Search results
-
-
Title
-
A novel positional sensor for 3D vascular reconstruction
-
Author
-
Merritt, John
-
Date Created
-
2011
-
Subjects--Topical
-
Optics, Information technology
-
Description
-
Abstract Intravascular ultrasound (IVUS) is a device that is surgically inserted into a femoral artery, or vein, to aid in the diagnosis of cardiovascular disease. Correctly locating the IVUS tip facilitates accurate 3D vascular reconstruction. Re...
-
-
Title
-
APPLICATION OF COMPLEX ADAPTIVE SYSTEMS IN PORTFOLIO MANAGEMENT
-
Author
-
SU, ZHEYUAN
-
Date Created
-
2017
-
Subjects--Topical
-
Information technology
-
Description
-
Simulation-based methods are becoming a promising research tool in financial markets. A general Complex Adaptive System can be tailored to different application scenarios. Based on the current research, we built two models that would benefit portf...
-
-
Title
-
Advances in Modern Botnet Understanding and the Accurate Enumeration of Infected Hosts
-
Author
-
Nunnery, Christopher
-
Date Created
-
2011
-
Subjects--Topical
-
Information technology, Information science
-
Description
-
Botnets remain a potent threat due to evolving modern architectures, inadequate remediation methods, and inaccurate measurement techniques. In response, this research exposes the architectures and operations of two advanced botnets, techniques to ...
-
-
Title
-
An Approach Towards an Autonomic Computing Prototype Reference Architecture
-
Author
-
Williams, Trevon
-
Date Created
-
2019
-
Subjects--Topical
-
Computer science, Information technology, System theory
-
Description
-
Autonomic Computing is a grand challenge that strives to create self-regulating environments. The end goal, is to create an environment that can self-optimize, self-protect, self-heal and self-configure based on built-in, formulated, and generated...
-
-
Title
-
Analysis of public health information from social media
-
Author
-
Thalambedu Kumaresan, Madhav Narayan
-
Date Created
-
2016
-
Subjects--Topical
-
Information technology
-
Description
-
Social networking sites have become an integral part of daily life in the modern world. They can serve as an important, dynamic data source providing collective intelligence and awareness of health related issues. Analysis of huge volumes of unstr...
-
-
Title
-
Anatomy of a protest: Activism, people, social media and urban space
-
Author
-
Karduni, Alireza
-
Date Created
-
2017
-
Subjects--Topical
-
Information technology, Social sciences--Research, Architecture
-
Description
-
The black lives matter movement has risen in response to social injustices in the African-American community in the United States, specifically concerned with police shootings and brutality. Similar to many modern movements in the age of informati...
-
-
Title
-
Arny: An Interaction Model Based On Emotional Feedback For An AI_Based Co-creative Design System
-
Author
-
Abdellahi, Sarah
-
Date Created
-
2021
-
Subjects--Topical
-
Artificial intelligence, Information technology, Computer science
-
Description
-
Co-creative collaboration is a creative collaboration of two or more agents working together on a shared creative product. Effective co-creative collaboration is a combination of interactions and contributions of the task collaborators. In human-h...
-
-
Title
-
Assured Information Sharing for Ad-hoc Collaboration
-
Author
-
Jin, Jing
-
Date Created
-
2009
-
Subjects--Topical
-
Computer engineering, Information technology
-
Description
-
Collaborative information sharing tends to be highly dynamic and often ad hoc among organizations. The dynamic natures and sharing patterns in ad-hoc collaboration impose a need for a comprehensive and flexible approach to reflecting and coping wi...
-
-
Title
-
Autonomous Cyber Defense: Formal Models and Applications
-
Author
-
Dutta, Ashutosh
-
Date Created
-
2021
-
Subjects--Topical
-
Computer science, Information science, Information technology
-
Description
-
With technological advancements, cyber attacks are highly automated and organized with asymmetric advantages over defenders regarding cost and efforts.Attackers employ sophisticated and diversified approaches to achieve attack objectives while bei...
-
-
Title
-
CONFIGURATION OF APPLICATION PERMISSIONS WITH CONTEXTUAL ACCESS CONTROL
-
Author
-
Besmer, Andrew
-
Date Created
-
2013
-
Subjects--Topical
-
Information technology
-
Description
-
Users are burdened with the task of configuring access control policies on many different application platforms used by mobile devices and social network sites. Many of these platforms employ access control mechanisms to configure application perm...
-
-
Title
-
Clustering and Recommendation Techniques for Access Control Policy Management
-
Author
-
Marouf, Said
-
Date Created
-
2012
-
Subjects--Topical
-
Information technology
-
Description
-
Managing access control policies can be a daunting process, given the frequent policy decisions that need to be made, and the potentially large number of policy rules involved. Policy management includes, but is not limited to: policy optimization...
-
-
Title
-
Communities of Purpose
-
Author
-
Stukes, Felesia
-
Date Created
-
2016
-
Subjects--Topical
-
Computer science, Information technology
-
Description
-
Communities of Purpose are commonly known to enact their purposes through social movements, grassroots efforts, semi-formal groups, and through organizations in the voluntary sector. They carry out charitable missions and goals and are often commi...
-
-
Title
-
Coordinating decentralized learning and conflict resolution across agent boundaries
-
Author
-
Cheng, Shanjun
-
Date Created
-
2012
-
Subjects--Topical
-
Computer science, Information technology, Artificial intelligence
-
Description
-
It is crucial for embedded systems to adapt to the dynamics of openenvironments. This adaptation process becomes especially challenging in the context of multiagent systems because of scalability, partial information accessibility and complex inte...