The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper examines the process used in scheduling limited resources for blocks of time. The paper compares a complex algorithm current used to a random assignment system on scheduling equity. This research involved scheduling contracted guides with non-regular schedules to tours in advance or the day of the scheduling process. The random assignment algorithm, which is analyzed by equity, replaces...
The focus of this research work is to investigate the problem of providing partition tolerance in cloud-based applications while maintaining application data integrity. This study looks at developing a cloud application to track sales of admission tickets to a battlefield as a motivating example. Web browsers are run inside the premises of the enterprise selling the tickets, while the rest of the...
In this paper, we explore some of the challenges to extracting Wiktionary data so it can be used for machine translation. We provide a use case of considerations made in the development of a web service that transforms raw data in a wiktionary xml dump file into a web-service that provides language translation. Our case study focuses on the performance of this service in comparison to a service using...
In this paper, we investigate the problem of providing highly available, decentralized, dynamic path selection in high performance computing networking. We look at a use case for dynamic path selection that better utilizes bandwidth available in the network. The network architecture we propose is a partial mesh grid whereby each host is directly connected to four forwarding devices. We propose an...
With an increasing population, social media is a trendy form of sharing information, which can be a massive pitfall for unwary users. With a number of users that are largely untrained in proper password creation methodologies, this influx of information can be damaging. This paper aims to describe current measures of password strength, the current user mindset of password generation and how social...
An application running on an android mobile platform may sometimes crash in the midst of its lifecycle without the user triggering an explicit close action. This is due to memory leaks in the system which are introduced due to insufficient memory handling mechanisms. Memory leaks are not easily identified by testing the application. There are a few tools to identify memory usage over time for an application...
Automation of information extraction from eligibility criteria will provide a breakthrough in effective utilization of information for patient search in clinical databases. A majority of eligibility criteria contain temporal information associated with medical conditions and events. This project creates a novel natural language processing (NLP) pipeline for extraction and classification of temporal...
In this paper, we investigate the value of Payment Card Industry Data Security Standard (PCI DSS) by examining popular implementations of hosted payment processing solutions. First, we will dive into Card Connect, a registered ISO of Wells Fargo Bank, and see how their client-side-dependent model allows for trivial manipulation. Then we look at Card Connect plugins for more widespread vulnerabilities...
Cloud services can be consumed using web service calls through the APIs provided by the cloud provider. Although using a fine-grained web-service request allows better flexibility of services, this approach will require service consumers to make multiple service requests to the cloud. The cloud will end up receiving a significantly higher number of requests, lowering the performance and increasing...
The Payment Card Industry Data Security Standard (PCI-DSS, or simply PCI) governs the many security standards associated with payment card transactions. Point of sale systems in today's brick-and-mortar storefronts fall woefully short of these standards at every step of the work flow. They commonly use outdated desktop computers and store card data locally, oftentimes in plaintext. Backups of these...
In his talk, Olmsted will investigate the problem of developing secure development of cloudbased enterprise applications. Consistency, availability, and durability are investigated for web service (WS) transactions. He proposes an approach that matches the availability of the popular lazy replica update propagation method while increasing durability and consistency. His replica update propagation...
In the development of a new software solution, users and developers spend the majority of their effort on modeling the functional requirements. The Non-Functional Requirements (NFR) are treated as a second class requirement, ignored until the end of the development cycle. They are often hidden, overshadowed and therefore, frequently neglected or forgotten. They are neglected because NFRs are often...
This paper will examine two cases of Information Conflicts in post-Soviet Eastern Europe, Estonia in 2007 and Georgia in 2008, both existing in the shadow of Russian influence. This paper will be a case study of the historical and political differences between the countries, the differences between the two conflicts and the differences in how both countries have since reacted to the conflicts. Prior...
In this paper we investigate the problem of manual survey completion for the purposes of market validation. This study resides in the application domain of business market validation as a motivating example. The amount of data which can be output for market validation can be drastically increased through the process of automation. Through the use of automatic survey completion, we seek to decrease...
Social media has a tremendous impact on current culture and trends. It has revolutionized the way in which people communicate with one another. Malicious entities exploit the vulnerabilities brought upon by the availability of personal data content on these networks. Openly sharing personal information online can make a user vulnerable to threats such as identity theft, phishing attacks, and profile...
In his talk, Dr. Olmsted will investigate the problem of developing secure development of cloud-based enterprise applications. Consistency, availability, and durability are investigated for web service (WS) transactions. He proposes an approach that matches the availability of the popular lazy replica update propagation method while increasing durability and consistency. His replica update propagation...
In his talk, Dr. Olmsted will investigate the problem of developing secure development of cloud-based enterprise applications. Consistency, availability, and durability are investigated for web service (WS) transactions. He proposes an approach that matches the availability of the popular lazy replica update propagation method while increasing durability and consistency. His replica update propagation...
This paper investigates the problem of providing long-running web service transactions that maintain consistency, high availability, and durability. Long running transactions involve human interaction as activities in the transaction. The human interaction increases the latency of the overall transaction. Implementation options are considered for managing limited resources held by a transaction that...
In this paper we look at solutions for notifying patients and medical professionals in the event of a pacemaker failure. Many people depend on pacemakers to regulate their heartbeat. Pacemaker failures can lead to hospital visits or death, making pacemaker failure detection an issue for people with these devices. HeartSync uses an iPhone to simulate a Wearable Heart Rate Monitor and Pacemaker data...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.