Search For:

Displaying 1-50 out of 61 total
MOS 2.0 - modeling the next revolutionary Mission Operations System
Found in: IEEE Aerospace Conference
By Christopher L. Delp, Duane Bindschadler, Ryan Wollaeger, Carlos Carrion, Michelle McCullar, Maddalena Jackson, Marc Sarrel, Louise Anderson, Doris Lam
Issue Date:March 2011
pp. 1-15
Designed and implemented in the 1980's, the Advanced Multi-Mission Operations System (AMMOS) was a breakthrough for deep-space NASA missions, enabling significant reductions in the cost and risk of implementing ground systems. By designing a framework for ...
 
Update - concept of operations for Integrated Model-Centric Engineering at JPL
Found in: IEEE Aerospace Conference
By Todd J. Bayer, Matthew Bennett, Christopher L. Delp, Daniel Dvorak, J. Steven Jenkins, Sanda Mandutianu
Issue Date:March 2011
pp. 1-15
The increasingly ambitious requirements levied on JPL's space science missions, and the development pace of such missions, challenge our current engineering practices. <sup>12</sup>All the engineering disciplines face this growth in complexity ...
 
Uncertainty and variability in accounting for grid electricity in life cycle assessment
Found in: Sustainable Systems and Technology, IEEE International Symposium on
By Christopher L. Weber, Paulina Jaramillo, Joe Marriott, Constantine Samaras
Issue Date:May 2009
pp. 1-8
The generation and distribution of electric power is enormously important in both economic and environmental terms. However, despite the obvious importance of electricity for life cycle assessment and policy analysis, accounting for the environmental emiss...
 
Toward Systemically Secure IT Architectures
Found in: Enabling Technologies, IEEE International Workshops on
By Glenn M. Brunette, Christoph L. Schuba
Issue Date:June 2005
pp. 8-18
This paper addresses the need for strong security guarantees in increasingly dynamic and flexible information technology (IT) environments. It applies time-tested security principles, architectural patterns, and continuous improvement constructs to weave s...
 
Transient Power Supply Voltage (V <sub>DDT</sub> ) Analysis for Detecting IC Defects
Found in: Test Conference, International
By Edward I. Cole Jr., Jerry M. Soden, Paiboon Tangyunyong, Patrick L. Candelaria, Richard W. Beegle, Daniel L. Barton, Christopher L. Henderson, Charles F. Hawkins
Issue Date:November 1997
pp. 23
Transient power supply voltage (v<sub>DDT</sub>) analysis is a new testing technique demonstrated as a powerful alternative and complement to I<sub>DDQ</sub> testing. v<sub>DDT</sub> analysis takes advantage of the limit...
 
Investigation of Non-zero Duality Gap Solutions to a Semidefinite Relaxation of the Optimal Power Flow Problem
Found in: 2014 47th Hawaii International Conference on System Sciences (HICSS)
By Daniel K. Molzahn,Bernard C. Lesieutre,Christopher L. DeMarco
Issue Date:January 2014
pp. 2325-2334
Recently, a semi definite programming relaxation of the power flow equations has been applied to the optimal power flow problem. When this relaxation is "tight" (i.e., the solution has zero duality gap), a globally optimal solution is obtained. E...
   
A Synthetic Information Approach to Urban-Scale Disaster Modeling
Found in: 2013 IEEE 16th International Conference on Computational Science and Engineering (CSE)
By Samarth Swarup,Kristian Lum,Christopher L. Barrett,Keith Bisset,Stephen G. Eubank,Madhav V. Marathe,Paula Stretz
Issue Date:December 2013
pp. 1105-1112
We describe a large-scale simulation of a hypothetical nuclear detonation in an urban region. Simulating such a complex scenario requires modeling the population and its interactions with interdependent infrastructures such as transportation, communication...
 
Reverse Engineering Molecular Hypergraphs
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics
By Ahsanur Rahman,Christopher L. Poirel,David J. Badger,Craig Estep,T.M. Murali
Issue Date:September 2013
pp. 1113-1124
Analysis of molecular interaction networks is pervasive in systems biology. This research relies almost entirely on graphs for modeling interactions. However, edges in graphs cannot represent multiway interactions among molecules, which occur very often wi...
 
Simfrastructure: A Flexible and Adaptable Middleware Platform for Modeling and Analysis of Socially Coupled Systems
Found in: 2013 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid)
By Keith R. Bisset,Suruchi Deodhar,Hemanth Makkapati,Madhav V. Marathe,Paula Stretz,Christopher L. Barrett
Issue Date:May 2013
pp. 506-513
Socially coupled systems are comprised of interdependent social, organizational, economic, infrastructure and physical networks. Today's urban regions serve as an excellent example of such systems. People and institutions confront the implications of the i...
 
AdDressing Missing Nodes as Missing Data in Dynamic Causal Modeling
Found in: 2012 2nd International Workshop on Pattern Recognition in NeuroImaging (PRNI)
By Christopher L. Wyatt,Shaza B. Zaghlool
Issue Date:July 2012
pp. 81-84
Dynamic Causal Modeling (DCM) uses dynamical systems to represent the high-level neural processing strategy for a given cognitive task. The logical network topology of the model is specified by a combination of prior knowledge and statistical analysis of t...
 
Visually Contrast Two Collections of Frequent Patterns
Found in: Data Mining Workshops, International Conference on
By Christopher L. Carmichael,Yaroslav Hayduk,Carson Kai-Sang Leung
Issue Date:December 2011
pp. 1128-1135
Frequent pattern mining searches for frequently occurring sets of items or events. While users are interested in finding these frequent patterns in most situations, they may want to compare and contrast the mined frequent patterns in some other situations....
 
Onshore Mobile App Development: Successes and Challenges
Found in: Computer
By Christopher L. Huntley
Issue Date:September 2011
pp. 102-104
Developing mobile apps on multiple platforms requires innovative designers who can mold them into a native and immersive experience.
 
Extracting Spatio-Temporal Information from Inertial Body Sensor Networks for Gait Speed Estimation
Found in: Wearable and Implantable Body Sensor Networks, International Workshop on
By Shanshan Chen, Christopher L. Cunningham, John Lach, Bradford C. Bennett
Issue Date:May 2011
pp. 71-76
The fidelity of many inertial Body Sensor Network (BSN) applications depends on accurate spatio-temporal information retrieved from body-worn devices. However, there are many challenges caused by inherent sensor errors in inertial BSNs and the uncertainty ...
 
The Developer's Perspective
Found in: Computer
By Christopher L. Huntley
Issue Date:May 2011
pp. 88-90
A compelling tech story has five elements: people, projects, problems, products, and practices
 
Exploring Social Networks: A Frequent Pattern Visualization Approach
Found in: Social Computing / IEEE International Conference on Privacy, Security, Risk and Trust, 2010 IEEE International Conference on
By Carson Kai-Sang Leung, Christopher L. Carmichael
Issue Date:August 2010
pp. 419-424
Social network analysis and mining aims to search for implicit, previously unknown, and potentially useful relational information (e.g., social relationship) from social networks. A visual representation of the networks helps users to gain insights about t...
 
Analysis of Social Dynamics on FDA Panels Using Social Networks Extracted from Meeting Transcripts
Found in: Social Computing / IEEE International Conference on Privacy, Security, Risk and Trust, 2010 IEEE International Conference on
By David A. Broniatowski, Christopher L. Magee
Issue Date:August 2010
pp. 329-334
The social elements of technical decision-making are not well understood, particular among expert committees. This is largely due to a lack of methodology for directly studying such interactions in real-world situations. This paper presents a method for th...
 
Agility versus Maturity: Is There Really a Trade-Off?
Found in: Computer
By Vishnu Vinekar, Christopher L. Huntley
Issue Date:May 2010
pp. 87-89
Most agile teams use some upfront design, and most formal methods are iterative.
 
Interactive, Evolutionary Search in Upstream Object-Oriented Class Design
Found in: IEEE Transactions on Software Engineering
By Christopher L. Simons, Ian C. Parmee, Rhys Gwynllyw
Issue Date:November 2010
pp. 798-816
Although much evidence exists to suggest that early life cycle software engineering design is a difficult task for software engineers to perform, current computational tool support for software engineers is limited. To address this limitation, interactive ...
 
Carbon footprinting upstream supply chain for electronics manufacturing and computer services
Found in: Sustainable Systems and Technology, IEEE International Symposium on
By Y. Anny Huang, Christopher L. Weber, H. Scott Matthews
Issue Date:May 2009
pp. 1-6
Corporations and institutions, including the electronics manufacturing and computer services sectors have become concerned with their impacts on climate change and are participating in carbon footprint assessment and climate management discussions. Existin...
 
Energy consumption in the production of high-brightness light-emitting diodes
Found in: Sustainable Systems and Technology, IEEE International Symposium on
By Deanna H. Matthews, H. Scott Matthews, Paulina Jaramillo, Christopher L. Weber
Issue Date:May 2009
pp. 1-6
High-brightness light-emitting diodes (LEDs) form the basis for solid-state lighting (SSL) systems. SSL systems have the potential to reduce electricity consumption of lighting systems as they are much more efficient than current lighting technologies. One...
 
Life cycle comparison of traditional retail and e-commerce logistics for electronic products: A case study of buy.com
Found in: Sustainable Systems and Technology, IEEE International Symposium on
By Christopher L. Weber, Chris T. Hendrickson, H. Scott Matthews, Amy Nagengast, Rachael Nealer, Paulina Jaramillo
Issue Date:May 2009
pp. 1-6
This analysis compares e-commerce versus traditional retail systems energy use and greenhouse gas emissions through a case study of a product chosen to represent the retail process. We conclude that e-commerce has lower energy use and GHG emissions for our...
 
WiFIsViz: Effective Visualization of Frequent Itemsets
Found in: Data Mining, IEEE International Conference on
By Carson Kai-Sang Leung, Pourang P. Irani, Christopher L. Carmichael
Issue Date:December 2008
pp. 875-880
Frequent itemset mining plays an essential role in the mining of many different patterns. Most existing frequent itemset mining algorithms return the mined results--namely, frequent itemsets--in the form of textual lists. However, the use of visual represe...
 
EpiSimdemics: an efficient algorithm for simulating the spread of infectious disease over large realistic social networks
Found in: SC Conference
By Christopher L. Barrett, Keith R. Bisset, Stephen G. Eubank, Xizhou Feng, Madhav V. Marathe
Issue Date:November 2008
pp. 1-12
Preventing and controlling outbreaks of infectious diseases such as pandemic influenza is a top public health priority. We describe EpiSimdemics - a scalable parallel algorithm to simulate the spread of contagion in large, realistic social contact networks...
 
Performance Analysis and Validation of a Paracatadioptric Omnistereo System
Found in: Computer Vision, IEEE International Conference on
By Xiaojin Gong, Anbumani Subramanian, Christopher L. Wyatt, Daniel J. Stilwell
Issue Date:October 2007
pp. 1-8
In this paper we present a vector-based 3D localization formula for a paracatadioptric omnistereo system. Based on vector representation, the performance of this stereo system is analyzed numerically, including the maximum detectable range and the uncertai...
 
Efficient Mining of Frequent Patterns from Uncertain Data
Found in: Data Mining Workshops, International Conference on
By Carson Kai-Sang Leung, Christopher L. Carmichael, Boyu Hao
Issue Date:October 2007
pp. 489-494
Since its introduction, mining of frequent patterns has been the subject of numerous studies. Generally, they fo- cus on improving algorithmic efficiency for finding frequent patterns or on extending the notion of frequent patterns to other interesting pat...
 
Carbon Emissions Embodied in Importation, Transport and Retail of Electronics in the U.S.: A Growing Global Issue
Found in: Electronics and the Environment, International Symposium on
By Christopher L. Weber, H. Scott Matthews, James J. Corbett, Eric D. Williams
Issue Date:May 2007
pp. 174-179
Due to increased international trade over the past decade, the global carbon footprint of the US has been expanding. Electronics are a major driver in this trend, as they are both heavily imported and energy intensive. We estimate that the embodied emissio...
 
A Two-stage Algorithm for Shoreline Detection
Found in: Applications of Computer Vision, IEEE Workshop on
By Xiaojin Gong, Anbumani Subramanian, Christopher L. Wyatt
Issue Date:February 2007
pp. 40
Shoreline detection plays an important role in vision based navigation for autonomous surface vehicles (ASVs). It is a challenging task because of the diversity in near-bank scenarios. In this paper, we present a two-stage algorithm to find the shoreline b...
   
Strong Edge Coloring for Channel Assignment in Wireless Radio Networks
Found in: Pervasive Computing and Communications Workshops, IEEE International Conference on
By Christopher L. Barrett, V. S. Anil Kumar, Madhav V. Marathe, Shripad Thite, Gabriel Istrate, Sunil Thulasidasan
Issue Date:March 2006
pp. 106-110
We give efficient sequential and distributed approximation algorithms for strong edge coloring graphs modeling wireless networks. Strong edge coloring is equivalent to computing a conflict-free assignment of channels or frequencies to pairwise links betwee...
   
Autonomic Cluster Management System (ACMS): A Demonstration of Autonomic Principles at Work
Found in: Engineering of Computer-Based Systems, IEEE International Conference on the
By James D. Baldassari, Christopher L. Kopec, Eric S. Leshay, Walt Truszkowski, David Finkel
Issue Date:April 2005
pp. 512-518
Cluster computing, whereby a large number of simple processors or nodes are combined together to apparently function as a single powerful computer, has emerged as a research area in its own right. The approach offers a relatively inexpensive means of achie...
 
Scaling Network Services Using Programmable Network Devices
Found in: Computer
By Christoph L. Schuba, Jason Goldschmidt, Michael F. Speer, Mohamed Hefeeda
Issue Date:April 2005
pp. 52-60
The NEon system offers an integrated approach to architecting, operating, and managing network services. NEon uses policy rules defining the operation of individual network services and produces a unified set of rules that generic packet-processing engines...
 
A Spatial Analysis of Mobility Models: Application to Wireless Ad Hoc Network Simulation
Found in: Simulation Symposium, Annual
By D. Charles Engelhart, Anand Sivasubramaniam, Christopher L. Barrett, Madhav V. Marathe, James P. Smith, Monique Morin
Issue Date:April 2004
pp. 35
We quantatively analyze the differences between a realistic mobility model, TRANSIMS, and several synthetic mobility models. New synthetic models were created by modifying the standard random way point model in several ways in an attempt to make it more re...
 
Electronic Versus Paper Surveys: Analysis of Potential Psychometric Biases
Found in: Hawaii International Conference on System Sciences
By Scott McCoy, Peter V. Marks, Jr., Christopher L. Carr, Victor Mbarika
Issue Date:January 2004
pp. 80265c
The Internet and World Wide Web are increasingly being used for survey distribution and administration in both academic and practitioner research. Little systematic research exists on the efficacy of these survey administration media or their potential psy...
   
Approximate Connectivity Graph Generation in Mobile Ad Hoc Radio Networks
Found in: Simulation Symposium, Annual
By Christopher L. Barrett, Madhav V. Marathe, D.Charles Engelhart, Anand Sivasubramaniam
Issue Date:April 2003
pp. 81
Simulation is a widely used technique in the design and evaluation of mobile ad-hoc networks. However, time and space constraints can often limit the extent of the size, complexity and detail of the networks that can be simulated. Approximations in the sys...
 
There's More Than One Way to Build a Bridge
Found in: Computer
By Douglas A. Lyon, Christopher L. Huntley
Issue Date:May 2002
pp. 102-103
No summary available.
 
Testing of Alpha-Stable Distributions with the Characteristic Function
Found in: Signal Processing Workshop on High-Order Statistics, IEEE
By Christopher L. Brown, Sokol Saliu
Issue Date:June 1999
pp. 0224
We describe a test for the alpha-stable distribution based on the characteristic function (cf) by drawing on a cf based Gaussianity test and the parametric bootstrap procedure. High rejection rates are achieved against most alternative distributions, excep...
 
Inclusion of Price Dependent Load Models in the Optimal Power Flow
Found in: Hawaii International Conference on System Sciences
By James D. Weber, Thomas J. Overbye, Christopher L. DeMarco
Issue Date:January 1998
pp. 62
In this paper we investigate the inclusion of price-dependent loads into the traditional Optimal Power Flow algorithm. The development of the model will be based on the solution of the OPF using an objective function for maximization of social welfare. The...
   
Design of Predatory Generation Control in Electric Power Systems
Found in: Hawaii International Conference on System Sciences
By Christopher L. DeMarco
Issue Date:January 1998
pp. 32
Previous work has demonstrated the potential for coordinated control of a group of generators in a manner that destabilizes other machines in the system, while maintaining (nearly) completely satisfactory performance within this control group, thereby achi...
   
IC Diagnosis: Industry Issues
Found in: Test Conference, International
By Jerry M. Soden, Christopher L. Henderson
Issue Date:November 1997
pp. 435
No summary available.
   
Still in the Stone Age?
Found in: IEEE Design and Test of Computers
By Jerry M. Soden, Christopher L. Henderson
Issue Date:July 1997
pp. 128
No summary available.
 
Analysis of a Denial of Service Attack on TCP
Found in: Security and Privacy, IEEE Symposium on
By Christoph L. Schuba, Ivan V. Krsul, Markus G. Kuhn, Eugene H. spafford, Aurobindo Sundaram, Diego Zamboni
Issue Date:May 1997
pp. 0208
This paper analyzes a network-based denial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many TCP (Transmission Control Protocol) connection requests with spoofed source ad...
 
IC Failure Analysis Tools and Techniques - Magic, Mystery, and Science
Found in: Test Conference, International
By Jerry M. Soden, Richard E. Anderson, Christopher L. Henderson
Issue Date:October 1996
pp. 935
No summary available.
   
Virtual Reality and Parallel Systems Performance Analysis
Found in: Computer
By Daniel A. Reed, Keith A. Shields, Will H. Scullin, Luis F. Tavera, Christopher L. Elford
Issue Date:November 1995
pp. 57-67
Recording and analyzing the dynamics of application-program, system-software, and hardware interactions are the keys to understanding and tuning the performance of massively parallel systems. Because such systems contain hundreds or thousands of processors...
 
Topological and Impedance Element Ranking (TIER) of the Bulk-Power System
Found in: Hawaii International Conference on System Sciences
By Daniel R. Schwarting, Daniel K. Molzahn, Christopher L. DeMarco, Bernard C. Lesieutre
Issue Date:January 2011
pp. 1-10
The Electricity Modernization Act of the Energy Policy Act of 2005 requires the creation of enforceable reliability standards for users, owners, and operators of the
   
Reducing internet auction fraud
Found in: Communications of the ACM
By Bezalel Gavish, Christopher L. Tucci, Christopher L. Tucci
Issue Date:May 2008
pp. 89-97
When it comes to online auctions, "caveat emptor" is an understatement.
     
Tracking Nonlinear Systems using Higher Order Moments
Found in: Signal Processing Workshop on High-Order Statistics, IEEE
By Kenneth J. Turner, Farhan A. Faruqi, Christopher L. Brown
Issue Date:July 1997
pp. 0052
A sub-optimal nonlinear time-recursive filter is developed which considers an arbitrary number of moments of the conditional density. The filter assumes a quadratic truncation of the system dynamics and measurement functions and retains N moments, thus req...
 
Testing Multivariate Gaussianity with the Characteristic Function
Found in: Signal Processing Workshop on High-Order Statistics, IEEE
By Abdelhak M. Zoubir, Christopher L. Brown, Boualem Boashash
Issue Date:July 1997
pp. 0438
A modification to a previously developed characteristic function based Gaussianity test is proposed. The power of the test is consequently improved. This test is then extended to the multivariate case, allowing it to be applied to correlated data. Monte Ca...
 
Reverse Engineering Molecular Hypergraphs
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB)
By Ahsanur Rahman, Christopher L. Poirel, Craig Estep, David J. Badger, T. M. Murali
Issue Date:September 2013
pp. 1113-1124
Analysis of molecular interaction networks is pervasive in systems biology. This research relies almost entirely on graphs for modeling interactions. However, edges in graphs cannot represent multiway interactions among molecules, which occur very often wi...
     
A comparison of two memetic algorithms for software class modelling
Found in: Proceeding of the fifteenth annual conference on Genetic and evolutionary computation conference (GECCO '13)
By Christopher L. Simons, Jim Smith
Issue Date:July 2013
pp. 1485-1492
Recent research has demonstrated that the problem of class modelling within early cycle object orientated software engineering can be successfully tackled by posing it as a search problem to be tackled with meta-heuristics. This "Search Based Software Engi...
     
CloseViz: visualizing useful patterns
Found in: Proceedings of the ACM SIGKDD Workshop on Useful Patterns (UP '10)
By Carson Kai-Sang Leung, Christopher L. Carmichael
Issue Date:July 2010
pp. 17-26
Numerous algorithms have been proposed since the introduction of the research problem of frequent pattern mining. Such a research problem has played an essential role in many knowledge discovery and data mining (KDD) tasks. Most of the proposed frequent pa...
     
FpViz: a visualizer for frequent pattern mining
Found in: Proceedings of the ACM SIGKDD Workshop on Visual Analytics and Knowledge Discovery: Integrating Automated Analysis with Interactive Exploration (KDD '09)
By Carson Kai-Sang Leung, Christopher L. Carmichael
Issue Date:July 2009
pp. 30-39
Over the past 15 years, numerous algorithms have been proposed for frequent pattern mining as it plays an essential role in many knowledge discovery and data mining (KDD) tasks. Most of these frequent pattern mining algorithms return the mined results in t...
     
 1  2 Next >>