Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 5941 - 5970 of 6720

Full-Text Articles in Physical Sciences and Mathematics

Evaluation Of Mpeg-4 Ipmp Extension, Hwee Hwa Pang, Yongdong Wu Mar 2005

Evaluation Of Mpeg-4 Ipmp Extension, Hwee Hwa Pang, Yongdong Wu

Research Collection School Of Computing and Information Systems

MPEG-4 IPMPX (intellectual property management and protection extension) is the latest ISO standard which provides a flexible framework for protecting MPEG streams. The message mechanism of IPMPX enables interoperability among IPMPX-compliant devices no matter which protection methods are embedded. This paper highlights several problems in the message syntax of IPMPX: the tool delivery message IPMP_ToolES_AU is vulnerable to network attack, the authentication message IMP_Mutual_Authentication is incapable of defending against forgery attack, and the configuration message IPMP_SelectiveDecrptionInit is ambiguous and redundant. We propose a number of remedies to those problems, which can be incorporated into a corrigenda to improve the present …


Securing Application Command Layer Under Jini Services, Tarek Mahmoud Negm Feb 2005

Securing Application Command Layer Under Jini Services, Tarek Mahmoud Negm

Archived Theses and Dissertations

No abstract provided.


Negotiation Of Software Requirements In An Asynchronous Collaborative Environment, Catherine Lowry Campbell Jan 2005

Negotiation Of Software Requirements In An Asynchronous Collaborative Environment, Catherine Lowry Campbell

Dissertations

The effect of task structure and negotiation sequence on collaborative software requirements negotiation is investigated. This work began with an extensive literature review that focused on current research in collaborative software engineering and, in particular, on the negotiation of software requirements and the requisite collaboration for the development of such requirements. A formal detailed experiment was then conducted to evaluate the effects of negotiation sequence and task structure in an asynchronous group meeting environment. The experiment tested the impact of these structures on groups negotiating the requirements for an emergency response information system. The results reported here show that these …


Live, Virtual, And Constructive Environments For Performance Support, John Michael Lacontora Jan 2005

Live, Virtual, And Constructive Environments For Performance Support, John Michael Lacontora

Dissertations

As military systems become more complex, the operation and support of these systems becomes intrinsically more difficult. The U.S. Army's current procurement process relies on industry to provide embedded training and performance support tools for the systems they produce. These tools are relatively new and in the early stages of development. As yet, they have failed to meet the needs of the technicians that are required to support these complex systems. Current efforts to provide enabling technologies that enhance the capabilities of automotive maintenance technicians are concentrated in three professional communities. First is the Performance Improvement community where work is …


Digital Libraries And Middleware Technology, Muhammad Umar Qasim Jan 2005

Digital Libraries And Middleware Technology, Muhammad Umar Qasim

Theses

Digital libraries deliver personalized knowledge directly to their users, without being restricted to the contents of a physical library. In a digital library information from any online source can be managed and shared, making more knowledge available to users than before. The information sharing is achieved by integrating many autonomous heterogeneous systems available. The challenge is to provide users with the ability to transparently access digital library contents in spite of the heterogeneity among the information sources.

Research communities have proposed several approaches to accomplish the system integration in digital libraries. In this thesis, the working of currently employed approaches …


Java Performance Of The Rijndael Encryption Algorithm Across Compilers And Virtual Machines, Gregory Leavitt Orgill Jan 2005

Java Performance Of The Rijndael Encryption Algorithm Across Compilers And Virtual Machines, Gregory Leavitt Orgill

Theses and Dissertations

The Rijndael encryption algorithm has recently been published as the Advanced Encryption Standard (AES), a Federal Information Processing Standard, and is being accepted by developers and designers as the algorithm of choice where encryption is required. Java is becoming the language of choice for E-Business applications, many of which require cryptography. The performance of any Java application is dependent on the compiler and virtual machine used to compile and interpret. Prior research has provided performance information for the Rijndael algorithm in Java for specific virtual machines. This research includes the development of a Rijndael implementation in Java. Using Java system …


How To Overcome The Knowledge Paradox: Activate Knowledge Identity, Not Just Organize Information, Sajda Qureshi, Peter Keen Jan 2005

How To Overcome The Knowledge Paradox: Activate Knowledge Identity, Not Just Organize Information, Sajda Qureshi, Peter Keen

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

A paradox appears to thwart traditional knowledge sharing efforts in organizations: the greater the benefit of a piece of knowledge to an organization the less likely that it will be shared. This paper suggests that in order to mobilize knowledge where there is demand for it, it has to be activated. This paper considers the knowledge identity of the person whose knowledge is to be activated and uses these identities to analyze a case study in which highly distributed knowledge is activated. The analysis reveals activation effects needed to mobilize each of the knowledge identities.


A Sin Of Omission: Database Transactions, David Hansen Jan 2005

A Sin Of Omission: Database Transactions, David Hansen

Faculty Publications - Department of Electrical Engineering and Computer Science

Database courses are under increasing pressure to include new topics which inevitably leads to a decision about which topics are essential to the course and which can be omitted to make room for others. Recent surveys have indicated that many instructors are reducing or eliminating coverage of “transaction management” from their introductory database courses. As both an academic and a practitioner, I believe that this is a mistake. This paper discusses why the semantics of transaction management should be an integral topic in any introductory database management system course.


Social Indicators In Cleveland's Ward 17, Mark Salling, Sharon Bliss, Joseph Ahern Jan 2005

Social Indicators In Cleveland's Ward 17, Mark Salling, Sharon Bliss, Joseph Ahern

All Maxine Goodman Levin School of Urban Affairs Publications

No abstract provided.


The Edam Project: Mining Atmospheric Aerosol Datasets, Raghu Ramakrishnan, James J. Schauer, Lei Chen, Zheng Huang, Martin M. Shafer, Deborah S. Gross, David R. Musicant Jan 2005

The Edam Project: Mining Atmospheric Aerosol Datasets, Raghu Ramakrishnan, James J. Schauer, Lei Chen, Zheng Huang, Martin M. Shafer, Deborah S. Gross, David R. Musicant

Faculty Work

Data mining has been a very active area of research in the database, machine learning, and mathematical programming communities in recent years. EDAM (Exploratory Data Analysis and Management) is a joint project between researchers in Atmospheric Chemistry and Computer Science at Carleton College and the University of Wisconsin-Madison that aims to develop data mining techniques for advancing the state of the art in analyzing atmospheric aerosol datasets. There is a great need to better understand the sources, dynamics, and compositions of atmospheric aerosols. The traditional approach for particle measurement, which is the collection of bulk samples of particulates on filters, …


A Uniform Approach To Logic Programming Semantics, Pascal Hitzler, Matthias Wendt Jan 2005

A Uniform Approach To Logic Programming Semantics, Pascal Hitzler, Matthias Wendt

Computer Science and Engineering Faculty Publications

Part of the theory of programming and nonymonotonic reasoning concerns the study of fixed-point semantics for these paradigms. Several different semantics have been proposed during the last two decades, and some have been more successful and acknowledged than others. The rationales behind those various semantics have been manifold, depending on one's point of view, which may be that of a programmer or inspired by commonsense reasoning, and consequently the constructions which lead to these semantics are technically very diverse, and the exact relationships between them have not yet been fully understood. In this paper, we present a conceptually new method, …


Level Mapping Characterizations Of Selector-Generated Models For Logic Programs, Sibylle Schwarz, Pascal Hitzler Jan 2005

Level Mapping Characterizations Of Selector-Generated Models For Logic Programs, Sibylle Schwarz, Pascal Hitzler

Computer Science and Engineering Faculty Publications

Assigning semantics to logic programs via selector generated models (Schwarz 2002/2003) extends several semantics, like the stable, the inflationary, and the stable generated semantics, to programs with arbitrary formulae in rule heads and bodies. We study this approach by means of a unifying framework for characterizing different logic programming semantics using level mappings (Hitzler and Wendt 200x, Hitzler 2003), thereby supporting the claim that this framework is very flexible and applicable to very diversely defined semantics.


The Semantic Web In One Day, York Sure, Pascal Hitzler, Andreas Eberhart, Rudi Studer Jan 2005

The Semantic Web In One Day, York Sure, Pascal Hitzler, Andreas Eberhart, Rudi Studer

Computer Science and Engineering Faculty Publications

To gain momentum, technologies for building private semantic Webs or parts of the World Wide semantic Web must become a commodity and easy to integrate. To determine just how far semantic Web technologies have come, we wanted to create a snapshot of what you could do by applying and assembling existing semantic Web technologies - in one day.


Dlp - An Introduction, Denny Vrandecic, Pascal Hitzler, Rudi Studer Jan 2005

Dlp - An Introduction, Denny Vrandecic, Pascal Hitzler, Rudi Studer

Computer Science and Engineering Faculty Publications

DLP - Description Logic Programs - is the name for the common language that is able to integrate knowledge bases described in Description Logic with Logic Programs. In this introduction, we offer a very short overview of DLP, the motivation for it, the benefits it offers and how to use it.


Senior Health Care System, Meng-Chun Ling Jan 2005

Senior Health Care System, Meng-Chun Ling

Theses Digitization Project

Senior Health Care System (SHCS) is created for users to enter participants' conditions and store information in a central database. When users are ready for quarterly assessments the system generates a simple summary that can be reviewed, modified, and saved as part of the summary assessments, which are required by Federal and California law.


A Portable Traveler's Weblog, Feng-Chun Lung Jan 2005

A Portable Traveler's Weblog, Feng-Chun Lung

Theses Digitization Project

This project is a web based application tha provides a friendly and simple interface to let users easily record and modify their travel experiences anytime or anywhere.


A Generative Programming Approach To Interactive Information Retrieval: Insights And Experiences, Saverio Perugini, Naren Ramakrishnan Jan 2005

A Generative Programming Approach To Interactive Information Retrieval: Insights And Experiences, Saverio Perugini, Naren Ramakrishnan

Computer Science Faculty Publications

We describe the application of generative programming to a problem in interactive information retrieval. The particular interactive information retrieval problem we study is the support for "out-of-turn interaction" with a website – how a user can communicate input to a website when the site is not soliciting such information on the current page, but will do so on a subsequent page. Our solution approach makes generous use of program transformations (partial evaluation, currying, and slicing) to delay the site’s current solicitation for input until after the user’s out-of-turn input is processed. We illustrate how studying out-of-turn interaction through a generative …


The Good, Bad And The Indifferent: Explorations In Recommender System Health, Benjamin J. Keller, Sun-Mi Kim, N. Srinivas Vemuri, Naren Ramakrishnan, Saverio Perugini Jan 2005

The Good, Bad And The Indifferent: Explorations In Recommender System Health, Benjamin J. Keller, Sun-Mi Kim, N. Srinivas Vemuri, Naren Ramakrishnan, Saverio Perugini

Computer Science Faculty Publications

Our work is based on the premise that analysis of the connections exploited by a recommender algorithm can provide insight into the algorithm that could be useful to predict its performance in a fielded system. We use the jumping connections model defined by Mirza et al. [6], which describes the recommendation process in terms of graphs. Here we discuss our work that has come out of trying to understand algorithm behavior in terms of these graphs. We start by describing a natural extension of the jumping connections model of Mirza et al., and then discuss observations that have come from …


Utility Computing: Certification Model, Costing Model, And Related Architecture Development, Saif Ahmed Faruqui Jan 2005

Utility Computing: Certification Model, Costing Model, And Related Architecture Development, Saif Ahmed Faruqui

Theses Digitization Project

The purpose of the thesis was to propose one set of solutions to some of the challenges that are delaying the adoption of utility computing on a wider scale. These components enable effective deployment of utility computing, efficient look-up, and comparison of service offerings of different utility computing resource centers connected to the utility computing network.


Disintermediation In The United States Air Travel Industry Who Hold The Power Of Booking Strength, Preenida Gajaseni Jan 2005

Disintermediation In The United States Air Travel Industry Who Hold The Power Of Booking Strength, Preenida Gajaseni

Theses Digitization Project

The purpose of this study is to investigate the correlation of U.S. domestic air travelers and patterns of air travel purchase within the U.S. air travel industry. Influences on the patterns of air travel purchase involved 1) demographic characteristics of travelers 2) benefits to the customer 3) customer attitude toward service providers' (defined as airlines, web-based travel agents, and traditional travel agents and 4) information sources used to select and book a flight for business and leisure trips.


Graduate Advising System: Application Component, Kyle Rene Rotte Jan 2005

Graduate Advising System: Application Component, Kyle Rene Rotte

Theses Digitization Project

This project utilized PHP to write an application component for the Graduate Advising System (GRADS) computer program used by the Computer Science Department at California State University, San Bernardino. This application component allows the applicant to apply to the Computer Science program and to track the progress of his or her application. It allows people writing recommendations on the student's behalf to submit the recommendations via GRADS. It allows the Graduate Assistant to monitor the status of the application. It allows the Coordinator to review and evaluate the submitted application/ recommendation package.


A Random Rotation Perturbation Approach To Privacy Preserving Data Classification, Keke Chen, Ling Liu Jan 2005

A Random Rotation Perturbation Approach To Privacy Preserving Data Classification, Keke Chen, Ling Liu

Kno.e.sis Publications

This paper presents a random rotation perturbation approach for privacy preserving data classification. Concretely, we identify the importance of classification-specific information with respect to the loss of information factor, and present a random rotation perturbation framework for privacy preserving data classification. Our approach has two unique characteristics. First, we identify that many classification models utilize the geometric properties of datasets, which can be preserved by geometric rotation. We prove that the three types of classifiers will deliver the same performance over the rotation perturbed dataset as over the original dataset. Second, we propose a multi-column privacy model to address the …


Variational Bayesian Image Modelling, Li Chen, Feng Jiao, Dale Schuurmans, Shaojun Wang Jan 2005

Variational Bayesian Image Modelling, Li Chen, Feng Jiao, Dale Schuurmans, Shaojun Wang

Kno.e.sis Publications

We present a variational Bayesian framework for performing inference, density estimation and model selection in a special class of graphical models—Hidden Markov Random Fields (HMRFs). HMRFs are particularly well suited to image modelling and in this paper, we apply them to the problem of image segmentation. Unfortunately, HMRFs are notoriously hard to train and use because the exact inference problems they create are intractable. Our main contribution is to introduce an efficient variational approach for performing approximate inference of the Bayesian formulation of HMRFs, which we can then apply to the density estimation and model selection problems that arise when …


Meteor-S Wsdi: A Scalable P2p Infrastructure Of Registries For Semantic Publication And Discovery Of Web Services, Kunal Verma, Kaarthik Sivashanmugam, Amit P. Sheth, Abhijit Patil, Swapna Oundhakar, John Miller Jan 2005

Meteor-S Wsdi: A Scalable P2p Infrastructure Of Registries For Semantic Publication And Discovery Of Web Services, Kunal Verma, Kaarthik Sivashanmugam, Amit P. Sheth, Abhijit Patil, Swapna Oundhakar, John Miller

Kno.e.sis Publications

Web services are the new paradigm for distributed computing. They have much to offer towards interoperability of applications and integration of large scale distributed systems. To make Web services accessible to users, service providers use Web service registries to publish them. Current infrastructure of registries requires replication of all Web service publications in all Universal Business Registries. Large growth in number of Web services as well as the growth in the number of registries would make this replication impractical. In addition, the current Web service discovery mechanism is inefficient, as it does not support discovery based on the capabilities of …


From Semantic Search & Integration To Analytics, Amit P. Sheth Jan 2005

From Semantic Search & Integration To Analytics, Amit P. Sheth

Kno.e.sis Publications

Semantics is seen as the key ingredient in the next phase of the Web infrastructure as well as the next generation of enterprise content management. Ontology is the centerpiece of the most prevalent semantic technologies and provides the basis of representing, acquiring, and utilizing knowledge. With the availability of several commercial products and many research tools, specifications and increasing adoption of Semantic Web standards such as RDF for metadata and OWL for ontology representation, ontology-driven techniques and systems have already enabled a new generation of industry strength semantic applications. In particular, Semagix's Freedom has powered applications in leading verticals such …


Discovering Informative Subgraphs In Rdf Graphs, William H. Milnor, Cartic Ramakrishnan, Matthew Perry, Amit P. Sheth, John A. Miller, Krzysztof Kochut Jan 2005

Discovering Informative Subgraphs In Rdf Graphs, William H. Milnor, Cartic Ramakrishnan, Matthew Perry, Amit P. Sheth, John A. Miller, Krzysztof Kochut

Kno.e.sis Publications

Discovering patterns in graphs has long been an area of interest. In most contemporary approaches to such pattern discovery either quantitative anomalies or frequency of substructure is used to measure the interestingness of a pattern. In this paper we address the issue of discovering informative sub-graphs within RDF graphs. We motivate our work with an example related to Semantic Search. A user might pose a question of the form: ' What are the most relevant ways in which entity X is related to entity Y?' the response to which is a subgraph connecting X to Y. Relevance of the …


Framework For Semantic Web Process Composition, Kaarthik Sivashanmugam, John A. Miller, Amit P. Sheth, Kunal Verma Jan 2005

Framework For Semantic Web Process Composition, Kaarthik Sivashanmugam, John A. Miller, Amit P. Sheth, Kunal Verma

Kno.e.sis Publications

Web services have the potential to revolutionize e-commerce by enabling businesses to interact with each other on the fly. To date, however, Web processes using Web services have been created mostly at the syntactic level. Current composition standards focus on building processes based on the interface description of the participating services. This rigid approach, with its strong coupling between the process and the interface of the participating services, does not allow businesses to dynamically change partners and services. As shown in this article, Web process composition techniques can be enhanced by using semantic process templates to capture the semantic requirements …


Glyde - An Expressive Xml Standard For The Representation Of Glycan, Satya S. Sahoo, Christopher Thomas, Amit P. Sheth, Cory Andrew Henson, William S. York Jan 2005

Glyde - An Expressive Xml Standard For The Representation Of Glycan, Satya S. Sahoo, Christopher Thomas, Amit P. Sheth, Cory Andrew Henson, William S. York

Kno.e.sis Publications

The amount of glycomics data being generated is rapidly increasing as a result of improvements in analytical and computational methods. Correlation and analysis of this large, distributed data set requires an extensible and flexible representational standard that is also ‘understood’ by a wide range of software applications. An XML-based data representation standard that faithfully captures essential structural details of a glycan moiety along with additional information (such as data provenance) to aid the interpretation and usage of glycan data, will facilitate the exchange of glycomics data across the scientific community. To meet this need, we introduce GLYcan Data Exchange (GLYDE) …


The "Best K" For Entropy-Based Categorical Data Clustering, Keke Chen, Ling Liu Jan 2005

The "Best K" For Entropy-Based Categorical Data Clustering, Keke Chen, Ling Liu

Kno.e.sis Publications

With the growing demand on cluster analysis for categorical data, a handful of categorical clustering algorithms have been developed. Surprisingly, to our knowledge, none has satisfactorily addressed the important problem for categorical clustering – how can we determine the best K number of clusters for a categorical dataset? Since categorical data does not have the inherent distance function as the similarity measure, traditional cluster validation techniques based on the geometry shape and density distribution cannot be applied to answer this question. In this paper, we investigate the entropy property of the categorical data and propose a BkPlot method for determining …


Wsdl-S: Adding Semantics To Wsdl, John Miller, Kunal Verma, Preeda Rajasekaran, Amit P. Sheth, Rohit Aggarwal, Kaarthik Sivashanmugam Jan 2005

Wsdl-S: Adding Semantics To Wsdl, John Miller, Kunal Verma, Preeda Rajasekaran, Amit P. Sheth, Rohit Aggarwal, Kaarthik Sivashanmugam

Kno.e.sis Publications

Web services have primarily been designed for providing inter-operability between business applications. Current technologies assume a large amount of human interaction, for integrating two applications. This is primarily due to the fact that business process integration requires understanding of data and functions of the involved entities. Semantic Web technologies, powered by description logic based languages like OWL[1], aim to add greater meaning to Web content, by annotating the data with ontologies. Ontologies provide a mechanism of providing shared conceptualizations of domains. This allows agents to get an understanding of users’ Web content and greatly reduces human interaction for meaningful Web …