Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (2961)
- Wright State University (632)
- Walden University (447)
- Selected Works (287)
- New Jersey Institute of Technology (137)
-
- University of Nebraska at Omaha (119)
- California State University, San Bernardino (96)
- Old Dominion University (95)
- San Jose State University (85)
- University of Dayton (82)
- The University of Maine (67)
- City University of New York (CUNY) (65)
- University of Nebraska - Lincoln (54)
- Air Force Institute of Technology (53)
- SelectedWorks (53)
- Technological University Dublin (51)
- University of South Florida (50)
- Kennesaw State University (46)
- Nova Southeastern University (43)
- Claremont Colleges (42)
- University of Wisconsin Milwaukee (42)
- University of Arkansas, Fayetteville (41)
- Western Kentucky University (41)
- Dakota State University (39)
- Institute of Business Administration (38)
- California Polytechnic State University, San Luis Obispo (36)
- Western University (35)
- Ateneo de Manila University (34)
- Governors State University (34)
- Purdue University (34)
- Keyword
-
- Machine learning (101)
- Information technology (93)
- Data mining (89)
- Social media (78)
- Twitter (64)
-
- Machine Learning (57)
- Cybersecurity (54)
- Semantic Web (54)
- Deep learning (52)
- Artificial intelligence (49)
- Online learning (49)
- Information Technology (47)
- Classification (46)
- Cloud computing (45)
- Information retrieval (45)
- Privacy (45)
- Big data (44)
- Database (43)
- Ontology (43)
- Computer science (42)
- Information security (41)
- Algorithms (40)
- Security (40)
- Databases (39)
- Information systems (39)
- Management (37)
- Clustering (36)
- Data Mining (36)
- Northern Ohio Data and Information Service (NODIS) (36)
- Technology (35)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (2867)
- Kno.e.sis Publications (541)
- Walden Dissertations and Doctoral Studies (447)
- Theses and Dissertations (116)
- Dissertations (107)
-
- Computer Science Faculty Publications (91)
- Computer Science and Engineering Faculty Publications (91)
- Theses Digitization Project (84)
- Master's Projects (68)
- Information Systems and Quantitative Analysis Faculty Proceedings & Presentations (64)
- Electronic Theses and Dissertations (55)
- Dissertations and Theses Collection (Open Access) (50)
- Theses (46)
- USF Tampa Graduate Theses and Dissertations (46)
- CCE Theses and Dissertations (42)
- Information Systems and Quantitative Analysis Faculty Publications (41)
- Kyriakos MOURATIDIS (40)
- CGU Faculty Publications and Research (37)
- International Conference on Information and Communication Technologies (36)
- Open Educational Resources (34)
- Department of Information Systems & Computer Science Faculty Publications (33)
- All Capstone Projects (32)
- Graduate Theses and Dissertations (32)
- Masters Theses & Doctoral Dissertations (32)
- Articles (29)
- Conference papers (28)
- David LO (28)
- Journal of Spatial Information Science (28)
- All Maxine Goodman Levin School of Urban Affairs Publications (27)
- Saverio Perugini (25)
- Publication Type
Articles 5941 - 5970 of 6720
Full-Text Articles in Physical Sciences and Mathematics
Evaluation Of Mpeg-4 Ipmp Extension, Hwee Hwa Pang, Yongdong Wu
Evaluation Of Mpeg-4 Ipmp Extension, Hwee Hwa Pang, Yongdong Wu
Research Collection School Of Computing and Information Systems
MPEG-4 IPMPX (intellectual property management and protection extension) is the latest ISO standard which provides a flexible framework for protecting MPEG streams. The message mechanism of IPMPX enables interoperability among IPMPX-compliant devices no matter which protection methods are embedded. This paper highlights several problems in the message syntax of IPMPX: the tool delivery message IPMP_ToolES_AU is vulnerable to network attack, the authentication message IMP_Mutual_Authentication is incapable of defending against forgery attack, and the configuration message IPMP_SelectiveDecrptionInit is ambiguous and redundant. We propose a number of remedies to those problems, which can be incorporated into a corrigenda to improve the present …
Securing Application Command Layer Under Jini Services, Tarek Mahmoud Negm
Securing Application Command Layer Under Jini Services, Tarek Mahmoud Negm
Archived Theses and Dissertations
No abstract provided.
Negotiation Of Software Requirements In An Asynchronous Collaborative Environment, Catherine Lowry Campbell
Negotiation Of Software Requirements In An Asynchronous Collaborative Environment, Catherine Lowry Campbell
Dissertations
The effect of task structure and negotiation sequence on collaborative software requirements negotiation is investigated. This work began with an extensive literature review that focused on current research in collaborative software engineering and, in particular, on the negotiation of software requirements and the requisite collaboration for the development of such requirements. A formal detailed experiment was then conducted to evaluate the effects of negotiation sequence and task structure in an asynchronous group meeting environment. The experiment tested the impact of these structures on groups negotiating the requirements for an emergency response information system. The results reported here show that these …
Live, Virtual, And Constructive Environments For Performance Support, John Michael Lacontora
Live, Virtual, And Constructive Environments For Performance Support, John Michael Lacontora
Dissertations
As military systems become more complex, the operation and support of these systems becomes intrinsically more difficult. The U.S. Army's current procurement process relies on industry to provide embedded training and performance support tools for the systems they produce. These tools are relatively new and in the early stages of development. As yet, they have failed to meet the needs of the technicians that are required to support these complex systems. Current efforts to provide enabling technologies that enhance the capabilities of automotive maintenance technicians are concentrated in three professional communities. First is the Performance Improvement community where work is …
Digital Libraries And Middleware Technology, Muhammad Umar Qasim
Digital Libraries And Middleware Technology, Muhammad Umar Qasim
Theses
Digital libraries deliver personalized knowledge directly to their users, without being restricted to the contents of a physical library. In a digital library information from any online source can be managed and shared, making more knowledge available to users than before. The information sharing is achieved by integrating many autonomous heterogeneous systems available. The challenge is to provide users with the ability to transparently access digital library contents in spite of the heterogeneity among the information sources.
Research communities have proposed several approaches to accomplish the system integration in digital libraries. In this thesis, the working of currently employed approaches …
Java Performance Of The Rijndael Encryption Algorithm Across Compilers And Virtual Machines, Gregory Leavitt Orgill
Java Performance Of The Rijndael Encryption Algorithm Across Compilers And Virtual Machines, Gregory Leavitt Orgill
Theses and Dissertations
The Rijndael encryption algorithm has recently been published as the Advanced Encryption Standard (AES), a Federal Information Processing Standard, and is being accepted by developers and designers as the algorithm of choice where encryption is required. Java is becoming the language of choice for E-Business applications, many of which require cryptography. The performance of any Java application is dependent on the compiler and virtual machine used to compile and interpret. Prior research has provided performance information for the Rijndael algorithm in Java for specific virtual machines. This research includes the development of a Rijndael implementation in Java. Using Java system …
How To Overcome The Knowledge Paradox: Activate Knowledge Identity, Not Just Organize Information, Sajda Qureshi, Peter Keen
How To Overcome The Knowledge Paradox: Activate Knowledge Identity, Not Just Organize Information, Sajda Qureshi, Peter Keen
Information Systems and Quantitative Analysis Faculty Proceedings & Presentations
A paradox appears to thwart traditional knowledge sharing efforts in organizations: the greater the benefit of a piece of knowledge to an organization the less likely that it will be shared. This paper suggests that in order to mobilize knowledge where there is demand for it, it has to be activated. This paper considers the knowledge identity of the person whose knowledge is to be activated and uses these identities to analyze a case study in which highly distributed knowledge is activated. The analysis reveals activation effects needed to mobilize each of the knowledge identities.
A Sin Of Omission: Database Transactions, David Hansen
A Sin Of Omission: Database Transactions, David Hansen
Faculty Publications - Department of Electrical Engineering and Computer Science
Database courses are under increasing pressure to include new topics which inevitably leads to a decision about which topics are essential to the course and which can be omitted to make room for others. Recent surveys have indicated that many instructors are reducing or eliminating coverage of “transaction management” from their introductory database courses. As both an academic and a practitioner, I believe that this is a mistake. This paper discusses why the semantics of transaction management should be an integral topic in any introductory database management system course.
Social Indicators In Cleveland's Ward 17, Mark Salling, Sharon Bliss, Joseph Ahern
Social Indicators In Cleveland's Ward 17, Mark Salling, Sharon Bliss, Joseph Ahern
All Maxine Goodman Levin School of Urban Affairs Publications
No abstract provided.
The Edam Project: Mining Atmospheric Aerosol Datasets, Raghu Ramakrishnan, James J. Schauer, Lei Chen, Zheng Huang, Martin M. Shafer, Deborah S. Gross, David R. Musicant
The Edam Project: Mining Atmospheric Aerosol Datasets, Raghu Ramakrishnan, James J. Schauer, Lei Chen, Zheng Huang, Martin M. Shafer, Deborah S. Gross, David R. Musicant
Faculty Work
Data mining has been a very active area of research in the database, machine learning, and mathematical programming communities in recent years. EDAM (Exploratory Data Analysis and Management) is a joint project between researchers in Atmospheric Chemistry and Computer Science at Carleton College and the University of Wisconsin-Madison that aims to develop data mining techniques for advancing the state of the art in analyzing atmospheric aerosol datasets. There is a great need to better understand the sources, dynamics, and compositions of atmospheric aerosols. The traditional approach for particle measurement, which is the collection of bulk samples of particulates on filters, …
A Uniform Approach To Logic Programming Semantics, Pascal Hitzler, Matthias Wendt
A Uniform Approach To Logic Programming Semantics, Pascal Hitzler, Matthias Wendt
Computer Science and Engineering Faculty Publications
Part of the theory of programming and nonymonotonic reasoning concerns the study of fixed-point semantics for these paradigms. Several different semantics have been proposed during the last two decades, and some have been more successful and acknowledged than others. The rationales behind those various semantics have been manifold, depending on one's point of view, which may be that of a programmer or inspired by commonsense reasoning, and consequently the constructions which lead to these semantics are technically very diverse, and the exact relationships between them have not yet been fully understood. In this paper, we present a conceptually new method, …
Level Mapping Characterizations Of Selector-Generated Models For Logic Programs, Sibylle Schwarz, Pascal Hitzler
Level Mapping Characterizations Of Selector-Generated Models For Logic Programs, Sibylle Schwarz, Pascal Hitzler
Computer Science and Engineering Faculty Publications
Assigning semantics to logic programs via selector generated models (Schwarz 2002/2003) extends several semantics, like the stable, the inflationary, and the stable generated semantics, to programs with arbitrary formulae in rule heads and bodies. We study this approach by means of a unifying framework for characterizing different logic programming semantics using level mappings (Hitzler and Wendt 200x, Hitzler 2003), thereby supporting the claim that this framework is very flexible and applicable to very diversely defined semantics.
The Semantic Web In One Day, York Sure, Pascal Hitzler, Andreas Eberhart, Rudi Studer
The Semantic Web In One Day, York Sure, Pascal Hitzler, Andreas Eberhart, Rudi Studer
Computer Science and Engineering Faculty Publications
To gain momentum, technologies for building private semantic Webs or parts of the World Wide semantic Web must become a commodity and easy to integrate. To determine just how far semantic Web technologies have come, we wanted to create a snapshot of what you could do by applying and assembling existing semantic Web technologies - in one day.
Dlp - An Introduction, Denny Vrandecic, Pascal Hitzler, Rudi Studer
Dlp - An Introduction, Denny Vrandecic, Pascal Hitzler, Rudi Studer
Computer Science and Engineering Faculty Publications
DLP - Description Logic Programs - is the name for the common language that is able to integrate knowledge bases described in Description Logic with Logic Programs. In this introduction, we offer a very short overview of DLP, the motivation for it, the benefits it offers and how to use it.
Senior Health Care System, Meng-Chun Ling
Senior Health Care System, Meng-Chun Ling
Theses Digitization Project
Senior Health Care System (SHCS) is created for users to enter participants' conditions and store information in a central database. When users are ready for quarterly assessments the system generates a simple summary that can be reviewed, modified, and saved as part of the summary assessments, which are required by Federal and California law.
A Portable Traveler's Weblog, Feng-Chun Lung
A Portable Traveler's Weblog, Feng-Chun Lung
Theses Digitization Project
This project is a web based application tha provides a friendly and simple interface to let users easily record and modify their travel experiences anytime or anywhere.
A Generative Programming Approach To Interactive Information Retrieval: Insights And Experiences, Saverio Perugini, Naren Ramakrishnan
A Generative Programming Approach To Interactive Information Retrieval: Insights And Experiences, Saverio Perugini, Naren Ramakrishnan
Computer Science Faculty Publications
We describe the application of generative programming to a problem in interactive information retrieval. The particular interactive information retrieval problem we study is the support for "out-of-turn interaction" with a website – how a user can communicate input to a website when the site is not soliciting such information on the current page, but will do so on a subsequent page. Our solution approach makes generous use of program transformations (partial evaluation, currying, and slicing) to delay the site’s current solicitation for input until after the user’s out-of-turn input is processed. We illustrate how studying out-of-turn interaction through a generative …
The Good, Bad And The Indifferent: Explorations In Recommender System Health, Benjamin J. Keller, Sun-Mi Kim, N. Srinivas Vemuri, Naren Ramakrishnan, Saverio Perugini
The Good, Bad And The Indifferent: Explorations In Recommender System Health, Benjamin J. Keller, Sun-Mi Kim, N. Srinivas Vemuri, Naren Ramakrishnan, Saverio Perugini
Computer Science Faculty Publications
Our work is based on the premise that analysis of the connections exploited by a recommender algorithm can provide insight into the algorithm that could be useful to predict its performance in a fielded system. We use the jumping connections model defined by Mirza et al. [6], which describes the recommendation process in terms of graphs. Here we discuss our work that has come out of trying to understand algorithm behavior in terms of these graphs. We start by describing a natural extension of the jumping connections model of Mirza et al., and then discuss observations that have come from …
Utility Computing: Certification Model, Costing Model, And Related Architecture Development, Saif Ahmed Faruqui
Utility Computing: Certification Model, Costing Model, And Related Architecture Development, Saif Ahmed Faruqui
Theses Digitization Project
The purpose of the thesis was to propose one set of solutions to some of the challenges that are delaying the adoption of utility computing on a wider scale. These components enable effective deployment of utility computing, efficient look-up, and comparison of service offerings of different utility computing resource centers connected to the utility computing network.
Disintermediation In The United States Air Travel Industry Who Hold The Power Of Booking Strength, Preenida Gajaseni
Disintermediation In The United States Air Travel Industry Who Hold The Power Of Booking Strength, Preenida Gajaseni
Theses Digitization Project
The purpose of this study is to investigate the correlation of U.S. domestic air travelers and patterns of air travel purchase within the U.S. air travel industry. Influences on the patterns of air travel purchase involved 1) demographic characteristics of travelers 2) benefits to the customer 3) customer attitude toward service providers' (defined as airlines, web-based travel agents, and traditional travel agents and 4) information sources used to select and book a flight for business and leisure trips.
Graduate Advising System: Application Component, Kyle Rene Rotte
Graduate Advising System: Application Component, Kyle Rene Rotte
Theses Digitization Project
This project utilized PHP to write an application component for the Graduate Advising System (GRADS) computer program used by the Computer Science Department at California State University, San Bernardino. This application component allows the applicant to apply to the Computer Science program and to track the progress of his or her application. It allows people writing recommendations on the student's behalf to submit the recommendations via GRADS. It allows the Graduate Assistant to monitor the status of the application. It allows the Coordinator to review and evaluate the submitted application/ recommendation package.
A Random Rotation Perturbation Approach To Privacy Preserving Data Classification, Keke Chen, Ling Liu
A Random Rotation Perturbation Approach To Privacy Preserving Data Classification, Keke Chen, Ling Liu
Kno.e.sis Publications
This paper presents a random rotation perturbation approach for privacy preserving data classification. Concretely, we identify the importance of classification-specific information with respect to the loss of information factor, and present a random rotation perturbation framework for privacy preserving data classification. Our approach has two unique characteristics. First, we identify that many classification models utilize the geometric properties of datasets, which can be preserved by geometric rotation. We prove that the three types of classifiers will deliver the same performance over the rotation perturbed dataset as over the original dataset. Second, we propose a multi-column privacy model to address the …
Variational Bayesian Image Modelling, Li Chen, Feng Jiao, Dale Schuurmans, Shaojun Wang
Variational Bayesian Image Modelling, Li Chen, Feng Jiao, Dale Schuurmans, Shaojun Wang
Kno.e.sis Publications
We present a variational Bayesian framework for performing inference, density estimation and model selection in a special class of graphical models—Hidden Markov Random Fields (HMRFs). HMRFs are particularly well suited to image modelling and in this paper, we apply them to the problem of image segmentation. Unfortunately, HMRFs are notoriously hard to train and use because the exact inference problems they create are intractable. Our main contribution is to introduce an efficient variational approach for performing approximate inference of the Bayesian formulation of HMRFs, which we can then apply to the density estimation and model selection problems that arise when …
Meteor-S Wsdi: A Scalable P2p Infrastructure Of Registries For Semantic Publication And Discovery Of Web Services, Kunal Verma, Kaarthik Sivashanmugam, Amit P. Sheth, Abhijit Patil, Swapna Oundhakar, John Miller
Meteor-S Wsdi: A Scalable P2p Infrastructure Of Registries For Semantic Publication And Discovery Of Web Services, Kunal Verma, Kaarthik Sivashanmugam, Amit P. Sheth, Abhijit Patil, Swapna Oundhakar, John Miller
Kno.e.sis Publications
Web services are the new paradigm for distributed computing. They have much to offer towards interoperability of applications and integration of large scale distributed systems. To make Web services accessible to users, service providers use Web service registries to publish them. Current infrastructure of registries requires replication of all Web service publications in all Universal Business Registries. Large growth in number of Web services as well as the growth in the number of registries would make this replication impractical. In addition, the current Web service discovery mechanism is inefficient, as it does not support discovery based on the capabilities of …
From Semantic Search & Integration To Analytics, Amit P. Sheth
From Semantic Search & Integration To Analytics, Amit P. Sheth
Kno.e.sis Publications
Semantics is seen as the key ingredient in the next phase of the Web infrastructure as well as the next generation of enterprise content management. Ontology is the centerpiece of the most prevalent semantic technologies and provides the basis of representing, acquiring, and utilizing knowledge. With the availability of several commercial products and many research tools, specifications and increasing adoption of Semantic Web standards such as RDF for metadata and OWL for ontology representation, ontology-driven techniques and systems have already enabled a new generation of industry strength semantic applications. In particular, Semagix's Freedom has powered applications in leading verticals such …
Discovering Informative Subgraphs In Rdf Graphs, William H. Milnor, Cartic Ramakrishnan, Matthew Perry, Amit P. Sheth, John A. Miller, Krzysztof Kochut
Discovering Informative Subgraphs In Rdf Graphs, William H. Milnor, Cartic Ramakrishnan, Matthew Perry, Amit P. Sheth, John A. Miller, Krzysztof Kochut
Kno.e.sis Publications
Discovering patterns in graphs has long been an area of interest. In most contemporary approaches to such pattern discovery either quantitative anomalies or frequency of substructure is used to measure the interestingness of a pattern. In this paper we address the issue of discovering informative sub-graphs within RDF graphs. We motivate our work with an example related to Semantic Search. A user might pose a question of the form: ' What are the most relevant ways in which entity X is related to entity Y?' the response to which is a subgraph connecting X to Y. Relevance of the …
Framework For Semantic Web Process Composition, Kaarthik Sivashanmugam, John A. Miller, Amit P. Sheth, Kunal Verma
Framework For Semantic Web Process Composition, Kaarthik Sivashanmugam, John A. Miller, Amit P. Sheth, Kunal Verma
Kno.e.sis Publications
Web services have the potential to revolutionize e-commerce by enabling businesses to interact with each other on the fly. To date, however, Web processes using Web services have been created mostly at the syntactic level. Current composition standards focus on building processes based on the interface description of the participating services. This rigid approach, with its strong coupling between the process and the interface of the participating services, does not allow businesses to dynamically change partners and services. As shown in this article, Web process composition techniques can be enhanced by using semantic process templates to capture the semantic requirements …
Glyde - An Expressive Xml Standard For The Representation Of Glycan, Satya S. Sahoo, Christopher Thomas, Amit P. Sheth, Cory Andrew Henson, William S. York
Glyde - An Expressive Xml Standard For The Representation Of Glycan, Satya S. Sahoo, Christopher Thomas, Amit P. Sheth, Cory Andrew Henson, William S. York
Kno.e.sis Publications
The amount of glycomics data being generated is rapidly increasing as a result of improvements in analytical and computational methods. Correlation and analysis of this large, distributed data set requires an extensible and flexible representational standard that is also ‘understood’ by a wide range of software applications. An XML-based data representation standard that faithfully captures essential structural details of a glycan moiety along with additional information (such as data provenance) to aid the interpretation and usage of glycan data, will facilitate the exchange of glycomics data across the scientific community. To meet this need, we introduce GLYcan Data Exchange (GLYDE) …
The "Best K" For Entropy-Based Categorical Data Clustering, Keke Chen, Ling Liu
The "Best K" For Entropy-Based Categorical Data Clustering, Keke Chen, Ling Liu
Kno.e.sis Publications
With the growing demand on cluster analysis for categorical data, a handful of categorical clustering algorithms have been developed. Surprisingly, to our knowledge, none has satisfactorily addressed the important problem for categorical clustering – how can we determine the best K number of clusters for a categorical dataset? Since categorical data does not have the inherent distance function as the similarity measure, traditional cluster validation techniques based on the geometry shape and density distribution cannot be applied to answer this question. In this paper, we investigate the entropy property of the categorical data and propose a BkPlot method for determining …
Wsdl-S: Adding Semantics To Wsdl, John Miller, Kunal Verma, Preeda Rajasekaran, Amit P. Sheth, Rohit Aggarwal, Kaarthik Sivashanmugam
Wsdl-S: Adding Semantics To Wsdl, John Miller, Kunal Verma, Preeda Rajasekaran, Amit P. Sheth, Rohit Aggarwal, Kaarthik Sivashanmugam
Kno.e.sis Publications
Web services have primarily been designed for providing inter-operability between business applications. Current technologies assume a large amount of human interaction, for integrating two applications. This is primarily due to the fact that business process integration requires understanding of data and functions of the involved entities. Semantic Web technologies, powered by description logic based languages like OWL[1], aim to add greater meaning to Web content, by annotating the data with ontologies. Ontologies provide a mechanism of providing shared conceptualizations of domains. This allows agents to get an understanding of users’ Web content and greatly reduces human interaction for meaningful Web …