These are representative sample records from Science.gov related to your search topic.
For comprehensive and current results, perform a real-time search at Science.gov.
1

Student Motivation in Computer Networking Courses  

ERIC Educational Resources Information Center

This paper introduces several hands-on projects that have been used to motivate students in learning various computer networking concepts. These projects are shown to be very useful and applicable to the learners' daily tasks and activities such as emailing, Web browsing, and online shopping and banking, and lead to an unexpected byproduct,…

Hsin, Wen-Jung

2007-01-01

2

Innovation of laboratory exercises in course Distributed systems and computer networks  

NASA Astrophysics Data System (ADS)

This paper is focused on innovation of laboratory exercises in course Distributed Systems and Computer Networks. These exercises were introduced in November of 2012 and replaced older exercises in order to reflect real life applications.

Sou?ek, Pavel; Slavata, Old?ich; Holub, Jan

2013-09-01

3

Designing a Versatile Dedicated Computing Lab to Support Computer Network Courses: Insights from a Case Study  

ERIC Educational Resources Information Center

Providing adequate computing lab support for Management Information Systems (MIS) and Computer Science (CS) programs is a perennial challenge for most academic institutions in the US and abroad. Factors, such as lack of physical space, budgetary constraints, conflicting needs of different courses, and rapid obsolescence of computing technology,…

Gercek, Gokhan; Saleem, Naveed

2006-01-01

4

Computer ethics: A capstone course  

SciTech Connect

This paper presents a capstone course on computer ethics required for all computer science majors in our program. The course was designed to encourage students to evaluate their own personal value systems in terms of the established values in computer science as represented by the ACM Code of Ethics. The structure, activities, and topics of the course as well as assessment of the students are presented. Observations on various course components and student evaluations of the course are also presented.

Fisher, T.G. [St. Cloud State Univ., MN (United States); Abunawass, A.M. [Western Illinois Univ., Macomb, IL (United States)

1994-12-31

5

Network and Computer Security  

NSDL National Science Digital Library

A wide variety of educational resources and course materials are available through the Massachusetts Institute of Technologyâ??s Open Courseware Project. This particular course â??Network and Computer Securityâ?ť contains problem sets and exams with solutions as well as a full reading list that is accessible to the public. Some of the topics covered in this course are: cryptography, authentication and identification schemes, viruses, software protection, firewalls, and electronic commerce among others. Computer science students will find the reading materials and practice problems available here especially useful. This is an excellent source of information for anyone who is currently studying or interested in network and computer security.

Rivest, Ronald L.

6

Computer Networks  

NSDL National Science Digital Library

CSC 344. Computer Networks (3) Prerequisite: CSC 242. The theory and application of inter-computer communication. Local-area and wide-area networks; data transmission and error correction; OSI and TCP/IP layering protocols; ethernet, token ring, token bus and other network technologies; network topologies; the client-server model; bridges and multi-protocol routers; the Internet. Applications include electronic funds transfer and distributed databases.

Hudson, Mr T.

2003-04-21

7

Engineering and Computing Undergraduate Courses  

E-print Network

Faculty of Engineering and Computing Undergraduate Courses (including Architecture, Aerospace, Building, Civil Engineering and Mathematics) #12;2 Contents Coventry University 4 About Coventry 5 Facilities 6 Department of Computing 8 Department of Mathematics and Control Engineering 15 Department

Low, Robert

8

Spring 2007 Course details EE650: "Advanced Topics in Computer Networks"  

E-print Network

that in the near future the global network will consist of an Internet-like core and a number of wireless edge and network traces. For each topic, we will first introduce the corresponding research problem/area (e for a conference submission. You can work in teams of at most 2 people per project. (More information

9

A Course in Computers and Music.  

ERIC Educational Resources Information Center

Describes an undergraduate course on computers in the field of music. Illustrations of what can be presented are provided by descriptions of course content related to computer-aided music analysis, computer music, and computer-aided composition. An annotated bibliography is presented as a resource to those preparing to introduce such a course.…

Medsker, Larry

1983-01-01

10

ONLINE SOCIAL NETWORK ANALYTICS Course Syllabus  

E-print Network

(asymptotic learning) or herding may occur in online social networks. TOPICS Basic social network conceptsONLINE SOCIAL NETWORK ANALYTICS Course Syllabus ECTS: 10 Period: Summer 2013 (17 July - 14 Aug) Level: Master Language of teaching: English Course type: Summer University STADS UVA code: 460122U056

11

DEVELOPING AND TEACHING GRADUATE COURSES IN COMPUTATIONAL INTELLIGENCE  

E-print Network

networks, evolutionary computing and fuzzy logic. While these courses are offered at the graduate level, and grading and evaluation. INTRODUCTION The advent of new computational techniques inspired by nature has, development is complicated because the fields are rapidly changing, few comprehensive textbooks exist

Smith, Alice E.

12

Computational Verb Neural Networks  

Microsoft Academic Search

When any attribute value in a conventional neural network is verbified, the result is a computational verb neural network(VNN). We can verbify inputs, outputs, biases, weights and many other attributes of conventional neural networks. In this paper, we reported two types of VNNs. The first one consists of computational verb inputs and numerical output. The second one consists of computational

Tao Yang

2007-01-01

13

A Computer Science HCI Course  

Microsoft Academic Search

Can a computer science student learn to be a designer and a psychologist as well as a computer scientist? Unlikely, but they\\u000a can learn to appreciate what other disciplines offer HCI. The need for computer science students to understand the big picture,\\u000a that HCI is multidisciplinary in nature, has been recognized for many years. Yet successfully integrating HCI into a

Beryl Plimmer

14

Computer Maintenance Technology. Suggested Basic Course Outline.  

ERIC Educational Resources Information Center

This competency-based basic course outline is designed for a two-year secondary program in computer maintenance technology. The first year is devoted to basic electricity and electronics, the second to the troubleshooting, maintenance, and service of microcomputers. (The repair section is based upon the Apple II computer, disc drive, monitor, and…

Texas A and M Univ., College Station. Vocational Instructional Services.

15

Computer Programming in a Spatial Analysis Course.  

ERIC Educational Resources Information Center

Contends that students in spatial analysis courses generally are familiar with computer use and programs but lack basic computer programing skills. Describes four exercises in which students learn programing using BASIC and dBASE. Asserts that programming exercises help students clarify concepts, understand the rationale behind calculations, use…

Gesler, Wilbert; Kaplan, Abram

1993-01-01

16

A survey of computer science capstone course literature  

Microsoft Academic Search

In this article, we surveyed literature related to undergraduate computer science capstone courses. The survey was organized around course and project issues. Course issues included: course models, learning theories, course goals, course topics, student evaluation, and course evaluation. Project issues included: software process models, software process phases, project type, documentation, tools, groups, and instructor administration. We reflected on these issues

Robert F. Dugan Jr.

2011-01-01

17

Networking Computers Schoolwide.  

ERIC Educational Resources Information Center

Discusses the planning that is needed to effectively network school computers. Topics addressed include advantages of networking, including electronic mail, cost effectiveness, and time savings; use by students and teachers; wiring systems; network configurations; and use by library/media centers. (LRW)

Lipman, Art

1994-01-01

18

K-12 Computer Networking.  

ERIC Educational Resources Information Center

The "ERIC Review" is published three times a year and announces research results, publications, and new programs relevant to each issue's theme topic. This issue explores computer networking in elementary and secondary schools via two principal articles: "Plugging into the 'Net'" (Michael B. Eisenberg and Donald P. Ely); and "Computer Networks for…

ERIC Review, 1993

1993-01-01

19

Computer Network Resources for Physical Geography Instruction.  

ERIC Educational Resources Information Center

Asserts that the use of computer networks provides an important and effective resource for geography instruction. Describes the use of the Internet network in physical geography instruction. Provides an example of the use of Internet resources in a climatology/meteorology course. (CFR)

Bishop, Michael P.; And Others

1993-01-01

20

Plagiarism in computer science courses  

SciTech Connect

Plagiarism of computer programs has long been a problem in higher education. Ease of electronic copying, vague understanding by students as to what constitutes plagiarism, increasing acceptance of plagiarism by students, lack of enforcement by instructors and school administrators, and a whole host of other factors contribute to plagiarism. The first step in curbing plagiarism is prevention, the second (and much less preferable) is detection. History files and software metrics can be used as a tool to aid in detecting possible plagiarism. This paper gives advice concerning how to deal with plagiarism and with using software monitors to detect plagiarism.

Harris, J.K. [Francis Marion Univ., Florence, SC (United States)

1994-12-31

21

A social implications of computing course which teaches computer ethics  

SciTech Connect

Computers are integral to today`s world, forming our society as well as responding to it, In recognition of this interaction, as well as in response to requirements by the Computer Science Accrediting Board (CSAB), many schools are incorporating computer ethics and values and addressing the social implications of computing within their curriculum. The approach discussed here is through a separate course, rather than relying on the integration of specific topics throughout the curriculum.

Pulliam, S.C. [Western Kentucky Univ., Bowling Green, KY (United States)

1994-12-31

22

6.857 Network and Computer Security, Fall 2003  

E-print Network

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include ...

Rivest, Ronald

23

Mobile Computing/ Mobile Networks  

E-print Network

Multicast Interoperability Network reliability (TCP) Quality of service (QoS) #12;2 3 The Internet 1969) in 1969 They documented the Internet protocols Email was developed Networked 4 computers together Government also funded universities for research 4 1989-1990 Transfer of Internet from Government

Yu, Chansu

24

An introductory computer science course for non-majors  

Microsoft Academic Search

This paper describes an approach to an introductory computer science course designed especially for students who are not specifically required to take a computer course and thus ordinarily receive no appreciation for computers or computing. This is the third semester this course has been offered. Student enrollment has been 31, 46 and 41 respectively. We anticipate higher enrollment figures next

Roger L. Wainwright

1980-01-01

25

Computers, Networks and Education.  

ERIC Educational Resources Information Center

Discussed is how globally networked, easy-to-use computers can enhance learning only within an educational environment that encourages students to question "facts" and seek challenges. The strengths and weaknesses of computers used as amplifiers for learning are described. (KR)

Kay, Alan C.

1991-01-01

26

Computers: Networks, Registration  

ERIC Educational Resources Information Center

A computer network serves 53 schools and colleges in North Carolina; Essex County College in New Jersey has an on-line computer registration system that is used by students and administrators to enter information or ask questions. (Author/MLF)

Nation's Schools and Colleges, 1975

1975-01-01

27

Adding GPU Computing to Computer Organization Courses David Bunde  

E-print Network

4- or 6-core CPU servers, but most PCs and laptops today come with CUDA capable graphics cards Performance Computing, in courses with a more general focus. The manual handling of data movement required architecture is most closely categorized as a variant of SIMD, or single-instruction, multiple data. Whereas

Bunde, David

28

Closeness Possible through Computer Networking.  

ERIC Educational Resources Information Center

Points out the benefits of computer networking for scholastic journalism. Discusses three systems currently offering networking possibilities for publications: the Student Press Information Network; the Youth Communication Service; and the Dow Jones Newspaper Fund's electronic mail system. (MS)

Dodd, Julie E.

1989-01-01

29

BU Social Science Methods Network Inventory of Graduate Methods Courses  

E-print Network

concepts covered in a first statistics course (e.g., CAS MA 613) and presents, in detail, more advancedBU Social Science Methods Network Inventory of Graduate Methods Courses School Course number Course RS 653 Quantitative Research Methods 4 Req. RS 600 Descriptive and inferential statistics most

Goldberg, Bennett

30

Using Virtualization and Automatic Evaluation: Adapting Network Services Management Courses to the EHEA  

ERIC Educational Resources Information Center

This paper outlines the adaptation of a course on the management of network services in operating systems, called NetServicesOS, to the context of the new European Higher Education Area (EHEA). NetServicesOS is a mandatory course in one of the official graduate programs in the Faculty of Computer Science at the Universidad Nacional de Educacion a…

Ros, S.; Robles-Gomez, A.; Hernandez, R.; Caminero, A. C.; Pastor, R.

2012-01-01

31

A CAD (Classroom Assessment Design) of a Computer Programming Course  

ERIC Educational Resources Information Center

This paper presents a CAD (classroom assessment design) of an entry-level undergraduate computer programming course "Computer Programming I". CAD has been the product of a long experience in teaching computer programming courses including teaching "Computer Programming I" 22 times. Each semester, CAD is evaluated and modified for the subsequent…

Hawi, Nazir S.

2012-01-01

32

GENI Laboratory Exercises Development for a Cloud Computing Course  

E-print Network

GENI Laboratory Exercises Development for a Cloud Computing Course Prasad Calyam, Sripriya.edu Abstract--Cloud computing education involves integration of computing theories and information technologies in a cloud computing course offered at University of Missouri in Fall 2013. Three sets of laboratory

Calyam, Prasad

33

Anatomy of a Graduate Ubiquitous\\/Pervasive Computing Course  

Microsoft Academic Search

This paper presents the author's experience in design- ing and teaching a graduate level Ubiquitous Computing (Ubicomp) course at Arizona State University. It identifies some of the challenges in teaching a Ubicomp course and presents some solutions. This course was designed for stu- dents with no prior exposure to Ubicomp or experience in Human Computer Interaction; and to have minimal

S. K. S. Gupta; Ira A. Fulton

2004-01-01

34

Virtual Network Computing  

NSDL National Science Digital Library

The Virtual Network Computing software package, a product of AT&T Laboratories Cambridge, is one of the more useful and decidedly different utilities than generally appears in our Network Tools section. This software, although it is complex in nature and has a technical-sounding moniker, allows one to use just about any computer remotely across a local area network or even the Internet. To accomplish this remote use, the system actually displays the entire desktop of the remote computer in a window on the local computer. Amazingly, you can display and use a Macintosh desktop, for example, on your Win95/98/NT system or a Win95/98/NT desktop on your Unix system or any other combination of these possibilities. The system is simple to install and works quite well. Although minor bugs are noticeable, the system is complete enough to allow, for example, the remote use of many popular Windows programs on a Unix system. The VNC system is free to download and use and runs on Win95/98/NT, SPARC Solaris, Linux, and DEC Alpha OSF1. Beta versions of the software are also available for the Macintosh and Windows CE 2.x.

35

Computer Design in an Introductory Course--Part II.  

ERIC Educational Resources Information Center

Describes the use of a logic circuit simulator to design a computer in an introductory computer course. Discusses the design of a sequence generator, control circuits, and testing of a computer's instruction set. (YP)

Spoerri, Peter

1990-01-01

36

Information visualization courses for students with a computer science background.  

PubMed

Linnaeus University offers two master's courses in information visualization for computer science students with programming experience. This article briefly describes the syllabi, exercises, and practices developed for these courses. PMID:24807935

Kerren, Andreas

2013-01-01

37

Computational Thinking in High School Courses Vicki Allan  

E-print Network

Computational Thinking in High School Courses Vicki Allan Computer Science Utah State University in recent years. This is paralleled by a drop in the number of high school students taking the CS AP exam and the number of high schools offering computer science courses. The declines come at a time when career

Allan, Vicki H.

38

Computer Networks and Networking: A Primer.  

ERIC Educational Resources Information Center

Provides a basic introduction to computer networks and networking terminology. Topics addressed include modems; the Internet; TCP/IP (Transmission Control Protocol/Internet Protocol); transmission lines; Internet Protocol numbers; network traffic; Fidonet; file transfer protocol (FTP); TELNET; electronic mail; discussion groups; LISTSERV; USENET;…

Collins, Mauri P.

1993-01-01

39

A computer-based course in spectrogram reading  

Microsoft Academic Search

We describe a computer-based course in spectrogram reading built with the CSLU Toolkit. The principal teaching tool is SpeechView, a Toolkit component that allows students to interact with speech waveform files, spectrograms, and labels. These capabilities are essential for a course in spectrogram reading. Other Toolkit modules bring additional capabilities to the course: (1) an animated face allows students to

Tim Carmell; John-Paul Hosom; Ron Cole

1999-01-01

40

Distributed network computing over local ATM networks  

SciTech Connect

Communication between processors has long been the bottleneck of distributed network computing. However, recent progress in switch-based high-speed Local Area Networks (LANs) may be changing this situation. Asynchronous Transfer Mode (ATM) is one of the most widely-accepted and emerging high-speed network standards which can potentially satisfy the communication needs of distributed network computing. In this paper, the authors investigate distributed network computing over local ATM networks. They first study the performance characteristics involving end-to-end communication in an environment that includes several types of workstations interconnected via a Fore Systems` ASX-100 ATM Switch. They then compare the communication performance of four different Application Programming Interfaces (APIs). The four APIs were Fore Systems ATM API, BSD socket programming interface, Sun`s Remote Procedure Call (RPC), and the Parallel Virtual Machine (PVM) message passing library. Each API represents distributed programming at a different communication protocol layer. They evaluate parallel Matrix Multiplication over the local ATM network. The experimental results show that network computing is promising over local ATM networks.

Lin, M.; Hsieh, J.; Du, D.H.C.; MacDonald, J.A. [Univ. of Minnesota, Minneapolis, MN (United States); Thomas, J.P. [Minnesota Supercomputer Center Inc., Minneapolis, MN (United States)

1994-12-31

41

Tourism networks and computer networks  

E-print Network

The body of knowledge accumulated in recent years on the structure and the dynamics of complex networks has offered useful insights on the behaviour of many natural and artificial complex systems. The analysis of some of these, namely those formed by companies and institutions, however, has proved problematical mainly for the difficulties in collecting a reasonable amount of data. This contribution argues that the World Wide Web can provide an efficient and effective way to gather significant samples of networked socio-economic systems to be used for network analyses and simulations. The case discussed refers to a tourism destination, the fundamental subsystem of an industry which can be considered one of the most important in today's World economy.

Baggio, Rodolfo

2008-01-01

42

Social networks generate interest in computer science  

Microsoft Academic Search

For forty years programming has been the foundation of introductory computer science. Despite exponential increases in computational power during this period, examples used in introductory courses have remained largely unchanged. The incredible growth in statistics courses at all levels, in contrast with the decline of students taking computer science courses, points to the potential for introducing computer science at many

Casey Alt; Owen Astrachan; Jeffrey Forbes; Richard Lucic; Susan Rodger

2006-01-01

43

"Horses for Courses": Categories of Computer-Based Learning Program and Their Uses in Pharmacology Courses.  

ERIC Educational Resources Information Center

Describes the pharma-CAL-ogy project, funded by Teaching and Learning Technology Programme (TLTP), which has developed various types of software for use in pharmacology courses. Topics include course organization and delivery software, drill and practice software, tutorial-type programs, simulations, and the need to integrate computer-assisted…

Hughes, Ian E.

1998-01-01

44

Student Learning Networks on Residential Field Courses: Does Size Matter?  

ERIC Educational Resources Information Center

This article describes learner and tutor reports of a learning network that formed during the completion of investigative projects on a residential field course. Staff and students recorded project-related interactions, who they were with and how long they lasted over four phases during the field course. An enquiry based learning format challenged…

Langan, A. Mark; Cullen, W. Rod; Shuker, David M.

2008-01-01

45

Oral business english network course design in secondary vocational school  

Microsoft Academic Search

Oral Business English is a required course for E- commerce major students of secondary vocational school. This paper describes the design of Oral Business English network course of secondary vocational school on the aspects of the general design concept, basic structure, modules design and technology application, to explore the efficient use of the various teaching resources based on websites, the

Huang Xingyun; Ou Qizhong

2011-01-01

46

Stand-Alone Computer Courses in Teachers' IT Training  

ERIC Educational Resources Information Center

The stand-alone computer course is the earliest IT training model in teacher education. Designed in the early 1980s, the course responded to increasing demands from schools that teachers have adequate technology skills. The primary goal was to improve technology proficiency among preservice teachers. Research later determined that student teachers…

Wang, Yu-Mei

2006-01-01

47

Computer Technology and Student Preferences in a Nutrition Course  

ERIC Educational Resources Information Center

This study assessed learner preferences for using computer-based technology in a distance education course. A questionnaire was posted to students who had taken an undergraduate nutrition course at Athabasca University, Canada. The response rate was 57.1% (176 returned out of 308). Subjects were predominately female (93.7%) and nursing students…

Temple, Norman J.; Kemp, Wendy C.; Benson, Wendy A.

2006-01-01

48

A Mobile Robotics Course for Undergraduate Students in Computer Science  

Microsoft Academic Search

A first generation of mobile robots able to cope with the high uncertainty of natural environments is starting to emerge. As a consequence, there is an increasing need for theoretical and practical courses that can formally teach the state of the art of the technology. This paper describes our experience teaching a mobile robotics course as part of our computer

Alvaro Soto; Pablo Espinace; Ruben Mitnik

2006-01-01

49

Time-course of cortical networks involved in working memory  

PubMed Central

Working memory (WM) is one of the most studied cognitive constructs. Although many neuroimaging studies have identified brain networks involved in WM, the time course of these networks remains unclear. In this paper we use dense-array electroencephalography (dEEG) to capture neural signals during performance of a standard WM task, the n-back task, and a blend of principal components analysis and independent components analysis (PCA/ICA) to statistically identify networks of WM and their time courses. Results reveal a visual cortex centric network, that also includes the posterior cingulate cortex, that is active prior to stimulus onset and that appears to reflect anticipatory, attention-related processes. After stimulus onset, the ventromedial prefrontal cortex, lateral prefrontal prefrontal cortex, and temporal poles become associated with the prestimulus network. This second network appears to reflect executive control processes. Following activation of the second network, the cortices of the temporo-parietal junction with the temporal lobe structures seen in the first and second networks re-engage. This third network appears to reflect activity of the ventral attention network involved in control of attentional reorientation. The results point to important temporal features of network dynamics that integrate multiple subsystems of the ventral attention network with the default mode network in the performance of working memory tasks. PMID:24523686

Luu, Phan; Caggiano, Daniel M.; Geyer, Alexandra; Lewis, Jenn; Cohn, Joseph; Tucker, Don M.

2014-01-01

50

NEW COMPUTER SCIENCE COURSE FOR NON-MAJORS: COSC 1306 Computer Literacy for Science Majors  

E-print Network

NEW COMPUTER SCIENCE COURSE FOR NON-MAJORS: COSC 1306 Computer Literacy for Science Majors Fall 1306 will attempt to define computer literacy for the twenty-first century. Rather than learning how science and learn to develop efficient algorithms for a wide variety of problems. The course will survey

Pâris, Jehan-François

51

Introducing computer tools into a first course in electrical engineering  

Microsoft Academic Search

At a school where engineering students have immediate access to a personal computer, it is important that they become familiar with that tool early in their studies. In introductory engineering courses it is also important that the students learn to perceive the computer as a tool and not as an end in itself. Achieving these goals requires a careful integration

Don Y. Northam

1995-01-01

52

Integration of Computers into a Course on Biostatistics  

ERIC Educational Resources Information Center

The biostatistics course for undergraduate medical and dental students at the University of Connecticut Health Center is taught by the Keller Plan, and students can use computers to analyze data sets and to score their unit tests. The computer is an essential tool for data analysis and an attractive option for test scoring. (LBH)

Gjerde, Craig L.

1977-01-01

53

A Computer Course for Business Students: Teacher's Guide.  

ERIC Educational Resources Information Center

This teacher's guide is for a course designed to teach business students the fundamentals of the BASIC language and computer programming using a series of business-oriented programs. Each lesson contains an introduction, flow charts, and computer programs. The six lesson topics are print-out and format control, count-average, withholding tax…

Waterhouse, Ann

54

Integrating ethical topics in a traditional computer science course  

SciTech Connect

It is never hard to find additional, often unconventional, topics which seem to beg inclusion in standard courses. A dynamic discipline like computer science usually provides a steady stream of new technical ideas to vie for time and attention with more traditional material. As difficult as it may be to keep standard CS courses up-to-date with technical innovations, it often seems even more difficult to include non-technical topics even when there is universal agreement on their importance, Inevitably the question of whether or not such inclusion will compromise the technical content of the course arises. This paper describes an attempt to include two such topics in a traditional course in data structures. The two topics are writing and ethics and, although the effort concentrates on the inclusion of ethical questions in a standard CS course, writing is the vehicle for accomplishing this goal. Furthermore, the inclusion writing in the CS curriculum is certainly recognized as a desirable outcome.

Winrich, L.B. [Univ. of North Dakota, Grand Forks, ND (United States)

1994-12-31

55

LINCS: Livermore's network architecture. [Octopus computing network  

SciTech Connect

Octopus, a local computing network that has been evolving at the Lawrence Livermore National Laboratory for over fifteen years, is currently undergoing a major revision. The primary purpose of the revision is to consolidate and redefine the variety of conventions and formats, which have grown up over the years, into a single standard family of protocols, the Livermore Interactive Network Communication Standard (LINCS). This standard treats the entire network as a single distributed operating system such that access to a computing resource is obtained in a single way, whether that resource is local (on the same computer as the accessing process) or remote (on another computer). LINCS encompasses not only communication but also such issues as the relationship of customer to server processes and the structure, naming, and protection of resources. The discussion includes: an overview of the Livermore user community and computing hardware, the functions and structure of each of the seven layers of LINCS protocol, the reasons why we have designed our own protocols and why we are dissatisfied by the directions that current protocol standards are taking.

Fletcher, J.G.

1982-01-01

56

Computer Network Security- The Challenges of Securing a Computer Network  

NASA Technical Reports Server (NTRS)

This article is intended to give the reader an overall perspective on what it takes to design, implement, enforce and secure a computer network in the federal and corporate world to insure the confidentiality, integrity and availability of information. While we will be giving you an overview of network design and security, this article will concentrate on the technology and human factors of securing a network and the challenges faced by those doing so. It will cover the large number of policies and the limits of technology and physical efforts to enforce such policies.

Scotti, Vincent, Jr.

2011-01-01

57

Power Efficiency in Wireless Network Distributed Computing  

Microsoft Academic Search

Advanced wireless applications such as sensor networks involve a close interaction between the communication and computation processes that deliver the services under stringent power constraints. Wireless network distributed computing (WNDC) is a potential solution to reducing the power consumption per node as well as that of the network. In WNDC, a computational task is executed among a network of collaborative

Dinesh Datla; Xuetao Chen; Timothy R. Newman; Jeffrey H. Reed; Tamal Bose

2009-01-01

58

Collective network for computer structures  

DOEpatents

A system and method for enabling high-speed, low-latency global collective communications among interconnected processing nodes. The global collective network optimally enables collective reduction operations to be performed during parallel algorithm operations executing in a computer structure having a plurality of the interconnected processing nodes. Router devices ate included that interconnect the nodes of the network via links to facilitate performance of low-latency global processing operations at nodes of the virtual network and class structures. The global collective network may be configured to provide global barrier and interrupt functionality in asynchronous or synchronized manner. When implemented in a massively-parallel supercomputing structure, the global collective network is physically and logically partitionable according to needs of a processing algorithm.

Blumrich, Matthias A. (Ridgefield, CT); Coteus, Paul W. (Yorktown Heights, NY); Chen, Dong (Croton On Hudson, NY); Gara, Alan (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Takken, Todd E. (Brewster, NY); Steinmacher-Burow, Burkhard D. (Wernau, DE); Vranas, Pavlos M. (Bedford Hills, NY)

2011-08-16

59

Collective network for computer structures  

DOEpatents

A system and method for enabling high-speed, low-latency global collective communications among interconnected processing nodes. The global collective network optimally enables collective reduction operations to be performed during parallel algorithm operations executing in a computer structure having a plurality of the interconnected processing nodes. Router devices are included that interconnect the nodes of the network via links to facilitate performance of low-latency global processing operations at nodes of the virtual network. The global collective network may be configured to provide global barrier and interrupt functionality in asynchronous or synchronized manner. When implemented in a massively-parallel supercomputing structure, the global collective network is physically and logically partitionable according to the needs of a processing algorithm.

Blumrich, Matthias A; Coteus, Paul W; Chen, Dong; Gara, Alan; Giampapa, Mark E; Heidelberger, Philip; Hoenicke, Dirk; Takken, Todd E; Steinmacher-Burow, Burkhard D; Vranas, Pavlos M

2014-01-07

60

Networking DEC and IBM computers  

NASA Technical Reports Server (NTRS)

Local Area Networking of DEC and IBM computers within the structure of the ISO-OSI Seven Layer Reference Model at a raw signaling speed of 1 Mops or greater are discussed. After an introduction to the ISO-OSI Reference Model nd the IEEE-802 Draft Standard for Local Area Networks (LANs), there follows a detailed discussion and comparison of the products available from a variety of manufactures to perform this networking task. A summary of these products is presented in a table.

Mish, W. H.

1983-01-01

61

Computing motion using resistive networks  

NASA Technical Reports Server (NTRS)

Recent developments in the theory of early vision are described which lead from the formulation of the motion problem as an ill-posed one to its solution by minimizing certain 'cost' functions. These cost or energy functions can be mapped onto simple analog and digital resistive networks. It is shown how the optical flow can be computed by injecting currents into resistive networks and recording the resulting stationary voltage distribution at each node. These networks can be implemented in cMOS VLSI circuits and represent plausible candidates for biological vision systems.

Koch, Christof; Luo, Jin; Mead, Carver; Hutchinson, James

1988-01-01

62

Integration of Major Computer Program Packages into Experimental Courses: Organic Synthesis Design and the Computer.  

ERIC Educational Resources Information Center

Presents discussion on: (1) computer assisted synthesis in industry and academia; (2) computer applications to teaching organic synthesis; (3) a computer program (ORGSYN) incorporating reactions to synthesize aliphatic compounds; and (4) the design of a computer program as a heuristic device in an introductory organic course. (SK)

Sandel, Bonnie Burns; Solomon, Robert W.

1981-01-01

63

Comparison of On-Line and Traditional Computer Literacy Courses for Preservice Teachers: A Case Study.  

ERIC Educational Resources Information Center

Investigated the effectiveness of two computer literacy courses for preservice teachers, one offered online and one through traditional methods. Compared courses in terms of their effectiveness on computer attitudes and learning experiences about computers, and considered gender effects, previous computer courses, previous computer attitudes, and…

Gurbuz, Tarkan; Yildirim, Soner; Ozden, M. Yasar

2001-01-01

64

Course 10: Three Lectures on Biological Networks  

NASA Astrophysics Data System (ADS)

1 Enzymatic networks. Proofreading knots: How DNA topoisomerases disentangle DNA 1.1 Length scales and energy scales 1.2 DNA topology 1.3 Topoisomerases 1.4 Knots and supercoils 1.5 Topological equilibrium 1.6 Can topoisomerases recognize topology? 1.7 Proposal: Kinetic proofreading 1.8 How to do it twice 1.9 The care and proofreading of knots 1.10 Suppression of supercoils 1.11 Problems and outlook 1.12 Disquisition 2 Gene expression networks. Methods for analysis of DNA chip experiments 2.1 The regulation of gene expression 2.2 Gene expression arrays 2.3 Analysis of array data 2.4 Some simplifying assumptions 2.5 Probeset analysis 2.6 Discussion 3 Neural and gene expression networks: Song-induced gene expression in the canary brain 3.1 The study of songbirds 3.2 Canary song 3.3 ZENK 3.4 The blush 3.5 Histological analysis 3.6 Natural vs. artificial 3.7 The Blush II: gAP 3.8 Meditation

Magnasco, M. O.

65

A Term Project for a Course on Computer Forensics  

ERIC Educational Resources Information Center

The typical approach to creating an examination disk for exercises and projects in a course on computer forensics is for the instructor to populate a piece of media with evidence to be retrieved. While such an approach supports the simple use of forensic tools, in many cases the use of an instructor-developed examination disk avoids utilizing some…

Harrison, Warren

2006-01-01

66

The Use of Blackboard in Computer Information Systems Courses.  

ERIC Educational Resources Information Center

This paper focuses on the rationale for incorporating Blackboard, a Web-authoring software package, as the knowledge construction tool in computer information system courses. The authors illustrate previous strategies they incorporated in their classes, and they present their uses of Blackboard. They point out their reactions as teachers, and the…

Figueroa, Sandy; Huie, Carol

67

Visualizing Trends in Student Performance Across Computer Science Courses  

E-print Network

Visualizing Trends in Student Performance Across Computer Science Courses Dana Wortman University as identify areas of the curriculum or instruction that can be improved. Categories and Subject Descriptors K. Copyright 2007 ACM 1-59593-361-1/07/0003 ...$5.00. Keywords CS1, CS2, Visualization, Student Performance

Rheingans, Penny

68

Strategies for Computer-Based Distance Writing Courses.  

ERIC Educational Resources Information Center

There is really no theoretical difference between standard education and distance education; the difference is in the mediation of the transactions between teachers and students. Distance education writing courses can be successful provided the instructor uses a strong text, states his or her guidelines clearly, tutors well on computer, and offers…

Newbold, Webster

69

Computer-Oriented Calculus Courses Using Finite Differences.  

ERIC Educational Resources Information Center

The so-called discrete approach in calculus instruction involves introducing topics from the calculus of finite differences and finite sums, both for motivation and as useful tools for applications of the calculus. In particular, it provides an ideal setting in which to incorporate computers into calculus courses. This approach has been…

Gordon, Sheldon P.

70

Mission impossible? [FBI computer network  

Microsoft Academic Search

With a new computer network automated investigative tools, and more channels for sharing information, the FBI hopes to finally know what it knows. The fall of 2001 saw the start of an ambitious program of modernization, which seems to recognize that the barriers that prevent the FBI from analyzing and sharing data are as much cultural as technological. These include

J. Kumagai

2003-01-01

71

Computer Networks Improve Student Achievement, School Management.  

ERIC Educational Resources Information Center

Using computer networking programs at two high schools as examples, this article describes what principals should know about networking. The many advantages of computer networking in schools will remain beneficial so long as the principal's objectives are met. Tips are provided for assessing the network. (eight references) (MLH)

Cherry, Steve

1991-01-01

72

Computer Science 78 Computer Networks or hacking the network, part II  

E-print Network

Computer Science 78 Computer Networks ­ or hacking the network, part II In what follows, we discuss Overview Welcome to the world on computer networks. Ever wondered what makes the Internet tick? Want focuses on the communications protocols used in computer networks: their functionality, specification

Campbell, Andrew T.

73

Intelligent Fault Diagnosis in Computer Networks  

E-print Network

Intelligent Fault Diagnosis in Computer Networks Xin Hu Kongens Lyngby 2007 IMM-THESIS-2007-49 #12 As the computer networks become larger and more complicated, fault diagnosis becomes a difficult task for network the root cause is time-consuming and error-prone. Therefore, auto- mated fault diagnosis in computer

74

Networking Course Syllabus in Accredited Library and Information Science Programs: A Comparative Analysis Study  

ERIC Educational Resources Information Center

The study investigated networking courses offered in accredited Library and Information Science schools in the United States in 2009. The study analyzed and compared network syllabi according to Course Syllabus Evaluation Rubric to obtain in-depth understanding of basic features and characteristics of networking courses taught. The study embraced…

Abouserie, Hossam Eldin Mohamed Refaat

2009-01-01

75

The Effect of Computer Literacy Course on Students' Attitudes toward Computer Applications  

ERIC Educational Resources Information Center

Studies indicate that the use of technologies as teaching aids and tools for self-study is influenced by students' attitudes toward computers and their applications. The purpose of this study is to determine whether taking a Computer Literacy and Applications (CLA) course has an impact on students' attitudes toward computer applications, across…

Erlich, Zippy; Gadot, Rivka; Shahak, Daphna

2009-01-01

76

TCPP Curriculum in Parallel Programming courses of the Degree in Computer Science at  

E-print Network

TCPP Curriculum in Parallel Programming courses of the Degree in Computer Science at the University programming courses. The courses are in the 4th year of the Degree in Computer Science at the University of the project. II. Parallelism in the Computer Science Degree at the University of Murcia Computer Science

Giménez, Domingo

77

Profiles of Motivated Self-Regulation in College Computer Science Courses: Differences in Major versus Required Non-Major Courses  

ERIC Educational Resources Information Center

The goal of the present study was to utilize a profiling approach to understand differences in motivation and strategic self-regulation among post-secondary STEM students in major versus required non-major computer science courses. Participants were 233 students from required introductory computer science courses (194 men; 35 women; 4 unknown) at…

Shell, Duane F.; Soh, Leen-Kiat

2013-01-01

78

An Infrared Network for Mobile Computers  

Microsoft Academic Search

The PARCTAB infrared network provides a flexible infrastructure for research into wireless mobile computing. The network consists of a collection of room-sized cells each wired with a base station transceiver. Mobile computers communicate with transceivers through a carrier sense multiple access (CSMA) protocol and act as terminals for applications executing on remote hosts. Each mobile computer is represented by a

Norman Adams; Bill N. Schilit; Michael M. Tso; Roy Want

1993-01-01

79

Code 672 observational science branch computer networks  

NASA Technical Reports Server (NTRS)

In general, networking increases productivity due to the speed of transmission, easy access to remote computers, ability to share files, and increased availability of peripherals. Two different networks within the Observational Science Branch are described in detail.

Hancock, D. W.; Shirk, H. G.

1988-01-01

80

Pedagogical Utilization and Assessment of the Statistic Online Computational Resource in Introductory Probability and Statistics Courses  

PubMed Central

Technology-based instruction represents a new recent pedagogical paradigm that is rooted in the realization that new generations are much more comfortable with, and excited about, new technologies. The rapid technological advancement over the past decade has fueled an enormous demand for the integration of modern networking, informational and computational tools with classical pedagogical instruments. Consequently, teaching with technology typically involves utilizing a variety of IT and multimedia resources for online learning, course management, electronic course materials, and novel tools of communication, engagement, experimental, critical thinking and assessment. The NSF-funded Statistics Online Computational Resource (SOCR) provides a number of interactive tools for enhancing instruction in various undergraduate and graduate courses in probability and statistics. These resources include online instructional materials, statistical calculators, interactive graphical user interfaces, computational and simulation applets, tools for data analysis and visualization. The tools provided as part of SOCR include conceptual simulations and statistical computing interfaces, which are designed to bridge between the introductory and the more advanced computational and applied probability and statistics courses. In this manuscript, we describe our designs for utilizing SOCR technology in instruction in a recent study. In addition, present the results of the effectiveness of using SOCR tools at two different course intensity levels on three outcome measures: exam scores, student satisfaction and choice of technology to complete assignments. Learning styles assessment was completed at baseline. We have used three very different designs for three different undergraduate classes. Each course included a treatment group, using the SOCR resources, and a control group, using classical instruction techniques. Our findings include marginal effects of the SOCR treatment per individual classes; however, pooling the results across all courses and sections, SOCR effects on the treatment groups were exceptionally robust and significant. Coupling these findings with a clear decrease in the variance of the quantitative examination measures in the treatment groups indicates that employing technology, like SOCR, in a sound pedagogical and scientific manner enhances overall the students’ understanding and suggests better long-term knowledge retention. PMID:19750185

Dinov, Ivo D.; Sanchez, Juana; Christou, Nicolas

2009-01-01

81

Fault diagnosis in computing networks  

SciTech Connect

This dissertation is concerned with system-level fault diagnosis, which is the problem of identifying faulty units (components) in computer systems. For the purpose of generality, a computer system, regardless of whether it is a computer network, multiprocessor computer, or distributed system, is considered to be a collection of units. Each unit is tested by other units within the system and the results of the tests are collected in order to identify the faulty units. The units and test assignments are represented by a directed graph, which is called a testing graph. In Chapter 1, motivations for studying the Theory of system-level fault diagnosis is explained. Chapter 2 describes the various models that are used to represent test assignments and the implications of test results, and some of the relevant previous research is discussed. Chapter 3 addresses the problem of determining the diagnosability number (t) of a system's testing graph, which is the maximum number of faulty units that the system can tolerate and remain diagnosable. For previous results, it is assumed that there is a central controller that collects the test results and makes the diagnosis. In Chapters 4 and 5 the author considers distributed diagnosis applicable to systems that do not have a central controller. In distributed diagnosis, each unit in the system arrives at its own diagnosis.

Kreutzer, S.E.

1986-01-01

82

LabVIEW and G as a Computing Language Course Mukkai Krishnamoorthy and Sibylle Schupp,  

E-print Network

project. We have to calculate the (stops shortly) g.c.d. of two numbers. (Sighs.) LabVIEW is a coolG isn't C! LabVIEW and G as a Computing Language Course Mukkai Krishnamoorthy and Sibylle Schupp course using the programming language G with the LabVIEW environment. This course is a one credit course

Bystroff, Chris

83

Multimedia computer support for a course in ground control  

SciTech Connect

A prototype multimedia compact disc (CD) was created using the facilities at the Rock Mechanics and Explosives Research Center (RMERC) of the University of Missouri-Rolla (UMR) to teach a portion of a course in Ground Control. Multimedia computers offer an environment where audio-visual presentations can be made in an interactive fashion. Together with relevant animation clips, video clips, and 3-D representations, the difficulties in describing mining processes and earth structures can be overcome. This paper describes the experience gained in preparing interactive multimedia lectures on computers. The hardware and software used in creating the sound commentary, 3-D graphics, animation clips, video clips, and movies are listed. The structure of the program and how interactivity was achieved is explained in detail. Such an instructional tool is not only an excellent supplement to regular courses but it also is an inexpensive and effective way of providing distance education for mining engineers working at remote locations scattered all over the country.

Summers, D.A.; Unal, A. [Univ. of Missouri, Rolla, MO (United States)

1996-12-31

84

Math 484: Mathematical & Computational Modeling Course Information and Syllabus Spring 2013  

E-print Network

Math 484: Mathematical & Computational Modeling Course Information and Syllabus ­ Spring 2013 problems that arise in industry, government, science and engineering. 1. Main objective is to teach math Prerequisites Math 407 or equivalent first course in scientific computing. Math 455 or equivalent first course

85

Math 484: Mathematical & Computational Modeling Course Information and Syllabus Spring 2012  

E-print Network

Math 484: Mathematical & Computational Modeling Course Information and Syllabus ­ Spring 2012 problems that arise in industry, government, science and engineering. 1. Main objective is to teach math Prerequisites Math 407 or equivalent first course in scientific computing. Math 455 or equivalent first course

86

Computer networks as human system interface  

Microsoft Academic Search

With the dramatic increase of network bandwidth and decrease of network latency and because of development of new network programming technologies, the dynamic websites provide dynamic interaction to the end user and at the same time implement asynchronous client-server communication in the background. Many applications are being deployed through the computer and are becoming more popular and are effective means

Nam Pham; Bogdan M. Wilamowski; A. Malimowski

2010-01-01

87

Computing aggregates for monitoring wireless sensor networks  

Microsoft Academic Search

Wireless sensor networks involve very large numbers of small, low-power, wireless devices. Given their unattended nature, and their potential applications in harsh environments, we need a monitoring infrastructure that indicates system failures and resource depletion. We describe an architecture for sensor network monitoring, then focus on one aspect of this architecture: continuously computing aggregates (sum, average, count) of network properties

Jerry Zhao; Ramesh Govindan; Deborah Estrin

2003-01-01

88

Using E-Mail across Computer Networks.  

ERIC Educational Resources Information Center

Discusses the use of telecommunications technology to exchange electronic mail, files, and messages across different computer networks. Networks highlighted include ARPA Internet; BITNET; USENET; FidoNet; MCI Mail; and CompuServe. Examples of the successful use of networks in higher education are given. (Six references) (LRW)

Hazari, Sunil

1990-01-01

89

Women Who Learn Computing Like Men: Different Gender Positions on Basic Computer Courses in Adult Education  

ERIC Educational Resources Information Center

This article argues that research on gender and adult learning too often regards men and women as unified and separate groups, and does not take intra-gender variation into account. It presents one possible approach to address this problem, in a study of 142 women and 35 men attending basic computer courses in Swedish municipal adult education…

Salminen-Karlsson, Minna

2009-01-01

90

PACS mini refresher course. Network and ACR-NEMA protocols.  

PubMed

The backbone of the picture archiving and communication system (PACS) is the electronic network used to move information. Communications networks require electronic rules of operation or protocols so that a set of data being transmitted reaches the intended destination and does not collide with another set of transmitted data. The most efficient protocol is flexible and can respond to the fluctuations in volume of data transmitted via the network. Successful network connection of PACS devices requires standardized interfaces so that equipment from multiple vendors can use the network protocol. The American College of Radiology (ACR) and the National Electrical Manufacturers Association (NEMA) have developed a standard for imaging equipment interfaces: DICOM (Digital Imaging and Communications in Medicine). The DICOM standard allows interoperability among different computers and operating systems. It is flexible and will allow modification and expansions as new imaging techniques evolve. The authors and the ACR-NEMA committee believe that the DICOM standard represents an important choice for radiologists, since it was developed with their interests in mind. PMID:1609144

Horii, S C; Bidgood, W D

1992-05-01

91

1/1 (2003), 137152 A first course in computer science  

E-print Network

1/1 (2003), 137­152 A first course in computer science: Languages and goals Dennis C. Smolarski Abstract. The College Board Advanced Placement exam in computer science will use the language Java starting computer science courses at the univer- sity level. This article reviews the purpose of an introductory

Smolarski, Dennis C.

92

An Advanced Sequence of Computer Courses for Humanities Students: The Penn State Program.  

ERIC Educational Resources Information Center

A series of computer science courses at Pennsylvania State University is designed to meet the needs of undergraduate humanities students who wish to use computers. The first of three integrated courses exposes the student to the range of computer applications in the humanities and teaches him to write nontrivial programs in the PL/1 Programing…

Smith, John B.

93

3: Parallelism in Microprocessors Course on "Scalable Computing". Vittorio Scarano 3: Parallelism in Microprocessors  

E-print Network

3: Parallelism in Microprocessors Course on "Scalable Computing". Vittorio Scarano 3: Parallelism in Microprocessors Seminars in Scalable Computing Vittorio Scarano Universit`a di Salerno Dottorato di Ricerca in Informatica 1/65 3: Parallelism in Microprocessors Course on "Scalable Computing". Vittorio Scarano Plan 1

Scarano, Vittorio

94

Use of Computer-Mediated Communication in a Teaching Practicum Course  

ERIC Educational Resources Information Center

This study investigates how Computer-Mediated Communication (CMC) can be effectively used in a teaching practicum course to enhance preservice teachers' learning. We constructed a web-based CMC system and used it in a Teaching Practicum course. Computer science preservice teachers and experienced secondary school computer teachers, who served as…

Wu, Cheng-Chih; Lee, Greg C.

2004-01-01

95

Gender Differences in the Choice of Computer Courses: Applying an Expectancy-Value Model  

Microsoft Academic Search

The choice of computer courses has a direct influence on the development of computer literacy. It is alarming, therefore, that girls seem to choose computer courses less frequently than boys. The present paper examines (a) whether these often-reported gender differences also occur at the early high school level (Study 1) and (b) how these differences can be predicted by applying

Oliver Dickhäuser; Joachim Stiensmeier-Pelster

2003-01-01

96

Gender differences in the choice of computer courses: applying an expectancy-value model  

Microsoft Academic Search

The choice of computer courses has a direct influence on the development of computer literacy. It is alarming, therefore, that girls seem to choose computer courses less frequently than boys. The present paper examines (a) whether these often-reported gender differences also occur at the early high school level (Study 1) and (b) how these differences can be predicted by applying

OLIVER DICKHÄUSER; JOACHIM STIENSMEIER-PELSTER

2003-01-01

97

Using Microcomputer Simulations in the Classroom: Examples from Undergraduate and Faculty Computer Literacy Courses.  

ERIC Educational Resources Information Center

Examples of the use of computer simulations in two undergraduate courses, (American Foreign Policy and Introduction to International Politics), and a faculty computer literacy course on simulations and artificial intelligence, are provided in this compilation of various instructional items. A list of computer simulations available for various…

Hart, Jeffrey A.

98

Queuing theory models for computer networks  

NASA Technical Reports Server (NTRS)

A set of simple queuing theory models which can model the average response of a network of computers to a given traffic load has been implemented using a spreadsheet. The impact of variations in traffic patterns and intensities, channel capacities, and message protocols can be assessed using them because of the lack of fine detail in the network traffic rates, traffic patterns, and the hardware used to implement the networks. A sample use of the models applied to a realistic problem is included in appendix A. Appendix B provides a glossary of terms used in this paper. This Ames Research Center computer communication network is an evolving network of local area networks (LANs) connected via gateways and high-speed backbone communication channels. Intelligent planning of expansion and improvement requires understanding the behavior of the individual LANs as well as the collection of networks as a whole.

Galant, David C.

1989-01-01

99

Profiles of Motivated Self-Regulation in College Computer Science Courses: Differences in Major versus Required Non-Major Courses  

NASA Astrophysics Data System (ADS)

The goal of the present study was to utilize a profiling approach to understand differences in motivation and strategic self-regulation among post-secondary STEM students in major versus required non-major computer science courses. Participants were 233 students from required introductory computer science courses (194 men; 35 women; 4 unknown) at a large Midwestern state university. Cluster analysis identified five profiles: (1) a strategic profile of a highly motivated by-any-means good strategy user; (2) a knowledge-building profile of an intrinsically motivated autonomous, mastery-oriented student; (3) a surface learning profile of a utility motivated minimally engaged student; (4) an apathetic profile of an amotivational disengaged student; and (5) a learned helpless profile of a motivated but unable to effectively self-regulate student. Among CS majors and students in courses in their major field, the strategic and knowledge-building profiles were the most prevalent. Among non-CS majors and students in required non-major courses, the learned helpless, surface learning, and apathetic profiles were the most prevalent. Students in the strategic and knowledge-building profiles had significantly higher retention of computational thinking knowledge than students in other profiles. Students in the apathetic and surface learning profiles saw little instrumentality of the course for their future academic and career objectives. Findings show that students in STEM fields taking required computer science courses exhibit the same constellation of motivated strategic self-regulation profiles found in other post-secondary and K-12 settings.

Shell, Duane F.; Soh, Leen-Kiat

2013-12-01

100

Simulation for training computer network operations  

Microsoft Academic Search

Attacks on Department of Defense computer systems are a serious and growing threat. The cornerstone to the protection of these highly valuable networks is education and training. The U. S. Strategic Command is examining a new tool to train and exercise computer security to determine if the complex concepts relating to computer security can be more effectively taught by including

L. L. DeLooze; Paul McKean; John R. Mostow; Christopher Graig

2004-01-01

101

Computer Based Collaborative Problem Solving for Introductory Courses in Physics  

NASA Astrophysics Data System (ADS)

We discuss collaborative problem solving computer-based recitation style. The course is designed by Lee [1], and the idea was proposed before by Christian, Belloni and Titus [2,3]. The students find the problems on a web-page containing simulations (physlets) and they write the solutions on an accompanying worksheet after discussing it with a classmate. Physlets have the advantage of being much more like real-world problems than textbook problems. We also compare two protocols for web-based instruction using simulations in an introductory physics class [1]. The inquiry protocol allowed students to control input parameters while the worked example protocol did not. We will discuss which of the two methods is more efficient in relation to Scientific Discovery Learning and Cognitive Load Theory. 1. Lee, Kevin M., Nicoll, Gayle and Brooks, Dave W. (2004). ``A Comparison of Inquiry and Worked Example Web-Based Instruction Using Physlets'', Journal of Science Education and Technology 13, No. 1: 81-88. 2. Christian, W., and Belloni, M. (2001). Physlets: Teaching Physics With Interactive Curricular Material, Prentice Hall, Englewood Cliffs, NJ. 3. Christian,W., and Titus,A. (1998). ``Developing web-based curricula using Java Physlets.'' Computers in Physics 12: 227--232.

Ilie, Carolina; Lee, Kevin

2010-03-01

102

Nuclear Physics computer networking: Report of the Nuclear Physics Panel on Computer Networking  

Microsoft Academic Search

This paper discusses: the state of computer networking within nuclear physics program; network requirements for nuclear physics; management structure; and issues of special interest to the nuclear physics program office.

C. Bemis; J. Erskine; M. Franey; D. Greiner; M. Hoehn; M. Kaletka; M. LeVine; R. Roberson

1990-01-01

103

Computer Networking Goes to School.  

ERIC Educational Resources Information Center

Describes the design and implementation of the microcomputer network that will soon link every vocational center and comprehensive high school in West Virginia. The author discusses the advantages of networking, what equipment is used, instructional emphases, how various programs use the network, teacher training, and learner outcomes. (CT)

Cook, John

1985-01-01

104

"Minds and Machines" for Humanities Majors: A Liberal Arts Course in Computers and Cognition.  

ERIC Educational Resources Information Center

Discusses "Minds and Machines," a one-semester undergraduate course for nontechnical majors. Explains that the course examines how philosophical problems of knowledge, cognition, language, and human nature can be investigated with computer-related concepts and techniques. Describes experiments conducted during the course, including mind reading,…

Cushing, Steven

1991-01-01

105

Development of a Virtual Computer Architecture Course Silvia Bechter, Torsten Braun, Gnther Stattenberger  

E-print Network

Development of a Virtual Computer Architecture Course Silvia Bechter, Torsten Braun, GĂĽnther- line tests and quizzes to a web page of a lecture. However, there are several types of courses it is rather difficult to develop a virtual course for. Examples are practical exercises, where students have

Braun, Torsten

106

Techniques for Developing a Syllabus/Website for a Computer Mediated Learning (CML) Course.  

ERIC Educational Resources Information Center

Computer mediated learning (CML) courses can overcome the temporal and spatial obstacles of isolated commuter students with busy schedules. Whether presented online or as an add-on to an on-campus course, the CML course needs a good syllabus. This paper discusses components of a CML syllabus and online activities for students. Typical components…

Bull, Kay Sather; Kimball, Sarah; Stansberry, Susan

107

Integrating emerging topics through online team design in a hybrid communication networks course: Interaction patterns and impact  

E-print Network

Integrating emerging topics through online team design in a hybrid communication networks course Abstract An important challenge in the introductory communication networks course in electrical students with experiences in online collaboration, which is common in the engineering workplace

Reisslein, Martin

108

Reliability computation of multistage interconnection networks  

SciTech Connect

Multistage interconnection networks (MINs) are widely used as interconnection media in multiprocessing environments. Three reliability measures are particularly important for MINs: terminal-, broadcast-, and network-reliability. This paper presents a general algorithm that generates a reliability expression for these measures. The reliability is analyzed under the assumption of statistical independence of failure. Nonetheless, failure dependencies can also be solved. This method is appropriate for analyzing other computer networks.

Botting, C. (Bell Northern Research, Research Triangle Park (US)); Rai, S. (Louisiana State Univ., Baton Rouge, LA (USA)); Agrawal, D.P. (North Carolina State Univ., Raleigh, NC (USA))

1989-04-01

109

Intracavitary course of the right coronary artery: an increasingly recognized anomaly by coronary computed tomography angiography.  

PubMed

Coronary computed tomography angiography is being increasingly used for evaluation of coronary artery anatomy. We present a case report in which coronary computed tomography angiography detected an uncommon intracavitary course of the right coronary artery. PMID:20414137

Renapurkar, Rahul; Desai, Milind Y; Curtin, Ronan J

2010-08-01

110

Computer Networks and African Studies Centers.  

ERIC Educational Resources Information Center

The use of electronic communication in the 12 Title VI African Studies Centers is discussed, and the networks available for their use are reviewed. It is argued that the African Studies Centers should be on the cutting edge of contemporary electronic communication and that computer networks should be a fundamental aspect of their programs. An…

Kuntz, Patricia S.

111

Neural Network Computing and Natural Language Processing.  

ERIC Educational Resources Information Center

Considers the application of neural network concepts to traditional natural language processing and demonstrates that neural network computing architecture can: (1) learn from actual spoken language; (2) observe rules of pronunciation; and (3) reproduce sounds from the patterns derived by its own processes. (Author/CB)

Borchardt, Frank

1988-01-01

112

Neural networks applications to control and computations  

NASA Technical Reports Server (NTRS)

Several interrelated problems in the area of neural network computations are described. First an interpolation problem is considered, then a control problem is reduced to a problem of interpolation by a neural network via Lyapunov function approach, and finally a new, faster method of learning as compared with the gradient descent method, was introduced.

Luxemburg, Leon A.

1994-01-01

113

A Survey and Evaluation of Simulators Suitable for Teaching Courses in Computer Architecture and Organization  

ERIC Educational Resources Information Center

Courses in Computer Architecture and Organization are regularly included in Computer Engineering curricula. These courses are usually organized in such a way that students obtain not only a purely theoretical experience, but also a practical understanding of the topics lectured. This practical work is usually done in a laboratory using simulators…

Nikolic, B.; Radivojevic, Z.; Djordjevic, J.; Milutinovic, V.

2009-01-01

114

Developing Self-Direction in an Online Course through Computer-Mediated Interaction  

ERIC Educational Resources Information Center

Using content analysis to analyze transcripts from a graduate course conducted via computer conferencing, this study confirmed that students exhibit self-direction as indicated by both the variety and the extent of concrete self-directed activities. Furthermore, the study explained how students are self-directed in a computer conferencing course

Lee, Jiyeon; Gibson, Chere Campbell

2003-01-01

115

Converting an Experimental Laboratory Course from Paper and Pencil to Computer  

ERIC Educational Resources Information Center

This article provides suggestions for developing a laboratory-based research methods course using computers. We describe important considerations for creating this type of course including selecting software, choosing experiments, and teaching students with different levels of computer skill. We also include 3 model projects that required…

Hamilton, Maryellen; Geraci, Lisa

2004-01-01

116

A Program of Computational Chemistry Exercises for the First-Semester General Chemistry Course  

ERIC Educational Resources Information Center

The computer systems available for molecular modeling are described, along with a discussion of a molecular modeling program created and supported by computational techniques for the first-semester general chemistry course. Various exercises are listed, which direct the learner from a beginner's course in software practice to more complex…

Feller, Scott E.; Dallinger, Richard F.; McKinney, Paul Caylor

2004-01-01

117

Genetic Networks and Soft Computing  

Microsoft Academic Search

The analysis of gene regulatory networks provides enormous information on various fundamental cellular processes involving growth, development, hormone secretion, and cellular communication. Their extraction from available gene expression profiles is a challenging problem. Such reverse engineering of genetic networks offers insight into cellular activity toward prediction of adverse effects of new drugs or possible identification of new drug targets. Tasks

Sushmita Mitra; Ranajit Das; Yoichi Hayashi

2011-01-01

118

Spontaneous ad hoc mobile cloud computing network.  

PubMed

Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes. PMID:25202715

Lacuesta, Raquel; Lloret, Jaime; Sendra, Sandra; Peńalver, Lourdes

2014-01-01

119

Spontaneous Ad Hoc Mobile Cloud Computing Network  

PubMed Central

Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes. PMID:25202715

Lacuesta, Raquel; Sendra, Sandra; Peńalver, Lourdes

2014-01-01

120

How to hook worms [computer network security  

Microsoft Academic Search

This paper discusses the use of intrusion detection systems to protect against the various threats faced by computer systems by way of worms, viruses and other forms of attacks. Intrusion detection systems attempt to detect things that are wrong in a computer network or system. The main problems of these systems, however, are the many false alarms they produce, their

J. Riordan; A. Wespi; D. Zamboni

2005-01-01

121

Computer Networking with the Victorian Correspondence School.  

ERIC Educational Resources Information Center

During 1985 the Education Department installed two-way radios in 44 remote secondary schools in Victoria, Australia, to improve turn-around time for correspondence assignments. Subsequently, teacher supervisors at Melbourne's Correspondence School sought ways to further augument audio interactivity with computer networking. Computer equipment was…

Conboy, Ian

122

COURSE NAME Cryptography Engineering COURSE NAME  

E-print Network

and RFID) 14. Sensor Networks PREREQUISITES TEXTBOOKS #12;COURSE NAME IN ENGLISH Computer Graphics COURSE requirements on protocols of challenge-response type. The use of standard protocols such as SSL, public. PREREQUISITES No specific request, suit for both first time student and experienced researcher. TEXTBOOKS #12

Wichmann, Felix

123

MTX data acquisition and analysis computer network  

NASA Astrophysics Data System (ADS)

For the MTX experiment, we use a network of computers for plasma diagnostic data acquisition and analysis. This multivendor network employs VMS, UNIX, and BASIC based computers connected in a local area Ethernet network. Some of the data is acquired directly into a VAX/VMS computer cluster over a fiber-optic serial CAMAC highway. Several HP-Unix workstations and HP-BASIC instrument control computers acquire and analyze data for the more data intensive or specialized diagnostics. The VAX/VMS system is used for global analysis of the data and serves as the central data archiving and retrieval manager. Shot synchronization and control of data flow are implemented by task-to-task message passing using our interprocess communication system. The system has been in operation during our initial MTX tokamak and FEL experiments; it has operated reliably with data rates typically in the range of 5 Mbytes/shot without limiting the experimental shot rate.

Butner, D. N.; Casper, T. A.; Brown, M. D.; Drlik, M.; Meyer, W. H.; Moller, J. M.

1990-10-01

124

Computing with structured connections networks. Technical report  

SciTech Connect

Rapid advances both in the neurosciences and in computer science are beginning to lead to a new interest in computational models linking animal brains and behavior. In computer science, there is a large and growing body of knowledge about parallel computation and another, largely separate, science of artificial intelligence. The idea of looking directly at massively parallel realizations of intelligent activity promises to be fruitful for the study of both natural and artificial computations. Much attention has been directed towards the biological implications of this interdisciplinary effort, but there are equally important relations with computational theory, hardware and software. This article focuses on the design and use of massively parallel computational models, particularly in artificial intelligence. Much of the recent work on massively parallel computation has been carried out by physicists and examines the emergent behavior of large, unstructured collections of computing units. We are more concerned with how one can design, realize and analyze networks that embody the specific computational structures needed to solve hard problems. Adaptation and learning are treated as ways to improve structured networks, not as a replacement for analysis and design.

Feldman, J.A.; Fanty, M.A.; Goddard, N.; Lynne, K.

1987-04-01

125

Computer Aided Chemical Engineering CHEN 3600 Spring 2013 Course Outcomes  

E-print Network

subject material essential to the course is covered as well as detailing the degree of mastery expected- tions, rates of change, areas under curves, Laplace transform, Monte Carlo Simulation) en- countered

Ashurst, W. Robert

126

Interaction, Critical Thinking, and Social Network Analysis (SNA) in Online Courses  

ERIC Educational Resources Information Center

This study tried to ascertain a possible relationship between the number of student moderators (1, 2, and 3), online interactions, and critical thinking of K-12 educators enrolled in an online course that was taught from a constructivist approach. The course topic was use of technology in special education. Social network analysis (SNA) and…

Thormann, Joan; Gable, Samuel; Fidalgo, Patricia Seferlis; Blakeslee, George

2013-01-01

127

On computer vision in wireless sensor networks.  

SciTech Connect

Wireless sensor networks allow detailed sensing of otherwise unknown and inaccessible environments. While it would be beneficial to include cameras in a wireless sensor network because images are so rich in information, the power cost of transmitting an image across the wireless network can dramatically shorten the lifespan of the sensor nodes. This paper describe a new paradigm for the incorporation of imaging into wireless networks. Rather than focusing on transmitting images across the network, we show how an image can be processed locally for key features using simple detectors. Contrasted with traditional event detection systems that trigger an image capture, this enables a new class of sensors which uses a low power imaging sensor to detect a variety of visual cues. Sharing these features among relevant nodes cues specific actions to better provide information about the environment. We report on various existing techniques developed for traditional computer vision research which can aid in this work.

Berry, Nina M.; Ko, Teresa H.

2004-09-01

128

Computational Statistical Methods for Social Network Models  

PubMed Central

We review the broad range of recent statistical work in social network models, with emphasis on computational aspects of these methods. Particular focus is applied to exponential-family random graph models (ERGM) and latent variable models for data on complete networks observed at a single time point, though we also briefly review many methods for incompletely observed networks and networks observed at multiple time points. Although we mention far more modeling techniques than we can possibly cover in depth, we provide numerous citations to current literature. We illustrate several of the methods on a small, well-known network dataset, Sampson’s monks, providing code where possible so that these analyses may be duplicated. PMID:23828720

Hunter, David R.; Krivitsky, Pavel N.; Schweinberger, Michael

2013-01-01

129

Computation of signal delays in RC networks  

NASA Technical Reports Server (NTRS)

A model for signal delay computation in RC networks is presented. The strength of the paradigm is its generality and simplicity. The definition of delay is applicable to RC meshes with potential resistive attenuating paths to ground. The algorithms can also be applied to undriven circuits (static charge sharing) and circuits with initial charge. To compute the delays, each node in the network is explored locally to derive a system of sparse linear equations. The solutions of the system are delay values based on the Elmore time constant at each point in the circuit.

Hidalgo, Juan Carlos; Narendran, Paliath; Chaiken, Seth

1993-01-01

130

Computer Course Articulation among High Schools and Colleges and Universities in the State of Arizona.  

ERIC Educational Resources Information Center

The purpose of this study was to determine the extent of communication between Arizona's secondary schools and postsecondary institutions concerning computer education and computer literacy. A document analysis of college catalogs and a survey of 70 school districts determined the extent of advanced placement courses, computer education services,…

Babcock, Gifford M.

131

Talking about Code: Integrating Pedagogical Code Reviews into Early Computing Courses  

ERIC Educational Resources Information Center

Given the increasing importance of soft skills in the computing profession, there is good reason to provide students withmore opportunities to learn and practice those skills in undergraduate computing courses. Toward that end, we have developed an active learning approach for computing education called the "Pedagogical Code Review"…

Hundhausen, Christopher D.; Agrawal, Anukrati; Agarwal, Pawan

2013-01-01

132

Computational Modeling of Mammalian Signaling Networks  

PubMed Central

One of the most exciting developments in signal transduction research has been the proliferation of studies in which a biological discovery was initiated by computational modeling. Here we review the major efforts that enable such studies. First, we describe the experimental technologies that are generally used to identify the molecular components and interactions in, and dynamic behavior exhibited by, a network of interest. Next, we review the mathematical approaches that are used to model signaling network behavior. Finally, we focus on three specific instances of “model-driven discovery”: cases in which computational modeling of a signaling network has led to new insights which have been verified experimentally. Signal transduction networks are the bridge between the extraordinarily complex extracellular environment and a carefully orchestrated cellular response. These networks are largely composed of proteins which can interact, move to specific cellular locations, or be modified or degraded. The integration of these events often leads to the activation or inactivation of transcription factors, which then induce or repress the expression of thousands of genes. Because of this critical role in translating environmental cues to cellular behaviors, malfunctioning signaling networks can lead to a variety of pathologies. One example is cancer, in which many of the key genes found to be involved in cancer onset and development are components of signaling pathways [1, 2]. A detailed understanding of the cellular signaling networks underlying such diseases would likely be extremely useful in developing new treatments. However, the complexity of signaling networks is such that their integrated functions cannot be determined without computational simulation. In recent years, mathematical modeling of signal transduction has led to some exciting new findings and biological discoveries. Here, we review the work that has enabled computational modeling of mammalian signaling networks, as well as the demonstrated value of such modeling. We begin by reviewing the experimental techniques commonly associated with model-building efforts, in terms of mapping network interactions as well as determining the dynamic network response to perturbation. We then discuss modeling strategies, and finally focus on three cases that dramatically illustrate the power of models to discover new biology. PMID:20836022

Hughey, Jacob J; Lee, Timothy K; Covert, Markus W

2011-01-01

133

Toward a Singleton Undergraduate Computer Graphics Course in Small and Medium-Sized Colleges  

ERIC Educational Resources Information Center

This article discusses the evolution of a single undergraduate computer graphics course over five semesters, driven by a primary question: if one could offer only one undergraduate course in graphics, what would it include? This constraint is relevant to many small and medium-sized colleges that lack resources, adequate expertise, and enrollment…

Shesh, Amit

2013-01-01

134

Computer simulations enhance experimental demonstrations in the underwater acoustics and sonar course  

Microsoft Academic Search

Underwater acoustics and sonar (SP411) is a 3 hour course that is offered to midshipmen in their senior year. Typically, general science and oceanography majors, totaling 110 students\\/yr, enroll. Since this course is offered without a lab, the ''in class'' experience has been enhanced with the development (over many years) of our demo carts and computer workstations which surround the

Murray S. Korman

2002-01-01

135

Two freshman courses which introduce digital electronics, programming, computers, and interfacing  

NASA Astrophysics Data System (ADS)

This article describes two one-credit freshman courses intended to familiarize students with the laboratory use of computers. The courses provide an introduction to programming in a high level language (BASIC) and in assembly language and to the design and construction of simple digital circuits. A final project requires students to interface an electronic thermometer to an S-100 Bus machine.

Seligmann, P.; Spencer, C. D.

1985-04-01

136

A Computational-Modeling Course for Undergraduate Students in Chemical Technology  

ERIC Educational Resources Information Center

The PC-based software technology, a computational-modeling course, for undergraduate chemistry students helps them to understand the molecular modeling in a better way. This course would be able to accommodate a wider array of topics and a greater depth of theory as the modeling is increasingly incorporated into the chemistry curriculum.

Hessley, Rita K.

2004-01-01

137

Educational Impact of Digital Visualization Tools on Digital Character Production Computer Science Courses  

ERIC Educational Resources Information Center

Digital character production courses have traditionally been taught in art departments. The digital character production course at the University of Utah is centered, drawing uniformly from art and engineering disciplines. Its design has evolved to include a synergy of computer science, functional art and human anatomy. It gives students an…

van Langeveld, Mark Christensen

2009-01-01

138

Evaluation of the Effectiveness of a Web-Based Learning Design for Adult Computer Science Courses  

ERIC Educational Resources Information Center

This paper reports on work undertaken within a pilot study concerned with the design, development, and evaluation of online computer science training courses. Drawing on recent developments in e-learning technology, these courses were structured around the principles of a learner-oriented approach for use with adult learners. The paper describes a…

Antonis, Konstantinos; Daradoumis, Thanasis; Papadakis, Spyros; Simos, Christos

2011-01-01

139

Parallel Computation of Unsteady Flows on a Network of Workstations  

NASA Technical Reports Server (NTRS)

Parallel computation of unsteady flows requires significant computational resources. The utilization of a network of workstations seems an efficient solution to the problem where large problems can be treated at a reasonable cost. This approach requires the solution of several problems: 1) the partitioning and distribution of the problem over a network of workstation, 2) efficient communication tools, 3) managing the system efficiently for a given problem. Of course, there is the question of the efficiency of any given numerical algorithm to such a computing system. NPARC code was chosen as a sample for the application. For the explicit version of the NPARC code both two- and three-dimensional problems were studied. Again both steady and unsteady problems were investigated. The issues studied as a part of the research program were: 1) how to distribute the data between the workstations, 2) how to compute and how to communicate at each node efficiently, 3) how to balance the load distribution. In the following, a summary of these activities is presented. Details of the work have been presented and published as referenced.

1997-01-01

140

Contributing to success in an introductory computer science course: a study of twelve factors  

Microsoft Academic Search

This study was conducted to determine factors that promote success in an introductory college computer science course. The model included twelve possible predictive factors including math background, attribution for success\\/failure (luck, effort, difficulty of task, and ability), domain specific self-efficacy, encouragement, comfort level in the course, work style preference, previous programming experience, previous non-programming computer experience, and gender. Subjects included

Brenda Cantwell Wilson; Sharon Shrock

2001-01-01

141

A Course in Algebra and Trigonometry with Computer Programming.  

ERIC Educational Resources Information Center

This textbook was developed by the Colorado Schools Computing Science (CSCS) Curriculum Development Project. It can be used with high school or college students in an integrated presentation of second-year algebra, trigonometry, and beginning computer programing. (MK)

Beavers, Mildred; And Others

142

Manual for Museum Computer Network Data Preparation.  

ERIC Educational Resources Information Center

This manual describes information processing procedures for Museum Computer Network (MCN) systems. The first section contains general rules for preparation of input: conventions for all data; conventions for controlling the appearance of output; conventions for automatic sorting of data; conventions for user specified sorting of data; and…

Vance, David

143

Advanced networks and computing in healthcare  

PubMed Central

As computing and network capabilities continue to rise, it becomes increasingly important to understand the varied applications for using them to provide healthcare. The objective of this review is to identify key characteristics and attributes of healthcare applications involving the use of advanced computing and communication technologies, drawing upon 45 research and development projects in telemedicine and other aspects of healthcare funded by the National Library of Medicine over the past 12?years. Only projects publishing in the professional literature were included in the review. Four projects did not publish beyond their final reports. In addition, the authors drew on their first-hand experience as project officers, reviewers and monitors of the work. Major themes in the corpus of work were identified, characterizing key attributes of advanced computing and network applications in healthcare. Advanced computing and network applications are relevant to a range of healthcare settings and specialties, but they are most appropriate for solving a narrower range of problems in each. Healthcare projects undertaken primarily to explore potential have also demonstrated effectiveness and depend on the quality of network service as much as bandwidth. Many applications are enabling, making it possible to provide service or conduct research that previously was not possible or to achieve outcomes in addition to those for which projects were undertaken. Most notable are advances in imaging and visualization, collaboration and sense of presence, and mobility in communication and information-resource use. PMID:21486877

Ackerman, Michael

2011-01-01

144

COMP 347: Computer Networks Cisco Laboratory 1  

E-print Network

COMP 347: Computer Networks Cisco Laboratory 1 Introduction to Cisco IOS Objective · Log and thoroughly understand the `Theory' section before proceeding to the lab exercises. Theory Most Cisco routers run on an operating system referred to as IOS. Cisco IOS (originally Internetwork Operating System

Hamey, Len

145

Query optimization in star computer networks  

Microsoft Academic Search

Query processing is investigated for relational databases distributed over several computers organized in a star network. Minimal response-time processing strategies are presented for queries involving the select, project, and join commands. These strategies depend on system parameters such as communication costs and different machine processing speeds; database parameters such as relation cardinality and file size; and query parameters such as

Larry Kerschberg; Peter D. Ting; S. Bing Yao

1982-01-01

146

Master of Science in Computer Networking Program Overview  

E-print Network

in computer science, computer engineering or electrical engineering who wish to pursue a graduate degreeMaster of Science in Computer Networking Program Overview The Master of Science in Computer in computer networking. It is a 31 credit hour degree program that does not require a thesis, final oral exam

Young, R. Michael

147

Using satellite communications for a mobile computer network  

NASA Technical Reports Server (NTRS)

The topics discussed include the following: patrol car automation, mobile computer network, network requirements, network design overview, MCN mobile network software, MCN hub operation, mobile satellite software, hub satellite software, the benefits of patrol car automation, the benefits of satellite mobile computing, and national law enforcement satellite.

Wyman, Douglas J.

1993-01-01

148

Network virtualization for cloud computing  

Microsoft Academic Search

Cloud computing enables a transparent access to information technology (IT) services such that the users do not need to know\\u000a the location and characteristics of the relevant resources. While IT resource virtualization and service abstraction have\\u000a been widely investigated, data transport within the cloud and its efficient control have not received much attention in the\\u000a technical literature. In fact, connectivity

Fabio Baroncelli; Barbara Martini; Piero Castoldi

2010-01-01

149

Anonymous Transactions in Computer Networks  

NASA Astrophysics Data System (ADS)

We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as the Internet. We first present a practical scheme for anonymous transactions while the transaction resolution is assisted by a Trusted Authority. This practical scheme is extended to a theoretical scheme where a Trusted Authority is not involved in the transaction resolution. Given an authority that generates for each player hard to produce evidence EVID (e. g., problem instance with or without a solution) to each player, the identity of a user U is defined by the ability to prove possession of said evidence. We use Zero-Knowledge proof techniques to repeatedly identify U by providing a proof that U has evidence EVID, without revealing EVID, therefore avoiding identity theft.

Dolev, Shlomi; Kopeetsky, Marina

150

Introduction to Computational Topology (Spring 2014) Course Number Math 574 (Topics Course)  

E-print Network

software for analyzing the topology of point sets and shapes ­ termed Topological Data Analysis, or TDA. Computational topology combines topological results with efficient computational tools to analyze data and solve, algebraic topology, and optimization. We will also look at algorithms and data structures, and efficient

Krishnamoorthy, Bala

151

Social Studies: Application Units. Course II, Teachers. Computer-Oriented Curriculum. REACT (Relevant Educational Applications of Computer Technology).  

ERIC Educational Resources Information Center

This book is one of a series in Course II of the Relevant Educational Applications of Computer Technology (REACT) Project. It is designed to point out to teachers two of the major applications of computers in the social sciences: simulation and data analysis. The first section contains a variety of simulation units organized under the following…

Tecnica Education Corp., San Carlos, CA.

152

Toolbox to analyze computer-network interaction  

NASA Astrophysics Data System (ADS)

Understanding the nature of data communications requires tools to collect data from the computer, the network and their interaction. A tool is needed to get better understanding of the processes generating traffic to the network. The main components are an instrumented Linux kernel, a synthetic benchmark program, a system call tracer and a set of analysis programs for the post processing. The data collected from the network can be synchronized with the data collected from computer with an adequate accuracy without expensive hardware. Changes on the operating system (e.g. scheduling algorithm) or on the network can be easily evaluated by the synthetic benchmark where it is possible to modify CPU/IO-intensity ratio and the number of processes each type thus emulating different real-world applications. The data and the code size can be modified to evaluate the memory system performances over different working set sizes. The early measurements on the Ethernet indicate that this toolbox is useful. Measurements have revealed how network traffic is affected as number of processes changes. The toolbox development continues on ATM environment.

Peuhkuri, Markus

1997-10-01

153

An internet role-game for the laboratory of network security course  

Microsoft Academic Search

Over the last few years, many universities and educational institutions have introduced computer security related courses to their degree programs. The majority of these courses feature intensive laboratory activity based on live experiments of attack and defense techniques by means of team games organized as \\

Luigi Catuogno; Alfredo De Santis

2008-01-01

154

Causal Attributions of Success and Failure Made by Undergraduate Students in an Introductory-Level Computer Programming Course  

ERIC Educational Resources Information Center

The purpose of this research is to identify the causal attributions of business computing students in an introductory computer programming course, in the computer science department at Notre Dame University, Louaize. Forty-five male and female undergraduates who completed the computer programming course that extended for a 13-week semester…

Hawi, N.

2010-01-01

155

Learning Motivation in E-Learning Facilitated Computer Programming Courses  

ERIC Educational Resources Information Center

Computer programming skills constitute one of the core competencies that graduates from many disciplines, such as engineering and computer science, are expected to possess. Developing good programming skills typically requires students to do a lot of practice, which cannot sustain unless they are adequately motivated. This paper reports a…

Law, Kris M. Y.; Lee, Victor C. S.; Yu, Y. T.

2010-01-01

156

Pushing sensor network computation to the edge  

SciTech Connect

Sensor Networks consist of multiple devices equipped with some sensing apparatus. The devices in the network may be homogeneous or heterogeneous, yet they will coordinate in order to accomplish a pre-defined task. With the rising interest in the use of Sensor Networks in various applications, the sensor nodes need to subsist in a dynamic environment and react in a timely fashion to environmental stimuli. Unfortunately, the current paradigm in Sensor Network relies on static tasking of the nodes to support a common task; which ultimately leads to deployment of various networks to cover a common area so long as the tasks and owners of these networks differ. Straying away from this paradigm, our work introduces a framework to enable nodes to support dynamic tasking in a dynamic environment by pushing computation to the edge through FPGA-based reconfigurable nodes with increased processing power. Furthermore, we contend that the sensing apparatus available on the nodes limits the range of applications that such nodes will support. As such, reconfigurability of the nodes can yield the most efficient and responsive hardware implementation of algorithms to support common tasks of applications. The benefits of our approach are highlighted through the introduction of a target-tracking node that is reconfigurable and provides increased response time to stimuli.

Jean, Evens [Pennsylvania State University] [Pennsylvania State University; Collins, Robert [Pennsylvania State University, University Park, PA] [Pennsylvania State University, University Park, PA; Hurson, Ali [Missouri University of Science and Technology] [Missouri University of Science and Technology; Sedigh, Sahra [Missouri University of Science and Technology] [Missouri University of Science and Technology; Jiao, Yu [ORNL] [ORNL

2009-01-01

157

Improving Computing Courses from the Points of View of Students and Teachers: A Review and an Empirical Study  

ERIC Educational Resources Information Center

The improvement of computing courses is a permanent need and is a goal established by any teacher. Suggestions of possible course improvements should be made by teachers and students. Computer project-based courses involving a significant number of people pose difficulties to listening to all their opinions. The purpose of our research is twofold:…

Sampaio, Alberto; Sampaio, Isabel

2012-01-01

158

Effects of types of active learning activity on two junior-level computer engineering courses  

Microsoft Academic Search

In several computer engineering and computer science courses, it has been observed that active learning activities (ALAs) aid the students in better understanding of the technical material. In this paper, we explore the influence of the type of the ALA and the academic quality of the student on the effectiveness of the technique. We perform the study in two junior

Saurabh Bagchi; Mark C. Johnson; Somali Chaterji

2008-01-01

159

Design and Delivery of Multiple Server-Side Computer Languages Course  

ERIC Educational Resources Information Center

Given the emergence of service-oriented architecture, IS students need to be knowledgeable of multiple server-side computer programming languages to be able to meet the needs of the job market. This paper outlines the pedagogy of an innovative course of multiple server-side computer languages for the undergraduate IS majors. The paper discusses…

Wang, Shouhong; Wang, Hai

2011-01-01

160

Using E-mail in a Math/Computer Core Course.  

ERIC Educational Resources Information Center

This paper notes the advantages of using e-mail in computer literacy classes, and discusses the results of incorporating an e-mail assignment in the "Introduction to Mathematical Reasoning and Computer Programming" core course at Brooklyn College (New York). The assignment consisted of several steps. The students first read and responded to an…

Gurwitz, Chaya

161

Recursive algorithms in computer science courses: Fibonacci numbers and binomial coefficients  

Microsoft Academic Search

We observe that the computational inefficiency of branched recursive functions was not appropriately covered in almost all textbooks for computer science courses in the first three years of the curriculum. Fibonacci numbers and binomial coefficients were frequently used as examples of branched recursive functions. However, their exponential time complexity was rarely claimed and never completely proved in the textbooks. Alternative

I. Stojmenovic; Binomial Coefficients

2000-01-01

162

Advantages and disadvantages of using various computer tools in electrical engineering courses  

Microsoft Academic Search

This paper discusses different computer tools used to help deliver, administer, and teach the material covered in two basic undergraduate courses in electrical engineering. The computer facilities, programs and tutorials developed are discussed; however, the paper concentrates more on analyzing the results of using these tools in the student learning process. The students' marks and the results of several student

C. A. Canizares; Zeno T. Faur

1997-01-01

163

Integrating an Intensive Experience with Communication Skills Development into a Computer Science Course  

E-print Network

Integrating an Intensive Experience with Communication Skills Development into a Computer Science, advisors often spend considerable time teaching ba- sic communication skills. Computer science students or communications course of- fered by another department is not adequate as these skills are best learned

Pollock, Lori L.

164

Landuse: A Computer Program for Laboratory Use in Economic Geography Courses, Technical Paper No. 8.  

ERIC Educational Resources Information Center

This technical report describes a digital computer program on the spatial structure of agricultural production and how it can be used in economic geography courses. Chapters one through four, respectively, (1) examine the use of digital computers in the teaching of college geography, (2) analyze the von Thunen theory which postulates laws that…

Marble, Duane F.; Anderson, Bruce M.

165

Relationships among Learning Styles and Motivation with Computer-Aided Instruction in an Agronomy Course  

ERIC Educational Resources Information Center

Multi-media learning tools were developed to enhance student learning for an introductory agronomy course at Iowa State University. During fall 2002, the new interactive computer program, called Computer Interactive Multimedia Program for Learning Enhancement (CIMPLE) was incorporated into the teaching, learning, and assessment processes of the…

McAndrews, Gina M.; Mullen, Russell E.; Chadwick, Scott A.

2005-01-01

166

Computer Modelling as an Aid to Teaching in an Internal Combustion Engineering Course  

Microsoft Academic Search

The computer has been used as a laboratory substitute in an Internal Combustion Engineering course. Computer programs have been used to model internal combustion engines and engine systems, allowing the effects of ambient conditions, and internal parameters, to be demonstrated. The programs have been in use for two years and have been developed over that time both to improve student

P. R. Cave

1974-01-01

167

Using Standardized Tests to Predict Achievement in an Introductory High School Computer Course.  

ERIC Educational Resources Information Center

Describes an investigation which assessed predictive value of Iowa Test of Educational Development, Science Research Associates Inc.'s Computer Programming Aptitude Battery, and Wolfe Programming Aptitude Test for predicting secondary school students' success in computer science courses, to develop a prediction model, and to estimate mastery…

Szymczuk, Michael; Frerichs, Dean

1985-01-01

168

A CS1 Course on Media Computation Working Document Version 3  

E-print Network

manipulation of digital media. Teaching the skill of programming is an explicit, high-priority goal for the course, and it is taught in the context of creation, transformation, and manipulation of digital media computation. 2 #12;· Programming a computer is our most flexible tool for manipulating digital media. Knowing

Guzdial, Mark

169

Fuzzy Logic, Neural Networks And Computer Vision  

NASA Astrophysics Data System (ADS)

The emulation of human-like vision on a computer is often the desired goal of robot vision and medical image processing. Human vision possesses some important attributes such as "perception" and "cognition". It is imperative that some aspects of these attributes are captured when emulating the human visual system. The processes of perception, mentation, and cognition imply that objects and images are not crisply perceived and, therefore, the more common forms of logic such as binary cannot be used. The recently developed calculus of fuzzy logic along with neuron-like computational units appear to be very powerful tools for the emulation of human-like vision fields on a computer. In this paper, we describe the connection between fuzzy logic and neural networks for the area of computer vision.

Gupta, Madan M.

1989-03-01

170

Spiking network simulation code for petascale computers.  

PubMed

Brain-scale networks exhibit a breathtaking heterogeneity in the dynamical properties and parameters of their constituents. At cellular resolution, the entities of theory are neurons and synapses and over the past decade researchers have learned to manage the heterogeneity of neurons and synapses with efficient data structures. Already early parallel simulation codes stored synapses in a distributed fashion such that a synapse solely consumes memory on the compute node harboring the target neuron. As petaflop computers with some 100,000 nodes become increasingly available for neuroscience, new challenges arise for neuronal network simulation software: Each neuron contacts on the order of 10,000 other neurons and thus has targets only on a fraction of all compute nodes; furthermore, for any given source neuron, at most a single synapse is typically created on any compute node. From the viewpoint of an individual compute node, the heterogeneity in the synaptic target lists thus collapses along two dimensions: the dimension of the types of synapses and the dimension of the number of synapses of a given type. Here we present a data structure taking advantage of this double collapse using metaprogramming techniques. After introducing the relevant scaling scenario for brain-scale simulations, we quantitatively discuss the performance on two supercomputers. We show that the novel architecture scales to the largest petascale supercomputers available today. PMID:25346682

Kunkel, Susanne; Schmidt, Maximilian; Eppler, Jochen M; Plesser, Hans E; Masumoto, Gen; Igarashi, Jun; Ishii, Shin; Fukai, Tomoki; Morrison, Abigail; Diesmann, Markus; Helias, Moritz

2014-01-01

171

Spiking network simulation code for petascale computers  

PubMed Central

Brain-scale networks exhibit a breathtaking heterogeneity in the dynamical properties and parameters of their constituents. At cellular resolution, the entities of theory are neurons and synapses and over the past decade researchers have learned to manage the heterogeneity of neurons and synapses with efficient data structures. Already early parallel simulation codes stored synapses in a distributed fashion such that a synapse solely consumes memory on the compute node harboring the target neuron. As petaflop computers with some 100,000 nodes become increasingly available for neuroscience, new challenges arise for neuronal network simulation software: Each neuron contacts on the order of 10,000 other neurons and thus has targets only on a fraction of all compute nodes; furthermore, for any given source neuron, at most a single synapse is typically created on any compute node. From the viewpoint of an individual compute node, the heterogeneity in the synaptic target lists thus collapses along two dimensions: the dimension of the types of synapses and the dimension of the number of synapses of a given type. Here we present a data structure taking advantage of this double collapse using metaprogramming techniques. After introducing the relevant scaling scenario for brain-scale simulations, we quantitatively discuss the performance on two supercomputers. We show that the novel architecture scales to the largest petascale supercomputers available today. PMID:25346682

Kunkel, Susanne; Schmidt, Maximilian; Eppler, Jochen M.; Plesser, Hans E.; Masumoto, Gen; Igarashi, Jun; Ishii, Shin; Fukai, Tomoki; Morrison, Abigail; Diesmann, Markus; Helias, Moritz

2014-01-01

172

Networked Computer Science Technical Reports Library  

NSDL National Science Digital Library

The goal of the Networked Computer Science Technical Report Library (NCSTRL, pronounced "ancestral") is to provide access to research papers produced at over 60 computer science departments and laboratories worldwide. Users may browse an institution's collection by author or year of publication, or may search through either a simple or an advanced interface. The site aims to advance the field of CS through resource sharing and by exploring related implementation issues. A word of caution: unless using a singular, unique term, avoid the simple search method since "or" operators are implied. Your best bet for searching multiple terms is the advanced search option.

1995-01-01

173

Networked Computer Science Technical Reports Library  

NSDL National Science Digital Library

The goal of the Networked Computer Science Technical Report Library (NCSTRL, pronounced "ancestral") is to provide access to research papers produced at over 60 computer science departments and laboratories worldwide. Users may browse an institution's collection by author or year of publication, or may search through either a simple or an advanced interface. The site aims to advance the field of CS through resource sharing and by exploring related implementation issues. A word of caution: unless using a singular, unique term, avoid the simple search method since "or" operators are implied. Your best bet for searching multiple terms is the advanced search option.

2005-10-28

174

The dangers of heterogeneous network computing: heterogeneous networks considered harmful  

SciTech Connect

This report addresses the issue of writing reliable numerical software for networks of heterogeneous computers. Much software has been written for distributed memory parallel computers and in principal such software could readily be ported to networks of machines, such as a collection of workstations connected by Ethernet, but if such a network is not homogeneous there are special challenges that need to be addressed. The symptoms can range from erroneous results returned without warning to deadlock. Some of the problems are straightforward to solve, but for others the solutions are not so obvious and indeed in some cases, such as the method of bisection which we shall discuss in the report, we have not yet decided upon a satisfactory solution that does not incur an unacceptable overhead. Making software robust on heterogeneous systems often requires additional communication. In this report we describe and illustrate the problems and, where possible, suggest solutions so that others may be aware of the potential pitfalls and either avoid them or, if that is not possible, ensure that their software is not used on heterogeneous networks.

Demmel, J.; Stanley, K. [California Univ., Berkeley, CA (United States); Dongarra, J. [Oak Ridge National Lab., TN (United States); Hammarling, S.; Osstrouchov, S. [Tennessee Univ., Knoxville, TN (United States)

1996-12-31

175

Neural network computer simulation of medical aerosols.  

PubMed

Preliminary investigations have been conducted to assess the potential for using artificial neural networks to simulate aerosol behaviour, with a view to employing this type of methodology in the evaluation and design of pulmonary drug-delivery systems. Details are presented of the general purpose software developed for these tasks; it implements a feed-forward back-propagation algorithm with weight decay and connection pruning, the user having complete run-time control of the network architecture and mode of training. A series of exploratory investigations is then reported in which different network structures and training strategies are assessed in terms of their ability to simulate known patterns of fluid flow in simple model systems. The first of these involves simulations of cellular automata-generated data for fluid flow through a partially obstructed two-dimensional pipe. The artificial neural networks are shown to be highly successful in simulating the behaviour of this simple linear system, but with important provisos relating to the information content of the training data and the criteria used to judge when the network is properly trained. A second set of investigations is then reported in which similar networks are used to simulate patterns of fluid flow through aerosol generation devices, using training data furnished through rigorous computational fluid dynamics modelling. These more complex three-dimensional systems are modelled with equal success. It is concluded that carefully tailored, well trained networks could provide valuable tools not just for predicting but also for analysing the spatial dynamics of pharmaceutical aerosols. PMID:8832491

Richardson, C J; Barlow, D J

1996-06-01

176

Computational drug repositioning through heterogeneous network clustering  

PubMed Central

Background Given the costly and time consuming process and high attrition rates in drug discovery and development, drug repositioning or drug repurposing is considered as a viable strategy both to replenish the drying out drug pipelines and to surmount the innovation gap. Although there is a growing recognition that mechanistic relationships from molecular to systems level should be integrated into drug discovery paradigms, relatively few studies have integrated information about heterogeneous networks into computational drug-repositioning candidate discovery platforms. Results Using known disease-gene and drug-target relationships from the KEGG database, we built a weighted disease and drug heterogeneous network. The nodes represent drugs or diseases while the edges represent shared gene, biological process, pathway, phenotype or a combination of these features. We clustered this weighted network to identify modules and then assembled all possible drug-disease pairs (putative drug repositioning candidates) from these modules. We validated our predictions by testing their robustness and evaluated them by their overlap with drug indications that were either reported in published literature or investigated in clinical trials. Conclusions Previous computational approaches for drug repositioning focused either on drug-drug and disease-disease similarity approaches whereas we have taken a more holistic approach by considering drug-disease relationships also. Further, we considered not only gene but also other features to build the disease drug networks. Despite the relative simplicity of our approach, based on the robustness analyses and the overlap of some of our predictions with drug indications that are under investigation, we believe our approach could complement the current computational approaches for drug repositioning candidate discovery. PMID:24564976

2013-01-01

177

Computational fact checking from knowledge networks  

E-print Network

Traditional fact checking by expert journalists cannot keep up with the enormous volume of information that is now generated online. Computational fact checking may significantly enhance our ability to evaluate the veracity of dubious information. Here we show that the complexities of human fact checking can be approximated quite well by finding the shortest path between concept nodes under properly defined semantic proximity metrics on knowledge graphs. Framed as a network problem this approach is feasible with efficient computational techniques. We evaluate this approach by examining tens of thousands of claims related to history, entertainment, geography, and biographical information using a public knowledge graph extracted from Wikipedia. Statements independently known to be true consistently receive higher support via our method than do false ones. These findings represent a significant step toward scalable computational fact-checking methods that may one day mitigate the spread of harmful misinformation...

Ciampaglia, Giovanni Luca; Rocha, Luis M; Bollen, Johan; Menczer, Filippo; Flammini, Alessandro

2015-01-01

178

Mobile Computing/Mobile Computing/Mobile Computing/Mobile Computing/ Mobile NetworksMobile NetworksMobile NetworksMobile Networks  

E-print Network

Network Protocols for Wired Network: EthernetNetwork: EthernetNetwork: EthernetNetwork: Ethernet Solomon's book addresses? Does it have two Ethernet addresses? What are differences between UDP and TCP? #12;3 Contents IP Optimization Current Topics 4 Network Protocols for WiredNetwork Protocols for WiredNetwork Protocols for Wired

Yu, Chansu

179

High-throughput Bayesian network learning using heterogeneous multicore computers  

Microsoft Academic Search

Aberrant intracellular signaling plays an important role in many diseases. The causal structure of signal transduction networks can be modeled as Bayesian Networks (BNs), and computationally learned from experimental data. However, learning the structure of Bayesian Networks (BNs) is an NP-hard problem that, even with fast heuristics, is too time consuming for large, clinically important networks (20--50 nodes). In this

Michael D. Linderman; Robert Bruggner; Vivek Athalye; Teresa H. Y. Meng; Narges Bani Asadi; Garry P. Nolan

2010-01-01

180

Secure routing and trust computation in multihop infrastructureless networks  

Microsoft Academic Search

Today's wireless networks rely mostly on infrastructural support for their operation. With the concept of ubiquitous computing growing more popular, research on infrastructureless networks have been rapidly growing. However, such types of networks face serious security challenges when deployed. This dissertation focuses on designing a secure routing solution and trust modeling for these infrastructureless networks. ^ The dissertation presents a

Tirthankar Ghosh

2005-01-01

181

Measuring Computer Science Knowledge Level of Hungarian Students Specialized in Informatics with Romanian Students Attending a Science Course or a Mathematics-Informatics Course  

ERIC Educational Resources Information Center

An analysis of Information Technology knowledge of Hungarian and Romanian students was made with the help of a self developed web based Informatics Test. The goal of this research is an analysis of the Computer Science knowledge level of Hungarian and Romanian students attending a Science course or a Mathematics-Informatics course. Analysed was…

Kiss, Gabor

2012-01-01

182

Design of a Competitive and Collaborative Learning Strategy in a Communication Networks Course  

ERIC Educational Resources Information Center

In this paper, an educational methodology based on collaborative and competitive learning is proposed. The suggested approach has been successfully applied to an undergraduate communication networks course, which is part of the core curriculum of the three-year degree in telecommunications engineering at the University of Valladolid in Spain. This…

Regueras, L. M.; Verdu, E.; Verdu, M. J.; de Castro, J. P.

2011-01-01

183

Culture, Role and Group Work: A Social Network Analysis Perspective on an Online Collaborative Course  

ERIC Educational Resources Information Center

This paper discusses the patterns of network dynamics within a multicultural online collaborative learning environment. It analyses the interaction of participants (both students and facilitators) within a discussion board that was established as part of a 3-month online collaborative course. The study employs longitudinal probabilistic social…

Stepanyan, Karen; Mather, Richard; Dalrymple, Roger

2014-01-01

184

Email networks and the spread of computer viruses  

Microsoft Academic Search

Many computer viruses spread via electronic mail, making use of computer users'email address books as a source for email addresses of new victims. These address books form a directed social network of connections between individuals over which the virus spreads. Here we investigate empirically the structure of this network using data drawn from a large computer installation, and discuss the

M. E. J. Newman; Stephanie Forrest; Justin Balthrop

2002-01-01

185

Computational Neuropsychiatry - Schizophrenia as a Cognitive Brain Network Disorder  

E-print Network

Computational modeling of functional brain networks in fMRI data has advanced the understanding of higher cognitive function. It is hypothesized that functional networks mediating higher cognitive processes are disrupted ...

Dauvermann, Maria R.

186

A Short Course in Computational Science and Engineering  

NASA Astrophysics Data System (ADS)

1. Introduction; 2. Octave programming; 3. Installing and running the Dev-C++ programming environment; 4. Introduction to computer and software architecture; 5. Fundamental concepts; 6. Procedural programming basics; 7. An introduction to object-oriented analysis; 8. C++ object-oriented programming syntax; 9. Arrays and matrices; 10. Input and output stream; 11. References; 12. Pointers and dynamic memory allocation; 13. Memory management; 14. The static keyword, multiple and virtual inheritance, templates and the STL library; 15. Creating a Java development environment; 16. Basic Java programming constructs; 17. Java classes and objects; 18. Advanced Java features; 19. Introductory numerical analysis; 20. Linear algebra; 21. Fourier transforms; 22. Differential equations; 23. Monte-Carlo methods; 24. Parabolic partial differential equation solvers; Index.

Yevick, David

2012-05-01

187

Some queuing network models of computer systems  

NASA Technical Reports Server (NTRS)

Queuing network models of a computer system operating with a single workload type are presented. Program algorithms are adapted for use on the Texas Instruments SR-52 programmable calculator. By slightly altering the algorithm to process the G and H matrices row by row instead of column by column, six devices and an unlimited job/terminal population could be handled on the SR-52. Techniques are also introduced for handling a simple load dependent server and for studying interactive systems with fixed multiprogramming limits.

Herndon, E. S.

1980-01-01

188

MIT OpenCourseWare: Introduction to Computer Science and Programming  

NSDL National Science Digital Library

For those individuals who have yet to experience one of MIT's OpenCourseWare offerings, this is a great place to start. This site provides access to the spring 2011 version of Professor John Guttag's popular "Introduction to Computer Science and Programming." This course is aimed at students with "little or no programming experience," and its goal is to help students feel "justifiably confident of their ability to write small programs that allow them to accomplish useful goals." The materials here include a complete set of lecture videos, resources for each video (such as handouts and slides), recitation videos by the course teaching assistants, and homework problems with sample student solutions. The site also includes self-assessment tools and a Further Study area, which includes collection of links to supplement the course materials.

Guttag, John

2012-05-25

189

Examining the Impact of Teacher-Generated Feedback in Online Math Courses Where Computer-Assisted Instruction Is Embedded  

ERIC Educational Resources Information Center

Teacher feedback and interaction are factors of success and satisfaction in online courses, but courses designed for computer-assisted instruction (CAI) require less communication between a teacher and student. The goal of this research was to examine the impact of teachers' feedback in online self-paced secondary math courses where CAI was…

Hoey, Rebecca Simon

2012-01-01

190

TimeXNet: Identifying active gene sub-networks using time-course gene expression profiles  

PubMed Central

Background Time-course gene expression profiles are frequently used to provide insight into the changes in cellular state over time and to infer the molecular pathways involved. When combined with large-scale molecular interaction networks, such data can provide information about the dynamics of cellular response to stimulus. However, few tools are currently available to predict a single active gene sub-network from time-course gene expression profiles. Results We introduce a tool, TimeXNet, which identifies active gene sub-networks with temporal paths using time-course gene expression profiles in the context of a weighted gene regulatory and protein-protein interaction network. TimeXNet uses a specialized form of the network flow optimization approach to identify the most probable paths connecting the genes with significant changes in expression at consecutive time intervals. TimeXNet has been extensively evaluated for its ability to predict novel regulators and their associated pathways within active gene sub-networks in the mouse innate immune response and the yeast osmotic stress response. Compared to other similar methods, TimeXNet identified up to 50% more novel regulators from independent experimental datasets. It predicted paths within a greater number of known pathways with longer overlaps (up to 7 consecutive edges) within these pathways. TimeXNet was also shown to be robust in the presence of varying amounts of noise in the molecular interaction network. Conclusions TimeXNet is a reliable tool that can be used to study cellular response to stimuli through the identification of time-dependent active gene sub-networks in diverse biological systems. It is significantly better than other similar tools. TimeXNet is implemented in Java as a stand-alone application and supported on Linux, MS Windows and Macintosh. The output of TimeXNet can be directly viewed in Cytoscape. TimeXNet is freely available for non-commercial users. PMID:25522063

2014-01-01

191

Deterministic Function Computation with Chemical Reaction Networks*  

PubMed Central

Chemical reaction networks (CRNs) formally model chemistry in a well-mixed solution. CRNs are widely used to describe information processing occurring in natural cellular regulatory networks, and with upcoming advances in synthetic biology, CRNs are a promising language for the design of artificial molecular control circuitry. Nonetheless, despite the widespread use of CRNs in the natural sciences, the range of computational behaviors exhibited by CRNs is not well understood. CRNs have been shown to be efficiently Turing-universal (i.e., able to simulate arbitrary algorithms) when allowing for a small probability of error. CRNs that are guaranteed to converge on a correct answer, on the other hand, have been shown to decide only the semilinear predicates (a multi-dimensional generalization of “eventually periodic” sets). We introduce the notion of function, rather than predicate, computation by representing the output of a function f : ?k ? ?l by a count of some molecular species, i.e., if the CRN starts with x1, …, xk molecules of some “input” species X1, …, Xk, the CRN is guaranteed to converge to having f(x1, …, xk) molecules of the “output” species Y1, …, Yl. We show that a function f : ?k ? ?l is deterministically computed by a CRN if and only if its graph {(x, y) ? ?k × ?l ? f(x) = y} is a semilinear set. Finally, we show that each semilinear function f (a function whose graph is a semilinear set) can be computed by a CRN on input x in expected time O(polylog ?x?1). PMID:25383068

Chen, Ho-Lin; Doty, David; Soloveichik, David

2013-01-01

192

Active and Collaborative Learning in an Introductory Electrical and Computer Engineering Course  

ERIC Educational Resources Information Center

Active and collaborative learning instruments were introduced into an introductory electrical and computer engineering course. These instruments were designed to assess specific learning objectives and program outcomes. Results show that students developed an understanding comparable to that of more advanced students assessed later in the…

Kotru, Sushma; Burkett, Susan L.; Jackson, David Jeff

2010-01-01

193

Effects of Multidimensional Concept Maps on Fourth Graders' Learning in Web-Based Computer Course  

ERIC Educational Resources Information Center

This study explores the effect of multidimensional concept mapping instruction on students' learning performance in a web-based computer course. The subjects consisted of 103 fourth graders from an elementary school in central Taiwan. They were divided into three groups: multidimensional concept map (MCM) instruction group, Novak concept map (NCM)…

Huang, Hwa-Shan; Chiou, Chei-Chang; Chiang, Heien-Kun; Lai, Sung-Hsi; Huang, Chiun-Yen; Chou, Yin-Yu

2012-01-01

194

Maintaining Pedagogical Integrity of a Computer Mediated Course Delivery in Social Foundations  

ERIC Educational Resources Information Center

Transforming a face to face course to a computer mediated format in social foundations (interdisciplinary field in education), while maintaining pedagogical integrity, involves strategic collaboration between instructional technologists and content area experts. This type of planned partnership requires open dialogue and a mutual respect for prior…

Stewart, Shelley; Cobb-Roberts, Deirdre; Shircliffe, Barbara J.

2013-01-01

195

Adventures with a Compulsory Computer Literacy Course in the Practicum Year.  

ERIC Educational Resources Information Center

This paper describes the problems and successes associated with the introduction of a compulsory computer literacy course to approximately 600 professional year students in the Faculty of Education Department at the University of Calgary (Alberta, Canada) during the fall 1984 and spring 1985 semesters. The events leading up to the introduction of…

Black, Donald B.

196

Success in Institutionalizing Basic Computer Skills Courses at a Community College Level.  

ERIC Educational Resources Information Center

This article outlines the development of basic computer literacy skills courses under the auspices of the Title III Grant awarded to San Jose City College (SJCC) of San Jose, California by the United States Department of Education (Grant no. PO31A980093, Strengthening Institutions, 1998-2003). The grant has been in effect for 3 years, and grant…

Dodge, Lucy

197

Agents and the Semantic Web PhD Course of the Computer  

E-print Network

Agents and the Semantic Web PhD Course of the Computer Science and Engineering Program, DIBRIS, University of Genova (Slide from http://www.urenio.org/2011/11/17/semantic-web-for-smart-cities/) Instructors: According to the seminal work of Berners-Lee, Hendler and Lassila (2001) "The Semantic Web is not a separate

Robbiano, Lorenzo

198

Computer Simulation of the Alonso Household Location Model in the Microeconomics Course  

ERIC Educational Resources Information Center

Computer simulation of the Alonso household location model can enrich the intermediate microeconomics course. The model includes decisions on location, land space, and other goods and is a valuable complement to the usual textbook model of household consumption. It has three decision variables, one of which is a "bad," and one good's price is a…

Bolton, Roger E.

2005-01-01

199

Integration of Major Computer Program Packages into Experimental Courses: A Freshman Experience.  

ERIC Educational Resources Information Center

Describes the use of the Gaussian 70 computer programs to carry out quantum chemical calculations, including single calculations, geometry, optimization, and potential surface scans. Includes a summary of student activities and benefits for students in an honors freshman chemistry course. (SK)

Lipschitz, Irving

1981-01-01

200

Enhancing Learning in Introductory Computer Science Courses through SCALE: An Empirical Study  

ERIC Educational Resources Information Center

The work presented in this paper aims to support and promote the learning process in introductory computer science courses through the Web-based, adaptive, activity-oriented learning environment known as Supporting Collaboration and Adaptation in a Learning Environment (SCALE). The environment engages students actively in the learning process and…

Verginis, I.; Gogoulou, A.; Gouli, E.; Boubouka, M.; Grigoriadou, M.

2011-01-01

201

Development of Online Cognitive and Algorithm Tests as Assessment Tools in Introductory Computer Science Courses  

ERIC Educational Resources Information Center

This paper presents the online cognitive and algorithm tests, which were developed in order to determine if certain cognitive factors and fundamental algorithms correlate with the performance of students in their introductory computer science course. The tests were implemented among Management Information Systems majors from the Philippines and…

Avancena, Aimee Theresa; Nishihara, Akinori; Vergara, John Paul

2012-01-01

202

Developing and Validating Test Items for First-Year Computer Science Courses  

ERIC Educational Resources Information Center

We report on the development, validation, and implementation of a collection of test items designed to detect misconceptions related to first-year computer science courses. To this end, we reworked the development scheme proposed by Almstrum et al. ("SIGCSE Bulletin" 38(4):132-145, 2006) to include students' artifacts and to…

Vahrenhold, Jan; Paul, Wolfgang

2014-01-01

203

Exploring Interactive and Dynamic Simulations Using a Computer Algebra System in an Advanced Placement Chemistry Course  

ERIC Educational Resources Information Center

The article describes the use of Mathematica, a computer algebra system (CAS), in a high school chemistry course. Mathematica was used to generate a graph, where a slider controls the value of parameter(s) in the equation; thus, students can visualize the effect of the parameter(s) on the behavior of the system. Also, Mathematica can show the…

Matsumoto, Paul S.

2014-01-01

204

An Integrated, Cooperative Learning Oriented Freshman Civil Engineering Course: Computer Analysis in Civil Engineering.  

ERIC Educational Resources Information Center

Worcester Polytechnic Institute (Massachusetts) has developed a new freshman course titled "Computer Analysis in Civil Engineering" as part of a curriculum revision project which emphasizes critical thinking, cooperative group learning and problem solving, the integration of knowledge through projects, and student responsibility for learning. The…

Hart, Frederick L.; Groccia, James E.

205

WebStars: Holistic, Arts-Based College Curriculum in a Computer Applications Course  

ERIC Educational Resources Information Center

The purpose of my qualitative, action study was to gain a better understanding of the effects of an experimental college course in computer applications. This inquiry was made concerning both the teacher's and learners' points of view. A holistic, arts-based approach was used by the researcher/teacher in order to design, develop and facilitate a…

Karsten, Selia

2004-01-01

206

Visualization Techniques for Computer Network Defense  

SciTech Connect

Effective visual analysis of computer network defense (CND) information is challenging due to the volume and complexity of both the raw and analyzed network data. A typical CND is comprised of multiple niche intrusion detection tools, each of which performs network data analysis and produces a unique alerting output. The state-of-the-practice in the situational awareness of CND data is the prevalent use of custom-developed scripts by Information Technology (IT) professionals to retrieve, organize, and understand potential threat events. We propose a new visual analytics framework, called the Oak Ridge Cyber Analytics (ORCA) system, for CND data that allows an operator to interact with all detection tool outputs simultaneously. Aggregated alert events are presented in multiple coordinated views with timeline, cluster, and swarm model analysis displays. These displays are complemented with both supervised and semi-supervised machine learning classifiers. The intent of the visual analytics framework is to improve CND situational awareness, to enable an analyst to quickly navigate and analyze thousands of detected events, and to combine sophisticated data analysis techniques with interactive visualization such that patterns of anomalous activities may be more easily identified and investigated.

Beaver, Justin M [ORNL; Steed, Chad A [ORNL; Patton, Robert M [ORNL; Cui, Xiaohui [ORNL; Schultz, Matthew A [ORNL

2011-01-01

207

Cloud Computing Services for Seismic Networks  

NASA Astrophysics Data System (ADS)

This thesis describes a compositional framework for developing situation awareness applications: applications that provide ongoing information about a user's changing environment. The thesis describes how the framework is used to develop a situation awareness application for earthquakes. The applications are implemented as Cloud computing services connected to sensors and actuators. The architecture and design of the Cloud services are described and measurements of performance metrics are provided. The thesis includes results of experiments on earthquake monitoring conducted over a year. The applications developed by the framework are (1) the CSN---the Community Seismic Network---which uses relatively low-cost sensors deployed by members of the community, and (2) SAF---the Situation Awareness Framework---which integrates data from multiple sources, including the CSN, CISN---the California Integrated Seismic Network, a network consisting of high-quality seismometers deployed carefully by professionals in the CISN organization and spread across Southern California---and prototypes of multi-sensor platforms that include carbon monoxide, methane, dust and radiation sensors.

Olson, Michael

208

Visualization techniques for computer network defense  

NASA Astrophysics Data System (ADS)

Effective visual analysis of computer network defense (CND) information is challenging due to the volume and complexity of both the raw and analyzed network data. A typical CND is comprised of multiple niche intrusion detection tools, each of which performs network data analysis and produces a unique alerting output. The state-of-the-practice in the situational awareness of CND data is the prevalent use of custom-developed scripts by Information Technology (IT) professionals to retrieve, organize, and understand potential threat events. We propose a new visual analytics framework, called the Oak Ridge Cyber Analytics (ORCA) system, for CND data that allows an operator to interact with all detection tool outputs simultaneously. Aggregated alert events are presented in multiple coordinated views with timeline, cluster, and swarm model analysis displays. These displays are complemented with both supervised and semi-supervised machine learning classifiers. The intent of the visual analytics framework is to improve CND situational awareness, to enable an analyst to quickly navigate and analyze thousands of detected events, and to combine sophisticated data analysis techniques with interactive visualization such that patterns of anomalous activities may be more easily identified and investigated.

Beaver, Justin M.; Steed, Chad A.; Patton, Robert M.; Cui, Xiaohui; Schultz, Matthew

2011-06-01

209

Quantum computation over the butterfly network  

E-print Network

In order to investigate distributed quantum computation under restricted network resources, we introduce a quantum computation task over the butterfly network where both quantum and classical communications are limited. We consider deterministically performing a two-qubit global unitary operation on two unknown inputs given at different nodes, with outputs at two distinct nodes. By using a particular resource setting introduced by M. Hayashi [Phys. Rev. A \\textbf{76}, 040301(R) (2007)], which is capable of performing a swap operation by adding two maximally entangled qubits (ebits) between the two input nodes, we show that unitary operations can be performed without adding any entanglement resource, if and only if the unitary operations are locally unitary equivalent to controlled unitary operations. Our protocol is optimal in the sense that the unitary operations cannot be implemented if we relax the specifications of any of the channels. We also construct protocols for performing controlled traceless unitary operations with a 1-ebit resource and for performing global Clifford operations with a 2-ebit resource.

Akihito Soeda; Yoshiyuki Kinjo; Peter S. Turner; Mio Murao

2011-07-14

210

Network-Aware Partitioning of Computation in Diamond  

E-print Network

Network-Aware Partitioning of Computation in Diamond Alex Nizhner1 Larry Huston2 Peter Steenkiste Pittsburgh, PA 15213 Abstract The Diamond storage architecture enables efficient interactive search efficient use of resources under dynamic conditions, Diamond adaptively partitions computation among

211

A One-Credit Hands-On Introductory Course in Electrical and Computer Engineering Using a Variety of Topic Modules  

ERIC Educational Resources Information Center

This paper describes a one-credit laboratory course for freshmen majoring in electrical and computer engineering (ECE). The course is motivational in nature and exposes the students to a wide range of areas of electrical and computer engineering. The authors believe it is important to give freshmen a broad perspective of what ECE is all about, and…

Pierre, J. W.; Tuffner, F. K.; Anderson, J. R.; Whitman, D. L.; Ula, A. H. M. S.; Kubichek, R. F.; Wright, C. H. G.; Barrett, S. F.; Cupal, J. J.; Hamann, J. C.

2009-01-01

212

Design and Development of a Sample "Computer Programming" Course Tool via Story-Based E-Learning Approach  

ERIC Educational Resources Information Center

This study introduces a story-based e-learning oriented course tool that was designed and developed for using within "computer programming" courses. With this tool, students can easily adapt themselves to the subjects in the context of computer programming principles, thanks to the story-based, interactive processes. By using visually…

Kose, Utku; Koc, Durmus; Yucesoy, Suleyman Anil

2013-01-01

213

The Use of a PDP-11/20 Computer in a Non-Calculus General Physics Course.  

ERIC Educational Resources Information Center

Computer-assisted instruction supplements traditional methods in a non-calculus physics course offered at Seattle Pacific College. Thirty-five science majors enrolled in the first quarter and 32 continued in the second term. The hardware for the course consists of a PDP-11/20 computer and eight teletype terminals; additional peripheral equipment…

Yu, David U. L.

214

Efficiently modeling neural networks on massively parallel computers  

NASA Technical Reports Server (NTRS)

Neural networks are a very useful tool for analyzing and modeling complex real world systems. Applying neural network simulations to real world problems generally involves large amounts of data and massive amounts of computation. To efficiently handle the computational requirements of large problems, we have implemented at Los Alamos a highly efficient neural network compiler for serial computers, vector computers, vector parallel computers, and fine grain SIMD computers such as the CM-2 connection machine. This paper describes the mapping used by the compiler to implement feed-forward backpropagation neural networks for a SIMD (Single Instruction Multiple Data) architecture parallel computer. Thinking Machines Corporation has benchmarked our code at 1.3 billion interconnects per second (approximately 3 gigaflops) on a 64,000 processor CM-2 connection machine (Singer 1990). This mapping is applicable to other SIMD computers and can be implemented on MIMD computers such as the CM-5 connection machine. Our mapping has virtually no communications overhead with the exception of the communications required for a global summation across the processors (which has a sub-linear runtime growth on the order of O(log(number of processors)). We can efficiently model very large neural networks which have many neurons and interconnects and our mapping can extend to arbitrarily large networks (within memory limitations) by merging the memory space of separate processors with fast adjacent processor interprocessor communications. This paper will consider the simulation of only feed forward neural network although this method is extendable to recurrent networks.

Farber, Robert M.

1993-01-01

215

ComputerEngineering4DK4 Computer Communication Networks  

E-print Network

in cellular networks, wireless media access, hidden and exposed CSMA stations, IEEE 802.11 wireless LAN standard LANs, CSMA/CD, Ethernet, capacity limitations, token ring networks, performance of ring networks

Haykin, Simon

216

Interactive knowledge networks for interdisciplinary course navigation within Moodle  

NSDL National Science Digital Library

Web-based hypermedia learning environments are widely used in modern education and seem particularly well suited for interdisciplinary learning. Previous work has identified guidance through these complex environments as a crucial problem of their acceptance and efficiency. We reasoned that map-based navigation might provide straightforward and effortless orientation. To achieve this, we developed a clickable and user-oriented concept map-based navigation plugin. This tool is implemented as an extension of Moodle, a widely used learning management system. It visualizes inner and interdisciplinary relations between learning objects and is generated dynamically depending on user set parameters and interactions. This plugin leaves the choice of navigation type to the user and supports direct guidance. Previously developed and evaluated face-to-face interdisciplinary learning materials bridging physiology and physics courses of a medical curriculum were integrated as learning objects, the relations of which were defined by metadata. Learning objects included text pages, self-assessments, videos, animations, and simulations. In a field study, we analyzed the effects of this learning environment on physiology and physics knowledge as well as the transfer ability of third-term medical students. Data were generated from pre- and posttest questionnaires and from tracking student navigation. Use of the hypermedia environment resulted in a significant increase of knowledge and transfer capability. Furthermore, the efficiency of learning was enhanced. We conclude that hypermedia environments based on Moodle and enriched by concept map-based navigation tools can significantly support interdisciplinary learning. Implementation of adaptivity may further strengthen this approach.

Peter M Thule (Emory University/Atlanta VA Medical Center); Kathrin Dethleffsen (Ludwig-Maximilians-Universität); Michael Meyer (Ludwig-Maximilians-Universität)

2012-12-01

217

Network Patch Cables Demystified: A Super Activity for Computer Networking Technology  

ERIC Educational Resources Information Center

This article de-mystifies network patch cable secrets so that people can connect their computers and transfer those pesky files--without screaming at the cables. It describes a network cabling activity that can offer students a great hands-on opportunity for working with the tools, techniques, and media used in computer networking. Since the…

Brown, Douglas L.

2004-01-01

218

SNAP: A computer program for generating symbolic network functions  

NASA Technical Reports Server (NTRS)

The computer program SNAP (symbolic network analysis program) generates symbolic network functions for networks containing R, L, and C type elements and all four types of controlled sources. The program is efficient with respect to program storage and execution time. A discussion of the basic algorithms is presented, together with user's and programmer's guides.

Lin, P. M.; Alderson, G. E.

1970-01-01

219

Exploring utilization of visualization for computer and network security  

Microsoft Academic Search

The role of the network security administrator is continually morphing to keep pace with the ever-changing area of computer and network security. These changes are due in part to both the continual development of new security exploits by attackers as well as improvements in network security products available for use. One area which has garnered much research in the past

Andy Luse

2009-01-01

220

Reservoir Computing Approaches to Recurrent Neural Network Training Mantas Lukosevicius  

E-print Network

Reservoir Computing Approaches to Recurrent Neural Network Training Mantas Lukosevicius , Herbert recurrent neural network (RNN) training, where an RNN (the reservoir) is generated randomly and only a readout is trained. The paradigm, becoming known as reservoir computing, greatly facilitated the practical

221

Computer-Based Semantic Network in Molecular Biology: A Demonstration.  

ERIC Educational Resources Information Center

This paper analyzes the hardware and software features that would be desirable in a computer-based semantic network system for representing biology knowledge. It then describes in detail a prototype network of molecular biology knowledge that has been developed using Filevision software and a Macintosh computer. The prototype contains about 100…

Callman, Joshua L.; And Others

222

Empirical Study of Topology Effects on Diagnosis in Computer Networks  

Microsoft Academic Search

In this paper, we compare the efficiency of fault detection and diagnosis in networks having different topological properties, such as scale-free networks and Erdos-Renyi random graphs. Efficiency measures include both the number of tests (e.g., end-to-end network probes) necessary for diagnosis and the computational complexity of diagnosis. We observe that diagnosis in scale-free networks typically requires significantly larger number of

Natalia Odintsova; Irina Rish

2007-01-01

223

Fibernet: Multimode Optical Fibers for Local Computer Networks  

Microsoft Academic Search

Local computer networks which communicate over copper conductors have been developed both to promote resource sharing and provide increased performance. Such networks typically operate at bandwidth-length (Bw circ L) products up to a fewMHz circ km. In this paper we consider the use of fiber optics in such networks, and give a status report on a star-configured fiber optic network

ERIC G. RAWSON; ROBERT M. METCALFE

1978-01-01

224

Theory VI. Computational Materials Sciences Network (CMSN)  

SciTech Connect

The Computational Materials Sciences Network (CMSN) is a virtual center consisting of scientists interested in working together, across organizational and disciplinary boundaries, to formulate and pursue projects that reflect challenging and relevant computational research in the materials sciences. The projects appropriate for this center involve those problems best pursued through broad cooperative efforts, rather than those key problems best tackled by single investigator groups. CMSN operates similarly to the DOE Center of Excellence for the Synthesis and Processing of Advanced Materials, coordinated by George Samara at Sandia. As in the Synthesis and Processing Center, the intent of the modest funding for CMSN is to foster partnering and collective activities. All CMSN proposals undergo external peer review and are judged foremost on the quality and timeliness of the science and also on criteria relevant to the objective of the center, especially concerning a strategy for partnering. More details about CMSN can be found on the CMSN webpages at: http://cmpweb.ameslab.gov/ccms/CMSN-homepage.html.

Zhang, Z Y

2008-06-25

225

Multidetector computed tomography findings of an asymptomatic levoatrial cardinal vein with an interatrial course.  

PubMed

A 57-year-old female patient with a family history of coronary artery disease admitted to our hospital for the coronary check-up. A coronary angiography was performed with ECG-gated 128 slice dual source computed tomography.Multidetector computed tomography (MDCT) showed, in addition to the normal coronary arteries, a persistent levoatrial cardinal vein (LCV) draining into vena cava superior. ECG-gated cardiac MDCT is a useful tool showing the origin, course, and drainage site of LCV. PMID:24068692

Genç, B; Solak, A; Sahin, N; Gür, S; Oztürk, A; Kalayc?o?lu, S

2013-08-01

226

The one-way quantum computer--a non-network model of quantum computation  

Microsoft Academic Search

A one-way quantum computer works by only performing a sequence of one-qubit measurements on a particular entangled multi-qubit state, the cluster state. No non-local operations are required in the process of computation. Any quantum logic network can be simulated on the one-way quantum computer. On the other hand, the network model of quantum computation cannot explain all ways of processing

Robert Raussendorf; Daniel E. Browne; Hans J. Briegel

2002-01-01

227

A Novel College Network Resource Management Method using Cloud Computing  

NASA Astrophysics Data System (ADS)

At present information construction of college mainly has construction of college networks and management information system; there are many problems during the process of information. Cloud computing is development of distributed processing, parallel processing and grid computing, which make data stored on the cloud, make software and services placed in the cloud and build on top of various standards and protocols, you can get it through all kinds of equipments. This article introduces cloud computing and function of cloud computing, then analyzes the exiting problems of college network resource management, the cloud computing technology and methods are applied in the construction of college information sharing platform.

Lin, Chen

228

Syntactic Computations in the Language Network: Characterizing Dynamic Network Properties Using Representational Similarity Analysis  

PubMed Central

The core human capacity of syntactic analysis involves a left hemisphere network involving left inferior frontal gyrus (LIFG) and posterior middle temporal gyrus (LMTG) and the anatomical connections between them. Here we use magnetoencephalography (MEG) to determine the spatio-temporal properties of syntactic computations in this network. Listeners heard spoken sentences containing a local syntactic ambiguity (e.g., “… landing planes …”), at the offset of which they heard a disambiguating verb and decided whether it was an acceptable/unacceptable continuation of the sentence. We charted the time-course of processing and resolving syntactic ambiguity by measuring MEG responses from the onset of each word in the ambiguous phrase and the disambiguating word. We used representational similarity analysis (RSA) to characterize syntactic information represented in the LIFG and left posterior middle temporal gyrus (LpMTG) over time and to investigate their relationship to each other. Testing a variety of lexico-syntactic and ambiguity models against the MEG data, our results suggest early lexico-syntactic responses in the LpMTG and later effects of ambiguity in the LIFG, pointing to a clear differentiation in the functional roles of these two regions. Our results suggest the LpMTG represents and transmits lexical information to the LIFG, which responds to and resolves the ambiguity. PMID:23730293

Tyler, Lorraine K.; Cheung, Teresa P. L.; Devereux, Barry J.; Clarke, Alex

2013-01-01

229

Using high-performance networks to enable computational aerosciences applications  

NASA Technical Reports Server (NTRS)

One component of the U.S. Federal High Performance Computing and Communications Program (HPCCP) is the establishment of a gigabit network to provide a communications infrastructure for researchers across the nation. This gigabit network will provide new services and capabilities, in addition to increased bandwidth, to enable future applications. An understanding of these applications is necessary to guide the development of the gigabit network and other high-performance networks of the future. In this paper we focus on computational aerosciences applications run remotely using the Numerical Aerodynamic Simulation (NAS) facility located at NASA Ames Research Center. We characterize these applications in terms of network-related parameters and relate user experiences that reveal limitations imposed by the current wide-area networking infrastructure. Then we investigate how the development of a nationwide gigabit network would enable users of the NAS facility to work in new, more productive ways.

Johnson, Marjory J.

1992-01-01

230

Secure Multi-Party Computation for statistical computations using virtual parties on a Token Ring Network  

Microsoft Academic Search

A novel Secure Multi-party Computation protocol for statistical computations has been proposed and implemented in this work. The described protocol is an enhanced version of our previous proposal of virtual party protocol. Here the system is implemented using a Token Ring Network. Secure Multi-party Computation is classically defined as a system in which computation which involves data from a number

D. K. Mishra; Rohit Pathak; Satyadhar Joshi; A. Ludhiyani

2010-01-01

231

Application of Artificial Neural Networks Techniques to Computer Worm Detection  

Microsoft Academic Search

Detecting computer worms is a highly challenging task. Commonly this task is performed by antivirus software tools that rely on prior explicit knowledge of the worm's code, which is represented by signatures. We present a new approach based on Artificial Neural Networks (ANN) for detecting the presence of computer worms based on the computer's behavioral measures. In order to evaluate

Dima Stopel; Zvi Boger; Robert Moskovitch; Yuval Shahar; Yuval Elovici

2006-01-01

232

Learning a Distance Metric from a Network: Computer Science Dept.  

E-print Network

@cs.columbia.edu Tony Jebara Computer Science Dept. Columbia University jebara@cs.columbia.edu A Degree DistributionalLearning a Distance Metric from a Network: Appendix Blake Shaw Computer Science Dept. Columbia University blake@cs.columbia.edu Bert Huang Computer Science Dept. Columbia University bert

Huang, Bert

233

The one-way quantum computer - a non-network model of quantum computation  

E-print Network

A one-way quantum computer works by only performing a sequence of one-qubit measurements on a particular entangled multi-qubit state, the cluster state. No non-local operations are required in the process of computation. Any quantum logic network can be simulated on the one-way quantum computer. On the other hand, the network model of quantum computation cannot explain all ways of processing quantum information possible with the one-way quantum computer. In this paper, two examples of the non-network character of the one-way quantum computer are given. First, circuits in the Clifford group can be performed in a single time step. Second, the realisation of a particular circuit --the bit-reversal gate-- on the one-way quantum computer has no network interpretation. (Submitted to J. Mod. Opt, Gdansk ESF QIT conference issue.)

Raussendorf, R; Briegel, H J; Raussendorf, Robert; Browne, Daniel E.; Briegel, Hans J.

2001-01-01

234

Computational Verb Cellular Networks: Part II-One-Dimensional Computational Verb Local  

Microsoft Academic Search

Computational verb cellular networks (CVCNs) are a new kind of cellular computational platform where the local rules are computational verb rules. In a sister paper(60) 2D CVCNs were studied. In this paper, 1D CVCNs with 1D computational verb local rules are studied. The bifurcations of patterns in 1D CVCNs with computational verb local rules consisting of two computational verbs decrease

2009-01-01

235

Teaching the cloud - experiences in designing and teaching an undergraduate-level course in cloud computing at the Carnegie Mellon University in Qatar  

Microsoft Academic Search

Cloud computing is a disruptive technology, one that embodies a major conceptual shift and is rapidly changing the way users, developers, and organizations work with computing infrastructure. Carnegie Mellon University in Qatar offered a one-semester undergraduate course to introduce students to cloud computing. In this paper we describe our approach and experiences in designing the course. We describe course elements

M. Suhail Rehman; Majd F. Sakr

2011-01-01

236

162 Electrical and Computer Engineering 163 Courses and projects that actively involve them in their own education and  

E-print Network

162 Electrical and Computer Engineering 163 · Courses and projects that actively involve them · A broad education outside of engineering and science that emphasizes the role of electrical and computer of technology Graduate and undergraduate programs in electrical and computer engineering offer concentrations

Richards-Kortum, Rebecca

237

Is It Ethical for Patents to Be Issued for the Computer Algorithms that Affect Course Management Systems for Distance Learning?  

ERIC Educational Resources Information Center

This article discusses the impact of patents for computer algorithms in course management systems. Referring to historical documents and court cases, the positive and negative aspects of software patents are presented. The key argument is the accessibility to algorithms comprising a course management software program such as Blackboard. The…

Moreau, Nancy

2008-01-01

238

A Framework for Measuring Student Learning Gains and Engagement in an Introductory Computing Course: A Preliminary Report of Findings  

ERIC Educational Resources Information Center

This paper describes a framework for measuring student learning gains and engagement in a Computer Science 1 (CS 1) / Information Systems 1 (IS 1) course. The framework is designed for a CS1/IS1 course as it has been traditionally taught over the years as well as when it is taught using a new pedagogical approach with Web services. It enables the…

Lim, Billy; Hosack, Bryan; Vogt, Paul

2012-01-01

239

COMPUTER NETWORKS ECE Department, University of Toronto  

E-print Network

capacity compared to 2010. Video: By 2018, the fast majority (90%) of traffic will be Video video web New Types of Networks: Data center networks, software defined networks, Terabit Ethernet, Low latency Ethernet and Wi-Fi Labs: Client-server Socket Programming, File Transfer, Actual Traffic Measurement

Prodiæ, Aleksandar

240

Mobile Computing/Mobile Computing/Mobile Computing/Mobile Computing/ Mobile NetworksMobile NetworksMobile NetworksMobile Networks  

E-print Network

Mobile NetworksMobile Networks Mobile IP Prof. Chansu Yu 2 Contents IP for Wired Network Mobile IP Overview Basic Mobile IP Agent Discovery Registration Tunneling Route Optimization Current Topics #12;3 Simplified CDMA,... Mobile IP Mobile TCP 4 Simplified Reference Model... Location/context-sensitive services

Yu, Chansu

241

ELEC3030 (EL336) Computer Networks S Chen How Networks Differ  

E-print Network

minor protocol translation, e.g. Ethernet to 802.11 ­ Multiprotocol router at network layer: operate to Internet Switch Mainframe Router 802.11 Notebook computer FDDI ring SNA network ATM network ­ Transport on packets, translate between different packet formats, possibly split up packets Ethernet Connection

Chen, Sheng

242

On the Chronometry and Metrology of Computer Network Timescales and their Application to the Network Time  

E-print Network

On the Chronometry and Metrology of Computer Network Timescales and their Application, and on calendar metrology, which is the determination of conventional civil time and date according to the modern. Reprinted from: Mills, D.L. On the chronology and metrology of computer network timescales and thei

Mills, David L.

243

On the Chronometry and Metrology of Computer Network Timescales and their Application to the Network Time  

E-print Network

On the Chronometry and Metrology of Computer Network Timescales and their Application, and on calendar metrology, which is the determination of conventional civiltimeand date according to the modern, D.L. On the chronology and metrology of computer network timescales and their application

Mills, David L.

244

The Effect of Prior Experience with Computers, Statistical Self-Efficacy, and Computer Anxiety on Students' Achievement in an Introductory Statistics Course: A Partial Least Squares Path Analysis  

ERIC Educational Resources Information Center

A Partial Least Squares Path Analysis technique was used to test the effect of students' prior experience with computers, statistical self-efficacy, and computer anxiety on their achievement in an introductory statistics course. Computer Anxiety Rating Scale and Current Statistics Self-Efficacy Scale were administered to a sample of 64 first-year…

Abd-El-Fattah, Sabry M.

2005-01-01

245

Computers, Electronic Networking and Education: Some American Experiences.  

ERIC Educational Resources Information Center

Describes new developments in distributed educational computing at Massachusetts Institute of Technology (MIT, "Athena"), Carnegie Mellon University ("Andrew"), Brown University "Intermedia"), Electronic University Network (California), Western Behavioral Sciences Institute (California), and University of California, Irvine. Topics discussed…

McConnell, David

1991-01-01

246

The one-way quantum computer--a non-network model of quantum computation  

Microsoft Academic Search

A one-way quantum computer (QCC) works by performing a sequence of one-qubit measurements on a particular entangled multi-qubit state, the cluster state. No non-local operations are required in the process of computation. Any quantum logic network can be simulated on the QCC. On the other hand, the network model of quantum computation cannot explain all ways of processing quantum information

Robert Raussendorf; Daniel E. Browne; Hans J. Briegel

2002-01-01

247

Creating a two-layered augmented artificial immune system for application to computer network intrusion detection  

NASA Astrophysics Data System (ADS)

Computer network security has become a very serious concern of commercial, industrial, and military organizations due to the increasing number of network threats such as outsider intrusions and insider covert activities. An important security element of course is network intrusion detection which is a difficult real world problem that has been addressed through many different solution attempts. Using an artificial immune system has been shown to be one of the most promising results. By enhancing jREMISA, a multi-objective evolutionary algorithm inspired artificial immune system, with a secondary defense layer; we produce improved accuracy of intrusion classification and a flexibility in responsiveness. This responsiveness can be leveraged to provide a much more powerful and accurate system, through the use of increased processing time and dedicated hardware which has the flexibility of being located out of band.

Judge, Matthew G.; Lamont, Gary B.

2009-05-01

248

Network analysis of trace data for the support of group work: activity patterns in a completely online course  

Microsoft Academic Search

A 16-student, completely online software design course was studied using social network analysis and grounded theory techniques. Bi-directional (read and post) log data of user activity was recorded to understand how small group networks change over time with activity type (individual, peer-to-peer, and small group). Network structure was revealed through sociograms and triangulated with discussion board topics and interview data

Sean P. Goggins; Krista Galyen; James M. Laffey

2010-01-01

249

Networks and Project Work: Alternative Pedagogies for Writing with Computers.  

ERIC Educational Resources Information Center

Describes three main uses of computers for writing as a social activity: networking, telecommunications, and project work. Examines advantages and disadvantages of teaching writing on a network. Argues that reports in the literature and the example of an English as a foreign language writing class show that project work shares most of the…

Susser, Bernard

1993-01-01

250

Neutral Networks in Protein Space A Computational Study Based on  

E-print Network

to be very similar to the nucleic acid case. Key words: inverse folding, knowledge based potentials, neutralNeutral Networks in Protein Space A Computational Study Based on Knowledge­Based Potentials of Mean@tbi.univie.ac.at or stadler@santafe.edu #12; Babajide et al.: Neutral Networks of Proteins Background: Protein space

Stadler, Peter F.

251

Computer Network Security: Best Practices for Alberta School Jurisdictions.  

ERIC Educational Resources Information Center

This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…

Alberta Dept. of Education, Edmonton.

252

The Role of Computer Networks in Aerospace Engineering  

Microsoft Academic Search

This paper presents selected results from an empirical investigation into the use of computer networks in aersopace engineering. Such networks allow aerospace engineers to communicate with people and access remote resources through electronic mail, file transfer, and remote log-in. The study drew its subjects from private sector, government and academic organizations in the U.S. aerospace industry. Data presented here were

Ann Peterson Bishop

1994-01-01

253

Computer Networks as Instructional and Collaborative Distance Learning Environments.  

ERIC Educational Resources Information Center

Reports on the early stages of a project at the U.S. Air Force Academy, in which the instructional applications of a networked classroom laboratory, an intranet, and the Internet are explored as well as the effectiveness and efficiency of groupware and computer networks as instructional environments. Presents the results of the first pilot tests.…

Schrum, Lynne; Lamb, Theodore A.

1997-01-01

254

Huge Computer Network Quickens Pace of Academic Exchange and Collaboration.  

ERIC Educational Resources Information Center

Internet, a network of computer networks, offers scholars an unprecedented array of information resources and professional communication options. At the same time, the complexity of some system features has frustrated many, and it has not been in high demand among academics. Efforts are being made to orient users better. (MSE)

Wilson, David L.

1992-01-01

255

Use of Physical Simulation, Computer Simulation, and a Common Product in a Series of Courses to Illu  

NSDL National Science Digital Library

Use of Physical & Computer Simulation and a Standard Product in a Series of Courses to Illustrate Industrial and Manufacturing Engineering Technology Principles This presentation will explain the use of Physical Three-Dimensional Simulation and Computer Simulation coupled with a simple, standard product to teach various principles of Industrial and Manufacturing Engineering Technology throughout several different courses. This product (a simple model wagon), along with a variety of options, is threaded through several courses, allowing students to keep a common frame of reference, while seeing how the various principles within the courses tie together. Every course has a team oriented lab project which allows the students to build their team work and communication skills. This teaching methodology also allows the use of active, hands-on learning for the purpose of process improvement and leadership development. As the courses progress, the students will experience the transformation of the product assembly process from rudimentary assembly, to the effective use of fixtures and workstation design to reduce operator effort and improve productivity. It culminates with the course on Lean Manufacturing which also introduces the use of production simulation using in-house designed and manufactured equipment that allows us to integrate component manufacturing along with product assembly. The presentation will include video clips of the various course projects and principles, a computer simulation and samples of the products. The use of these concepts presented allows students to experience real life examples in the classroom that closely mimic what they will see in industry.

Carlisle, Tom; Winarchick, Charlie

2010-02-22

256

Applications of bio-inspired computational intelligence in optical networks  

NASA Astrophysics Data System (ADS)

Computational intelligence techniques have appeared as efficient alternatives to solve complex problems, such as in optimization of multi-objective problems. These techniques have been used to solve hard problems in optical networks, such as the impairment-aware routing and wavelength assignment problem, the design of the physical and the logical topology, and the placement of high cost devices along the network where necessary, such as regenerators and wavelength converters. This paper presents some examples of the use of evolutionary computation, swarm intelligence and neurocomputing to solve these optical network problems.

Martins Filho, Joaquim F.; Bastos Filho, Carmelo J. A.; Chaves, Daniel A. R.

2012-12-01

257

Neuromorphic computing applications for network intrusion detection systems  

NASA Astrophysics Data System (ADS)

What is presented here is a sequence of evolving concepts for network intrusion detection. These concepts start with neuromorphic structures for XOR-based signature matching and conclude with computationally based network intrusion detection system with an autonomous structuring algorithm. There is evidence that neuromorphic computation for network intrusion detection is fractal in nature under certain conditions. Specifically, the neural structure can take fractal form when simple neural structuring is autonomous. A neural structure is fractal by definition when its fractal dimension exceeds the synaptic matrix dimension. The authors introduce the use of fractal dimension of the neuromorphic structure as a factor in the autonomous restructuring feedback loop.

Garcia, Raymond C.; Pino, Robinson E.

2014-05-01

258

Mobile Computing/Mobile Computing/Mobile Computing/Mobile Computing/ Mobile NetworksMobile NetworksMobile NetworksMobile Networks  

E-print Network

.g., Ethernet) Evolution WiFi Protected Access (WPA) and WPA2 8 IEEE 802.11 Security MAC at sender encryptsMobile NetworksMobile Networks IEEE 802.11: SecurityIEEE 802.11: SecurityIEEE 802.11: SecurityIEEE 802.11 in 802.11) 4 4 authenticityauthenticityauthenticityauthenticity

Yu, Chansu

259

Computational algorithms for closed queueing networks with exponential servers  

Microsoft Academic Search

Methods are presented for computing the equilibrium distribution of customers in closed queueing networks with exponential servers. Expressions for various marginal distributions are also derived. The computational algorithms are based on two-dimensional iterative techniques which are highly efficient and quite simple to implement. Implementation considerations such as storage allocation strategies and order of evaluation are examined in some detail.

Jeffrey P. Buzen

1973-01-01

260

What Networking of Information Can Do for Cloud Computing  

Microsoft Academic Search

Cloud computing is making it possible to separate the process of building an infrastructure for service provisioning from the business of providing end user services. Today, such infrastructures are normally provided in large data centres and the applications are executed remotely from the users. One reason for this is that cloud computing requires a reasonably stable infrastructure and networking environment,

Börje Ohlman; Anders Eriksson; René Rembarz

2009-01-01

261

Network-Aware Partitioning of Computation in Diamond  

E-print Network

Network-Aware Partitioning of Computation in Diamond Alex Nizhner 1 Larry Huston 2 Peter Steenkiste Pittsburgh, PA 15213 Abstract The Diamond storage architecture enables eĂ?cient interactive searchĂ?cient use of resources under dynamic conditions, Diamond adaptively partitions computation among the storage

262

Modeling computer and web attitudes using neural networks  

Microsoft Academic Search

The paper aims to suggest models for predicting computer and Web attitudes using artificial neural networks with an additional support of standard statistics in data preparation and feature selection. Based on previously confirmed statistical instruments CAS and WAS, three models were designed. The first two models observed computer and Web attitudes separately, while both attitudes were observed in the third

Marijana Zekic-Susac; Jasna Horvat

2005-01-01

263

Three-dimensional courses of zygomaticofacial and zygomaticotemporal canals using micro-computed tomography in Korean.  

PubMed

The zygomatic nerve (ZN), which originates from the maxillary nerve at the pterygopalatine fossa, enters the orbit through the inferior orbital fissure. Within the lateral region of the orbit, the ZN divides into the zygomaticofacial (ZF) and zygomaticotemporal (ZT) nerves. The ZF and ZT nerves then pass on to the face and temporal region through the zygomaticoorbital foramen and enter their own bony canals within the zygomatic bone. However, multiple zygomaticofacial and zygomaticotemporal canals (ZFCs and ZTCs, respectively) can be observed, and their detailed intrabony courses are unknown. The aim of this study was clarify the three-dimensional intrabony courses and running patterns of the ZFCs and ZTCs, both to obtain a detailed anatomical description and for clinical purposes. Fourteen sides of the zygomatic bones were scanned as two-dimensional images using a micro-computed tomography (CT), with 32-?m slice thickness. Intrabony structures of each canals were three-dimensionally reconstructed and analyzed using Mimics computer software (Version 10.01; Materialise, Leuven, Belgium). We found that some ZTC was originated from ZFC. In 71.4% of the specimens, the ZTC(s) divided from the intrabony canal along the course of the ZFC(s). In other cases, 28.6% of ZTCs were opened through each corresponding ZT foramen. Zygomaticofacial canal originates from zygomaticoorbital foramen, divided into some of ZTCs, and is finally opened as ZF foramen. This new anatomical description of the intrabony structures of the ZFC(s) and ZTC(s) within the zygomatic bone by micro-CT technology provided helpful information to surgeons performing clinical procedures such as Le Fort osteotomy and reconstructive surgeries in the midface region. PMID:24036727

Kim, Hong-San; Oh, Jin-Ho; Choi, Da-Yae; Lee, Jae-Gi; Choi, Jong-Hoon; Hu, Kyung-Seok; Kim, Hee-Jin; Yang, Hun-Mu

2013-09-01

264

Home Care Nursing via Computer Networks: Justification and Design Specifications  

PubMed Central

High-tech home care includes the use of information technologies, such as computer networks, to provide direct care to patients in the home. This paper presents the justification and design of a project using a free, public access computer network to deliver home care nursing. The intervention attempts to reduce isolation and improve problem solving among home care patients and their informal caregivers. Three modules comprise the intervention: a decision module, a communications module, and an information data base. This paper describes the experimental evaluation of the project, and discusses issues in the delivery of nursing care via computers.

Brennan, Patricia Flatley

1988-01-01

265

""This talk explains how the con uence of cloud computing and Massive OpenOnline Courses (MOOCs) have allowed us greatly  

E-print Network

""This talk explains how the con uence of cloud computing and Massive OpenOnline Courses (MOOCs explains how the confluence of cloud computing and Massive Open Online Courses (MOOCs) have allowed us software engineering course. Colloquium and Distinguished LECTURE SERIES Myths About MOOCs and Software

Zhou, Yuanyuan

266

Phoebus: Network Middleware for Next-Generation Network Computing  

SciTech Connect

The Phoebus project investigated algorithms, protocols, and middleware infrastructure to improve end-to-end performance in high speed, dynamic networks. The Phoebus system essentially serves as an adaptation point for networks with disparate capabilities or provisioning. This adaptation can take a variety of forms including acting as a provisioning agent across multiple signaling domains, providing transport protocol adaptation points, and mapping between distributed resource reservation paradigms and the optical network control plane. We have successfully developed the system and demonstrated benefits. The Phoebus system was deployed in Internet2 and in ESnet, as well as in GEANT2, RNP in Brazil and over international links to Korea and Japan. Phoebus is a system that implements a new protocol and associated forwarding infrastructure for improving throughput in high-speed dynamic networks. It was developed to serve the needs of large DOE applications on high-performance networks. The idea underlying the Phoebus model is to embed Phoebus Gateways (PGs) in the network as on-ramps to dynamic circuit networks. The gateways act as protocol translators that allow legacy applications to use dedicated paths with high performance.

Martin Swany

2012-06-16

267

10 CFR 73.54 - Protection of digital computer and communication systems and networks.  

...2014-01-01 false Protection of digital computer and communication systems and networks...Sites § 73.54 Protection of digital computer and communication systems and networks...shall provide high assurance that digital computer and communication systems and...

2014-01-01

268

10 CFR 73.54 - Protection of digital computer and communication systems and networks.  

Code of Federal Regulations, 2013 CFR

...2013-01-01 false Protection of digital computer and communication systems and networks...Sites § 73.54 Protection of digital computer and communication systems and networks...shall provide high assurance that digital computer and communication systems and...

2013-01-01

269

10 CFR 73.54 - Protection of digital computer and communication systems and networks.  

Code of Federal Regulations, 2010 CFR

...2010-01-01 false Protection of digital computer and communication systems and networks...73.54 Protection of digital computer and communication systems and networks...provide high assurance that digital computer and communication systems and...

2010-01-01

270

MTX (Microwave Tokamak Experiment) data acquisition and analysis computer network  

NASA Astrophysics Data System (ADS)

For the MTX experiment, we use a network of computers for plasma diagnostic data acquisition and analysis. This multivendor network employs VMS, UNIX, and BASIC based computers connected in a local area Ethernet network. Some of the data is acquired directly into a VAX/VMS computer cluster over a fiber-optic serial CAMAC highway. Several HP-Unix workstations and HP-BASIC instrument control computers acquire and analyze data for the more data intensive or specialized diagnostics. The VAX/VMS system is used for global analysis of the data and serves as the central data archiving and retrieval manager. Shot synchronization and control of data flow are implemented by task-to-task message passing using our interprocess communication system. The system has been in operation during our initial MTX tokamak and FEL experiments; it has operated reliably with data rates typically in the range of 5 megabytes/shot without limiting the experimental shot rate.

Butner, D. N.; Casper, T. A.; Brown, M. D.; Drlik, M.; Meyer, W. H.; Moller, J. M.

1990-06-01

271

SHORT COURSE PROCEEDINGS: APPLICATIONS OF COMPUTER PROGRAMS IN THE PRELIMINARY DESIGN OF WASTEWATER TREATMENT FACILITIES; SECTION I. WORKSHOP LECTURES  

EPA Science Inventory

This document contains the material used for the Short Course on the Applications of Computer Programs in the Preliminary Design of Wastewater Treatment Facilities. It covers the role of computer programs in preliminary design and use of the Exec Program to determine the effect o...

272

The Use of Modular Computer-Based Lessons in a Modification of the Classical Introductory Course in Organic Chemistry.  

ERIC Educational Resources Information Center

An experimental course in organic chemistry utilized computer-assisted instructional (CAI) techniques. The CAI lessons provided tutorial drill and practice and simulated experiments and reactions. The Conversational Language for Instruction and Computing was used, along with a CDC 6400-6600 system; students scheduled and completed the lessons at…

Stotter, Philip L.; Culp, George H.

273

Computers and Networks Part I Jen Golbeck  

E-print Network

, convert units first! #12;11 Moore's Law · What is it? ­ Gordon E. Moore, co-founder of Intel: number of components on an integrated circuit will double every 18 months (1965) · Why is it important? #12;12 Illustration of Moore's Law #12;13 A Very Brief History of Computing · Computer = "a person who computes

Golbeck, Jennifer

274

An approach to a Cloud Computing network  

Microsoft Academic Search

ldquoCloud Computingrdquo is becoming increasingly relevant, as it will enable companies involved in spreading this technology to open the doors to Web 3.0. In this work the basic features of cloud computing are presented and compared with those of the original technology: Grid Computing. The new categories of services introduced will slowly replace many types of computational resources currently used.

Francesco Maria Aymerich; Gianni Fenu; Simone Surcis

2008-01-01

275

Computationally Efficient Neural Network Intrusion Security Awareness  

SciTech Connect

An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

Todd Vollmer; Milos Manic

2009-08-01

276

Quantization in acquisition and computation networks  

E-print Network

In modern systems, it is often desirable to extract relevant information from large amounts of data collected at different spatial locations. Applications include sensor networks, wearable health-monitoring devices and a ...

Sun, John Zheng

2013-01-01

277

Computational Verification of Network Programs in Coq  

E-print Network

-level network programming lan- guage. We build on recent work by Monsanto et al. [10], which defined the syn. #12;OpenFlow. Drawing on the NetCore compilation algorithm of Monsanto et al., Guha et al. formalized

Singh, Jaswinder Pal

278

[The use of computers and networking in the neurosurgical field].  

PubMed

Due to the improvements in computer and network technology, we are able to use medical information easily and safely on the network in medical institutions. In our department, we constructed and used an original Intranet with light fibers. The network links the outpatient room, ward, operation room, staff room and the examination room. Moreover, many computers and medical instruments are connected to the Intranet. Since our original Intranet has no connection with the outside network, we are able to access the patient's medical information safely. Using access management of identity and a password on the server, the client can present the medical information with sound and movie upon request of the patients and their families, medical students, nurses and doctors. Doctors can also search and input the patient's most recent medical information on a network database of every client. By linking the examination machine and operation aided instrument to the Intranet, we were able to forward the patient's medical information to the operation aided instrument easily and quickly. Furthermore, we will be able to perform tele-medicine and tele-operation in the near future: that is, the medical staff can guide the neurosurgical operation outside of the operation room with a microscope and computer view using picture mutual communication devices. By strict access to the management of our Intranet, we are able to use the medical information effectively for patient's treatment, operation, education and study on the network with no connection to the outside network. PMID:10097628

Oizumi, T; Ohira, T; Kawase, T

1999-02-01

279

Index : A Rule Based Expert System For Computer Network Maintenance  

NASA Astrophysics Data System (ADS)

Communications is an expert intensive discipline. The application of expert systems for maintenance of large and complex networks, mainly as an aid in trouble shooting, can simplify the task of network management. The important steps involved in troubleshooting are fault detection, fault reporting, fault interpretation and fault isolation. At present, Network Maintenance Facilities are capable of detecting and reporting the faults to network personnel. Fault interpretation refers to the next step in the process, which involves coming up with reasons for the failure. Fault interpretation can be characterized in two ways. First, it involves such a diversity of facts that it is difficult to predict. Secondly, it embodies a wealth of knowledge in the form of network management personnel. The application of expert systems in these interpretive tasks is an important step towards automation of network maintenance. In this paper, INDEX (Intelligent Network Diagnosis Expediter), a rule based production system for computer network alarm interpretation is described. It acts as an intelligent filter for people analyzing network alarms. INDEX analyzes the alarms in the network and identifies proper maintenance action to be taken.The important feature of this production system is that it is data driven. Working memory is the principal data repository of production systems and its contents represent the current state of the problem. Control is based upon which productions match the constantly changing working memory elements. Implementation of the prototype is in OPS83. Major issues in rule based system development such as rule base organization, implementation and efficiency are discussed.

Chaganty, Srinivas; Pitchai, Anandhi; Morgan, Thomas W.

1988-03-01

280

Courses: Computer Science (CS) Page 279Sonoma State University 2012-2013 Catalog CS 242 DiSCrete StruCtureS for Computer SCienCe (4)  

E-print Network

, network- ing, artificial intelligence, computer aided instruction, computer architecture, and databases intelligent agents. Students will work as part of a team to create a complete description document systems, ethics, and human factors affecting use and misuse of computers. Discussion of recent technical

Ravikumar, B.

281

Six networks on a universal neuromorphic computing substrate.  

PubMed

In this study, we present a highly configurable neuromorphic computing substrate and use it for emulating several types of neural networks. At the heart of this system lies a mixed-signal chip, with analog implementations of neurons and synapses and digital transmission of action potentials. Major advantages of this emulation device, which has been explicitly designed as a universal neural network emulator, are its inherent parallelism and high acceleration factor compared to conventional computers. Its configurability allows the realization of almost arbitrary network topologies and the use of widely varied neuronal and synaptic parameters. Fixed-pattern noise inherent to analog circuitry is reduced by calibration routines. An integrated development environment allows neuroscientists to operate the device without any prior knowledge of neuromorphic circuit design. As a showcase for the capabilities of the system, we describe the successful emulation of six different neural networks which cover a broad spectrum of both structure and functionality. PMID:23423583

Pfeil, Thomas; Grübl, Andreas; Jeltsch, Sebastian; Müller, Eric; Müller, Paul; Petrovici, Mihai A; Schmuker, Michael; Brüderle, Daniel; Schemmel, Johannes; Meier, Karlheinz

2013-01-01

282

Six Networks on a Universal Neuromorphic Computing Substrate  

PubMed Central

In this study, we present a highly configurable neuromorphic computing substrate and use it for emulating several types of neural networks. At the heart of this system lies a mixed-signal chip, with analog implementations of neurons and synapses and digital transmission of action potentials. Major advantages of this emulation device, which has been explicitly designed as a universal neural network emulator, are its inherent parallelism and high acceleration factor compared to conventional computers. Its configurability allows the realization of almost arbitrary network topologies and the use of widely varied neuronal and synaptic parameters. Fixed-pattern noise inherent to analog circuitry is reduced by calibration routines. An integrated development environment allows neuroscientists to operate the device without any prior knowledge of neuromorphic circuit design. As a showcase for the capabilities of the system, we describe the successful emulation of six different neural networks which cover a broad spectrum of both structure and functionality. PMID:23423583

Pfeil, Thomas; Grübl, Andreas; Jeltsch, Sebastian; Müller, Eric; Müller, Paul; Petrovici, Mihai A.; Schmuker, Michael; Brüderle, Daniel; Schemmel, Johannes; Meier, Karlheinz

2013-01-01

283

Networked Computing in the 1990s.  

ERIC Educational Resources Information Center

The changes in the relationship between the computer and user from that of an isolated productivity tool to than of an active collaborator in the acquisition, use, and creation of information, as well as a facilitator of human interaction are discussed. The four paradigms of computing are compared. (KR)

Tesler, Lawrence G.

1991-01-01

284

Connectomic constraints on computation in feedforward networks of spiking neurons.  

PubMed

Several efforts are currently underway to decipher the connectome or parts thereof in a variety of organisms. Ascertaining the detailed physiological properties of all the neurons in these connectomes, however, is out of the scope of such projects. It is therefore unclear to what extent knowledge of the connectome alone will advance a mechanistic understanding of computation occurring in these neural circuits, especially when the high-level function of the said circuit is unknown. We consider, here, the question of how the wiring diagram of neurons imposes constraints on what neural circuits can compute, when we cannot assume detailed information on the physiological response properties of the neurons. We call such constraints-that arise by virtue of the connectome-connectomic constraints on computation. For feedforward networks equipped with neurons that obey a deterministic spiking neuron model which satisfies a small number of properties, we ask if just by knowing the architecture of a network, we can rule out computations that it could be doing, no matter what response properties each of its neurons may have. We show results of this form, for certain classes of network architectures. On the other hand, we also prove that with the limited set of properties assumed for our model neurons, there are fundamental limits to the constraints imposed by network structure. Thus, our theory suggests that while connectomic constraints might restrict the computational ability of certain classes of network architectures, we may require more elaborate information on the properties of neurons in the network, before we can discern such results for other classes of networks. PMID:24691897

Ramaswamy, Venkatakrishnan; Banerjee, Arunava

2014-10-01

285

Computer simulations enhance experimental demonstrations in the underwater acoustics and sonar course  

NASA Astrophysics Data System (ADS)

Underwater acoustics and sonar (SP411) is a 3 hour course that is offered to midshipmen in their senior year. Typically, general science and oceanography majors, totaling 110 students/yr, enroll. Since this course is offered without a lab, the ''in class'' experience has been enhanced with the development (over many years) of our demo carts and computer workstations which surround the classroom. In a studio classroom atmosphere, students perform a variety of experiments in small groups. How can scientific visualizations best develop learning of complex interactions? Two examples are presented. PC-IMAT (personal curriculum interactive multisensor analysis training) simulations of multielement array steering support the theory and enhance the experiments that are performed in class such as the two-element array. Mathematica simulations involving the programming and animation of a point source in a rigid-rigid infinite parallel wave guide are used to stress the method of images, superposition, group and phase velocity and far-field modal pattern that is observed as a function of depth and source frequency. Later, students have fun using a ripple tank with an eye dropper to generate a point source between two adjustable parallel boundaries, and their understanding of ''underwater sound'' is greatly enhanced.

Korman, Murray S.

2002-11-01

286

Computational analysis of light scattering from collagen fiber networks  

NASA Astrophysics Data System (ADS)

Neoplastic progression in epithelial tissues is accompanied by structural and morphological changes in the stromal collagen matrix. We used the Finite-Difference Time-Domain (FDTD) method, a popular computational technique for full-vector solution of complex problems in electromagnetics, to establish a relationship between structural properties of collagen fiber networks and light scattering, and to analyze how neoplastic changes alter stromal scattering properties. To create realistic collagen network models, we acquired optical sections from the stroma of fresh normal and neoplastic oral cavity biopsies using fluorescence confocal microscopy. These optical sections were then processed to construct three-dimensional collagen networks of different sizes as FDTD model input. Image analysis revealed that volume fraction of collagen fibers in the stroma decreases with neoplastic progression, and statistical texture features computed suggest that fibers tend to be more disconnected in neoplastic stroma. The FDTD modeling results showed that neoplastic fiber networks have smaller scattering cross-sections compared to normal networks of the same size, whereas high-angle scattering probabilities tend to be higher for neoplastic networks. Characterization of stromal scattering is expected to provide a basis to better interpret spectroscopic optical signals and to develop more reliable computational models to describe photon propagation in epithelial tissues.

Arifler, Dizem; Pavlova, Ina; Gillenwater, Ann; Richards-Kortum, Rebecca

2007-07-01

287

Cardiac mitochondrial network excitability: insights from computational analysis  

PubMed Central

In the heart, mitochondria form a regular lattice and function as a coordinated, nonlinear network to continuously produce ATP to meet the high-energy demand of the cardiomyocytes. Cardiac mitochondria also exhibit properties of an excitable system: electrical or chemical signals can spread within or among cells in the syncytium. The detailed mechanisms by which signals pass among individual elements (mitochondria) across the network are still not completely understood, although emerging studies suggest that network excitability might be mediated by the local diffusion and autocatalytic release of messenger molecules such as reactive oxygen species and/or Ca2+. In this short review, we have attempted to described recent advances in the field of cardiac mitochondrial network excitability. Specifically, we have focused on how mitochondria communicate with each other through the diffusion and regeneration of messenger molecules to initiate and propagate waves or oscillations, as revealed by computational models of mitochondrial network. PMID:22427517

O'Rourke, Brian

2012-01-01

288

Fairness in window flow controlled computer networks  

Microsoft Academic Search

A measure is proposed that is based on two key concepts: (1) the congestion caused by a virtual circuit (VC) on the others; and (2) the penalty inflicted by the network on a VC. These two concepts are then combined to define a fairness criterion that uses the principle that a virtual circuit should not be able to congest the

F. Wong; J. R. B. de Marca

1989-01-01

289

Performance evaluation of scalable parallel computing networks  

E-print Network

of this research. To determine the maximum two-way delivery time, we must put the system into a state that will cause the worst case time to be observed. The two external factors that affect conditions in the network are the injection rate and the traffic model...

Wilkinson, Robert Todd

2012-06-07

290

Mobile and Ubiquitous Computing Wireless Sensor Networks"  

E-print Network

on low power! · Equipped to sense physical data! · Networked using low-power radio! · Function:! ­ Sense! ­ low power! · New interesting sensors! ­ light, heat, humidity! ­ position, movement, acceleration, vibration! ­ chemical presence, biosensor! ­ magnetic field, electrical inc. bio-signals (ECG and EEG

Roussos, George

291

Properties of sparse penalties on inferring gene regulatory networks from time-course gene expression data.  

PubMed

Genes regulate each other and form a gene regulatory network (GRN) to realise biological functions. Elucidating GRN from experimental data remains a challenging problem in systems biology. Numerous techniques have been developed and sparse linear regression methods become a promising approach to infer accurate GRNs. However, most linear methods are either based on steady-state gene expression data or their statistical properties are not analysed. Here, two sparse penalties, adaptive least absolute shrinkage and selection operator and smoothly clipped absolute deviation, are proposed to infer GRNs from time-course gene expression data based on an auto-regressive model and their Oracle properties are proved under mild conditions. The effectiveness of those methods is demonstrated by applications to in silico and real biological data. PMID:25569860

Liu, Li-Zhi; Wu, Fang-Xiang; Zhang, Wen-Jun

2015-02-01

292

A local area computer network expert system framework  

NASA Technical Reports Server (NTRS)

Over the past years an expert system called LANES designed to detect and isolate faults in the Goddard-wide Hybrid Local Area Computer Network (LACN) was developed. As a result, the need for developing a more generic LACN fault isolation expert system has become apparent. An object oriented approach was explored to create a set of generic classes, objects, rules, and methods that would be necessary to meet this need. The object classes provide a convenient mechanism for separating high level information from low level network specific information. This approach yeilds a framework which can be applied to different network configurations and be easily expanded to meet new needs.

Dominy, Robert

1987-01-01

293

Small-world networks in neuronal populations: a computational perspective.  

PubMed

The analysis of the brain in terms of integrated neural networks may offer insights on the reciprocal relation between structure and information processing. Even with inherent technical limits, many studies acknowledge neuron spatial arrangements and communication modes as key factors. In this perspective, we investigated the functional organization of neuronal networks by explicitly assuming a specific functional topology, the small-world network. We developed two different computational approaches. Firstly, we asked whether neuronal populations actually express small-world properties during a definite task, such as a learning task. For this purpose we developed the Inductive Conceptual Network (ICN), which is a hierarchical bio-inspired spiking network, capable of learning invariant patterns by using variable-order Markov models implemented in its nodes. As a result, we actually observed small-world topologies during learning in the ICN. Speculating that the expression of small-world networks is not solely related to learning tasks, we then built a de facto network assuming that the information processing in the brain may occur through functional small-world topologies. In this de facto network, synchronous spikes reflected functional small-world network dependencies. In order to verify the consistency of the assumption, we tested the null-hypothesis by replacing the small-world networks with random networks. As a result, only small world networks exhibited functional biomimetic characteristics such as timing and rate codes, conventional coding strategies and neuronal avalanches, which are cascades of bursting activities with a power-law distribution. Our results suggest that small-world functional configurations are liable to underpin brain information processing at neuronal level. PMID:23632438

Zippo, Antonio G; Gelsomino, Giuliana; Van Duin, Pieter; Nencini, Sara; Caramenti, Gian Carlo; Valente, Maurizio; Biella, Gabriele E M

2013-08-01

294

Network Nation: Human Communication via Computer  

E-print Network

and I published several articles together; these faded notes are some of the evidence of the influence as swiftly as anyone else." The book was not mere lofty Net dreams. In 1971, its computer scientist author

Kiesler, Sara

295

Probabilistic anomaly detection in distributed computer networks  

Microsoft Academic Search

Distributed host-based anomaly detection has not yet proven practical due to the ex- cessive computational overhead during training and detection. This paper considers an efficient algorithm for detecting resource anomalies in event streams with either Poisson or long-tailed arrival processes. A form of distributed, lazy evaluation is pre- sented, which uses a model for human-computer interaction based two-dimensional time and

Mark Burgess

2006-01-01

296

[Research toward a heterogeneous networked computing cluster  

SciTech Connect

Over the last year the Systems Development Group, SDG, has been involved in a number of projects. The primary projects include extending the UNIX version of DQS, a DCE version of DQS, a Java based queuing system, a Computer Aided Learning and Instruction model and working with the Florida Department of Law Enforcement in the formation of the Florida Computer Crime Center. Additionally SDG has assisted a number of state and local agencies. A synopsis of these projects is contained in this report.

Duke, D.W.; Green, T.P.

1998-08-11

297

Blogging within a Social Networking Site as a Form of Literature Response in a Teacher Education Course  

ERIC Educational Resources Information Center

The purpose of this qualitative study was to document how pre-service teachers in a children's literature course experienced blogging on a social networking site as a form of literature response. Understanding how pre-service teachers experience these tools can inform the ways we instruct them to integrate Web 2.0 tools into their teaching.…

Hutchison, Amy; Wang, Wei

2012-01-01

298

Propagation of computer virus both across the Internet and external computers: A complex-network approach  

NASA Astrophysics Data System (ADS)

Based on the assumption that external computers (particularly, infected external computers) are connected to the Internet, and by considering the influence of the Internet topology on computer virus spreading, this paper establishes a novel computer virus propagation model with a complex-network approach. This model possesses a unique (viral) equilibrium which is globally attractive. Some numerical simulations are also given to illustrate this result. Further study shows that the computers with higher node degrees are more susceptible to infection than those with lower node degrees. In this regard, some appropriate protective measures are suggested.

Gan, Chenquan; Yang, Xiaofan; Liu, Wanping; Zhu, Qingyi; Jin, Jian; He, Li

2014-08-01

299

Cloud computing in Aircraft Data Network  

Microsoft Academic Search

The introduction of data networks within an aircraft has created several service opportunities for the air carriers. Using the available Internet connectivity, the carriers could offer services like Video-on-Demand (VoD), Voice-over-IP (VoIP), and gaming-on-demand within the aircraft. One of the major road blocks in implementing any of these services is the additional hardware and software requirements. Each service requires dedicated

Amarnath Jasti; Surya Mohapatra; Bhargav Potluri; Ravi Pendse

2011-01-01

300

A Three-Dimensional Computational Model of Collagen Network Mechanics  

PubMed Central

Extracellular matrix (ECM) strongly influences cellular behaviors, including cell proliferation, adhesion, and particularly migration. In cancer, the rigidity of the stromal collagen environment is thought to control tumor aggressiveness, and collagen alignment has been linked to tumor cell invasion. While the mechanical properties of collagen at both the single fiber scale and the bulk gel scale are quite well studied, how the fiber network responds to local stress or deformation, both structurally and mechanically, is poorly understood. This intermediate scale knowledge is important to understanding cell-ECM interactions and is the focus of this study. We have developed a three-dimensional elastic collagen fiber network model (bead-and-spring model) and studied fiber network behaviors for various biophysical conditions: collagen density, crosslinker strength, crosslinker density, and fiber orientation (random vs. prealigned). We found the best-fit crosslinker parameter values using shear simulation tests in a small strain region. Using this calibrated collagen model, we simulated both shear and tensile tests in a large linear strain region for different network geometry conditions. The results suggest that network geometry is a key determinant of the mechanical properties of the fiber network. We further demonstrated how the fiber network structure and mechanics evolves with a local formation, mimicking the effect of pulling by a pseudopod during cell migration. Our computational fiber network model is a step toward a full biomechanical model of cellular behaviors in various ECM conditions. PMID:25386649

Lee, Byoungkoo; Zhou, Xin; Riching, Kristin; Eliceiri, Kevin W.; Keely, Patricia J.; Guelcher, Scott A.; Weaver, Alissa M.; Jiang, Yi

2014-01-01

301

Solving Computational Grand Challenges Using a Network of Heterogeneous Supercomputers  

Microsoft Academic Search

. This paper describes experiments connecting a Cray XMP, Intel iPSC\\/860,and Thinking Machines CM2 together over a high speed network to form a much larger virtualcomputer. The purpose of the experiments is to demonstrate the power and flexibilityof the PVM (Parallel Virtual Machine) system to allow programmers to exploit a diversecollection of the most powerful computers available to solve Grand

Adam Beguelin; Jack Dongarra; Al Geist; Robert Manchek; Vaidy S. Sunderam

1991-01-01

302

High Performance Computing and Networking for Science--Background Paper.  

ERIC Educational Resources Information Center

The Office of Technology Assessment is conducting an assessment of the effects of new information technologies--including high performance computing, data networking, and mass data archiving--on research and development. This paper offers a view of the issues and their implications for current discussions about Federal supercomputer initiatives…

Congress of the U.S., Washington, DC. Office of Technology Assessment.

303

A Network Flow Computation for Project Cost Curves  

Microsoft Academic Search

A network flow method is outlined for solving the linear programming problem of computing the least cost curve for a project composed of many individual jobs, where it is assumed that certain jobs must be finished before others can be started. Each job has an associated crash completion time and normal completion time, and the cost of doing the job

D. R. Fulkerson

1961-01-01

304

Networking Mobile Devices and Computers in an Intelligent Home  

Microsoft Academic Search

This paper presents the prototype of a universal model for implementing the smart home. In this model, computers and various digital devices form a single network that operates at a high level of intelligence to provide and manage common services. The universal model includes a standard framework that will enable hardware and software vendors to develop consumer electronic (CE) devices

Lior Zoref; David Bregman; Dov Dori

2009-01-01

305

SSH1 MAN IN THE MIDDLE ATTACK Computer Network Security  

E-print Network

SSH1 MAN IN THE MIDDLE ATTACK Computer Network Security ECE578 Dr. Cetin Kaya Koc Siva Sai and Man-in-the-middle attack. Because there are too many materials, this project will mainly cover the topic about SSH1 Man in the middle attack, or "SSH1 confidentiality attack". Introduction The concept

306

Computing the Viscosity of Supercooled Liquids: Markov Network Model  

E-print Network

that is clearly super-Arrhenius (fragile) for a Kob-Andersen model of binary liquid. ExperimentallyComputing the Viscosity of Supercooled Liquids: Markov Network Model Ju Li1 *, Akihiro Kushima1, when liquid viscosity changes continuously by more than ten orders of magnitude, is challenging

Lin, Xi

307

THE BEHAVIOR OF ETHERNET-LIKE COMPUTER COMMUNICATIONS NETWORKS  

E-print Network

THE BEHAVIOR OF ETHERNET-LIKE COMPUTER COMMUNICATIONS NETWORKS Guy T. Almes and Edward D. Lazowska the widespread influence of Ethernet, a surprising amount of confusion exists concerning various important the policies common to Ethernet-like systems and by using an analytic model to study their behavior. We

Anderson, Richard

308

Network for Computational Nanotechnology (NCN)NEED To drive more  

E-print Network

Network for Computational Nanotechnology (NCN)NEED To drive more rapid innovation in nanotechnology supports the National Nanotechnology Initiative (see nano.gov) by building and operating nanoHUB.org. Our vision is to accelerate the transformation of nanoscience to nanotechnology and to educate

Ginzel, Matthew

309

aiVIS Artificial Immune Network Visualisation Computing Laboratory  

E-print Network

The field of Artificial Immune Systems (AIS) is the use of the natural immune system as a metaphor: immune networks, self organising maps, exploratory data analysis, artificial immune systems, cluster to Computer Scientists (Paton, 1994). Recently, increased use has been made of the natural immune system

Kent, University of

310

Computing & Networking Resource and Responsible Use Policies & Guidelines  

E-print Network

objectives of the Colorado School of Mines. The ethical and legal use of any computing and networking usage charge to faculty, staff and students to accomplish tasks relating primarily to classroom or special projects sanctioned by the School. 8. Electronic communication is a common form of personal

311

Computer-mediated interactions through English for Elite Police Network  

Microsoft Academic Search

The objective of English for Elite Police Network program is to provide an interactive platform for trainees, instructors, police experts and other participants so as to enhance interests as well as efficiency in professional English learning and training. Computer-mediated interactions are strengthened in both police English learning and policing skills training through role-playing, discussing and interacting in scenarios which enable

Zhongwen Liu

2011-01-01

312

Teachers' Self-Training Activities on Computer Networks in Japan.  

ERIC Educational Resources Information Center

Provides an overview of inservice teacher training programs in Japan, which have few links to formal distance education programs. Teachers' growing use of computer communications networks is reviewed as a self-teaching method, and future directions are suggested. (Contains nine references.) (EAM)

Saga, Hiroo

1993-01-01

313

Highspeed ATM networking on lowend computer systems Werner Almesberger  

E-print Network

adapter designs. Then, characteristics of contemporary PCs (as a typical low­end host architecture for the restrictions of contemporary personal computers. In this paper, architectural aspects of existing PC hardware, ATM network adapters, and operating systems are examined, and in fact, serious limitations

Almesberger, Werner

314

Computational Neuropsychiatry – Schizophrenia as a Cognitive Brain Network Disorder  

PubMed Central

Computational modeling of functional brain networks in fMRI data has advanced the understanding of higher cognitive function. It is hypothesized that functional networks mediating higher cognitive processes are disrupted in people with schizophrenia. In this article, we review studies that applied measures of functional and effective connectivity to fMRI data during cognitive tasks, in particular working memory fMRI studies. We provide a conceptual summary of the main findings in fMRI data and their relationship with neurotransmitter systems, which are known to be altered in individuals with schizophrenia. We consider possible developments in computational neuropsychiatry, which are likely to further our understanding of how key functional networks are altered in schizophrenia. PMID:24723894

Dauvermann, Maria R.; Whalley, Heather C.; Schmidt, André; Lee, Graham L.; Romaniuk, Liana; Roberts, Neil; Johnstone, Eve C.; Lawrie, Stephen M.; Moorhead, Thomas W. J.

2014-01-01

315

Wired: Computer Networks in the English Classroom.  

ERIC Educational Resources Information Center

Describes several collaborative writing projects using electronic mail (e-mail). Notes that although most of these projects can be tried without computers, two of the barriers in the classroom--time and distance--are removed as a result of electronic communication links. (MM)

Kinkead, Joyce

1988-01-01

316

Computer-Communications Networks and Teletraffic.  

ERIC Educational Resources Information Center

Bi-directional cable TV (CATV) systems that are being installed today may not be well suited for computer communications. Older CATV systems are being modified to bi-directional transmission and most new systems are being built with bi-directional capability included. The extreme bandwidth requirement for carrying 20 or more TV channels on a…

Switzer, I.

317

Neuronal and network computation in the brain  

SciTech Connect

The concepts and methods of non-linear dynamics have been a powerful tool for studying some gamow aspects of brain dynamics. In this paper we show how, from time series analysis of electroencepholograms in sick and healthy subjects, chaotic nature of brain activity could be unveiled. This finding gave rise to the concept of spatiotemporal cortical chaotic networks which in turn was the foundation for a simple brain-like device which is able to become attentive, perform pattern recognition and motion detection. A new method of time series analysis is also proposed which demonstrates for the first time the existence of neuronal code in interspike intervals of coclear cells.

Babloyantz, A. [Center for Study of Non-linear Systems, Universite Libre de Bruxelles, CP 231, Boulevard du Triomphe, 1050 Brussels (Belgium); International Solvay Institutes for Physics and Chemistry, ULB-Campus Plaine-CP 231, Boulevard du Triomphe, 1050 Brussels (Belgium)

1999-03-22

318

Prediction of Student Course Selection in Online Higher Education Institutes Using Neural Network  

ERIC Educational Resources Information Center

Students are required to choose courses they are interested in for the coming semester. Due to restrictions, including lack of sufficient resources and overheads of running several courses, some universities might not offer all of a student's desirable courses. Universities must know every student's demands for every course prior to each semester…

Kardan, Ahmad A.; Sadeghi, Hamid; Ghidary, Saeed Shiry; Sani, Mohammad Reza Fani

2013-01-01

319

Global tree network for computing structures enabling global processing operations  

DOEpatents

A system and method for enabling high-speed, low-latency global tree network communications among processing nodes interconnected according to a tree network structure. The global tree network enables collective reduction operations to be performed during parallel algorithm operations executing in a computer structure having a plurality of the interconnected processing nodes. Router devices are included that interconnect the nodes of the tree via links to facilitate performance of low-latency global processing operations at nodes of the virtual tree and sub-tree structures. The global operations performed include one or more of: broadcast operations downstream from a root node to leaf nodes of a virtual tree, reduction operations upstream from leaf nodes to the root node in the virtual tree, and point-to-point message passing from any node to the root node. The global tree network is configurable to provide global barrier and interrupt functionality in asynchronous or synchronized manner, and, is physically and logically partitionable.

Blumrich; Matthias A. (Ridgefield, CT); Chen, Dong (Croton-On-Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY); Vranas, Pavlos M. (Bedford Hills, NY)

2010-01-19

320

A Multi-Year Investigation of the Relationship between Pedagogy, Computer Use and Course Effectiveness in Postsecondary Education  

ERIC Educational Resources Information Center

This study investigated the change in the relationship between pedagogy, computer-use and students' perceptions about course-effectiveness over time. Students from a Canadian university completed a questionnaire in two different years (2003 = 1,834 participants and 2007 = 1,866 participants). Of greatest interest were characteristics of technology…

Tamim, Rana M.; Lowerison, Gretchen; Schmid, Richard F.; Bernard, Robert M.; Abrami, Philip C.

2011-01-01

321

Exploring Students Intentions to Study Computer Science and Identifying the Differences among ICT and Programming Based Courses  

ERIC Educational Resources Information Center

Computer Science (CS) courses comprise both Programming and Information and Communication Technology (ICT) issues; however these two areas have substantial differences, inter alia the attitudes and beliefs of the students regarding the intended learning content. In this research, factors from the Social Cognitive Theory and Unified Theory of…

Giannakos, Michail N.

2014-01-01

322

Reflective Behaviors under a Web-Based Portfolio Assessment Environment for High School Students in a Computer Course  

ERIC Educational Resources Information Center

This research attempted to categorize reflection in a Web-based portfolio assessment using the Chinese Word Segmenting System (CWSS). Another aim of this research was to explore reflective performance in which individual differences were further examined. Participants were 45 eight-grade students from a junior high school taking a computer course.…

Chang, Chi-Cheng; Chen, Cheng-Chuan; Chen, Yi-Hui

2012-01-01

323

Effects of Computer-Aided Personalized System of Instruction in Developing Knowledge and Critical Thinking in Blended Learning Courses  

ERIC Educational Resources Information Center

Two experiments were conducted to assess an online version of Keller's personalized system of instruction, called computer-aided personalized system of instruction (CAPSI), as part of a blended learning design with regard to course knowledge and critical thinking development. In Experiment 1, two lecture sections of an introduction to University…

Svenningsen, Louis; Pear, Joseph J.

2011-01-01

324

Computer-Based and Paper-and-Pencil Administration Mode Effects on a Statewide End-of-Course English Test  

ERIC Educational Resources Information Center

The current study compared student performance between paper-and-pencil testing (PPT) and computer-based testing (CBT) on a large-scale statewide end-of-course English examination. Analyses were conducted at both the item and test levels. The overall results suggest that scores obtained from PPT and CBT were comparable. However, at the content…

Kim, Do-Hong; Huynh, Huynh

2008-01-01

325

Implementation of Service Learning and Civic Engagement for Computer Information Systems Students through a Course Project at the Hashemite University  

ERIC Educational Resources Information Center

Service learning methodologies provide information systems students with the opportunity to create and implement systems in real-world, public service-oriented social contexts. This paper presents a case study of integrating a service learning project into an undergraduate Computer Information Systems course titled "Information Systems"…

Al-Khasawneh, Ahmad; Hammad, Bashar K.

2013-01-01

326

Computer-Mediated Word-of-Mouth Communication: The Influence of Mixed Reviews on Student Perceptions of Instructors and Courses  

ERIC Educational Resources Information Center

The purpose of this experiment was to test the influence of mixed reviews appearing as computer-mediated word-of-mouth communication (WOM) on student perceptions of instructors (attractiveness and credibility) and attitudes toward learning course content (affective learning and state motivation). Using the heuristic-systematic processing model, it…

Edwards, Autumn; Edwards, Chad

2013-01-01

327

Effects of Computer Assisted Instruction on Students' Attitudes towards Science Courses in Turkey: A Meta-Analysis  

ERIC Educational Resources Information Center

Many primary studies have been performed to reveal the effects of computer assisted instruction (CAI) on students' attitudes towards science courses. In determining the effectiveness of these studies, gathering and evaluating of the studies at some characteristics play an important role. The aim of this study is to determine meta-analytically the…

Tekbiyik, Ahmet; Birinci Konur, Kader; Pirasa, Nimet

2008-01-01

328

A Triangulated Study of Academic Language Needs of Iranian Students of Computer Engineering: Are the Courses on Track?  

ERIC Educational Resources Information Center

Even though English for Specific Academic Purposes (ESAP) courses constitute a significant part of the Iranian university curriculum, curriculum developers have generally developed the programs based on intuition. This study assessed the present and target situation academic language needs of undergraduate students of computer engineering. To this…

Atai, Mahmood Reza; Shoja, Leila

2011-01-01

329

Mining Social Networks on the Mexican Computer Science Community  

NASA Astrophysics Data System (ADS)

Scientific communities around the world are increasingly paying more attention to collaborative networks to ensure they remain competitive, the Computer Science (CS) community is not an exception. Discovering collaboration opportunities is a challenging problem in social networks. Traditional social network analysis allows us to observe which authors are already collaborating, how often they are related to each other, and how many intermediaries exist between two authors. In order to discover the potential collaboration among Mexican CS scholars we built a social network, containing data from 1960 to 2008. We propose to use a clustering algorithm and social network analysis to identify scholars that would be advisable to collaborate. The idea is to identify clusters consisting of authors who are completely disconnected but with opportunities of collaborating given their common research areas. After having clustered the initial social network we built, we analyze the collaboration networks of each cluster to discover new collaboration opportunities based on the conferences where the authors have published. Our analysis was made based on the large-scale DBLP bibliography and the census of Mexican scholars made by REMIDEC.

Ayanegui-Santiago, Huberto; Reyes-Galaviz, Orion F.; Chávez-Aragón, Alberto; Ramírez-Cruz, Federico; Portilla, Alberto; García-Bańuelos, Luciano

330

Reduction of dynamical biochemical reactions networks in computational biology  

PubMed Central

Biochemical networks are used in computational biology, to model mechanistic details of systems involved in cell signaling, metabolism, and regulation of gene expression. Parametric and structural uncertainty, as well as combinatorial explosion are strong obstacles against analyzing the dynamics of large models of this type. Multiscaleness, an important property of these networks, can be used to get past some of these obstacles. Networks with many well separated time scales, can be reduced to simpler models, in a way that depends only on the orders of magnitude and not on the exact values of the kinetic parameters. The main idea used for such robust simplifications of networks is the concept of dominance among model elements, allowing hierarchical organization of these elements according to their effects on the network dynamics. This concept finds a natural formulation in tropical geometry. We revisit, in the light of these new ideas, the main approaches to model reduction of reaction networks, such as quasi-steady state (QSS) and quasi-equilibrium approximations (QE), and provide practical recipes for model reduction of linear and non-linear networks. We also discuss the application of model reduction to the problem of parameter identification, via backward pruning machine learning techniques. PMID:22833754

Radulescu, O.; Gorban, A. N.; Zinovyev, A.; Noel, V.

2012-01-01

331

Simulating quantum computation by contracting tensor networks  

E-print Network

The treewidth of a graph is a useful combinatorial measure of how close the graph is to a tree. We prove that a quantum circuit with T gates whose underlying graph has treewidth d can be simulated classically in poly(T)*exp(O(d)) time, which, in particular, is polynomial in T if d = O(logT). Among many implications, we show efficient simulations for quantum formulas, defined and studied by Yao (Proceedings of the 34th Annual Symposium on Foundations of Computer Science, 352-361, 1993), and for log-depth circuits whose gates apply to nearby qubits only, a natural constraint satisfied by most physical implementations. We also extend the result to show that one-way quantum computation of Raussendorf and Briegel (Physical Review Letters, 86:5188-5191, 2001), a universal quantum computation scheme very promising for its physical implementation, can be efficiently simulated by a randomized algorithm if its quantum resource is derived from a small-treewidth graph.

Markov, I; Markov, Igor; Shi, Yaoyun

2005-01-01

332

Policy on Appropriate Use of Computer and Network Resources Policy on Appropriate Use of  

E-print Network

, appropriate, hacking, misuse. #12;Policy on Appropriate Use of Computer and Network Resources Page 2 3Policy on Appropriate Use of Computer and Network Resources 3/5/2014 Policy on Appropriate Use of Computer and Network Resources I. Purpose and Scope The information systems of Northeastern University

Sridhar, Srinivas

333

A computational framework for gene regulatory network inference that combines multiple methods and datasets  

PubMed Central

Background Reverse engineering in systems biology entails inference of gene regulatory networks from observational data. This data typically include gene expression measurements of wild type and mutant cells in response to a given stimulus. It has been shown that when more than one type of experiment is used in the network inference process the accuracy is higher. Therefore the development of generally applicable and effective methodologies that embed multiple sources of information in a single computational framework is a worthwhile objective. Results This paper presents a new method for network inference, which uses multi-objective optimisation (MOO) to integrate multiple inference methods and experiments. We illustrate the potential of the methodology by combining ODE and correlation-based network inference procedures as well as time course and gene inactivation experiments. Here we show that our methodology is effective for a wide spectrum of data sets and method integration strategies. Conclusions The approach we present in this paper is flexible and can be used in any scenario that benefits from integration of multiple sources of information and modelling procedures in the inference process. Moreover, the application of this method to two case studies representative of bacteria and vertebrate systems has shown potential in identifying key regulators of important biological processes. PMID:21489290

2011-01-01

334

Computing Tutte polynomials of contact networks in classrooms  

NASA Astrophysics Data System (ADS)

Objective: The topological complexity of contact networks in classrooms and the potential transmission of an infectious disease were analyzed by sex and age. Methods: The Tutte polynomials, some topological properties and the number of spanning trees were used to algebraically compute the topological complexity. Computations were made with the Maple package GraphTheory. Published data of mutually reported social contacts within a classroom taken from primary school, consisting of children in the age ranges of 4-5, 7-8 and 10-11, were used. Results: The algebraic complexity of the Tutte polynomial and the probability of disease transmission increases with age. The contact networks are not bipartite graphs, gender segregation was observed especially in younger children. Conclusion: Tutte polynomials are tools to understand the topology of the contact networks and to derive numerical indexes of such topologies. It is possible to establish relationships between the Tutte polynomial of a given contact network and the potential transmission of an infectious disease within such network

Hincapié, Doracelly; Ospina, Juan

2013-05-01

335

Smart photonic networks and computer security for image data  

NASA Astrophysics Data System (ADS)

Work reported here is part of a larger project on 'Smart Photonic Networks and Computer Security for Image Data', studying the interactions of coding and security, switching architecture simulations, and basic technologies. Coding and security: coding methods that are appropriate for data security in data fusion networks were investigated. These networks have several characteristics that distinguish them form other currently employed networks, such as Ethernet LANs or the Internet. The most significant characteristics are very high maximum data rates; predominance of image data; narrowcasting - transmission of data form one source to a designated set of receivers; data fusion - combining related data from several sources; simple sensor nodes with limited buffering. These characteristics affect both the lower level network design and the higher level coding methods.Data security encompasses privacy, integrity, reliability, and availability. Privacy, integrity, and reliability can be provided through encryption and coding for error detection and correction. Availability is primarily a network issue; network nodes must be protected against failure or routed around in the case of failure. One of the more promising techniques is the use of 'secret sharing'. We consider this method as a special case of our new space-time code diversity based algorithms for secure communication. These algorithms enable us to exploit parallelism and scalable multiplexing schemes to build photonic network architectures. A number of very high-speed switching and routing architectures and their relationships with very high performance processor architectures were studied. Indications are that routers for very high speed photonic networks can be designed using the very robust and distributed TCP/IP protocol, if suitable processor architecture support is available.

Campello, Jorge; Gill, John T.; Morf, Martin; Flynn, Michael J.

1998-02-01

336

Offdiagonal Complexity: A Computationally Quick Network Complexity Measure—Application to Protein Networks and Cell Division  

Microsoft Academic Search

Many complex biological, social, and economical networks show topologies drastically differing from random graphs. But what\\u000a is a complex network, i.e., how can one quantify the complexity of a graph? Here the Offdiagonal Complexity (OdC), a new,\\u000a and computationally cheap, measure of complexity is defined, based on the node-node link cross-distribution, whose nondiagonal\\u000a elements characterize the graph structure beyond link

Jens Christian Claussen

337

EEL 6562 --Image Processing and Computer Vision http://www.wu.ece.ufl.edu/courses/eel6825s13/[1/8/2013 2:21:25 PM  

E-print Network

EEL 6562 -- Image Processing and Computer Vision http://www.wu.ece.ufl.edu/courses/eel6825s13/[1/8/2013 2:21:25 PM] University of Florida Department of Electrical and Computer Engineering EEL 6825 to the students through a mixture of motivational applications and theory. Course Prerequisites EEL 3135 (Discrete

Fang, Yuguang "Michael"

338

Cellular computational networks--a scalable architecture for learning the dynamics of large networked systems.  

PubMed

Neural networks for implementing large networked systems such as smart electric power grids consist of multiple inputs and outputs. Many outputs lead to a greater number of parameters to be adapted. Each additional variable increases the dimensionality of the problem and hence learning becomes a challenge. Cellular computational networks (CCNs) are a class of sparsely connected dynamic recurrent networks (DRNs). By proper selection of a set of input elements for each output variable in a given application, a DRN can be modified into a CCN which significantly reduces the complexity of the neural network and allows use of simple training methods for independent learning in each cell thus making it scalable. This article demonstrates this concept of developing a CCN using dimensionality reduction in a DRN for scalability and better performance. The concept has been analytically explained and empirically verified through application. PMID:24300549

Luitel, Bipul; Venayagamoorthy, Ganesh Kumar

2014-02-01

339

A multi-year investigation of the relationship between pedagogy, computer use and course effectiveness in postsecondary education  

Microsoft Academic Search

This study investigated the change in the relationship between pedagogy, computer-use and students’ perceptions about course-effectiveness\\u000a over time. Students from a Canadian university completed a questionnaire in two different years (2003 = 1,834 participants\\u000a and 2007 = 1,866 participants). Of greatest interest were characteristics of technology that interact with pedagogy to achieve\\u000a positive learning outcomes. A factor analysis revealed a three-factor solution: “course-structure,” “active-learning,”

Rana M. Tamim; Gretchen Lowerison; Richard F. Schmid; Robert M. Bernard; Philip C. Abrami

2011-01-01

340

Line-plane broadcasting in a data communications network of a parallel computer  

DOEpatents

Methods, apparatus, and products are disclosed for line-plane broadcasting in a data communications network of a parallel computer, the parallel computer comprising a plurality of compute nodes connected together through the network, the network optimized for point to point data communications and characterized by at least a first dimension, a second dimension, and a third dimension, that include: initiating, by a broadcasting compute node, a broadcast operation, including sending a message to all of the compute nodes along an axis of the first dimension for the network; sending, by each compute node along the axis of the first dimension, the message to all of the compute nodes along an axis of the second dimension for the network; and sending, by each compute node along the axis of the second dimension, the message to all of the compute nodes along an axis of the third dimension for the network.

Archer, Charles J. (Rochester, MN); Berg, Jeremy E. (Rochester, MN); Blocksome, Michael A. (Rochester, MN); Smith, Brian E. (Rochester, MN)

2010-11-23

341

Using FarmVille in an Introductory Managerial Accounting Course to Engage Students, Enhance Comprehension, and Develop Social Networking Skills  

ERIC Educational Resources Information Center

This article explores the use of the free Zynga computer game FarmVille, which is played in conjunction with Facebook[R], to facilitate active learning in a managerial accounting course. Results indicate that it invokes an improved understanding of the accounting content, particularly among nonaccounting majors; a high level of student…

Krom, Cynthia L.

2012-01-01

342

Review of efforts combining neural networks and evolutionary computation  

NASA Astrophysics Data System (ADS)

Since the widespread recognition of the capacity for neural networks to perform general function approximation, a variety of such mapping functions have been used to address difficult problems in pattern recognition, time series forecasting, automatic control, image compression, and other engineering applications. Although these efforts have met with considerable success, the design and training of neural networks have remained much of an art, relying on human expertise, trial, and error. More recently, methods in evolutionary computation, including genetic algorithms, evolution strategies, and evolutionary programming, have been used to assist in and automate the design and training of neural networks. This presentation offers a review of these efforts and discusses the potential benefits and limitations of such combinations.

Fogel, David B.; Angeline, Peter J.

1995-04-01

343

Brain Network Evolution after Stroke Based on Computational Experiments  

PubMed Central

Stroke is a frequently-occurring disease threatening the human nervous system. As a serious debilitation affecting a large-scale, hierarchical, and vastly complex electrochemical system, stroke remains relatively misunderstood. Rehabilitation mechanisms and means have suffered from this lack of systematic understanding. Here we propose an evolution model to simulate the dynamic actual evolvement process of functional brain networks computationally in an effort to address current shortcomings in the state of the field. According to simulation results, we conclude that the brain networks of patients following acute stroke were characterized by lower small worldness and lower quantity of long-distance connections compared with the healthy condition. Moreover, distance penalization may be used to describe the general mechanism of brain network evolution in the acute period after stroke. PMID:24376592

Li, Wei; Huang, Yue; Li, Yapeng; Chen, Xi

2013-01-01

344

Determination of time-course change rate for arterial xenon using the time course of tissue xenon concentration in xenon-enhanced computed tomography  

SciTech Connect

In calculating tissue blood flow (TBF) according to the Fick principle, time-course information on arterial tracer concentration is indispensable and has a considerable influence on the accuracy of calculated TBF. In TBF measurement by xenon-enhanced computed tomography (Xe-CT), nonradioactive xenon gas is administered by inhalation as a tracer, and end-tidal xenon is used as a substitute for arterial xenon. There has been the assumption that the time-course change rate for end-tidal xenon concentration (Ke) and that for arterial xenon concentration (Ka) are substantially equal. Respiratory gas sampling is noninvasive to the patient and Ke can be easily measured by exponential curve fitting to end-tidal xenon concentrations. However, it is pointed out that there would be a large difference between Ke and Ka in many cases. The purpose of this work was to develop a method of determining the Ka value using the time course of tissue xenon concentration in Xe-CT. The authors incorporated Ka into the Kety autoradiographic equation as a parameter to be solved, and developed a method of least-squares to obtain the solution for Ka from the time-course changes in xenon concentration in the tissue. The authors applied this method of least-squares to the data from Xe-CT abdominal studies performed on 17 patients; the solution for Ka was found pixel by pixel in the spleen, and its Ka map was created for each patient. On the one hand, the authors obtained the average value of the Ka map of the spleen as the calculated Ka (Ka{sub calc}) for each patient. On the other hand, the authors measured Ka (Ka{sub meas}) using the time-course changes in CT enhancement in the abdominal aorta for each patient. There was a good correlation between Ka{sub calc} and Ka{sub meas} (r=0.966, P<0.0001), and these two Ka values were close to each other (Ka{sub calc}=0.935xKa{sub meas}+0.089). This demonstrates that Ka{sub calc} would be close to the true Ka value. Accuracy of TBF by Xe-CT can be improved with use of the average value of the Ka map of an organ like the spleen that has a single blood supply (only arterial inflow)

Sase, Shigeru; Takahashi, Hideaki; Ikeda, Hiroki; Kobayashi, Minoru; Matsumoto, Nobuyuki; Suzuki, Michihiro [Anzai Medical Co., Ltd., 3-9-15 Nishi-Shinagawa, Shinagawa-ku, Tokyo 141-0033 (Japan); Department of Internal Medicine, Division of Gastroenterology and Hepatology, School of Medicine, St. Marianna University, 2-16-1 Miyamae-ku, Sugao, Kawasaki 216-5811 (Japan)

2008-06-15

345

SAFENET-a Navy approach to computer networking  

Microsoft Academic Search

The SAFENET (survivable adaptable fiber optic embedded network) standards which are being developed for use in US Navy computer-based systems, are described. There are two SAFENET standards. SAFENET I is based on the IEEE 802.5 LAN standard, while SAFENET II is based on the fiber distributed data interface (FDDI). The SAFENET physical topology is based on a dual counter-rotating ring

Jeffrey L. Paige

1990-01-01

346

Neural networks and pattern recognition in human-computer interaction  

Microsoft Academic Search

This paper reports on the activities of the workshop held on Sunday 28th April at the CHI'91 conference. Participants were there to discuss different ideas, methods and approaches to using pattern recognition in human-computer interaction.The workshop aimed to bring together researchers using novel methodologies, such as neural networks, in HCI applications, as well as practitioners using alternative or more traditional

Janet Finlay; Russell Beale

1993-01-01

347

Experiments with Simulation of Attacks against Computer Networks  

Microsoft Academic Search

\\u000a The paper describes implementation issues of and experiments with the software tool “Attack Simulator” intended for active\\u000a assessment of computer networks vulnerability at the stages of design and deployment. The suggested approach is based on malefactor’s\\u000a intention modeling, ontology-based attack structuring and state machines specification of attack scenarios. The paper characterizes\\u000a a generalized agent-based architecture of Attack Simulator. The generation

Igor V. Kotenko; Evgeny Man'kov

2003-01-01

348

A computational tool for quantitative analysis of vascular networks.  

PubMed

Angiogenesis is the generation of mature vascular networks from pre-existing vessels. Angiogenesis is crucial during the organism' development, for wound healing and for the female reproductive cycle. Several murine experimental systems are well suited for studying developmental and pathological angiogenesis. They include the embryonic hindbrain, the post-natal retina and allantois explants. In these systems vascular networks are visualised by appropriate staining procedures followed by microscopical analysis. Nevertheless, quantitative assessment of angiogenesis is hampered by the lack of readily available, standardized metrics and software analysis tools. Non-automated protocols are being used widely and they are, in general, time--and labour intensive, prone to human error and do not permit computation of complex spatial metrics. We have developed a light-weight, user friendly software, AngioTool, which allows for quick, hands-off and reproducible quantification of vascular networks in microscopic images. AngioTool computes several morphological and spatial parameters including the area covered by a vascular network, the number of vessels, vessel length, vascular density and lacunarity. In addition, AngioTool calculates the so-called "branching index" (branch points/unit area), providing a measurement of the sprouting activity of a specimen of interest. We have validated AngioTool using images of embryonic murine hindbrains, post-natal retinas and allantois explants. AngioTool is open source and can be downloaded free of charge. PMID:22110636

Zudaire, Enrique; Gambardella, Laure; Kurcz, Christopher; Vermeren, Sonja

2011-01-01

349

A Computational Tool for Quantitative Analysis of Vascular Networks  

PubMed Central

Angiogenesis is the generation of mature vascular networks from pre-existing vessels. Angiogenesis is crucial during the organism' development, for wound healing and for the female reproductive cycle. Several murine experimental systems are well suited for studying developmental and pathological angiogenesis. They include the embryonic hindbrain, the post-natal retina and allantois explants. In these systems vascular networks are visualised by appropriate staining procedures followed by microscopical analysis. Nevertheless, quantitative assessment of angiogenesis is hampered by the lack of readily available, standardized metrics and software analysis tools. Non-automated protocols are being used widely and they are, in general, time - and labour intensive, prone to human error and do not permit computation of complex spatial metrics. We have developed a light-weight, user friendly software, AngioTool, which allows for quick, hands-off and reproducible quantification of vascular networks in microscopic images. AngioTool computes several morphological and spatial parameters including the area covered by a vascular network, the number of vessels, vessel length, vascular density and lacunarity. In addition, AngioTool calculates the so-called “branching index” (branch points / unit area), providing a measurement of the sprouting activity of a specimen of interest. We have validated AngioTool using images of embryonic murine hindbrains, post-natal retinas and allantois explants. AngioTool is open source and can be downloaded free of charge. PMID:22110636

Zudaire, Enrique; Gambardella, Laure; Kurcz, Christopher; Vermeren, Sonja

2011-01-01

350

Transforming an Introductory Linear Algebra Course with a TI-92 Hand-Held Computer.  

ERIC Educational Resources Information Center

Describes how the introduction of the TI-92 transformed a traditional first semester linear algebra course into a matrix-oriented course that emphasized conceptual understanding, relevant applications, and numerical issues. Indicates an increase in students' overall performance as they found the calculator very useful, believed it helped them…

Quesada, Antonio R.

2003-01-01

351

Using a Computer Program To Enhance an English Course in the Novel.  

ERIC Educational Resources Information Center

An English course at DePauw University (Indiana) on the history of the novel was greatly enhanced by the addition of technology. The course looks at novels as portraits of a very flexible human nature in the context of a culture that has steadily changed, moving from a feudal system of static social structure, an economy based on barter, fixed and…

Field, David

352

Peer-Led Team Learning in Mathematics Courses for Freshmen Engineering and Computer Science Students  

ERIC Educational Resources Information Center

Peer-led Team Learning (PLTL) is an instructional method reported to increase student learning in STEM courses. As mathematics is a significant hurdle for many freshmen engineering students, a PLTL program was implemented for students to attempt to improve their course performance. Here, an analysis of PLTL for freshmen engineering students in…

Reisel, John R.; Jablonski, Marissa R.; Munson, Ethan; Hosseini, Hossein

2014-01-01

353

Three short cases for use in online introduction to computer information systems courses  

Microsoft Academic Search

Online courses are now commonplace at many universities, replacing correspondence (postal) based distance education methods. An important and widely used component of online courses are online forums. Forums encourage interaction between students (who may never meet face-to-face) and are a vital part of the virtual classroom experience. Literature suggests that distance learners require a great deal of interaction to overcome

Mark O. Pendergast

2008-01-01

354

Using Blogging and Laptop Computers to Improve Writing Skills on a Vocational Training Course  

ERIC Educational Resources Information Center

The action research project described in this paper was part of an initiative to bring about change in the way courses are delivered in the vocational trades area at UNITEC New Zealand. We decided to focus on students' writing on a new Level 3 course--the Certificate in Automotive and Mechanical Engineering (C.A.M.E.) in which all participants had…

Marsden, Nick; Piggot-Irvine, Eileen

2012-01-01

355

Report on Computing and Networking in the Space Science Laboratory by the SSL Computer Committee  

NASA Technical Reports Server (NTRS)

The Space Science Laboratory (SSL) at Marshall Space Flight Center is a multiprogram facility. Scientific research is conducted in four discipline areas: earth science and applications, solar-terrestrial physics, astrophysics, and microgravity science and applications. Representatives from each of these discipline areas participate in a Laboratory computer requirements committee, which developed this document. The purpose is to establish and discuss Laboratory objectives for computing and networking in support of science. The purpose is also to lay the foundation for a collective, multiprogram approach to providing these services. Special recognition is given to the importance of the national and international efforts of our research communities toward the development of interoperable, network-based computer applications.

Gallagher, D. L. (editor)

1993-01-01

356

SocialCloud: Using Social Networks for Building Distributed Computing Services  

E-print Network

SocialCloud: Using Social Networks for Building Distributed Computing Services Abedelaziz Mohaisen investigate a new computing paradigm, called SocialCloud, in which computing nodes are governed by social ties existing computing paradigms, such as grid computing and the conventional cloud computing paradigms. We

Kim, Dae-Shik

357

A computer-based ``laboratory`` course in mathematical methods for science and engineering: The Legendre Polynomials module. Final report  

SciTech Connect

WhistleSoft, Inc., proposed to convert a successful pedagogical experiment into multimedia software, making it accessible to a much broader audience. A colleague, Richard J. Jacob, has been teaching a workshop course in mathematical methods at Arizona State University (ASU) for lower undergraduate science majors. Students work at their own pace through paper-based tutorials containing many exercises, either with pencil and paper or with computer tools such as spreadsheets. These tutorial modules cry out for conversion into an interactive computer-based tutorial course that is suitable both for the classroom and for self-paced, independent learning. WhistleSoft has made a prototype of one such module, Legendre Polynomials, under Subcontract (No F97440018-35) with the Los Alamos Laboratory`s Technology Commercialization Office for demonstration and marketing purposes.

Silbar, R.R. [WhistleSoft, Inc., Los Alamos, NM (United States)

1998-09-28

358

An effective method for computing the noise in biochemical networks  

NASA Astrophysics Data System (ADS)

We present a simple yet effective method, which is based on power series expansion, for computing exact binomial moments that can be in turn used to compute steady-state probability distributions as well as the noise in linear or nonlinear biochemical reaction networks. When the method is applied to representative reaction networks such as the ON-OFF models of gene expression, gene models of promoter progression, gene auto-regulatory models, and common signaling motifs, the exact formulae for computing the intensities of noise in the species of interest or steady-state distributions are analytically given. Interestingly, we find that positive (negative) feedback does not enlarge (reduce) noise as claimed in previous works but has a counter-intuitive effect and that the multi-OFF (or ON) mechanism always attenuates the noise in contrast to the common ON-OFF mechanism and can modulate the noise to the lowest level independently of the mRNA mean. Except for its power in deriving analytical expressions for distributions and noise, our method is programmable and has apparent advantages in reducing computational cost.

Zhang, Jiajun; Nie, Qing; He, Miao; Zhou, Tianshou

2013-02-01

359

An effective method for computing the noise in biochemical networks.  

PubMed

We present a simple yet effective method, which is based on power series expansion, for computing exact binomial moments that can be in turn used to compute steady-state probability distributions as well as the noise in linear or nonlinear biochemical reaction networks. When the method is applied to representative reaction networks such as the ON-OFF models of gene expression, gene models of promoter progression, gene auto-regulatory models, and common signaling motifs, the exact formulae for computing the intensities of noise in the species of interest or steady-state distributions are analytically given. Interestingly, we find that positive (negative) feedback does not enlarge (reduce) noise as claimed in previous works but has a counter-intuitive effect and that the multi-OFF (or ON) mechanism always attenuates the noise in contrast to the common ON-OFF mechanism and can modulate the noise to the lowest level independently of the mRNA mean. Except for its power in deriving analytical expressions for distributions and noise, our method is programmable and has apparent advantages in reducing computational cost. PMID:23464139

Zhang, Jiajun; Nie, Qing; He, Miao; Zhou, Tianshou

2013-02-28

360

An effective method for computing the noise in biochemical networks  

PubMed Central

We present a simple yet effective method, which is based on power series expansion, for computing exact binomial moments that can be in turn used to compute steady-state probability distributions as well as the noise in linear or nonlinear biochemical reaction networks. When the method is applied to representative reaction networks such as the ON-OFF models of gene expression, gene models of promoter progression, gene auto-regulatory models, and common signaling motifs, the exact formulae for computing the intensities of noise in the species of interest or steady-state distributions are analytically given. Interestingly, we find that positive (negative) feedback does not enlarge (reduce) noise as claimed in previous works but has a counter-intuitive effect and that the multi-OFF (or ON) mechanism always attenuates the noise in contrast to the common ON-OFF mechanism and can modulate the noise to the lowest level independently of the mRNA mean. Except for its power in deriving analytical expressions for distributions and noise, our method is programmable and has apparent advantages in reducing computational cost. PMID:23464139

Zhang, Jiajun; Nie, Qing; He, Miao; Zhou, Tianshou

2013-01-01

361

Students at the University of Abertay Dundee Learn Computer Hacking to Defend Networks  

ERIC Educational Resources Information Center

In this article, the author describes a new cybersecurity course at the University of Abertay Dundee in Scotland. Geoffrey R. Lund, leader of the software-applications program at Abertay, says the course prepares students for a rapidly growing job market by teaching that the best defense is a good offense. Professors set up a network of 20 or so…

Vance, Erik

2007-01-01

362

Computer-mediated communication and the linking of students, text, and author on an ESL writing course listserv  

Microsoft Academic Search

This paper addresses an issue of interest to many first- (L1) and second-language (L2) writing theorists and teachers: the role(s) that computer-mediated communication (CMC) can play in making writing instruction more effective and more meaningful, particularly in the highly technological early years of the twenty-first century. This paper explores the use of CMC in the form of a writing course

Alan Hirvela

2007-01-01

363

Chinese Restaurant Game - Part II: Applications to Wireless Networking, Cloud Computing, and Online Social Networking  

E-print Network

In Part I of this two-part paper [1], we proposed a new game, called Chinese restaurant game, to analyze the social learning problem with negative network externality. The best responses of agents in the Chinese restaurant game with imperfect signals are constructed through a recursive method, and the influence of both learning and network externality on the utilities of agents is studied. In Part II of this two-part paper, we illustrate three applications of Chinese restaurant game in wireless networking, cloud computing, and online social networking. For each application, we formulate the corresponding problem as a Chinese restaurant game and analyze how agents learn and make strategic decisions in the problem. The proposed method is compared with four common-sense methods in terms of agents' utilities and the overall system performance through simulations. We find that the proposed Chinese restaurant game theoretic approach indeed helps agents make better decisions and improves the overall system performan...

Wang, Chih-Yu; Liu, K J Ray

2011-01-01

364

Computational Models and Emergent Properties of Respiratory Neural Networks  

PubMed Central

Computational models of the neural control system for breathing in mammals provide a theoretical and computational framework bringing together experimental data obtained from different animal preparations under various experimental conditions. Many of these models were developed in parallel and iteratively with experimental studies and provided predictions guiding new experiments. This data-driven modeling approach has advanced our understanding of respiratory network architecture and neural mechanisms underlying generation of the respiratory rhythm and pattern, including their functional reorganization under different physiological conditions. Models reviewed here vary in neurobiological details and computational complexity and span multiple spatiotemporal scales of respiratory control mechanisms. Recent models describe interacting populations of respiratory neurons spatially distributed within the Bötzinger and pre-Bötzinger complexes and rostral ventrolateral medulla that contain core circuits of the respiratory central pattern generator (CPG). Network interactions within these circuits along with intrinsic rhythmogenic properties of neurons form a hierarchy of multiple rhythm generation mechanisms. The functional expression of these mechanisms is controlled by input drives from other brainstem components, including the retrotrapezoid nucleus and pons, which regulate the dynamic behavior of the core circuitry. The emerging view is that the brainstem respiratory network has rhythmogenic capabilities at multiple levels of circuit organization. This allows flexible, state-dependent expression of different neural pattern-generation mechanisms under various physiological conditions, enabling a wide repertoire of respiratory behaviors. Some models consider control of the respiratory CPG by pulmonary feedback and network reconfiguration during defensive behaviors such as cough. Future directions in modeling of the respiratory CPG are considered. PMID:23687564

Lindsey, Bruce G.; Rybak, Ilya A.; Smith, Jeffrey C.

2012-01-01

365

Application of artificial neural networks in computer-aided diagnosis.  

PubMed

Computer-aided diagnosis is a diagnostic procedure in which a radiologist uses the outputs of computer analysis of medical images as a second opinion in the interpretation of medical images, either to help with lesion detection or to help determine if the lesion is benign or malignant. Artificial neural networks (ANNs) are usually employed to formulate the statistical models for computer analysis. Receiver operating characteristic curves are used to evaluate the performance of the ANN alone, as well as the diagnostic performance of radiologists who take into account the ANN output as a second opinion. In this chapter, we use mammograms to illustrate how an ANN model is trained, tested, and evaluated, and how a radiologist should use the ANN output as a second opinion in CAD. PMID:25502383

Liu, Bei

2015-01-01

366

PowerConserving Computation of OrderStatistics over Sensor Networks  

E-print Network

Power­Conserving Computation of Order­Statistics over Sensor Networks Michael B. Greenwald Dept@cis.upenn.edu ABSTRACT We study the problem of power­conserving computation of order statistics in sensor networks such as count, average, or max over sensor networks. In contrast, aggregate queries such as me­ dian have seen

Plotkin, Joshua B.

367

Finding and Analyzing Social Collaboration Networks in the Mexican Computer Science Community  

Microsoft Academic Search

Collaboration of peers is rather common in some scientific communities and is being facilitated with the advances in telecommunication and computer networking technologies. In this paper, we analyze the collaboration networks formed among Mexican computer science scholars, using social network analysis techniques. A series of measurements are performed to identify some patterns of collaboration both among individuals and among Mexican

L. Garcia-Bauelos; Alberto Portilla; A. Chavez-Aragon; O. F. Reyes-Galaviz; H. Ayanegui-Santiago

2009-01-01

368

The research of Cloud Computing based on service plane over optical networks  

Microsoft Academic Search

The implementation of Cloud Computing over optical networks faces many challenges and opportunities. A cloud computing architecture over optical networks is proposed based on the service plane. And the validity of the architecture we proposed was experimentally demonstrated in our Adaptive Multi-Service Optical Network testbed.

Zhen Li; Dahai Han; Jie Zhang; Xiuzhong Chen; Wanyi Gu; Yuefeng Ji

2009-01-01

369

Providing Network Performance Isolation in VDE-Based Cloud Computing Systems  

Microsoft Academic Search

In a cloud computing system, virtual machines owned by different clients are co-hosted on a single physical machine. It is vital to isolate network performance between the clients for ensuring fair usage of the constrained and shared network resources of the physical machine. Unfortunately, the existing network performance isolation techniques are not effective for cloud computing systems because they are

Vijeta Rathore; Jonghun Yoo; Jaesoo Lee; Seongsoo Hong

2011-01-01

370

The Co-Evolution and Emergence of Integrated International Financial Networks and Social Networks: Theory, Analysis, and Computations  

E-print Network

The Co-Evolution and Emergence of Integrated International Financial Networks and Social Networks: Theory, Analysis, and Computations Anna Nagurney Department of Finance and Operations Management Isenberg of such transformations and we develop a rigorous dynamic supernetwork theory for the integration of social networks

Nagurney, Anna

371

Ethics across the computer science curriculum: privacy modules in an introductory database course.  

PubMed

This paper describes the author's experience of infusing an introductory database course with privacy content, and the on-going project entitled Integrating Ethics Into the Database Curriculum, that evolved from that experience. The project, which has received funding from the National Science Foundation, involves the creation of a set of privacy modules that can be implemented systematically by database educators throughout the database design thread of an undergraduate course. PMID:16279760

Appel, Florence

2005-10-01

372

Computers in Instruction.  

ERIC Educational Resources Information Center

The University of Texas is heavily involved with computers in instruction. The computation center, with a Control Data 6600 and 6400, has a great number of course programs and a high usage level. With the NSF a southwest regional computer network was established to share in these programs, and there are 23 institutions currently involved. It is…

Warlick, Charles H.

373

Including Internet insurance as part of a hospital computer network security plan.  

PubMed

Cyber attacks on a hospital's computer network is a new crime to be reckoned with. Should your hospital consider internet insurance? The author explains this new phenomenon and presents a risk assessment for determining network vulnerabilities. PMID:11951384

Riccardi, Ken

2002-01-01

374

Computational Verb Cellular Networks: Part III-Solutions of One-Dimensional Computational Verb Cellular Networks  

Microsoft Academic Search

The theoretical study of conditions, under which three kinds of pattern solutions are generated in 1D computa- tional verb cellular networks(CVCN), is performed. Homogenous pattern solutions are found universal in 1D CVCNs while checkerboard and flip-flop pattern solutions are not rare in 1D CVCNs. Theorems, which provide constraints of parameters of 1D CVCN for generating these three kinds of pattern

Tao Yang

2009-01-01

375

Using distributed processing on a local area network to increase available computing power  

SciTech Connect

The migration from central computers to desktop computers distributed the total computing horsepower of a system over many different machines. A typical engineering office may have several networked desktop computers that are sometimes idle, especially after work hours and when people are absent. Users would benefit if applications were able to use these networked computers collectively. This paper describes a method of distributing the workload of an application on one desktop system to otherwise idle systems on the network. The authors present this discussion from a developer`s viewpoint, because the developer must modify an application before the user can realize any benefit of distributed computing on available systems.

Capps, K.S.; Sherry, K.J.

1996-06-01

376

Measuring the Impact of App Inventor for Android and Studio-Based Learning in an Introductory Computer Science Course for Non-Majors  

ERIC Educational Resources Information Center

A reexamination of the traditional instruction of introductory computer science (CS) courses is becoming a necessity. Introductory CS courses tend to have high attrition rates and low success rates. In many universities, the CS department suffered from low enrollment for several years compared to other majors. Multiple studies have linked these…

Ahmad, Khuloud Nasser

2012-01-01

377

Schools, Computers, and Libraries: Selected Resources from Course Projects Developed by Students in L.S. 8064-90, Villanova University. Fall Term, 1980.  

ERIC Educational Resources Information Center

As part of the requirements for an exploratory graduate course on computers offered by the Department of Library Science for school librarians and other interested persons, students developed course projects relating what they learned to possible applications in school and/or library settings. This resource booklet contains unedited selected…

Brickley, Richard R., Comp.

378

INTERACT-CANCER. The Development and Evaluation of a Computer-Assisted Course on Communication Skills for Medical Specialists in Oncology.  

ERIC Educational Resources Information Center

An interactive, computer-assisted communications skills course, which can fit easily into the busy schedule of medical specialists is presented. A new training method was developed and tested for its appeal to the target group (N=33). Course was evaluated for its relevance, value, and attraction. Results are included and discussed. (EMK)

Hulsman, Robert L.; Ros, Wynand J. G.; Janssen, Miriam; Winnubst, Jacques A. M.

1997-01-01

379

Doctoral school COURSE PROPOSAL  

E-print Network

. Among the many applications that benefit from cloud computing and cloud technologies, the data/computeDoctoral school COURSE PROPOSAL ED SPIM / Course proposal Page 1/2 2013 Title: Cloud computing in the domain of cloud computing. Indeed, during recent years, cloud computing has gained significant traction

Jeanjean, Louis

380

Sending Learning Pills to Mobile Devices in Class to Enhance Student Performance and Motivation in Network Services Configuration Courses  

ERIC Educational Resources Information Center

Teaching electrical and computer software engineers how to configure network services normally requires the detailed presentation of many configuration commands and their numerous parameters. Students tend to find it difficult to maintain acceptable levels of motivation. In many cases, this results in their not attending classes and not dedicating…

Munoz-Organero, M.; Munoz-Merino, P. J.; Kloos, C. D.

2012-01-01

381

Description and computational modeling of the whole course of status epilepticus induced by low dose lithium-pilocarpine in rats.  

PubMed

The main purposes of this study were (1) to describe the whole course of status epilepticus induced by a low dose lithium-pilocarpine model in rats, including depth-EEG from the hippocampus, ECoG from cortex and gross behaviors, and (2) to investigate the possible changes of the intrinsic neural network in the hippocampus during the status epilepticus by model simulation. The course of the induced status epilepticus was divided into baseline, pre-ictal, episodic, onset, continuous, and convalescence stages. At the pre-ictal stage, the main component of the spectrum of the depth-EEG shifted before seizure activity first appeared in the hippocampus at the episodic stage and propagated to the cortex at the onset stage. Model simulation indicated that the changes of depth-EEG of the whole course could be simulated by changes of the loop gains and the inputs of the neural network. The excitatory and inhibitory loops were first enhanced in the pre-ictal stage. The isolated seizures in the episodic stage were caused by variations of inputs from other pyramidal cells. The gain of slow inhibitory loop gradually decreased, leading to the onset of status epilepticus. Different types of waveforms in the status epilepticus corresponded to the different ratio of excitatory and inhibitory influence, caused by different levels of inhibition. Finally, in the convalescence stage, the gains of the excitatory loop and the inhibitory loop both changed toward the base line, recovering the balance. The changes of the parameters in the model were compatible with the experimental results in the literature. PMID:21911214

Chiang, Chia-Chu; Ju, Ming-Shaung; Lin, Chou-Ching K

2011-10-12

382

TILLMPAD NUMERISK STRMNINGSMEKANIK MVK 150 Applied Computational Fluid Mechanics (CFD), basic course  

E-print Network

TILL�MPAD NUMERISK STR�MNINGSMEKANIK MVK 150 Applied Computational Fluid Mechanics (CFD), basic vanligaste lösningsförfarandena presenteras och jämförs. Litteratur Andersson, J.D.; Computational Fluid

383

Recent Results in Photonic Quantum Computations, Simulations and Quantum Networks  

NASA Astrophysics Data System (ADS)

The applications of photonic entanglement manifold and reach from quantum communication [1] to quantum metrology [2] and optical quantum computing [3]. The advantage of the photon's mobility makes optical quantum computing unprecedented in speed, including feed-forward operations with high fidelity [4]. During the last few years the degree of control over photonic multi-particle entanglement has improved substantially and allows for not only overcoming the random nature of spontaneous emission sources [5], but also for the quantum simulation of other quantum systems. Here, I will also present the simulation of four spin-1/2 particles interacting via any Heisenberg-type Hamiltonian [6]. Moreover, recent experimental and theoretical progress, using the concepts of measurement-based quantum computation, indicates that photons are best suited for quantum networks. I will also present present results for the realization for such a client-server environment, where quantum information is communicated and computed using the same physical system [7]. References: [1] PRL 103, 020503 (2009); [2] Nature 429, 158 (2004); [3] Nature 434, 169 (2005); [4] Nature 445, 65 (2007); [5] Nature Photon 4, 553 (2010); [6] Nature Physics 7, 399 (2011); [7] in press.

Walther, Philip

2012-02-01

384

An Introductory Course on Service-Oriented Computing for High Schools  

ERIC Educational Resources Information Center

Service-Oriented Computing (SOC) is a new computing paradigm that has been adopted by major computer companies as well as government agencies such as the Department of Defense for mission-critical applications. SOC is being used for developing Web and electronic business applications, as well as robotics, gaming, and scientific applications. Yet,…

Tsai, W. T.; Chen, Yinong; Cheng, Calvin; Sun, Xin; Bitter, Gary; White, Mary

2008-01-01

385

An investigative laboratory course in human physiology using computer technology and collaborative writing.  

PubMed

Active investigative student-directed experiences in laboratory science are being encouraged by national science organizations. A growing body of evidence from classroom assessment supports their effectiveness. This study describes four years of implementation and assessment of an investigative laboratory course in human physiology for 65 second-year students in sports medicine and biology at a small private comprehensive college. The course builds on skills and abilities first introduced in an introductory investigations course and introduces additional higher-level skills and more complex human experimental models. In four multiweek experimental modules, involving neuromuscular, reflex, and cardiovascular physiology, by use of computerized hardware/software with a variety of transducers, students carry out self-designed experiments with human subjects and perform data collection and analysis, collaborative writing, and peer editing. In assessments, including standard course evaluations and the Salgains Web-based evaluation, student responses to this approach are enthusiastic, and gains in their skills and abilities are evident in their comments and in improved performance. PMID:15319194

FitzPatrick, Kathleen A

2004-12-01

386

Introduction to Computers: Parallel Alternative Strategies for Students. Course No. 0200000.  

ERIC Educational Resources Information Center

Parallel Alternative Strategies for Students (PASS) is a content-centered package of alternative methods and materials designed to assist secondary teachers to meet the needs of mainstreamed learning-disabled and emotionally-handicapped students of various achievement levels in the basic education content courses. This supplementary text and…

Chauvenne, Sherry; And Others

387

Using a Modular Construction Kit for the Realization of an Interactive Computer Graphics Course.  

ERIC Educational Resources Information Center

Recently, platform independent software components, like JavaBeans, have appeared that allow writing reusable components and composing them in a visual builder tool into new applications. This paper describes the use of such models to transform an existing course into a modular construction kit consisting of components of teaching text and program…

Klein, Reinhard; Hanisch, Frank

388

Information for ECE1508F: Introduction to Computational Genome Biology 1 Course objectives  

E-print Network

to understand how the genetic code stored in DNA generates the huge biological diversity that we see around us://www.ebi.ac.uk/microarray/biology_intro.html. Much of the course involves analyzing biological sequences (eg, DNA) and this material is covered quite acids, proteins, RNA, DNA, chromatin. DNA as the "code of life". Extraction of DNA. Genomes, genes

Frey, Brendan J.

389

Investigating Computer-Based Formative Assessments in a Medical Terminology Course  

ERIC Educational Resources Information Center

Research has been conducted on the effectiveness of formative assessments and on effectively teaching medical terminology; however, research had not been conducted on the use of formative assessments in a medical terminology course. A quantitative study was performed which captured data from a pretest, self-assessment, four module exams, and a…

Wilbanks, Jammie T.

2012-01-01

390

13. Engineering and Computer Science in Action: A Course on "The Structure of Engineering Revolutions"  

E-print Network

Revolutions" Eden Miller Medina and David A. Mindell Massachusetts Institute of Technology Abstract This class and the Program in Science, Technology and Society, "The Structure of Engineering Revolutions" illustrates how launched the flagship course "The Structure of Engineering Revolutions" in 1997 under the joint impetus

Medina, Eden

391

Copyright 2013 Michael Ian Shamos Glossary of Terms for the course "Law of Computer Technology"  

E-print Network

transaction conducted or performed, in whole or in part, by electronic means or electronic records, in which the acts or records of one or both parties are not reviewed by an individual in the ordinary course [of STANDARD OF PROOF in criminal cases. For conviction, the trier of fact must find every element of the crime

Shamos, Michael I.

392

Computational methods and opportunities for phosphorylation network medicine  

PubMed Central

Protein phosphorylation, one of the most ubiquitous post-translational modifications (PTM) of proteins, is known to play an essential role in cell signaling and regulation. With the increasing understanding of the complexity and redundancy of cell signaling, there is a growing recognition that targeting the entire network or system could be a necessary and advantageous strategy for treating cancer. Protein kinases, the proteins that add a phosphate group to the substrate proteins during phosphorylation events, have become one of the largest groups of ‘druggable’ targets in cancer therapeutics in recent years. Kinase inhibitors are being regularly used in clinics for cancer treatment. This therapeutic paradigm shift in cancer research is partly due to the generation and availability of high-dimensional proteomics data. Generation of this data, in turn, is enabled by increased use of mass-spectrometry (MS)-based or other high-throughput proteomics platforms as well as companion public databases and computational tools. This review briefly summarizes the current state and progress on phosphoproteomics identification, quantification, and platform related characteristics. We review existing database resources, computational tools, methods for phosphorylation network inference, and ultimately demonstrate the connection to therapeutics. Finally, many research opportunities exist for bioinformaticians or biostatisticians based on developments and limitations of the current and emerging technologies.

Chen, Yian Ann; Eschrich, Steven A.

2014-01-01

393

Optimizing use of course management systems.  

PubMed

In this bimonthly series, the author examines how nurse educators can use Internet and Web-based computer technologies such as search, communication, and collaborative writing tools; social networking and social bookmarking sites; virtual worlds; and Web-based teaching and learning programs. The focus of this article is optimizing the use of a course management system. PMID:21135672

Wink, Diane M

2011-01-01

394

A Case Study: A New Course on Engineering Project and Management for First-Year Graduate Students in Electrical and Computer Engineering  

NSDL National Science Digital Library

The electrical and computer engineering (ECE) department at the University offers a graduate curriculum that is designed to help students develop skills for system integration and acquire effective business and technology practices, as well as, fundamental knowledge in the ECE field. As part of the curriculum, a new course on engineering project and management has been recently introduced to first-year graduate students. This new course guides students through a complete design cycle from inception to completion with a pre-defined project of a complex system. This paper focuses on the experience and lessons learned from offering the Capstone like, project-based design course to first-year ECE graduate students. It reports details of the course and pedagogical approaches to achieving the course objectives. Evaluation results are also presented on course outcomes and learning experience of students.

Lee, Wookwon

395

Experiences with a tablet PC based lecture presentation system in computer science courses  

Microsoft Academic Search

Computer science instructors frequently teach using slides displayed with a computer and a data projector. This has many advantages, e.g., ability to present prepared materials and ease of switching the display to a development environment during mid-presentation. However, existing computer-based presentation systems severely limit flexibility in delivery, hindering instructors' extemporaneous adaptation of their presentations to match their audiences. One major

Richard J. Anderson; Ruth E. Anderson; Beth Simon; Steven A. Wolfman; Tammy VanDeGrift; Ken Yasuhara

2004-01-01

396

The effectiveness of computer-assisted instruction in a horticultural plant identification course  

E-print Network

of horticultural plants and to determine if a relationship existed between students' learning style and attitudes toward computers upon cognitive knowledge gained. Students learned plant identification by one of three treatments: 1) viewing live specimen, 2... score than students with a Converger (learn by thinking) learning style. Students had a slightly positive attitude toward computers. Generally, they thought computers were important to the future and were powerful tools in the work force. Students...

Corbett, Mona Rae

1992-01-01

397

Mines Computer and Network Access Agreement For Affiliated Programs (26-Feb-2013) Page 1 of 2 Colorado School of Mines Computer and Network Access Agreement  

E-print Network

and communication. Successful operation of the Internet and other networks relies upon or intentionally trying to create problems with the operation of computer systems the vending machines. But please be careful of equipment and considerate of others

398

Developing a virtualization platform for courses in networking, systems administration and cyber security education  

Microsoft Academic Search

Students studying topics in cyber security benefit from working with realistic training labs that test their knowledge of network security. Cost, space, time, and reproducibility are major factors that prevent instructors from building realistic networks for their students. This paper explores the ways that existing virtualization technologies could be packaged to provide a more accessible, comprehensive, and realistic training and

Kyle E. Stewart; Jeffrey W. Humphries; Todd R. Andel

2009-01-01

399

A major problem in teaching com-puter architecture and organization courses is  

E-print Network

of the environment encompasses three self-contained systems: · RISC-processor-based computer system (RCS), · CISC-processor-based computer system (CCS), and · hierarchical memory system (HMS). For both RCS and CCS, structures RCS and CCS differ primarily in processor architecture and organization. RCS architecture RCS has

Milenkovi, Aleksandar

400

An Educational Environment for Teaching a Course in Computer Architecture and Organization  

E-print Network

the graphic simulator. The simulator allows to execute programs at the clock, instruction and program levels and organization. It is made up of an educational computer system, a reference manual, a software package and a set structure of a computer system: processor, memory, input/output subsystem and bus. The reference manual

Milenkovi, Aleksandar

401

Cognitive Correlates of Performance in Algorithms in a Computer Science Course for High School  

ERIC Educational Resources Information Center

Computer science for high school faces many challenging issues. One of these is whether the students possess the appropriate cognitive ability for learning the fundamentals of computer science. Online tests were created based on known cognitive factors and fundamental algorithms and were implemented among the second grade students in the…

Avancena, Aimee Theresa; Nishihara, Akinori

2014-01-01

402

Hardware and Software Considerations in Computer Based Course Management. Technical Report No. 4.  

ERIC Educational Resources Information Center

Three of the more obvious advantages of using a computer to coordinate the logistics of a multifaceted instructional program with large numbers of students are the computer's ability to reliably control student activities, to keep and analyze data, and to make available instructional and evaluative materials. This document describes a…

Alessi, Stephen M.; And Others

403

Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey  

E-print Network

of network dynamics on trust dynamics and the impact of trust on security services. I. INTRODUCTIONTrust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey Kannan Govindan, Member IEEE and Prasant Mohapatra, Fellow IEEE Abstract Trust is an important aspect of mobile adhoc networks

California at Davis, University of

404

Sensor networks comprise a large number of low-cost miniaturized computers each acting autonomously and  

E-print Network

Sensor networks comprise a large number of low-cost miniaturized computers each acting autonomously. For example sensor networks can help to get higher fidelity information, get information in real time, get that sensor networks will be applied in many different areas in the future. Application areas might

Roedig, Utz

405

University of Tbingen WSI Computer Networks and Internet CATS Cooperating Autonomous Detection Systems  

E-print Network

University of Tübingen WSI ­ Computer Networks and Internet CATS ­ Cooperating Autonomous Detection destination, aggregate,...) Potential Techniques: - statistical tests, neural networks, Bayes networks CATS (CATS). While a single detection system is able to identify ongoing attacks autonomously, cooperation

Carle, Georg

406

Packet-voice communication on an ethernet local computer network: an experimental study  

Microsoft Academic Search

Local computer networks have been used successfully for data applications such as file transfers for several years. Recently, there have been several proposals for using these networks for voice applications also. We describe a simple voice protocol for use on a packet-switching local network. This protocol is used in an experimental study of the feasibility of using a 3 Mbps

Timothy A Gonsalves

1983-01-01

407

H.264 BASED ARCHITECTURE OF DIGITAL SURVEILLANCE NETWORK IN APPLICATION TO COMPUTER VISUALIZATION  

E-print Network

locations may then be transferred to a control room where human guards monitor the informationH.264 BASED ARCHITECTURE OF DIGITAL SURVEILLANCE NETWORK IN APPLICATION TO COMPUTER VISUALIZATION INTRODUCTION Analog Surveillance Network Present visual surveillance network systems are mainly designed

Fan, Jeffrey

408

Towards Virtual Networks for Virtual Machine Grid Computing Ananth I. Sundararaj Peter A. Dinda  

E-print Network

Towards Virtual Networks for Virtual Machine Grid Computing Ananth I. Sundararaj Peter A. Dinda Virtual machines can greatly simplify wide-area dis- tributed computing by lowering the level because remote sites are loath to provide connectivity to any machine attached to the site network

Subhlok, Jaspal

409

Breakthroughs and Views Recent advances in computational promoter analysis in understanding the transcriptional regulatory network  

Microsoft Academic Search

The computational approach to the study of transcriptional regulation networks has become more attractive and feasible with the rapid accumulation of complete genome sequences and the advance of high-throughput expression profiling technology. In this review, current computational approaches for understanding the transcriptional regulatory network, including promoter prediction, transcription factor binding site identification, combinatorial regulatory elements prediction, and transcription factor target

Ping Qiu

410

Computational inference of transcriptional regulatory networks from expression profiling and transcription factor binding site identification  

Microsoft Academic Search

We have developed a computational method for transcriptional regulatory network inference, CARRIE (Computational Ascertainment of Regu- latory Relationships Inferred from Expression), which combines microarray and promoter sequence analysis. CARRIE uses sources of data to identify the transcription factors (TFs) that regulate gene expression changes in response to a stimulus and generates testable hypotheses about the regulatory network connecting these TFs

Peter M. Haverty; Ulla Hansen; Zhiping Weng

2004-01-01

411

Fluid Centrality: A Social Network Analysis of Social-Technical Relations in Computer-Mediated Communication  

ERIC Educational Resources Information Center

In this article, centrality is explored as a measure of computer-mediated communication (CMC) in networked learning. Centrality measure is quite common in performing social network analysis (SNA) and in analysing social cohesion, strength of ties and influence in CMC, and computer-supported collaborative learning research. It argues that measuring…

Enriquez, Judith Guevarra

2010-01-01

412

Cloud networking and communications Cloud computing is having an important impact on  

E-print Network

Editorial Cloud networking and communications Cloud computing is having an important impact attention has been devoted to system aspects of Cloud computing. More recently, however, the focus. This special issue presents recent research in the area of communications and networking in the Cloud. Over

Boutaba, Raouf

413

DISCRETE EVENT SIMULATION OF OPTICAL SWITCH MATRIX PERFORMANCE IN COMPUTER NETWORKS  

SciTech Connect

In this paper, we present application of a Discrete Event Simulator (DES) for performance modeling of optical switching devices in computer networks. Network simulators are valuable tools in situations where one cannot investigate the system directly. This situation may arise if the system under study does not exist yet or the cost of studying the system directly is prohibitive. Most available network simulators are based on the paradigm of discrete-event-based simulation. As computer networks become increasingly larger and more complex, sophisticated DES tool chains have become available for both commercial and academic research. Some well-known simulators are NS2, NS3, OPNET, and OMNEST. For this research, we have applied OMNEST for the purpose of simulating multi-wavelength performance of optical switch matrices in computer interconnection networks. Our results suggest that the application of DES to computer interconnection networks provides valuable insight in device performance and aids in topology and system optimization.

Imam, Neena [ORNL; Poole, Stephen W [ORNL

2013-01-01

414

Pedagogical Utilization and Assessment of the Statistic Online Computational Resource in Introductory Probability and Statistics Courses  

ERIC Educational Resources Information Center

Technology-based instruction represents a new recent pedagogical paradigm that is rooted in the realization that new generations are much more comfortable with, and excited about, new technologies. The rapid technological advancement over the past decade has fueled an enormous demand for the integration of modern networking, informational and…

Dinov, Ivo D.; Sanchez, Juana; Christou, Nicolas

2008-01-01

415

WaveJava: Wavelet-based network computing  

NASA Astrophysics Data System (ADS)

Wavelet is a powerful theory, but its successful application still needs suitable programming tools. Java is a simple, object-oriented, distributed, interpreted, robust, secure, architecture-neutral, portable, high-performance, multi- threaded, dynamic language. This paper addresses the design and development of a cross-platform software environment for experimenting and applying wavelet theory. WaveJava, a wavelet class library designed by the object-orient programming, is developed to take advantage of the wavelets features, such as multi-resolution analysis and parallel processing in the networking computing. A new application architecture is designed for the net-wide distributed client-server environment. The data are transmitted with multi-resolution packets. At the distributed sites around the net, these data packets are done the matching or recognition processing in parallel. The results are fed back to determine the next operation. So, the more robust results can be arrived quickly. The WaveJava is easy to use and expand for special application. This paper gives a solution for the distributed fingerprint information processing system. It also fits for some other net-base multimedia information processing, such as network library, remote teaching and filmless picture archiving and communications.

Ma, Kun; Jiao, Licheng; Shi, Zhuoer

1997-04-01

416

Construction of a closed polymer network for computer simulations.  

PubMed

Computer simulations are an important tool for linking the behaviour of polymer materials to the properties of the constituent polymer chains. In simulations, one normally uses periodic boundary conditions to mimic a macroscopic system. For a cross-linked polymer network, this will impose restrictions on the motion of the polymer chains at the borders of the simulation cell. We present a new method for constructing a three-dimensional closed network without periodic boundaries by embedding the system onto the surface of a sphere in four dimensions. This method can also be used to construct finite-sized gel particles for simulating the swelling of particles in a surrounding solvent. The method is described in algorithmic detail to allow the incorporation of the method into different types of simulation programs. We also present the results of Brownian dynamics simulations, analyzing the end-to-end distribution, radial distribution function, and the pore size distribution for different volume fractions and for chains with varying stiffness. PMID:25338887

Kamerlin, Natasha; Ekholm, Tobias; Carlsson, Tobias; Elvingson, Christer

2014-10-21

417

Ion-photon networks for scalable quantum computing  

NASA Astrophysics Data System (ADS)

Trapped ions connected by photons are a promising avenue for large-scale quantum computing and quantum information transfer. Previous experiments with photonically connected, distant, trapped ions establish ion entanglement and teleportation. Here, we report advances toward combining these photonic gates between distant ions with Coulombic gates between nearby ions in order to demonstrate a scalable quantum network. Specifically, we show individual optical addressing of single ions, allowing for photonic entanglement to be performed separately from Coulombic gates. Additionally, we move from a four rod trap to a segmented blade-type trap to more easily hold a larger number of ions. Finally, we implement a more robust method of ion entanglement that lessens dephasing due to rf trap noise. These improvements are important steps to the realization of a scalable ion-photon network. This work was supported by grants from the U.S. Army Research Office with funding from IARPA, the DARPA OLE program, and the MURI program; the NSF PIF Program; the NSF Physics Frontier Center at JQI; the European Commission AQUTE program.

Clark, Susan; Hayes, David; Hucul, David; Debnath, Shantanu; Quraishi, Qudsia; Olmschenk, Steven; Matsukevich, Dzmitry; Maunz, Peter; Monroe, Christopher

2011-06-01

418

Distributed Sensor Network With Collective Computation For Situational Awareness  

NASA Astrophysics Data System (ADS)

Initiated under Laboratory Directed R&D funding we have engaged in empirical studies, theory development, and initial hardware development for a ground-based Distributed Sensor Network with Collective Computation (DSN-CC). A DSN-CC is a network that uses node-to-node communication and on-board processing to achieve gains in response time, power usage, communication bandwidth, detection resolution, and robustness. DSN-CCs are applicable to both military and civilian problems where massive amounts of data gathered over a large area must be processed to yield timely conclusions. We have built prototype hardware DSN-CC nodes. Each node has self-contained power and is 6"×10"×2". Each node contains a battery pack with power feed from a solar panel that forms the lid, a central processing board, a GPS card, and radio card. Further system properties will be discussed, as will scenarios in which the system might be used to counter Nuclear/Biological/Chemical (NBC) threats of unconventional warfare. Mid-year in FY02 this DSN-CC research project received funding from the Office of Nonproliferation Research and Engineering (NA-22), NNSA to support nuclear proliferation technology development.

Dreicer, Jared S.; Jorgensen, Anders M.; Dors, Eric E.

2002-10-01

419

CS 556: Cyber-Physical Systems: Languages and Course Description  

E-print Network

CS 556: Cyber-Physical Systems: Languages and Systems Course Description As the advance of computer hardware, embedded devices, and network technology, applications that involve both cyber and physical general-purpose and traditional computer appli- cations, cyber-physical systems have both continuous

Heller, Barbara

420

Computer simulation of the segmental neural network generating locomotion in lamprey by using populations of network interneurons  

Microsoft Academic Search

Realistic computer simulations of the experimentally established local spinal cord neural network generating swimming in the lamprey have been performed. Populations of network interneurons were used in which cellular properties, like cell size and membrane conductance including voltage dependent ion channels were randomly distributed around experimentally obtained mean values, as were synaptic conductances (kainate\\/AMPA, NMDA, glycine) and delays. This population

Jeanette Hellgren; Sten Grillner; Anders Lansner

1992-01-01

421

Investigating Patterns of Interaction in Networked Learning and Computer-Supported Collaborative Learning: A Role for Social Network Analysis  

ERIC Educational Resources Information Center

The focus of this study is to explore the advances that Social Network Analysis (SNA) can bring, in combination with other methods, when studying Networked Learning/Computer-Supported Collaborative Learning (NL/CSCL). We present a general overview of how SNA is applied in NL/CSCL research; we then go on to illustrate how this research method can…

de Laat, Maarten; Lally, Vic; Lipponen, Lasse; Simons, Robert-Jan

2007-01-01

422

On the chronometry and metrology of computer network timescales and their application to the network time protocol  

Microsoft Academic Search

This paper summarizes issues in computer network timekeeping with respect to the Network Time Protocol, which is used to synchronize time in many of the hosts and gateways of the Internet. It describes the methods used to coordinate and disseminate international time services and how they are incorporated into NTP time servers. It discusses the hazards on reckoning NTP dates

David L. Mills

1991-01-01

423

Calculating a checksum with inactive networking components in a computing system  

DOEpatents

Calculating a checksum utilizing inactive networking components in a computing system, including: identifying, by a checksum distribution manager, an inactive networking component, wherein the inactive networking component includes a checksum calculation engine for computing a checksum; sending, to the inactive networking component by the checksum distribution manager, metadata describing a block of data to be transmitted by an active networking component; calculating, by the inactive networking component, a checksum for the block of data; transmitting, to the checksum distribution manager from the inactive networking component, the checksum for the block of data; and sending, by the active networking component, a data communications message that includes the block of data and the checksum for the block of data.

Aho, Michael E; Chen, Dong; Eisley, Noel A; Gooding, Thomas M; Heidelberger, Philip; Tauferner, Andrew T

2014-12-16

424

DEPARTMENT OF COMPUTER SCIENCE Course Offerings -Fall 2012 (as of August 3, 2012)  

E-print Network

to Programming for Scientific Computing 03 MWF 10:00-10:50 C-2033 Wlodek Zuberek Laboratory 63 W 14:00-17:00 CS COMP 3710-001 Vocational Languages 05 MWF 12:00-12:50 EN-1002 G. Tina Yu COMP 3716-001 Software 3731-001 Introduction to Scientific Computing 03 MWF 10:00-10:50 EN-1003 George Miminis COMP 3754

Oyet, Alwell

425

ACM Journal of Educational Resources in Computing, Vol. 3, No. 2, June 2003, Article 2. Animation of Computer Networking Concepts  

E-print Network

and Wide- Area Networks---Ethernet, Internet General Terms: Design, Performance, Reliability Additional Key is implemented in the Internet. Categories and Subject Descriptors: K.3.2 [Computers and Education]: Computer. __________________________________________________________________________________________ 1. INTRODUCTION The importance of the Internet and the Web makes it clear that the basic principles

Holliday, Mark A.

426

Neural networks for enhanced human-computer interactions  

Microsoft Academic Search

The use of neural networks to create adaptive models of users and communications channels for use in designing system response characteristics is discussed. Two types of neural networks that will be useful for this type of task are considered. One, the Kohonen learning vector quantization (LVQ) network, is a clustering network. It can adjust the vector element values of a

Alianna J. Maren

1991-01-01

427

Mathematics Course  

NSDL National Science Digital Library

This document from SpaceTEC National Aerospace Technical Education Center presents a core readiness course which will serve to prepare individuals entering the aerospace field. The document is 55 pages and contains materials on both basic and advanced math topics such as whole numbers, fractions, decimals, roots, computing area, measurement systems, and functions of numbers.

2011-07-18

428

NASF transposition network: A computing network for unscrambling p-ordered vectors  

NASA Technical Reports Server (NTRS)

The viewpoints of design, programming, and application of the transportation network (TN) is presented. The TN is a programmable combinational logic network that connects 521 memory modules to 512 processors. The unscrambling of p-ordered vectors to 1-ordered vectors in one cycle is described. The TN design is based upon the concept of cyclic groups from abstract algebra and primitive roots and indices from number theory. The programming of the TN is very simple, requiring only 20 bits: 10 bits for offset control and 10 bits for barrel switch shift control. This simple control is executed by the control unit (CU), not the processors. Any memory access by a processor must be coordinated with the CU and wait for all other processors to come to a synchronization point. These wait and synchronization events can be a degradation in performance to a computation. The TN application is for multidimensional data manipulation, matrix processing, and data sorting, and can also perform a perfect shuffle. Unlike other more complicated and powerful permutation networks, the TN cannot, if possible at all, unscramble non-p-ordered vectors in one cycle.

Lim, R. S.

1979-01-01

429

Factors Affecting the Introduction of Information and Computer Literacy (ICL) Courses.  

ERIC Educational Resources Information Center

This paper summarizes a survey of Dutch junior secondary schools which was conducted to measure their adoption of the "information and computer literacy" (ICL) concept, and to investigate how far the implementation factors identified by Fullan (1982) are consistent with this innovation. The study's objectives were twofold: (1) to collect baseline…

Plomp, Tjeerd; Carleer, Gerrit

430

p88110: A Graphical Simulator for Computer Architecture and Organization Courses  

ERIC Educational Resources Information Center

Studying fundamental Computer Architecture and Organization topics requires a significant amount of practical work if students are to acquire a good grasp of the theoretical concepts presented in classroom lectures or textbooks. The use of simulators is commonly adopted in order to reach this objective. However, as most of the available…

Garcia, M. I.; Rodriguez, S.; Perez, A.; Garcia, A.

2009-01-01

431

Pattern of Non-Task Interactions in Asynchronous Computer-Supported Collaborative Learning Courses  

ERIC Educational Resources Information Center

Despite the importance of the non-task interactions in computer-supported collaborative learning (CSCL) environments as emphasized in the literature, few studies have investigated online behavior of people in the CSCL environments. This paper studies the pattern of non-task interactions among postgraduate students in an Australian university. The…

Abedin, Babak; Daneshgar, Farhad; D'Ambra, John

2014-01-01

432

An Evaluation of Computer-Aided Instruction in an Introductory Biostatistics Course.  

ERIC Educational Resources Information Center

Evaluates the effectiveness of computer assisted instruction for teaching biostatistics to first year students at the UCLA School of Dentistry. Results do not demonstrate the superiority of CAI but do suggest that CAI compares favorably to conventional lecture and programed instruction methods. (RAO)

Forsythe, Alan B.; Freed, James R.

1979-01-01

433

Experiences with a Tablet PC Based Lecture Presentation System in Computer Science Courses  

E-print Network

their audiences. One major limitation of computer-based systems is lack of support for high-quality handwriting of flexibility during presentation ­ especially the capacity to adjust the lecture based on audience reaction and document cameras) support high quality handwriting over slides, enabling the instructor to augment prepared

VanDeGrift, Tammy

434

Applying Synchronous Computer-Mediated Communication into Course Design: Some Considerations and Practical Guides  

ERIC Educational Resources Information Center

Purpose: The increased pressure to incorporate communication technologies into learning environments has intensified the attention given to the role of computer-mediated communication (CMC) in academic settings. However, the issue of how and why these technologies, especially synchronous CMC applications, has been given less attention in…

Olaniran, Bolanle A.

2006-01-01

435

Can Peer Instruction Be Effective in Upper-Division Computer Science Courses?  

ERIC Educational Resources Information Center

Peer Instruction (PI) is an active learning pedagogical technique. PI lectures present students with a series of multiple-choice questions, which they respond to both individually and in groups. PI has been widely successful in the physical sciences and, recently, has been successfully adopted by computer science instructors in lower-division,…

Bailey Lee, Cynthia; Garcia, Saturnino; Porter, Leo

2013-01-01

436

Student Attrition in a Computer-Managed Course and Cognitive Attributes. Summary.  

ERIC Educational Resources Information Center

The incorporation of computer-managed instruction into an academic program made it necessary to identify those cognitive styles, abilities, and aptitudes which were relevant to the success or failure of trainees in the Navy's Basic Electricity and Electronics (BE/E) School in order to minimize the attrition rate. Measures of 6 styles, 6 abilities,…

Federico, Pat-Anthony; Landis, David B.

437

Computer Security in the Introductory Business Information Systems Course: An Exploratory Study of Textbook Coverage  

ERIC Educational Resources Information Center

The authors conducted an evaluation of Management Information Systems (MIS) textbooks and found that computer security receives very little in-depth coverage. The textbooks provide, at best, superficial treatment of security issues. The research results suggest that MIS faculty need to provide material to supplement the textbook to provide…

Sousa, Kenneth J.; MacDonald, Laurie E.; Fougere, Kenneth T.

2005-01-01

438

Incorporating Computer-Aided Software in the Undergraduate Chemical Engineering Core Courses  

ERIC Educational Resources Information Center

Introductions of computer-aided software and simulators are implemented during the sophomore-year of the chemical engineering (ChE) curriculum at the American University of Sharjah (AUS). Our faculty concurs that software integration within the curriculum is beneficial to our students, as evidenced by the positive feedback received from industry…

Alnaizy, Raafat; Abdel-Jabbar, Nabil; Ibrahim, Taleb H.; Husseini, Ghaleb A.

2014-01-01

439

The Time Course of Task-Specific Memory Consolidation Effects in Resting State Networks  

PubMed Central

Previous studies have reported functionally localized changes in resting-state brain activity following a short period of motor learning, but their relationship with memory consolidation and their dependence on the form of learning is unclear. We investigate these questions with implicit or explicit variants of the serial reaction time task (SRTT). fMRI resting-state functional connectivity was measured in human subjects before the tasks, and 0.1, 0.5, and 6 h after learning. There was significant improvement in procedural skill in both groups, with the group learning under explicit conditions showing stronger initial acquisition, and greater improvement at the 6 h retest. Immediately following acquisition, this group showed enhanced functional connectivity in networks including frontal and cerebellar areas and in the visual cortex. Thirty minutes later, enhanced connectivity was observed between cerebellar nuclei, thalamus, and basal ganglia, whereas at 6 h there was enhanced connectivity in a sensory-motor cortical network. In contrast, immediately after acquisition under implicit conditions, there was increased connectivity in a network including precentral and sensory-motor areas, whereas after 30 min a similar cerebello-thalamo-basal ganglionic network was seen as in explicit learning. Finally, 6 h after implicit learning, we found increased connectivity in medial temporal cortex, but reduction in precentral and sensory-motor areas. Our findings are consistent with predictions that two variants of the SRTT task engage dissociable functional networks, although there are also networks in common. We also show a converging and diverging pattern of flux between prefrontal, sensory-motor, and parietal areas, and subcortical circuits across a 6 h consolidation period. PMID:24623776

Sami, Saber; Robertson, Edwin M.

2014-01-01

440

Model Course: Tactical Perimeter Defense  

NSDL National Science Digital Library

This site includes a model course from the CyberWatch Center. The site does not currently include any educational materials, but does provide a model framework for structuring a course on this topic. This course would cover all of the security related issues and essential skills that network administrators would need to successfully implement security in a given network. A detailed course outline is included. Users must register to view the model course, but registration is free and easy.

441

TCOM 500 (ESE 404): Introduction to Networks and Protocols Summer 2013  

E-print Network

TCOM 500 (ESE 404): Introduction to Networks and Protocols Summer 2013 Instructor: Prof. Kassam Course Description This course introduces the principles of computer networks and associated protocols switching, link layer and error control coding, multiple access and local area networks (Ethernet, wireless

Plotkin, Joshua B.

442

Designing a parallel evolutionary algorithm for inferring gene networks on the cloud computing environment  

PubMed Central

Background To improve the tedious task of reconstructing gene networks through testing experimentally the possible interactions between genes, it becomes a trend to adopt the automated reverse engineering procedure instead. Some evolutionary algorithms have been suggested for deriving network parameters. However, to infer large networks by the evolutionary algorithm, it is necessary to address two important issues: premature convergence and high computational cost. To tackle the former problem and to enhance the performance of traditional evolutionary algorithms, it is advisable to use parallel model evolutionary algorithms. To overcome the latter and to speed up the computation, it is advocated to adopt the mechanism of cloud computing as a promising solution: most popular is the method of MapReduce programming model, a fault-tolerant framework to implement parallel algorithms for inferring large gene networks. Results This work presents a practical framework to infer large gene networks, by developing and parallelizing a hybrid GA-PSO optimization method. Our parallel method is extended to work with the Hadoop MapReduce programming model and is executed in different cloud computing environments. To evaluate the proposed approach, we use a well-known open-source software GeneNetWeaver to create several yeast S. cerevisiae sub-networks and use them to produce gene profiles. Experiments have been conducted and the results have been analyzed. They show that our parallel approach can be successfully used to infer networks with desired behaviors and the computation time can be largely reduced. Conclusions Parallel population-based algorithms can effectively determine network parameters and they perform better than the widely-used sequential algorithms in gene network inference. These parallel algorithms can be distributed to the cloud computing environment to speed up the computation. By coupling the parallel model population-based optimization method and the parallel computational framework, high quality solutions can be obtained within relatively short time. This integrated approach is a promising way for inferring large networks. PMID:24428926

2014-01-01

443

Towards a Load Balancing in a three-level cloud computing network  

Microsoft Academic Search

Network bandwidth and hardware technology are developing rapidly, resulting in the vigorous development of the Internet. A new concept, cloud computing, uses low-power hosts to achieve high reliability. The cloud computing, an Internet-based development in which dynamically scalable and often virtualized resources are provided as a service over the Internet has become a significant issue. The cloud computing refers to

Shu-Ching Wang; Kuo-Qin Yan; Wen-Pin Liao; Shun-Sheng Wang

2010-01-01

444

IEEE Network July/August 20114 loud computing is a recent trend in information  

E-print Network

a respected information source on foundational research and trends in cloud computing. The first article, and delivered. The key driving forces behind the emergence of cloud computing include the overcapacity of today of storage, and progressive improvements in networking technologies. Cloud computing opens new per- spectives

Pallis, George

445

Identification of Shared Components and Sparse Networks in Gene Expression Time-Course Data  

Microsoft Academic Search

High-throughput gene expression technologies such as microarrays have been utilized in a variety of scientific applications. In this article, we develop multivariate techniques for visualizing gene regulatory networks using independent components analysis (ICA) techniques. A desirable feature of the ICA method is that it approximates a biological model for the gene expression. The methods are outlined and illustrated with application

Debashis Ghosh

2004-01-01

446

Research of trust model in P2P network based on trusted computing  

NASA Astrophysics Data System (ADS)

In order to strengthen the security of P2P networks, it is necessary to build trust relationships between nodes of networks. However, the traditional trust evaluation models can't resist the attacks of Pseudospoofing and Pseudostheft effectively. To resolve the problems, in this paper, the trusted computing method is introduced into P2P networks, and an idea of group trust model based on trusted computing methods is proposed. In the process of trust evaluation, the model can realize the anonymous attestation of the node body, which improves the creditability of trust relationships between nodes and resolves the security problems of P2P networks.

Li, Rong; Li, Lei

2013-03-01

447

A Feasibility Study of Synthesizing Subsurfaces Modeled with Computational Neural Networks  

NASA Technical Reports Server (NTRS)

This paper investigates the feasibility of synthesizing substructures modeled with computational neural networks. Substructures are modeled individually with computational neural networks and the response of the assembled structure is predicted by synthesizing the neural networks. A superposition approach is applied to synthesize models for statically determinate substructures while an interface displacement collocation approach is used to synthesize statically indeterminate substructure models. Beam and plate substructures along with components of a complicated Next Generation Space Telescope (NGST) model are used in this feasibility study. In this paper, the limitations and difficulties of synthesizing substructures modeled with neural networks are also discussed.

Wang, John T.; Housner, Jerrold M.; Szewczyk, Z. Peter

1998-01-01

448

An efficient data assimilation schema for restoration and extension of gene regulatory networks using time-course observation data.  

PubMed

Gene regulatory networks (GRNs) play a central role in sustaining complex biological systems in cells. Although we can construct GRNs by integrating biological interactions that have been recorded in literature, they can include suspicious data and a lack of information. Therefore, there has been an urgent need for an approach by which the validity of constructed networks can be evaluated; simulation-based methods have been applied in which biological observational data are assimilated. However, these methods apply nonlinear models that require high computational power to evaluate even one network consisting of only several genes. Therefore, to explore candidate networks whose simulation models can better predict the data by modifying and extending literature-based GRNs, an efficient and versatile method is urgently required. We applied a combinatorial transcription model, which can represent combinatorial regulatory effects of genes, as a biological simulation model, to reproduce the dynamic behavior of gene expressions within a state space model. Under the model, we applied the unscented Kalman filter to obtain the approximate posterior probability distribution of the hidden state to efficiently estimate parameter values maximizing prediction ability for observational data by the EM-algorithm. Utilizing the method, we propose a novel algorithm to modify GRNs reported in the literature so that their simulation models become consistent with observed data. The effectiveness of our approach was validated through comparison analysis to the previous methods using synthetic networks. Finally, as an application example, a Kyoto Encyclopedia of Genes and Genomes (KEGG)-based yeast cell cycle network was extended with additional candidate genes to better predict the real mRNA expressions data using the proposed method. PMID:25244077

Hasegawa, Takanori; Mori, Tomoya; Yamaguchi, Rui; Imoto, Seiya; Miyano, Satoru; Akutsu, Tatsuya

2014-11-01

449

Evaluation of Computer-Aided Instruction in a Gross Anatomy Course: A Six-Year Study  

NSDL National Science Digital Library

This article describes a multi-year study investigating the effectiveness of web based computer-aided instruction (CAI) and the factors affecting level of individual use. Three CAI were tested that differed in specificity of applicability to the curriculum and in the level of student interaction with the CAI. Outcomes measured include personality preferences, learning styles, and frequency of use as it correlated with exam performance.

2009-02-01

450

From an Executive Network to Executive Control: A Computational Model of the N-back Task  

PubMed Central

A paradigmatic test of executive control, the n-back task, is known to recruit a widely-distributed parietal, frontal and striatal “executive network,” and is thought to require an equally wide array of executive functions. The mapping of functions onto substrates in such a complex task presents a significant challenge to any theoretical framework for executive control. To address this challenge, we developed a biologically-constrained model of the n-back task that emergently develops the ability to appropriately gate, bind, and maintain information in working memory in the course of learning to perform the task. Furthermore, the model is sensitive to proactive interference in ways that match findings from neuroimaging, and shows a U-shaped performance curve after manipulation of prefrontal dopaminergic mechanisms similar to that observed in studies of genetic polymorphisms and pharmacological manipulations. Our model represents a formal computational link between anatomical, functional neuroimaging, genetic, behavioral, and theoretical levels of analysis in the study of executive control. In addition, the model specifies one way in which the prefrontal cortex, basal ganglia, parietal, and sensory cortices may learn to cooperate and give rise to executive control. PMID:21563882

Chatham, Christopher H.; Herd, Seth A.; Brant, Angela M.; Hazy, Thomas E.; Miyake, Akira; O’Reilly, Randy; Friedman, Naomi P.

2011-01-01

451

Friendly Neighborhood Computer Project. Extension of the IBM NJE network to DEC VAX computers  

SciTech Connect

This manual is divided into six chapters. The first is an overview of the VAX NJE emulator system and describes what can be done with the VAX NJE emulator software. The second chapter describes the commands that users of the VAX systems will use. Each command description includes the format of the command, a list of valid options and parameters and their meanings, and several short examples of command use. The third chapter describes the commands and capabilities for sending general, sequential files from and to VAX VMS nodes. The fourth chapter describes how to transmit data to a VAX from other computer systems on the network. The fifth chapter explains how to exchange electronic mail with IBM CMS users and with users of other VAX VMS systems connected by NJE communications. The sixth chapter describes operator procedures and the additional commands operators may use.

Raffenetti, R.C.; Bertoncini, P.J.; Engert, D.E.

1984-07-01

452

A computational molecular design framework for crosslinked polymer networks  

PubMed Central

Crosslinked polymers are important in a very wide range of applications including dental restorative materials. However, currently used polymeric materials experience limited durability in the clinical oral environment. Researchers in the dental polymer field have generally used a time-consuming experimental trial-and-error approach to the design of new materials. The application of computational molecular design (CMD) to crosslinked polymer networks has the potential to facilitate development of improved polymethacrylate dental materials. CMD uses quantitative structure property relations (QSPRs) and optimization techniques to design molecules possessing desired properties. This paper describes a mathematical framework which provides tools necessary for the application of CMD to crosslinked polymer systems. The novel parts of the system include the data structures used, which allow for simple calculation of structural descriptors, and the formulation of the optimization problem. A heuristic optimization method, Tabu Search, is used to determine candidate monomers. Use of a heuristic optimization algorithm makes the system more independent of the types of QSPRs used, and more efficient when applied to combinatorial problems. A software package has been created which provides polymer researchers access to the design framework. A complete example of the methodology is provided for polymethacrylate dental materials. PMID:23904665

Eslick, J.C.; Ye, Q.; Park, J.; Topp, E.M.; Spencer, P.; Camarda, K.V.

2013-01-01

453

Adaptive Management of Computing and Network Resources for Spacecraft Systems  

NASA Technical Reports Server (NTRS)

It is likely that NASA's future spacecraft systems will consist of distributed processes which will handle dynamically varying workloads in response to perceived scientific events, the spacecraft environment, spacecraft anomalies and user commands. Since all situations and possible uses of sensors cannot be anticipated during pre-deployment phases, an approach for dynamically adapting the allocation of distributed computational and communication resources is needed. To address this, we are evolving the DeSiDeRaTa adaptive resource management approach to enable reconfigurable ground and space information systems. The DeSiDeRaTa approach embodies a set of middleware mechanisms for adapting resource allocations, and a framework for reasoning about the real-time performance of distributed application systems. The framework and middleware will be extended to accommodate (1) the dynamic aspects of intra-constellation network topologies, and (2) the complete real-time path from the instrument to the user. We are developing a ground-based testbed that will enable NASA to perform early evaluation of adaptive resource management techniques without the expense of first deploying them in space. The benefits of the proposed effort are numerous, including the ability to use sensors in new ways not anticipated at design time; the production of information technology that ties the sensor web together; the accommodation of greater numbers of missions with fewer resources; and the opportunity to leverage the DeSiDeRaTa project's expertise, infrastructure and models for adaptive resource management for distributed real-time systems.

Pfarr, Barbara; Welch, Lonnie R.; Detter, Ryan; Tjaden, Brett; Huh, Eui-Nam; Szczur, Martha R. (Technical Monitor)

2000-01-01

454

Computer Network Availability at Sandia National Laboratories, Albuquerque NM: Measurement and Perception  

SciTech Connect

The desire to provide a measure of computer network availability at Sandia National Laboratories has existed for along time. Several attempts were made to build this measure by accurately recording network failures, identifying the type of network element involved, the root cause of the problem, and the time to repair the fault. Recognizing the limitations of available methods, it became obvious that another approach of determining network availability had to be defined. The chosen concept involved the periodic sampling of network services and applications from various network locations. A measure of ''network'' availability was then calculated based on the ratio of polling success to failure. The effort required to gather the information and produce a useful metric is not prohibitive and the information gained has verified long held feelings regarding network performance with real data.

NELSON,SPENCER D.; TOLENDINO,LAWRENCE F.

1999-11-01

455

Using distributed processing on a local area network to increase available computing power  

SciTech Connect

The migration from central computers to desktop computers means that the total computing horsepower of a system is now distributed over many different machines. A typical engineering office may have several desktop computers networked that are sometimes idle, especially after hours and when people are absent. It would be beneficial if an application running on one desktop machine could use the computing horsepower of the idle machines on the network. This paper describes a method of distributing the workload of an application of one desktop system to otherwise idle systems on the network. This discussion is presented from a developers` viewpoint, since the developer must modify an application before the user can realize any benefit of distributed computing on available systems.

Capps, K.S.; Sherry, K.J.

1994-12-31

456

TTN: A High Performance Hierarchical Interconnection Network for Massively Parallel Computers  

NASA Astrophysics Data System (ADS)

Interconnection networks play a crucial role in the performance of massively parallel computers. Hierarchical interconnection networks provide high performance at low cost by exploring the locality that exists in the communication patterns of massively parallel computers. A Tori connected Torus Network (TTN) is a 2D-torus network of multiple basic modules, in which the basic modules are 2D-torus networks that are hierarchically interconnected for higher-level networks. This paper addresses the architectural details of the TTN and explores aspects such as node degree, network diameter, cost, average distance, arc connectivity, bisection width, and wiring complexity. We also present a deadlock-free routing algorithm for the TTN using four virtual channels and evaluate the network's dynamic communication performance using the proposed routing algorithm under uniform and various non-uniform traffic patterns. We evaluate the dynamic communication performance of TTN, TESH, MH3DT, mesh, and torus networks by computer simulation. It is shown that the TTN possesses several attractive features, including constant node degree, small diameter, low cost, small average distance, moderate (neither too low, nor too high) bisection width, and high throughput and very low zero load latency, which provide better dynamic communication performance than that of other conventional and hierarchical networks.

Rahman, M. M. Hafizur; Inoguchi, Yasushi; Sato, Yukinori; Horiguchi, Susumu

457

Secure cloud computing with brokered trusted sensor networks  

Microsoft Academic Search

We propose a model for large-scale smartphone based sensor networks, with sensor information processed by clouds and grids, with a mediation layer for processing, filtering and other mashups done via a brokering network. Final aggregate results are assumed to be sent to users through traditional cloud interfaces such as browsers. We conjecture that such a network configuration will have significant

Apu Kapadia; Steven Myers; XiaoFeng Wang; Geoffrey Fox

2010-01-01

458

Model Course: Strategic Infrastructure Security  

NSDL National Science Digital Library

This site includes a model course from the CyberWatch Center. The site does not currently include any educational materials, but does provide a model framework for structuring a course on this topic. The course aims to help students understand the architecture for network defense, leading to the Security Certified Network Professional certification. Topics include network attacks and defenses, firewall systems and network security policies and configurations. A detailed course outline is included. Users must register to view the model course, but registration is free and easy.

459

An Ethernet Java Applet for a Course for Non-Majors.  

ERIC Educational Resources Information Center

Details the topics of a new course that introduces computing and communication technology to students not majoring in computer science. Discusses the process of developing a Java applet (a program that can be invoked through a World Wide Web browser) that illustrates the protocol used by ethernet local area networks to determine which computer can…

Holliday, Mark A.

1997-01-01

460

Main control computer security model of closed network systems protection against cyber attacks  

NASA Astrophysics Data System (ADS)

The model that brings the data input/output under control in closed network systems, that maintains the system securely, and that controls the flow of information through the Main Control Computer which also brings the network traffic under control against cyber-attacks. The network, which can be controlled single-handedly thanks to the system designed to enable the network users to make data entry into the system or to extract data from the system securely, intends to minimize the security gaps. Moreover, data input/output record can be kept by means of the user account assigned for each user, and it is also possible to carry out retroactive tracking, if requested. Because the measures that need to be taken for each computer on the network regarding cyber security, do require high cost; it has been intended to provide a cost-effective working environment with this model, only if the Main Control Computer has the updated hardware.

Seymen, Bilal

2014-06-01

461

Real-time neural network inversion on the SRC-6e reconfigurable computer.  

PubMed

Implementation of real-time neural network inversion on the SRC-6e, a computer that uses multiple field-programmable gate arrays (FPGAs) as reconfigurable computing elements, is examined using a sonar application as a specific case study. A feedforward multilayer perceptron neural network is used to estimate the performance of the sonar system (Jung et al., 2001). A particle swarm algorithm uses the trained network to perform a search for the control parameters required to optimize the output performance of the sonar system in the presence of imposed environmental constraints (Fox et al., 2002). The particle swarm optimization (PSO) requires repetitive queries of the neural network. Alternatives for implementing neural networks and particle swarm algorithms in reconfigurable hardware are contrasted. The final implementation provides nearly two orders of magnitude of speed increase over a state-of-the-art personal computer (PC), providing a real-time solution. PMID:17526353

Duren, Russell W; Marks, Robert J; Reynolds, Paul D; Trumbo, Matthew L

2007-05-01

462

MARIE CURIE Research Training Network (RTN) Computational Optimization Methods in Statistics, Econometrics and Finance  

E-print Network

- 1 ­ MARIE CURIE Research Training Network (RTN) COMISEF Computational Optimization Methods) This new RTN has been established to develop novel optimization procedures for applications in statistics researchers recruited into this RTN will experience an outstanding interdisciplinary training in quantitative

Nagurney, Anna

463

Quantum cryptographic network based on quantum memories Computer Science Department, Technion, Haifa 32000, Israel  

E-print Network

Quantum cryptographic network based on quantum memories Eli Biham Computer Science Department Quantum correlations between two particles show nonclassical properties that can be used for providing secure transmission of information. We present a quantum cryptographic system in which users store

Mor, Tal

464

Security Operation Modes for Enhancement of Utility Computer Network Cyber-Security  

Microsoft Academic Search

Concerns for utility computer networks' security and reliability are growing rapidly due to increasing utility devices with connections to external networks. This aggravates vulnerability of utility networks to cyber-attacks through external connections. Though encryption can provide security for user data transmissions, encryption itself could not provide protections against traffic-analysis attacks. Techniques against traffic-analysis attacks through statistically controlling the transmission rate

Lin Wang; Todd Mander; Helen Cheung; Farhad Nabhani; Richard Cheung

2007-01-01

465

Teaching Network Security in a Virtual Learning Environment  

ERIC Educational Resources Information Center

This article presents a virtual course with the topic network security. The course has been produced by Arcada Polytechnic as a part of the production team Computer Networks, Telecommunication and Telecommunication Systems in the Finnish Virtual Polytechnic. The article begins with an introduction to the evolution of the information security…

Bergstrom, Laura; Grahn, Kaj J.; Karlstrom, Krister; Pulkkis, Goran; Astrom, Peik

2004-01-01

466

Smoothing Vehicular Traffic Flow Using Vehicular-Based Ad Hoc Networking & Computing Grid (VGrid)  

Microsoft Academic Search

We propose VGrid: an ad hoc networking and computing grid formed by leveraging inter-vehicle wireless communications. In addition to exchanging data between vehicles, VGrid actively uses pertinent data to perform computations for solving traffic-related problems. In this paper, we examine the problem of smoothing vehicular traffic flow through the use of real-time position and velocity information exchanged over the network.

Andrew Chen; Behrooz Khorashadi; Chen-Nee Chuah; Dipak Ghosal; Michael Zhang

2006-01-01

467

A computational model for signaling pathways in bounded small-world networks corresponding to brain size  

E-print Network

the number of neurons in the human brain, found that the length of simulated signaling pathway can to characterize signaling in small-world networks with large but bounded numbers of nodes, as in human brainsA computational model for signaling pathways in bounded small-world networks corresponding to brain

Hong, Dawei

468

SOCIAL SCIENCE COMPUTER REVIEW White et al. / KINSHIP AND MARRIAGE NETWORKS  

E-print Network

SOCIAL SCIENCE COMPUTER REVIEW White et al. / KINSHIP AND MARRIAGE NETWORKS Anthropology Analyzing Large Kinship and Marriage Networks With Pgraph and Pajek DOUGLAS R. WHITE University of California to solutions of the problems discussed. Relinking of families through marriage, for example, can be formally

White, Douglas R.

469

Real-time computation at the edge of chaos in recurrent neural networks  

Microsoft Academic Search

Depending on the connectivity, recurrent networks of simple computational units can show very different types of dynamics, ranging from totally ordered to chaotic. We analyze how the type of dynamics (ordered or chaotic) exhibited by randomly connected networks of threshold gates driven by a time-varying input signal depends on the parameters describing the distribution of the connectivity matrix. In particular,

Nils Bertschinger; Thomas Natschlager

2004-01-01

470

Factors Impacting Adult Learner Achievement in a Technology Certificate Program on Computer Networks  

ERIC Educational Resources Information Center

This study investigates the factors impacting the achievement of adult learners in a technology certificate program on computer networks. We studied 2442 participants in 256 institutions. The participants were older than age 18 and were enrolled in the Cisco Certified Network Associate (CCNA) technology training program as "non-degree" or…

Delialioglu, Omer; Cakir, Hasan; Bichelmeyer, Barbara A.; Dennis, Alan R.; Duffy, Thomas M.

2010-01-01

471

Learning and optimization of machining operations using computing abilities of neural networks  

Microsoft Academic Search

The success of automated manufacturing relies to a large extent on the development of computer-based learning schemes that are able to code operational knowledge and to use this knowledge for synthesizing optimal strategies for machining operations. The authors present a scheme that uses a feedforward neural network for the learning and synthesis task. Neural networks consist of a collection of

S. S. Rangwala; D. A. Dornfeld

1989-01-01

472

How to procure cloud computing solutions: a manageable value network approach  

Microsoft Academic Search

Cloud computing research is currently dominated by technology and business-value driven approaches. Recently, the design of aligned procurement processes for cloud solutions in value networks has entered the scientific discourse. Especially in value networks, the implementation of procurement processes for cloud solutions, consisting of infrastructure-, platform - and software components, requires a holistic consideration of both procurement operations and the

Stefan Bensch

2011-01-01

473

Enhance Computational Efficiency of Neural Network Predictive Control Using PSO with  

E-print Network

Enhance Computational Efficiency of Neural Network Predictive Control Using PSO with Controllable For many industrial processes which usually exhibit multivariable and nonlinear dynamical behavior, neural with controllable random exploration velocity (PSO-CREV) is proposed in this paper. 2 Overview on Neural Network

Li, Yangmin

474

J. Parallel Distrib. Comput. 63 (2003) 847852 Routing permutations in Partitioned Optical Passive Stars Networks  

E-print Network

Stars Networks Alessandro Meia,Ă? and Romeo Rizzib a Department of Computer Science, University of Rome Passive Stars (POPS) network with g groups and d processors per group can route any permutation among is optimal in the worst case, and is at most the double of the optimum for all permutations p such that pĂ°i

Mei, Alessandro

475

Dynamic Network Reconfiguration Support for Mobile Computers Jon Inouye Jim Binkley Jonathan Walpole  

E-print Network

] provide users with the ability to dynamically attach or remove devices while the system is runningDynamic Network Reconfiguration Support for Mobile Computers Jon Inouye Jim Binkley Jonathan swapping technology combined with pervasive heterogeneous networks empowers mobile laptop users to select

Binkley, Jim

476

The impact of mass gatherings and holiday traveling on the course of an influenza pandemic: a computational model  

PubMed Central

Background During the 2009 H1N1 influenza pandemic, concerns arose about the potential negative effects of mass public gatherings and travel on the course of the pandemic. Better understanding the potential effects of temporal changes in social mixing patterns could help public officials determine if and when to cancel large public gatherings or enforce regional travel restrictions, advisories, or surveillance during an epidemic. Methods We develop a computer simulation model using detailed data from the state of Georgia to explore how various changes in social mixing and contact patterns, representing mass gatherings and holiday traveling, may affect the course of an influenza pandemic. Various scenarios with different combinations of the length of the mass gatherings or traveling period (range: 0.5 to 5 days), the proportion of the population attending the mass gathering events or on travel (range: 1% to 50%), and the initial reproduction numbers R0 (1.3, 1.5, 1.8) are explored. Results Mass gatherings that occur within 10 days before the epidemic peak can result in as high as a 10% relative increase in the peak prevalence and the total attack rate, and may have even worse impacts on local communities and travelers' families. Holiday traveling can lead to a second epidemic peak under certain scenarios. Conversely, mass traveling or gatherings may have little effect when occurring much earlier or later than the epidemic peak, e.g., more than 40 days earlier or 20 days later than the peak when the initial R0 = 1.5. Conclusions Our results suggest that monitoring, postponing, or cancelling large public gatherings may be warranted close to the epidemic peak but not earlier or later during the epidemic. Influenza activity should also be closely monitored for a potential second peak if holiday traveling occurs when prevalence is high. PMID:21176155

2010-01-01

477

Enhancing Physical Education and Sport Science Students' Self-Efficacy and Attitudes regarding Information and Communication Technologies through a Computer Literacy Course  

ERIC Educational Resources Information Center

Information and Communication Technologies (ICT) have become an integral component of Physical Education (PE) and Sport Science (SS) curricula and professions. It is thus imperative that PE and SS students develop ICT skills, self-efficacy in ICT and positive attitudes towards ICT. This study was aimed at designing a computer literacy course

Papastergiou, Marina

2010-01-01

478

Effects of Reflection Category and Reflection Quality on Learning Outcomes during Web-Based Portfolio Assessment Process: A Case Study of High School Students in Computer Application Course  

ERIC Educational Resources Information Center

This study examines the effects of reflection category and reflection quality on learning outcomes during Web-based portfolio assessment process. Experimental subjects consist of forty-five eight-grade students in a "Computer Application" course. Through the Web-based portfolio assessment system, these students write reflection, and join…

Chou, Pao-Nan; Chang, Chi-Cheng

2011-01-01

479

The Necessity and Applicability Levels of the Courses that are Offered in the Departments of Computer Education and Instructional Technologies (CEIT)  

ERIC Educational Resources Information Center

The main purpose of this study is to identify the levels of the necessity and applicability of the courses offered in the Departments of Computer Education and Instructional Technologies based on the views of the fourth grade and graduated students. In the study descriptive research model was used. The population of the study were final-year and…

Acat, M. Bahaddin; Kilic, Abdurrahman; Girmen, Pinar; Anagun, Senegul S.

2007-01-01

480

The Effect of Computer-Generated Instructional Feedback and Videotape on the Speaking Performance of College Students in a Basic Speech Course.  

ERIC Educational Resources Information Center

The purpose of this study was to determine the effectiveness of a computer-generated feedback system when used in conjunction with an analysis of videotaped performances of students' speeches and model speeches. Subjects, 112 university students enrolled in 9 sections of a required undergraduate public speaking course, were randomly assigned to 1…

Russell, Bruce W.

481

Effect of Computer Animation Technique on Students' Comprehension of the "Solar System and Beyond" Unit in the Science and Technology Course  

ERIC Educational Resources Information Center

The purpose of this study is to determine the effect of computer animation technique on academic achievement of students in the "Solar System and Beyond" unit lecture as part of the Science and Technology course of the seventh grade in primary education. The sample of the study consists of 60 students attending to the 7th grade of primary school…

Aksoy, Gokhan

2013-01-01

482

Reliability and Validity of Web-Based Portfolio Peer Assessment: A Case Study for a Senior High School's Students Taking Computer Course  

ERIC Educational Resources Information Center

This study examined the reliability and validity of Web-based portfolio peer assessment. Participants were 72 second-grade students from a senior high school taking a computer course. The results indicated that: 1) there was a lack of consistency across various student raters on a portfolio, or inter-rater reliability; 2) two-thirds of the raters…

Chang, Chi-Cheng; Tseng, Kuo-Hung; Chou, Pao-Nan; Chen, Yi-Hui

2011-01-01

483

Online social networks—Paradise of computer viruses  

NASA Astrophysics Data System (ADS)

Online social network services have attracted more and more users in recent years. So the security of social networks becomes a critical problem. In this paper, we propose a virus propagation model based on the application network of Facebook, which is the most popular among these social network service providers. We also study the virus propagation with an email virus model and compare the behaviors of a virus spreading on Facebook with the original email network. It is found that Facebook provides the same chance for a virus spreading while it gives a platform for application developers. And a virus will spread faster in the Facebook network if users of Facebook spend more time on it.

Fan, W.; Yeung, K. H.

2011-01-01

484

Network Security  

NSDL National Science Digital Library

This course on Network Security is provided by the Cyber Security Education Consortium (CSEC). The course requires students to perform laboratory assignments in securing networks and operating systems to learn about "network communications from a security standpoint" and "hardware and software security solutions." Links are provided to learn more about the Major Topics Covered, Course Learning Objectives, and Course Outline. The Course Outline includes a list of careers that require the knowledge from this course and related textbooks.

485

A Critical Role for Network Structure in Seizure Onset: A Computational Modeling Approach  

PubMed Central

Recent clinical work has implicated network structure as critically important in the initiation of seizures in people with idiopathic generalized epilepsies. In line with this idea, functional networks derived from the electroencephalogram (EEG) at rest have been shown to be significantly different in people with generalized epilepsy compared to controls. In particular, the mean node degree of networks from the epilepsy cohort was found to be statistically significantly higher than those of controls. However, the mechanisms by which these network differences can support recurrent transitions into seizures remain unclear. In this study, we use a computational model of the transition into seizure dynamics to explore the dynamic consequences of these differences in functional networks. We demonstrate that networks with higher mean node degree are more prone to generating seizure dynamics in the model and therefore suggest a mechanism by which increased mean node degree of brain networks can cause heightened ictogenicity.

Petkov, George; Goodfellow, Marc; Richardson, Mark P.; Terry, John R.

2014-01-01

486

Python for Education: Computational Methods for Nonlinear Systems  

E-print Network

We describe a novel, interdisciplinary, computational methods course that uses Python and associated numerical and visualization libraries to enable students to implement simulations for a number of different course modules. Problems in complex networks, biomechanics, pattern formation, and gene regulation are highlighted to illustrate the breadth and flexibility of Python-powered computational environments.

Christopher R. Myers; James. P. Sethna

2007-04-24

487

Developmental gene networks: a triathlon on the course to T cell identity.  

PubMed

Cells acquire their ultimate identities by activating combinations of transcription factors that initiate and sustain expression of the appropriate cell type-specific genes. T cell development depends on the progression of progenitor cells through three major phases, each of which is associated with distinct transcription factor ensembles that control the recruitment of these cells to the thymus, their proliferation, lineage commitment and responsiveness to T cell receptor signals, all before the allocation of cells to particular effector programmes. All three phases are essential for proper T cell development, as are the mechanisms that determine the boundaries between each phase. Cells that fail to shut off one set of regulators before the next gene network phase is activated are predisposed to leukaemic transformation. PMID:25060579

Yui, Mary A; Rothenberg, Ellen V

2014-08-01

488

Inference Algorithms for Similarity Networks Department of Computer Science  

E-print Network

of Bayesian networks, each constructed under the assumption that h draws its value from a specific subset for constructing large Bayesian net- works from the judgments of domain experts. Heck- erman used them to construct a diagnostic system for lymph-node pathology. The main advantages of simi- larity networks are their ability

Heckerman, David

489

Conservation Analysis in Biochemical Networks: Computational Issues for Software Writers  

E-print Network

in the community to investigate the potential rewards of analyzing the more readily available topological data, with the advent of genomic wide studies, topological data on networks is readily available. In particu- lar Palsson's group in San Diego have derived a number of network topologies from genomic data [Edwards

Ingalls, Brian

490

Symbolic dynamics and computation in model gene networks R. Edwardsa)  

E-print Network

of ordinary differential equations representing a simplified model of a genetic network. In this network of the equation. This formalism allows us to define bifurcations of chaotic dynamics of the differential equation in these equations are represented by a directed graph on an n-dimensional hypercube (n-cube in which each edge

Siegelmann , Hava T

491

Sun's Network File System (NFS) One of the first uses of distributed client/server computing was  

E-print Network

34 Sun's Network File System (NFS) One of the first uses of distributed client/server computing of data across clients. Thus, if 1 #12;2 SUN'S NETWORK FILE SYSTEM (NFS) you access a file on one machine-DUSSEAU #12;SUN'S NETWORK FILE SYSTEM (NFS) 3 even; in the best such case, no network traffic need be gener

Sheridan, Jennifer

492

Effects of cellular homeostatic intrinsic plasticity on dynamical and computational properties of biological recurrent neural networks.  

PubMed

Homeostatic intrinsic plasticity (HIP) is a ubiquitous cellular mechanism regulating neuronal activity, cardinal for the proper functioning of nervous systems. In invertebrates, HIP is critical for orchestrating stereotyped activity patterns. The functional impact of HIP remains more obscure in vertebrate networks, where higher order cognitive processes rely on complex neural dynamics. The hypothesis has emerged that HIP might control the complexity of activity dynamics in recurrent networks, with important computational consequences. However, conflicting results about the causal relationships between cellular HIP, network dynamics, and computational performance have arisen from machine-learning studies. Here, we assess how cellular HIP effects translate into collective dynamics and computational properties in biological recurrent networks. We develop a realistic multiscale model including a generic HIP rule regulating the neuronal threshold with actual molecular signaling pathways kinetics, Dale's principle, sparse connectivity, synaptic balance, and Hebbian synaptic plasticity (SP). Dynamic mean-field analysis and simulations unravel that HIP sets a working point at which inputs are transduced by large derivative ranges of the transfer function. This cellular mechanism ensures increased network dynamics complexity, robust balance with SP at the edge of chaos, and improved input separability. Although critically dependent upon balanced excitatory and inhibitory drives, these effects display striking robustness to changes in network architecture, learning rates, and input features. Thus, the mechanism we unveil might represent a ubiquitous cellular basis for complex dynamics in neural networks. Understanding this robustness is an important challenge to unraveling principles underlying self-organization around criticality in biological recurrent neural networks. PMID:24048833

Naudé, Jérémie; Cessac, Bruno; Berry, Hugues; Delord, Bruno

2013-09-18

493

Computing the drainage network on huge grid terrains Thiago L. Gomes  

E-print Network

and Problems]: Geo- metrical problems and computations General Terms Algorithms, Experimentation, Performance algorithm, named EMFlow, and its implementation to compute the drainage network, that is, the flow direction most recent and most efficient published methods: TerraFlow and r.watershed.seg. Since processing large

Franklin, W. Randolph

494

Network: Computation in Neural Systems March 2007; 18(1): 13  

E-print Network

Network: Computation in Neural Systems March 2007; 18(1): 1­3 BOOK REVIEW The Computational become an increasingly important component in neurobiological research. Modern multi-electrode and multi-site recording techniques, brain imaging, brain-machine interfaces, data from chronically implanted electrodes

Shadmehr, Reza

495

Exposure assessment of Electromagnetic Fields from Wireless Computer Networks (Wi-Fi); Phase 1 Laboratory Measurements  

E-print Network

Exposure assessment of Electromagnetic Fields from Wireless Computer Networks (Wi-Fi); Phase 1, Didcot, OX11 0RQ Abstract: In order to assess the electromagnetic field exposure from wireless computer in the laboratory in a controlled environment. Review the available information and survey reports to select WLAN

Haddadi, Hamed

496

Building Computational Agents using Neuronal Networks, Schema Theory and Artificial Intelligence1  

E-print Network

Building Computational Agents using Neuronal Networks, Schema Theory and Artificial Intelligence1 that the technology developed in our research fields (e.g., Computational Neurosci- ence, Artificial Intelligence Artificial Intelligence, and in Behavior-Based Robotics [1][2][3], in particular, when the aim is to build

Weitzenfeld, Alfredo

497

Flexible Network Infrastructure for Wearable Computing Using Conductive Fabric and Its Evaluation  

Microsoft Academic Search

Numbers of devices are distributed in the environment in wearable and ubiquitous computing systems, and all of such devices need power supply and communication ways as well as flexibility of placement. Both wireless and wired communication systems intrinsically contain the problems in power supply or flexibility of placement. In this paper, we introduce the flexible network infrastructure for wearable computing

Junichi Akita; Toru Shinmura; Masashi Toda

2006-01-01

498

TEMPORAL MESSAGE ORDERING IN WIRELESS SENSOR NETWORKS Institute for Pervasive Computing  

E-print Network

Computing ETH Zurich, Switzerland email: roemer@inf.ethz.ch ABSTRACT Wireless sensor networks (WSN capable of limited computation, wireless communication, and sensing. In a wide variety of ap- plication, military sys- tems, and business processes, WSNs are envisioned to fulfill complex monitoring tasks. While

499

Zero-error Function Computation in Sensor Networks Hemant Kowshik and P. R. Kumar  

E-print Network

consider the problem of data harvesting in wireless sensor networks. A designated collector node seeks communication and computation capabil- ities, for applications like fault monitoring, data harvesting of the function to combine transmissions at intermediate nodes. Thus the problem of function computation is more

500

SAT-Based Complete Don't-Care Computation for Network Optimization Alan Mishchenko Robert K. Brayton  

E-print Network

SAT-Based Complete Don't-Care Computation for Network Optimization Alan Mishchenko Robert K approach to Boolean network optimization using internal don't-cares. The improvements concern the type of don't-cares computed, their scope, and the computation method. Instead of the traditional compatible

Mishchenko, Alan