numbers of multimedia objects such as images. While such systems are designed to encourage user contributions and sharing, they are not well-organized collections on any given subject and are not easy to browse for specific subject matters. We have built a system that systematically organizes a large multimedia collection into an evolving faceted classification. This paper discusses the evaluation of such a system through a number of usage studies in a university setting.


2d Face Database Diversification Based On 3d Face Modeling, Qun Wang, Jiang Li, Vijayan K. Asari, Mohammad A. Karim, Manuel Filipe Costa (Ed.) Jan 2011

2d Face Database Diversification Based On 3d Face Modeling, Qun Wang, Jiang Li, Vijayan K. Asari, Mohammad A. Karim, Manuel Filipe Costa (Ed.)

Electrical & Computer Engineering Faculty Publications

Pose and illumination are identified as major problems in 2D face recognition (FR). It has been theoretically proven that the more diversified instances in the training phase, the more accurate and adaptable the FR system appears to be. Based on this common awareness, researchers have developed a large number of photographic face databases to meet the demand for data training purposes. In this paper, we propose a novel scheme for 2D face database diversification based on 3D face modeling and computer graphics techniques, which supplies augmented variances of pose and illumination. Based on the existing samples from identical individuals of …


Special Issue On Information Dissemination And New Services In P2p Systems, Min Song, Sachin Shetty, Wenbin Jiang, E. K. Park Jan 2011

Special Issue On Information Dissemination And New Services In P2p Systems, Min Song, Sachin Shetty, Wenbin Jiang, E. K. Park

Electrical & Computer Engineering Faculty Publications

Information dissemination is an important P2P application that has received considerable research attention in recent years. P2P information dissemination systems range from simple file sharing applications to more complex systems that allows users to securely and efficiently publish, organize, index, search, update and retrieve data in a distributed storage medium. For complex P2P information dissemination systems, there is a need for features which include security, anonymity, fairness, scalability, resource management, and organization capabilities. For effective information dissemination, following features of P2P systems and infrastructure need to be updated: distributed object location and routing mechanisms, novel approaches to content replication, caching …


Visual Knowledge Representation Of Conceptual Semantic Networks, Leyla Zhuhadar, Olfa Nasraoui, Robert Wyatt, Rong Yang Jan 2011

Visual Knowledge Representation Of Conceptual Semantic Networks, Leyla Zhuhadar, Olfa Nasraoui, Robert Wyatt, Rong Yang

Analytics & Information Systems Faculty Publications

This article presents methods of using visual analysis to visually represent large amounts of massive, dynamic, ambiguous data allocated in a repository of learning objects. These methods are based on the semantic representation of these resources. We use a graphical model represented as a semantic graph. The formalization of the semantic graph has been intuitively built to solve a real problem which is browsing and searching for lectures in a vast repository of colleges/courses located at Western Kentucky University1. This study combines Formal Concept Analysis (FCA) with Semantic Factoring to decompose complex, vast concepts into their primitives in order to …


Developing A Master Data Sharing Agreement: Seeking Student-Level Evidence To Support A Collaborative Community Effort In Education, Neil E. Carlson, Edwin Hernández, Chaná Edmond-Verley, Gustavo Rotondaro Jan 2011

Developing A Master Data Sharing Agreement: Seeking Student-Level Evidence To Support A Collaborative Community Effort In Education, Neil E. Carlson, Edwin Hernández, Chaná Edmond-Verley, Gustavo Rotondaro

University Faculty Publications and Creative Works

The authors, who represent a family foundation, a college, a university, and a public school system, describe the process of developing an agreement that allows student-level data to be shared for research and evaluation purposes. Keys to reaching the agreement included clear distinctions among roles and access to data, strict adherence to consent and confidentiality agreements, and a shared commitment to using data to improve student outcomes.


Developing A Master Data Sharing Agreement: Seeking Student-Level Evidence To Support A Collaborative Community Effort In Education, Neil E. Carlson, Edwin Hernández, Chaná Edmond-Verley, Gustavo Rotondaro Jan 2011

Developing A Master Data Sharing Agreement: Seeking Student-Level Evidence To Support A Collaborative Community Effort In Education, Neil E. Carlson, Edwin Hernández, Chaná Edmond-Verley, Gustavo Rotondaro

University Faculty Publications and Creative Works

The authors, who represent a family foundation, a college, a university, and a public school system, describe the process of developing an agreement that allows student-level data to be shared for research and evaluation purposes. Keys to reaching the agreement included clear distinctions among roles and access to data, strict adherence to consent and confidentiality agreements, and a shared commitment to using data to improve student outcomes.


Ua3/9/2 I.T. Division Annual Report + Tactical Plan, Wku Information Technology Jan 2011

Ua3/9/2 I.T. Division Annual Report + Tactical Plan, Wku Information Technology

WKU Administration Documents

Annual report of WKU Information Technology Division submitted to WKU President Gary Ransdell. Report is housed in UA3/9/2 Subject Files.