Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 144721 - 144750 of 302419

Full-Text Articles in Physical Sciences and Mathematics

Planning A Zero-Waste Event, Ashley Osborne Feb 2015

Planning A Zero-Waste Event, Ashley Osborne

Agriculture and Natural Resources Publications

Today the average American creates a little over 4 pounds of waste per day. Of that, roughly 1 ½ pounds is recycled or composted, meaning that more than 2½ pounds of waste per person per day is discarded to landfills or combusted (with energy recovery).


Explicit Solutions Of Imaginary Quadratic Norm Equations, Sandra Sze Feb 2015

Explicit Solutions Of Imaginary Quadratic Norm Equations, Sandra Sze

Dissertations, Theses, and Capstone Projects

Let $K=\mathbb{Q}(\sqrt{-d})$ be an imaginary quadratic extension of $\mathbb{Q}$. Let $h$ be the class number and $D$ be the discriminant of the field $K$. Assume $p$ is a prime such that $\displaystyle\left(\frac{D}{p}\right)=1$. Then $p$ splits in $K$. The elements of the ring of integers $\mathcal{O}_K$ are of the form $x+\sqrt{-d}y$ if $d\equiv1,2\pmod{4}$ and $\displaystyle x+\frac{1+\sqrt{-d}}{2}y$ if $d\equiv3\pmod{4}$, where $x$ and $y\in \mathbb{Z}$. The norm \\$N_{K/\mathbb{Q}}(x+\sqrt{-d}y)=x^2+dy^2$ and $N_{K/\mathbb{Q}}\left(\displaystyle x+\frac{1+\sqrt{-d}}{2}y\right)=\displaystyle\frac{(2x+y)^2}{4}+\frac{dy^2}{4}$. In this thesis, we find the elements of norm $p^h$ explicitly. We also prove certain congruences for solutions of norm equations.


Quadratic Discriminant Analysis Revisited, Wenbo Cao Feb 2015

Quadratic Discriminant Analysis Revisited, Wenbo Cao

Dissertations, Theses, and Capstone Projects

In this thesis, we revisit quadratic discriminant analysis (QDA), a standard classification method. Specifically, we investigate the parameter estimation and dimension reduction problems for QDA.

Traditionally, the parameters of QDA are estimated generatively; that is the parameters are estimated by maximizing the joint likelihood of observations and their labels. In practice, classical QDA, though computationally efficient, often underperforms discriminative classifiers, such as SVM, Boosting methods, and logistic regression. Motivated by recent research on hybrid generative/discriminative learning, we propose to estimate the parameters of QDA by minimizing a convex combination of negative joint log-likelihood and negative conditional log-likelihood of observations and …


Towards The Total Synthesis Of (+/-)-Gephyrotoxin 287c, Maciej E. Domaradzki Feb 2015

Towards The Total Synthesis Of (+/-)-Gephyrotoxin 287c, Maciej E. Domaradzki

Dissertations, Theses, and Capstone Projects

Studies directed toward the total synthesis of (+/-)-Gephyrotoxin 287C are described herein. Even though the target alkaloid has been synthesized four times to date, it still presents an interesting synthetic challenge. Our ultimate goal is to develop an efficient enantioselective synthetic route utilizing oxazolone chemistry in order to demonstrate its utility as a dienophilic component in intramolecular Diels-Alder reactions. This is part of a greater ongoing study aimed at a range of suitable alkaloid targets.

Chapter 1 provides introduction to frog toxins as secondary metabolites and subsequently shifts to the target alkaloid. (+/-)-Gephyrotoxin 287C was originally described by Daly and …


Strongly-Correlated 2d Electron Systems In Si-Mosfets, Shiqi Li Feb 2015

Strongly-Correlated 2d Electron Systems In Si-Mosfets, Shiqi Li

Dissertations, Theses, and Capstone Projects

Si-MOSFETs are basic building blocks of present-day integrated circuits. Above a threshold gate voltage, a layer of two-dimensional electrons is induced near the silicon-silicon dioxide interface of a Si-MOSFET. According to theory for noninteracting and weakly interacting electrons, no metallic state can exist in two dimensions in zero magnetic field in the limit of zero temperature. However, in strongly interacting electron systems the observation of a resistivity that changes from metallic to insulating temperature dependence has fueled a debate over whether this signals a quantum phase transition to a metallic phase in two dimensions.

In this thesis I will present …


Ecological Aspects Of The Music Of John Luther Adams, David Arie Shimoni Feb 2015

Ecological Aspects Of The Music Of John Luther Adams, David Arie Shimoni

Dissertations, Theses, and Capstone Projects

The composer John Luther Adams envisions his role as one who re-imagines and re-creates relationships with other human and non-human beings through music. This dissertation consists of an examination of songbirdsongs, Earth and the Great Weather, In the White Silence, Strange and Sacred Noise, The Place Where You Go to Listen, and Inuksuit to determine whether, and how, Adams succeeds in re-creating these relationships.

In the Introduction various means of connecting music and the natural world are reviewed, a semiotic and ecomusicological framework for analysis is established, and a listening typology is suggested. In the following chapters, analysis of …


Risk Of Gastrointestinal Bleeding Associated With Oral Anticoagulants: Population Based Retrospective Cohort Study, Hsien-Yen Chang, Meijia Zhou, Wenze Tang, G. Caleb Alexander, Sonal Singh Feb 2015

Risk Of Gastrointestinal Bleeding Associated With Oral Anticoagulants: Population Based Retrospective Cohort Study, Hsien-Yen Chang, Meijia Zhou, Wenze Tang, G. Caleb Alexander, Sonal Singh

Epidemiology Faculty Publications

Objectives To determine the real world safety of dabigatran or rivaroxaban compared with warfarin in terms of gastrointestinal bleeding.

Design Retrospective cohort study.

Setting Large administrative database of commercially insured people in United States from 1 October 2010 through 31 March 2012.

Participants Enrollees with a prescription of warfarin, dabigatran, or rivaroxaban between 1 October 2010 and 31 March 2012, who were aged 18 years or older, had continuous enrollment and no oral anticoagulant use during the six months before the entry date, with known age and sex, and with no gastrointestinal bleeding for at least six months before the …


Algal Biomass As A Binding Agent For The Densification Of Miscanthus, Sunil Thapa, Daniel B. Johnson, Peter Ping Liu, Thomas Canam Feb 2015

Algal Biomass As A Binding Agent For The Densification Of Miscanthus, Sunil Thapa, Daniel B. Johnson, Peter Ping Liu, Thomas Canam

Thomas Canam

Purpose: Lignocellulosic biomass has been regarded as an important future energy source due to its excessive availability; however, the wide application of this material for many applications is restricted by the high costs associated with densification, transportation, thermo-chemical pretreatment and conversion. In order to increase the density of lignocellulosic biomass, it is typically compressed into pellets or briquettes. This frequently requires the addition of additives, which may negatively impact the economics of the process. Environmentally-friendly binding agents that can be obtained inexpensively are therefore desirable. This study examines the change in physicochemical properties of densified Miscanthus straw where algae were …


Algal Biomass As A Binding Agent For The Densification Of Miscanthus, Sunil Thapa, Daniel B. Johnson, Peter Ping Liu, Thomas Canam Feb 2015

Algal Biomass As A Binding Agent For The Densification Of Miscanthus, Sunil Thapa, Daniel B. Johnson, Peter Ping Liu, Thomas Canam

Faculty Research & Creative Activity

Purpose: Lignocellulosic biomass has been regarded as an important future energy source due to its excessive availability; however, the wide application of this material for many applications is restricted by the high costs associated with densification, transportation, thermo-chemical pretreatment and conversion. In order to increase the density of lignocellulosic biomass, it is typically compressed into pellets or briquettes. This frequently requires the addition of additives, which may negatively impact the economics of the process. Environmentally-friendly binding agents that can be obtained inexpensively are therefore desirable. This study examines the change in physicochemical properties of densified Miscanthus straw where algae were …


Algal Biomass As A Binding Agent For The Densification Of Miscanthus, Sunil Thapa, Daniel Johnson, Peter Liu, Thomas Canam Feb 2015

Algal Biomass As A Binding Agent For The Densification Of Miscanthus, Sunil Thapa, Daniel Johnson, Peter Liu, Thomas Canam

Faculty Research & Creative Activity

Purpose: Lignocellulosic biomass has been regarded as an important future energy source due to its excessive availability; however, the wide application of this material for many applications is restricted by the high costs associated with densification, transportation, thermo-chemical pretreatment and conversion. In order to increase the density of lignocellulosic biomass, it is typically compressed into pellets or briquettes. This frequently requires the addition of additives, which may negatively impact the economics of the process. Environmentally-friendly binding agents that can be obtained inexpensively are therefore desirable. This study examines the change in physicochemical properties of densified Miscanthus straw where algae were …


Analysis And Improvement On A Biometric-Based Remote User Authentication Scheme Using Smart Cards, Fengtong Wen, Willy Susilo, Guomin Yang Feb 2015

Analysis And Improvement On A Biometric-Based Remote User Authentication Scheme Using Smart Cards, Fengtong Wen, Willy Susilo, Guomin Yang

Research Collection School Of Computing and Information Systems

In a recent paper (BioMed Research International, 2013/491289), Khan et al. proposed an improved biometrics-based remote user authentication scheme with user anonymity. The scheme is believed to be secure against password guessing attack, user impersonation attack, server masquerading attack, and provide user anonymity, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Khan et al.’s scheme, and demonstrate that their scheme doesn’t provide user anonymity. This also renders that their scheme is insecure against other attacks, such as off-line password guessing attack, user impersonation attacks. Subsequently, we propose a …


Simapp: A Framework For Detecting Similar Mobile Applications By Online Kernel Learning, Ning Chen, Steven C. H. Hoi, Shaohua Li, Xiaokui Xiao Feb 2015

Simapp: A Framework For Detecting Similar Mobile Applications By Online Kernel Learning, Ning Chen, Steven C. H. Hoi, Shaohua Li, Xiaokui Xiao

Research Collection School Of Computing and Information Systems

With the popularity of smart phones and mobile devices, the number of mobile applications (a.k.a. "apps") has been growing rapidly. Detecting semantically similar apps from a large pool of apps is a basic and important problem, as it is beneficial for various applications, such as app recommendation, app search, etc. However, there is no systematic and comprehensive work so far that focuses on addressing this problem. In order to fill this gap, in this paper, we explore multi-modal heterogeneous data in app markets (e.g., description text, images, user reviews, etc.), and present "SimApp" -- a novel framework for detecting similar …


Use Of A High-Value Social Audience Index For Target Audience Identification On Twitter, Siaw Ling Lo, David Cornforth, Raymond. Chiong Feb 2015

Use Of A High-Value Social Audience Index For Target Audience Identification On Twitter, Siaw Ling Lo, David Cornforth, Raymond. Chiong

Research Collection School Of Computing and Information Systems

With the large and growing user base of social media, it is not an easy feat to identify potential customers for business. This is mainly due to the challenge of extracting commercially viable contents from the vast amount of free-form conversations. In this paper, we analyse the Twitter content of an account owner and its list of followers through various text mining methods and segment the list of followers via an index. We have termed this index as the High-Value Social Audience (HVSA) index. This HVSA index enables a company or organisation to devise their marketing and engagement plan according …


Privacycanary: Privacy-Aware Recommenders With Adaptive Input Obfuscation, Thivya Kandappu, Arik Friedman, Roksan Borelli, Vijay Sivaraman Feb 2015

Privacycanary: Privacy-Aware Recommenders With Adaptive Input Obfuscation, Thivya Kandappu, Arik Friedman, Roksan Borelli, Vijay Sivaraman

Research Collection School Of Computing and Information Systems

Recommender systems are widely used by online retailers to promote products and content that are most likely to be of interest to a specific customer. In such systems, users often implicitly or explicitly rate products they have consumed, and some form of collaborative filtering is used to find other users with similar tastes to whom the products can be recommended. While users can benefit from more targeted and relevant recommendations, they are also exposed to greater risks of privacy loss, which can lead to undesirable financial and social consequences. The use of obfuscation techniques to preserve the privacy of user …


Simultaneous Analysis Of The Ballik-Ramsay And Phillips Systems Of C2 And Observation Of Forbidden Transitions Between Singlet And Triplet States, Wang Chen, Kentarou Kawaguchi, Peter F. Bernath, Jian Tang Feb 2015

Simultaneous Analysis Of The Ballik-Ramsay And Phillips Systems Of C2 And Observation Of Forbidden Transitions Between Singlet And Triplet States, Wang Chen, Kentarou Kawaguchi, Peter F. Bernath, Jian Tang

Chemistry & Biochemistry Faculty Publications

6229 lines of the Ballik-Ramsay system (b3Σg--a3Πu) and the Phillips system (A1Πu-X1Σg+) of C2 up to v = 8 and J = 76, which were taken from the literature or assigned in the present work, were analyzed simultaneously by least-squares fitting with 82 Dunham-like molecular parameters and spin-orbit interaction constants between the b3Σg- and X1Σg+ states with a standard deviation of 0.0037 cm-1 for the whole data set. As a …


Biometric Authentication On Iphone And Android: Usability, Perceptions, And Influences On Adoption, Rasekhar Bhagavatula, Blase Ur, Kevin Iacovino, Su Mon Kywe, Lorrie Faith Cranor, Marios Savvides Feb 2015

Biometric Authentication On Iphone And Android: Usability, Perceptions, And Influences On Adoption, Rasekhar Bhagavatula, Blase Ur, Kevin Iacovino, Su Mon Kywe, Lorrie Faith Cranor, Marios Savvides

Research Collection School Of Computing and Information Systems

While biometrics have long been promoted as the future of authentication, the recent introduction of Android face unlock and iPhone fingerprint unlock are among the first large-scale deployments of biometrics for consumers. In a 10-participant, within-subjects lab study and a 198-participant online survey, we investigated the usability of these schemes, along with users ’ experiences, attitudes, and adoption decisions. Participants in our lab study found both face unlock and fingerprint unlock easy to use in typical scenarios. The notable exception was that face unlock was completely unusable in a dark room. Most participants preferred fingerprint unlock over face unlock or …


Bridging The Vocabulary Gap Between Health Seekers And Healthcare Knowledge, Liqiang Nie, Yiliang Zhao, Akbari Mohammad, Jialie Shen, Tat-Seng Chua Feb 2015

Bridging The Vocabulary Gap Between Health Seekers And Healthcare Knowledge, Liqiang Nie, Yiliang Zhao, Akbari Mohammad, Jialie Shen, Tat-Seng Chua

Research Collection School Of Computing and Information Systems

The vocabulary gap between health seekers and providers has hindered the cross-system operability and the interuser reusability. To bridge this gap, this paper presents a novel scheme to code the medical records by jointly utilizing local mining and global learning approaches, which are tightly linked and mutually reinforced. Local mining attempts to code the individual medical record by independently extracting the medical concepts from the medical record itself and then mapping them to authenticated terminologies. A corpus-aware terminology vocabulary is naturally constructed as a byproduct, which is used as the terminology space for global learning. Local mining approach, however, may …


E-Esas: Evolution Of A Participatory Design-Based Solution For Breast Cancer (Bc) Patients In Rural Bangladesh, Mohammad Munirul Haque, Ferdaus Kawsar, Mohammad Adibuzzaman, Md Miftah Uddin, Sheikh Iqbal Ahamed, Richard Love, Ragib Hasan, Rumana Dowla, Tahmina Ferdousy, Reza Salim Feb 2015

E-Esas: Evolution Of A Participatory Design-Based Solution For Breast Cancer (Bc) Patients In Rural Bangladesh, Mohammad Munirul Haque, Ferdaus Kawsar, Mohammad Adibuzzaman, Md Miftah Uddin, Sheikh Iqbal Ahamed, Richard Love, Ragib Hasan, Rumana Dowla, Tahmina Ferdousy, Reza Salim

Mathematics, Statistics and Computer Science Faculty Research and Publications

Healthcare facility is scarce for rural women in the developing world. The situation is worse for patients who are suffering from diseases that require long-term feedback-oriented monitoring such as breast cancer. Lack of motivation to go to the health centers on patients’ side due to sociocultural barriers, financial restrictions and transportation hazards results in inadequate data for proper assessment. Fortunately, mobile phones have penetrated the masses even in rural communities of the developing countries. In this scenario, a mobile phone-based remote symptom monitoring system (RSMS) with inspirational videos can serve the purpose of both patients and doctors. Here, we present …


Producing High Strength Aluminum Alloy By Combination Of Equal Channel Angular Pressing And Bake Hardening, Hamid Alihosseini, Mohsen Asle Zaeem, Kamran Dehghani, Ghader Faraji Feb 2015

Producing High Strength Aluminum Alloy By Combination Of Equal Channel Angular Pressing And Bake Hardening, Hamid Alihosseini, Mohsen Asle Zaeem, Kamran Dehghani, Ghader Faraji

Materials Science and Engineering Faculty Research & Creative Works

A combination of severe plastic deformation by equal channel angular pressing (ECAP) and bake hardening (BH) was used to produce high strength ultrafine-grained AA6061 aluminum alloy. 2, 4 and 8 passes of ECAP were performed, and the bake hardenability of samples was tested by 6% pre-straining followed by baking at 200 °C for 20 min. The microstructures obtained for various passes of ECAP were characterized by XRD, EBSD, and TEM techniques. The microstructures were refined from an average grain size of 20 µm to 212 nm after 8 passes of ECAP. Maximum bake hardenability of 110 MPa, and final yield …


Semi-Modular Delay Model Revisited In Context Of Relative Timing, Hoon Park, Anping He, Marly Roncken, Xiaoyu Song Feb 2015

Semi-Modular Delay Model Revisited In Context Of Relative Timing, Hoon Park, Anping He, Marly Roncken, Xiaoyu Song

Electrical and Computer Engineering Faculty Publications and Presentations

A new definition of semi-modularity to accommodate relative timing constraints in self-timed circuits is presented. While previous definitions ignore such constraints, the new definition takes them into account. The difference on a design solution for a well-known speed-independent circuit implementation of the Muller C element and a set of relative timing constraints that renders the implementation hazard free is illustrated. The old definition produces a false semi-modularity conflict that cannot exist due to the set of imposed constraints. The new definition correctly accepts the solution.


Geometry And Statistics Of Jammed Granular Matter, Mark Robert Kanner Feb 2015

Geometry And Statistics Of Jammed Granular Matter, Mark Robert Kanner

Dissertations, Theses, and Capstone Projects

We use simulations of soft bidisperse disks to determine the properties of jammed packings and investigate the statistical mechanics of these systems. We have created a novel method for the classification of structural subunits of a packing and to calculate relevant physical quantities. The classification scheme is based on a 20 type decomposition of the Delaunay triangles extracted from the centers of the particles. Subunit frequencies are determined from geometrical properties and used to calculate the important macroscopic system quantities co-ordination number, packing fraction, and pressure. These relationships suggest that microscopic particle geometry plays an important role in observed macroscopic …


On Polynomial Roots Approximation Via Dominant Eigenspaces And Isolation Of Real Roots, Omar Ivan Retamoso Urbano Feb 2015

On Polynomial Roots Approximation Via Dominant Eigenspaces And Isolation Of Real Roots, Omar Ivan Retamoso Urbano

Dissertations, Theses, and Capstone Projects

Finding the roots of a given polynomial is a very old and noble problem in mathematics and computational mathematics. For about 4,000 years, various approaches had been proposed to solve this problem (see cite{FC99}). In 1824, Niels Abel showed that there existed polynomials of degree five, whose roots could not be expressed using radicals and arithmetic operations through their coefficients. Here is an example of such polynomials:$$x^5-4x-2.$$

Thus we must resort to iterative methods to approximate the roots of a polynomial given with its coefficients.

There are many algorithms that approximate the roots of a polynomial(see cite{B40}, cite{B68}, cite{MN93}, cite{MN97}, …


Identifying Unethical Personally Identifiable Information (Pii) Privacy Violations Committed By Is/It Practitioners: A Comparison To Computing Moral Exemplars, Mark H. Rosenbaum Feb 2015

Identifying Unethical Personally Identifiable Information (Pii) Privacy Violations Committed By Is/It Practitioners: A Comparison To Computing Moral Exemplars, Mark H. Rosenbaum

CCE Theses and Dissertations

In some instances, Information Systems and Information Technology (IS/IT) practitioners have been noted to commit privacy violations to Personally Identifiable Information (PII). However, computing exemplars, due to their notable dispositional Hallmark Features of morality, understandings of ethical abstractions, and other components that comprise their virtuous makeups, are theoretically less likely to commit privacy violations to PII. This research attempted to verify if those IS/IT practitioners who identify with some of the Hallmark Features of moral and computing exemplar were less willing to commit privacy violations to PII than were those IS/IT practitioners that did not identify themselves with some of …


Interpreting Ulysses Data Using Inverse Scattering Theory: Oblique Alfvén Waves, Mark Anthony Reynolds, Henry R. Wheeler Iv, R.L. Hamilton Feb 2015

Interpreting Ulysses Data Using Inverse Scattering Theory: Oblique Alfvén Waves, Mark Anthony Reynolds, Henry R. Wheeler Iv, R.L. Hamilton

Publications

Solitary wave structures observed by the Ulysses spacecraft in the solar wind were analyzed using both inverse scattering theory and direct numerical integration of the derivative nonlinear Schrödinger (DNLS) equation. Several of these structures were found to be consistent with soliton solutions of the DNLS equation. Such solitary structures have been commonly observed in the space plasma environment and may, in fact, be long-lived solitons. While the generation of these solitons may be due to an instability mechanism, e.g., the mirror instability, they may be observable far from the source region due to their coherent nature.


A Mathematician's Villanelle, Gizem Karaali Feb 2015

A Mathematician's Villanelle, Gizem Karaali

Pomona Faculty Publications and Research

No abstract provided.


Aesthetics In Action: Arts In A Democratic Society: Les Aspin Center For Government, Curtis L. Carter Feb 2015

Aesthetics In Action: Arts In A Democratic Society: Les Aspin Center For Government, Curtis L. Carter

Chemistry Faculty Research and Publications

No abstract provided.


A Systematic Comparison Of The Transverse Energy Minimization And Splitting Intensity Techniques For Measuring Shear-Wave Splitting Parameters, Fansheng Kong, Stephen S. Gao, Kelly H. Liu Feb 2015

A Systematic Comparison Of The Transverse Energy Minimization And Splitting Intensity Techniques For Measuring Shear-Wave Splitting Parameters, Fansheng Kong, Stephen S. Gao, Kelly H. Liu

Geosciences and Geological and Petroleum Engineering Faculty Research & Creative Works

Over the past several decades, shear-wave splitting (SWS) analyses have been increasingly utilized to delineate mantle structure and probe mantle dynamics. However, the reported splitting parameters (fast polarization orientations and splitting times) are frequently inconsistent among different studies, partially due to the different techniques used to estimate the splitting parameters. Here, we report results from a systematic comparison of the transverse minimization (TM) and the splitting intensity (SI) techniques. The study was motivated by the fact that recent comparative studies led to conflicting conclusions, which include the suggestion that TM, which is arguably the most widely used SWS-measuring technique, performs …


Thermal Perturbations Beneath The Incipient Okavango Rift Zone, Northwest Botswana, Khumo Leseane, Estella A. Atekwana, Kevin Lee Mickus, Mohamed G. Abdel Salam, Elisha M. Shemang, Eliot A. Atekwana Feb 2015

Thermal Perturbations Beneath The Incipient Okavango Rift Zone, Northwest Botswana, Khumo Leseane, Estella A. Atekwana, Kevin Lee Mickus, Mohamed G. Abdel Salam, Elisha M. Shemang, Eliot A. Atekwana

Geosciences and Geological and Petroleum Engineering Faculty Research & Creative Works

We used aeromagnetic and gravity data to investigate the thermal structure beneath the incipient Okavango Rift Zone (ORZ) in northwestern Botswana in order to understand its role in strain localization during rift initiation. We used three-dimensional (3-D) inversion of aeromagnetic data to estimate the Curie Point Depth (CPD) and heat flow under the rift and surrounding basement. We also used two-dimensional (2-D) power-density spectrum analysis of gravity data to estimate the Moho depth. Our results reveal shallow CPD values (8-15 km) and high heat flow (60-90 mW m-2) beneath a ∼60 km wide NE-trending zone coincident with major …


Will This Be Quick? A Case Study Of Bug Resolution Times Across Industrial Projects, Subhajit Datta, Prasanth Lade Feb 2015

Will This Be Quick? A Case Study Of Bug Resolution Times Across Industrial Projects, Subhajit Datta, Prasanth Lade

Research Collection School Of Computing and Information Systems

Resolution of problem tickets is a source of significant revenue in the worldwide software services industry. Due to the high volume of problem tickets in any large scale customer engagement, automated techniques are necessary to segregate related incoming tickets into groups. Existing techniques focus on this classification problem. In this paper, we present a case study built around the position that predicting the category of resolution times within a class of tickets and also the actual resolution times, is strongly beneficial to ticket resolution. We present an approach based on topic analysis to predict the category of resolution times of …


Leakage-Resilient Password Entry: Challenges, Design, And Evaluation, Qiang Yan, Jin Han, Yingjiu Li, Jianying Zhou, Robert H. Deng Feb 2015

Leakage-Resilient Password Entry: Challenges, Design, And Evaluation, Qiang Yan, Jin Han, Yingjiu Li, Jianying Zhou, Robert H. Deng

Research Collection School Of Computing and Information Systems

Password leakage is one of the most serious threats for password-based user authentication. Although this problem has been extensively investigated over the last two decades, there is still no widely adopted solution. In this paper, we attempt to systematically understand the challenges behind this problem and investigate the feasibility of solving it. Since password leakage usually happens when a password is input during authentication, we focus on designing leakage-resilient password entry (LRPE) schemes in this study. We develop a broad set of design criteria and use them to construct a practical LRPE scheme named CoverPad, which not only improves leakage …