Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2007

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1261 - 1290 of 6758

Full-Text Articles in Physical Sciences and Mathematics

Anonymous And Authenticated Key Exchange For Roaming Networks, Guomin Yang, Duncan S. Wong, Xiaotie Deng Sep 2007

Anonymous And Authenticated Key Exchange For Roaming Networks, Guomin Yang, Duncan S. Wong, Xiaotie Deng

Research Collection School Of Computing and Information Systems

User privacy is a notable security issue in wireless communications. It concerns about user identities from being exposed and user movements and whereabouts from being tracked. The concern of user privacy is particularly signified in systems which support roaming when users are able to hop across networks administered by different operators. In this paper, we propose a novel construction approach of anonymous and authenticated key exchange protocols for a roaming user and a visiting server to establish a random session key in such a way that the visiting server authenticates the user's home server without knowing exactly who the user …


Overview Of The Imageclef 2007 Object Retrieval Task, Thomas Deselaers, Steven C. H. Hoi Sep 2007

Overview Of The Imageclef 2007 Object Retrieval Task, Thomas Deselaers, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

We describe the object retrieval task of ImageCLEF 2007, give an overview of the methods of the participating groups, and present and discuss the results. The task was based on the widely used PASCAL object recognition data to train object recognition methods and on the IAPR TC-12 benchmark dataset from which images of objects of the ten different classes bicycles, buses, cars, motorbikes, cats, cows, dogs, horses, sheep, and persons had to be retrieved. Seven international groups participated using a wide variety of methods. The results of the evaluation show that the task was very challenging and that different methods …


Search For Gravitational Wave Radiation Associated With The Pulsating Tail Of The Sgr 1806−20 Hyperflare Of 27 December 2004 Using Ligo, B. P. Abbott, R. Abbott, Mario C. Diaz, R. Grosso, Soumya Mohanty, Soma Mukherjee, Cristina V. Torres Sep 2007

Search For Gravitational Wave Radiation Associated With The Pulsating Tail Of The Sgr 1806−20 Hyperflare Of 27 December 2004 Using Ligo, B. P. Abbott, R. Abbott, Mario C. Diaz, R. Grosso, Soumya Mohanty, Soma Mukherjee, Cristina V. Torres

Physics and Astronomy Faculty Publications and Presentations

We have searched for gravitational waves (GWs) associated with the SGR 1806−20 hyperflare of 27 December 2004. This event, originating from a Galactic neutron star, displayed exceptional energetics. Recent investigations of the x-ray light curve’s pulsating tail revealed the presence of quasiperiodic oscillations (QPOs) in the 30–2000 Hz frequency range, most of which coincides with the bandwidth of the LIGO detectors. These QPOs, with well-characterized frequencies, can plausibly be attributed to seismic modes of the neutron star which could emit GWs. Our search targeted potential quasimonochromatic GWs lasting for tens of seconds and emitted at the QPO frequencies. We have …


Departures From Gibrat’S Law, Discontinuities And City Size Distributions, Ahjond S. Garmestani, Craig R. Allen, Colin M. Gallagher, John Mittelstaedt Sep 2007

Departures From Gibrat’S Law, Discontinuities And City Size Distributions, Ahjond S. Garmestani, Craig R. Allen, Colin M. Gallagher, John Mittelstaedt

School of Natural Resources: Faculty Publications

Cities are complex, self-organizing, evolving systems and the emergent patterns they manifest provide insight into the dynamic processes in urban systems. This article analyses city size distributions, by decade, from the south-eastern region of the US for the years 1860–1990. It determines if the distributions are clustered into size classes and documents changes in the pattern of size classes over time. A statistical hypothesis test was also performed to detect dependence between city size and growth using discrete probability calculations under the assumption of Gibrat’s law. The city size distributions for the south-eastern region of the US were discontinuous, with …


A Classroom Outsourcing Experience For Software Engineering Learning, William L. Honig, Tejasvini Prasad Sep 2007

A Classroom Outsourcing Experience For Software Engineering Learning, William L. Honig, Tejasvini Prasad

Computer Science: Faculty Publications and Other Works

Outsourcing of software development is a key part of globalization, oft misunderstood by computer science students, and possibly a cause of declining enrollments in the field. The authors developed and implemented an outsourcing experience for students in an advanced software engineering course. Student teams at two universities developed game playing programs and outsourced key parts of their systems to the other university. Results show students improved their understanding of outsourcing, developed better appreciation for the importance of software engineering techniques, and created ad hoc communication protocols between teams. The paper concludes with recommendations for expanding the approach used to other …


Acoustic Positioning And Tracking In Portsmouth Harbour, New Hampshire, Michelle Weirathmueller, Thomas C. Weber, Val E. Schmidt, Glenn Mcgillicuddy, Larry A. Mayer, Lloyd C. Huff Sep 2007

Acoustic Positioning And Tracking In Portsmouth Harbour, New Hampshire, Michelle Weirathmueller, Thomas C. Weber, Val E. Schmidt, Glenn Mcgillicuddy, Larry A. Mayer, Lloyd C. Huff

Center for Coastal and Ocean Mapping

Portsmouth Harbor, New Hampshire, is frequently used as a testing area for multibeam and sidescan sonars, and is the location of numerous ground-truthing studies. Having the ability to accurately position underwater sensors is an important aspect of this type of work. However, underwater positioning in Portsmouth Harbor is challenging. It is relatively shallow, approximately one kilometer wide with depths of less than 25 meters. There is mixing between fresh river water and seawater, which is intensified by high currents and strong tides. This causes a very complicated spatial and temporal sound speed structure. Solutions that use the time-of-arrival of an …


Enhancement Of Underwater Video Mosaics For Post-Processing, Yuri Rzhanov, Fan Gu Sep 2007

Enhancement Of Underwater Video Mosaics For Post-Processing, Yuri Rzhanov, Fan Gu

Center for Coastal and Ocean Mapping

Mosaics of seafloor created from still images or video acquired underwater have proved to be useful for construction of maps of forensic and archeological sites, species' abundance estimates, habitat characterization, etc. Images taken by a camera mounted on a stable platform are registered (at first pair-wise and then globally) and assembled in a high resolution visual map of the surveyed area. While this map is usually sufficient for a human orientation and even quantitative measurements, it often contains artifacts that complicate an automatic post-processing (for example, extraction of shapes for organism counting, or segmentation for habitat characterization). The most prominent …


Marine Ship Automatic Identification System (Ais) For Enhanced Coastal Security Capabilities: An Oil Spill Tracking Application, Kurt Schwehr, Philip A. Mcgillivary Sep 2007

Marine Ship Automatic Identification System (Ais) For Enhanced Coastal Security Capabilities: An Oil Spill Tracking Application, Kurt Schwehr, Philip A. Mcgillivary

Center for Coastal and Ocean Mapping

National and international trade via shipping is already significant, and expected to continue increasing rapidly over the next decade. Both more ships and larger ships will contribute to this trade, includingships from countries with less rigorous shipping maintenance and inspection standards than the United States, and less strict pollution monitoring regulations. Changes in ship traffic management protocols have been implemented in recent years in the U.S. to minimize damage to coastlines, particularly near sensitive or protected marine environments. For example, to reduce risk to coastal resources off central California, shipping lanes for larger vessels were moved further offshore to allow …


Shibboleth As A Tool For Authorized Access Control To The Subversion Repository System, Amy Apon, Linh B. Ngo Sep 2007

Shibboleth As A Tool For Authorized Access Control To The Subversion Repository System, Amy Apon, Linh B. Ngo

Publications

Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is maintained at their home institution. With Shibboleth, a federation of institutions can share resources among users and yet allow the administration of both the user access control to resources and the user identity and attribute information to be performed at the hosting or home institution. Subversion is a version control repository system that allows the creation of fine-grained permissions to files and directories. In this project an infrastructure, Shibbolized Subversion, has been …


Shibboleth As A Tool For Authorized Access Control To The Subversion Repository System, Linh B. Ngo, Amy W. Apon Sep 2007

Shibboleth As A Tool For Authorized Access Control To The Subversion Repository System, Linh B. Ngo, Amy W. Apon

Publications

Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is maintained at their home institution. With Shibboleth, a federation of institutions can share resources among users and yet allow the administration of both the user access control to resources and the user identity and attribute information to be performed at the hosting or home institution. Subversion is a version control repository system that allows the creation of fine-grained permissions to files and directories. In this project an infrastructure, Shibbolized Subversion, has been …


Variable Intensity Of Teleconnections During The Late Holocene In Subtropical North America From An Isotopic Study Of Speleothem From Florida, Philip E. Van Beynen, Yemane Asmerom, Victor J. Polyak, Limaris R. Soto, Jason S. Polk Sep 2007

Variable Intensity Of Teleconnections During The Late Holocene In Subtropical North America From An Isotopic Study Of Speleothem From Florida, Philip E. Van Beynen, Yemane Asmerom, Victor J. Polyak, Limaris R. Soto, Jason S. Polk

School of Geosciences Faculty and Staff Publications

The persistence and influence of both tropical and extra‐tropical teleconnections on the hydrology of subtropical North America are little understood. Major atmospheric‐oceanic controls on the isotopic composition of the precipitation reconstructed from a 1,000 year old stalagmite are the North Atlantic Oscillation (NAO) and the Pacific Decadal Oscillation (PDO). These teleconnections create decadal‐ to centennial‐scale changes in the seasonal distribution of precipitation. An increase in the winter proportion of annual precipitation coincides with negative phase NAO conditions and a positive phase PDO. However, the PDO's influence appears to be weakened when it is out of phase with the El Niño …


Evaluating Opportunistic Routing Protocols With Large Realistic Contact Traces, Libo Song, David Kotz Sep 2007

Evaluating Opportunistic Routing Protocols With Large Realistic Contact Traces, Libo Song, David Kotz

Dartmouth Scholarship

Traditional mobile ad hoc network (MANET) routing protocols assume that contemporaneous end-to-end communication paths exist between data senders and receivers. In some mobile ad hoc networks with a sparse node population, an end-to-end communication path may break frequently or may not exist at any time. Many routing protocols have been proposed in the literature to address the problem, but few were evaluated in a realistic “opportunistic” network setting. We use simulation and contact traces (derived from logs in a production network) to evaluate and compare five existing protocols: direct-delivery, epidemic, random, PRoPHET, and Link-State, as well as our own proposed …


Organic Geochemical Investigation Of A Highly Contaminated Urban Waterway: The Gowanus Canal, Brooklyn, New York, Usa, Michael A. Kruge, Kevin K. Olsen, Eric A. Stern Sep 2007

Organic Geochemical Investigation Of A Highly Contaminated Urban Waterway: The Gowanus Canal, Brooklyn, New York, Usa, Michael A. Kruge, Kevin K. Olsen, Eric A. Stern

Department of Earth and Environmental Studies Faculty Scholarship and Creative Works

The Gowanus Canal is an industrial waterway constructed in the mid-19th century by widening and deepening a natural tidal channel. It is ca. 3 km in length and empties into Gowanus Bay, an arm of New York Harbor. Its banks, reinforced by bulkheads and piers, became the site of intensive industrial activity, including oil refining, coal gasification, soap making and tanning. Even though much of the industrial activity along the canal has ceased, its sediments remain highly enriched in organic and inorganic contaminants, with combined sewer outfalls continuing to transport pollutants into the canal. The canal area remains densely …


Evolutionary Combinatorial Optimization For Recursive Supervised Learning With Clustering, Kiruthika Ramanathan, Sheng Uei Guan Sep 2007

Evolutionary Combinatorial Optimization For Recursive Supervised Learning With Clustering, Kiruthika Ramanathan, Sheng Uei Guan

Research Collection School Of Computing and Information Systems

The idea of using a team of weak learners to learn a dataset is a successful one in literature. In this paper, we explore a recursive incremental approach to ensemble learning. In this paper, patterns are clustered according to the output space of the problem, i.e., natural clusters are formed based on patterns belonging to each class. A combinatorial optimization problem is therefore formed, which is solved using evolutionary algorithms. The evolutionary algorithms identify the "easy" and the "difficult" clusters in the system. The removal of the easy patterns then gives way to the focused learning of the more complicated …


Who’S Creating?, M. Thulasidas Sep 2007

Who’S Creating?, M. Thulasidas

Research Collection School Of Computing and Information Systems

We don’t read to retain information or knowledge any more. We search, scan, locate keywords, browse and bookmark. The Internet is doing to our reading habits what the calculator did to our arithmetic abilities. Knowledge is not cheap, although our easy access to it through the Internet may indicate otherwise. When we all become users of information, our knowledge will stop at its current level because nobody will be creating it any more.


Novelty Detection For Cross-Lingual News Stories With Visual Duplicates And Speech Transcripts, Xiao Wu, Alexander G. Hauptmann, Chong-Wah Ngo Sep 2007

Novelty Detection For Cross-Lingual News Stories With Visual Duplicates And Speech Transcripts, Xiao Wu, Alexander G. Hauptmann, Chong-Wah Ngo

Research Collection School Of Computing and Information Systems

An overwhelming volume of news videos from different channels and languages is available today, which demands automatic management of this abundant information. To effectively search, retrieve, browse and track cross-lingual news stories, a news story similarity measure plays a critical role in assessing the novelty and redundancy among them. In this paper, we explore the novelty and redundancy detection with visual duplicates and speech transcripts for cross-lingual news stories. News stories are represented by a sequence of keyframes in the visual track and a set of words extracted from speech transcript in the audio track. A major difference to pure …


Cross-Language And Cross-Media Image Retrieval: An Empirical Study At Imageclef2007, Steven C. H. Hoi Sep 2007

Cross-Language And Cross-Media Image Retrieval: An Empirical Study At Imageclef2007, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

This paper summarizes our empirical study of cross-language and cross-media image retrieval at the CLEF image retrieval track (ImageCLEF2007). In this year, we participated in the ImageCLEF photo retrieval task, in which the goal of the retrieval task is to search natural photos by some query with both textual and visual information. In this paper, we study the empirical evaluations of our solutions for the image retrieval tasks in three aspects. First of all, we study the application of language models and smoothing strategies for text-based image retrieval, particularly addressing the short text query issue. Secondly, we study the cross-media …


Raman Fiber Lasers And Amplifiers Based On Multimode Fibers And Their Applications To Beam Cleanup, Nathan B. Terry Sep 2007

Raman Fiber Lasers And Amplifiers Based On Multimode Fibers And Their Applications To Beam Cleanup, Nathan B. Terry

Theses and Dissertations

Raman fiber lasers (RFLs) and Raman fiber amplifiers (RFAs) in multimode fibers were explored. The RFL based on a graded-index fiber was shown to be very efficient relative to RFLs based on singlemode fibers. Several configurations of the RFL were examined; the beam quality of the Stokes beam depended on the reflectivity of the output coupler and the Stokes power. When used as a beam combiner, the RFL was a highly efficient brightness converter. RFL configurations which used dichroic mirrors were shown to be potentially useful for RFLs based on very large fibers. The forward- and backward-seeded geometries of an …


Multi-Objective Optimization For Speed And Stability Of A Sony Aibo Gait, Christopher A. Patterson Sep 2007

Multi-Objective Optimization For Speed And Stability Of A Sony Aibo Gait, Christopher A. Patterson

Theses and Dissertations

Locomotion is a fundamental facet of mobile robotics that many higher level aspects rely on. However, this is not a simple problem for legged robots with many degrees of freedom. For this reason, machine learning techniques have been applied to the domain. Although impressive results have been achieved, there remains a fundamental problem with using most machine learning methods. The learning algorithms usually require a large dataset which is prohibitively hard to collect on an actual robot. Further, learning in simulation has had limited success transitioning to the real world. Also, many learning algorithms optimize for a single fitness function, …


Hardness For Explicit State Software Model Checking Benchmarks, Eric G. Mercer, Neha Rungta Sep 2007

Hardness For Explicit State Software Model Checking Benchmarks, Eric G. Mercer, Neha Rungta

Faculty Publications

Directed model checking algorithms focus computation resources in the error-prone areas of concurrent systems. The algorithms depend on some empirical analysis to report their performance gains. Recent work characterizes the hardness of models used in the analysis as an estimated number of paths in the model that contain an error. This hardness metric is computed using a stateless random walk. We show that this is not a good hardness metric because models labeled hard with a stateless random walk metric have easily discoverable errors with a stateful randomized search. We present an analysis which shows that a hardness metric based …


Poisson Disk Point Sets By Hierarchical Dart Throwing, David Cline, Parris K. Egbert, Kenric B. White Sep 2007

Poisson Disk Point Sets By Hierarchical Dart Throwing, David Cline, Parris K. Egbert, Kenric B. White

Faculty Publications

Poisson disk point sets are “ideally” generated through a process of dart throwing. The naive dart throwing algorithm is extremely expensive if a maximal set is desired, however. In this paper we present a hierarchical dart throwing procedure which produces point sets that are equivalent to naive dart throwing, but is very fast. The procedure works by intelligently excluding areas known to be fully covered by existing samples. By excluding covered regions, the probability of accepting a thrown dart is greatly increased. Our algorithm is conceptually simple, performs dart throwing in O(N) time and memory, and produces a maximal point …


Image-Based Color Schemes, Bryan S. Morse, Daniel Thornton, Qing Xia, John Uibel Sep 2007

Image-Based Color Schemes, Bryan S. Morse, Daniel Thornton, Qing Xia, John Uibel

Faculty Publications

This paper presents a novel method for generating color schemes based on images intended to anchor color designs. This has wide applicability for web pages, printed materials, or other applications where images are used as a key part of the overall design. Unlike methods that are variants of color quantization and try to pixel-wise approximate the image, this method draws on graphic-design principles by emphasizing hue selection first, weighting effects of color by saturation, and considering the local spatial coherency in order to determine the overall visual impact of a color. Results demonstrate that the method generalizes to a wide …


Fisheries Research Report No. 163 - Spatial Scales Of Exploitation Among Populations Of Demersal Scalefish: Implications For Management. Part 1: Stock Status Of The Key Indicator Species For The Demersal Scalefish Fishery In The West Coast Bioregion., Department Of Fisheries, Western Australia Sep 2007

Fisheries Research Report No. 163 - Spatial Scales Of Exploitation Among Populations Of Demersal Scalefish: Implications For Management. Part 1: Stock Status Of The Key Indicator Species For The Demersal Scalefish Fishery In The West Coast Bioregion., Department Of Fisheries, Western Australia

Fisheries research reports

Final FRDC report - Project 2003/052

The levels of exploitation on dhufish and pink snapper across the West Coast Bioregion and for baldchin groper at the Abrolhos Islands are above international benchmark standards. This indicates that these stocks are currently being overfished and are therefore likely to be being depleted to levels below those necessary to ensure their long-term sustainability. The current reliance of the dhufish catch on a single recruitment pulse together with the extremely truncated age distribution of pink snapper indicates that both these stocks are particularly vulnerable.

The West Coast Demersal Scalefish Fishery is a multi-species fishery …


Using Author Topic To Detect Insider Threats From Email Traffic, James S. Okolica, Gilbert L. Peterson, Robert F. Mills Sep 2007

Using Author Topic To Detect Insider Threats From Email Traffic, James S. Okolica, Gilbert L. Peterson, Robert F. Mills

Faculty Publications

One means of preventing insider theft is by stopping potential insiders from becoming actual thieves. This article discusses an approach to assist managers in identifying potential insider threats. By using the Author Topic [Rosen-Zvi Michal, Griffiths Thomas, Steyvers Mark, Smyth Padhraic. The author-topic model for authors and documents. In: Proceedings of the 20th conference on uncertainty in artificial intelligence; 2004. p. 487–94.] clustering algorithm, we discern employees' interests from their daily emails. These interests then provide a means to create an implicit and an explicit social network graph. This approach locates potential insiders by finding individuals who either (1) feel …


A Trend Pattern Assessment Approach To Microarray Gene Expression Profiling Data Analysis, Kahai Cao, Qiuming Zhu, Javeed Iqbal, John W.C. Chan Sep 2007

A Trend Pattern Assessment Approach To Microarray Gene Expression Profiling Data Analysis, Kahai Cao, Qiuming Zhu, Javeed Iqbal, John W.C. Chan

Computer Science Faculty Publications

We study the problem of how to assess the reliability of a statistical measurement on data set containing unknown quantity of noises, inconsistencies, and outliers. A practical approach that analyzes the dynamical patterns (trends) of the statistical measurements through a sequential extreme-boundary-points (EBP) weed-out process is explored. We categorize the weed-out trend patterns (WOTP) and examine their relation to the reliability of the measurement. The approach is applied to the processes of extracting genes that are predictive to BCL2 translocations and to clinical survival outcomes of diffuse large B-cell lymphoma (DLBCL) from DNA Microarray gene expression profiling data sets. Fisher’s …


Blue Nile Incision On The Ethiopian Plateau: Pulsed Plateau Growth, Pliocene Uplift, And Hominin Evolution, Nahid D.S. Gani, M. Royhan Gani, Mohamed G. Abdel Salam Sep 2007

Blue Nile Incision On The Ethiopian Plateau: Pulsed Plateau Growth, Pliocene Uplift, And Hominin Evolution, Nahid D.S. Gani, M. Royhan Gani, Mohamed G. Abdel Salam

Geosciences and Geological and Petroleum Engineering Faculty Research & Creative Works

The 1.6-km-deep Gorge of the Nile, a rival of the Grand Canyon, resulted from the deep incision of the Blue Nile drainage into the uplifted Ethiopian Plateau. Understanding the incision history of the plateau is crucial to unraveling the Cenozoic tectonoclimatic evolution of the region, particularly because the region has long been used as a natural laboratory to understand the geodynamics of continental rifting and the evolution of hominins. We undertake a quantitative geomorphologic approach integrating field, geographic information system (GIS), and digital elevation model (DEM) data to analyze incision (volume, long-term rates, and spatiotemporal variability) and river longitudinal profiles …


Experimentally Constrained Molecular Relaxation: The Case Of Hydrogenated Amorphous Silicon, Parthapratim Biswas, Raymond Atta-Fynn, D. A. Drabold Sep 2007

Experimentally Constrained Molecular Relaxation: The Case Of Hydrogenated Amorphous Silicon, Parthapratim Biswas, Raymond Atta-Fynn, D. A. Drabold

Faculty Publications

We have extended our experimentally constrained molecular relaxation technique [P. Biswas et al., Phys. Rev. B 71, 54204 (2005)] to hydrogenated amorphous silicon: a 540-atom model with 7.4% hydrogen and a 611-atom model with 22% hydrogen were constructed. Starting from a random configuration, using physically relevant constraints, ab initio interactions, and the experimental static structure factor, we construct realistic models of hydrogenated amorphous silicon. Our models confirm the presence of a high-frequency localized band in the vibrational density of states due to Si-H vibration that has been observed in recent vibrational transient grating measurements on plasma enhanced chemical …


Relativistic Multiple Scattering Theory And The Relativistic Impulse Approximation, Khin Maung Maung, John W. Norbury, Trina Coleman Sep 2007

Relativistic Multiple Scattering Theory And The Relativistic Impulse Approximation, Khin Maung Maung, John W. Norbury, Trina Coleman

Faculty Publications

It is shown that a relativistic multiple scattering theory for hadron - nucleus scattering can be consistently formulated in four dimensions in the context of meson exchange. We give a multiple scattering series for the optical potential and discuss the differences between the relativistic and non- relativistic versions. We develop the relativistic multiple scattering series by separating out the one-boson exchange term from the rest of the Feynman series. However, this particular separation is not absolutely necessary and we discuss how to include other terms. We then show how to make a three- dimensional reduction for hadron - nucleus scattering …


Taking Stock Of The Creative Commons Experiment: Monitoring The Use Of Creative Commons Licenses And Evaluating Its Implications For The Future Of Creative Commons And For Copyright Law, Giorgos Cheliotis, Kam Wai, Warren Bartholomew Chik, Ankit Guglani, Giri Kumar Tayi Sep 2007

Taking Stock Of The Creative Commons Experiment: Monitoring The Use Of Creative Commons Licenses And Evaluating Its Implications For The Future Of Creative Commons And For Copyright Law, Giorgos Cheliotis, Kam Wai, Warren Bartholomew Chik, Ankit Guglani, Giri Kumar Tayi

Research Collection School Of Computing and Information Systems

We provide an analysis of the use of Creative Commons (CC) licenses, an approach to licensing creative works which has become very popular among authors who wish to promote more liberal sharing and use of their work. We provide data demonstrating the popularity of CC, examine which specific license types within the CC framework are most popular, and then identify contributing factors for the relative popularity of some of the license types.


Column Heterogeneity As A Measure Of Data Quality, Bing Tian Dai, Nick Koudas, Beng Chin Ooi, Divesh Srivastava, Suresh Venkatasubramanian Sep 2007

Column Heterogeneity As A Measure Of Data Quality, Bing Tian Dai, Nick Koudas, Beng Chin Ooi, Divesh Srivastava, Suresh Venkatasubramanian

Research Collection School Of Computing and Information Systems

Data quality is a serious concern in every data management application, and a variety of quality measures have been proposed, including accuracy, freshness and completeness, to capture the common sources of data quality degradation. We identify and focus attention on a novel measure, column heterogeneity, that seeks to quantify the data quality problems that can arise when merging data from different sources. We identify desiderata that a column heterogeneity measure should intuitively satisfy, and discuss a promising direction of research to quantify database column heterogeneity based on using a novel combination of cluster entropy and soft clustering. Finally, we present …