Towards better understanding Cybersecurity: or are "Cyberspace" and "Cyber Space" the same?
|
|
|
- Catherine Ray
- 10 years ago
- Views:
Transcription
1 Towards better understanding Cybersecurity: or are "Cyberspace" and "Cyber Space" the same? Stuart Madnick Nazli Choucri Steven Camiña Wei Lee Woon Working Paper CISL# November 2012 Composite Information Systems Laboratory (CISL) Sloan School of Management, Room E Massachusetts Institute of Technology Cambridge, MA 02142
2 Towards better understanding Cybersecurity: or are "Cyberspace" and "Cyber Space" the same? Stuart Madnick MIT Sloan School of Management and MIT School of Engineering Nazli Choucri MIT Dept of Political Science Steven Camiña MIT Dept of Electrical Engineering and Computer Science Wei Lee Woon Masdar Institute of Science and Technology ABSTRACT Although there are many technology challenges and approaches to attaining cybersecurity, human actions (or inactions) also often pose large risks. There are many reasons, but one problem is whether we all see the world the same way. That is, what does cybersecurity actually mean as well as the many related concepts, such as cyberthreat, cybercrime, etc. Although dictionaries, glossaries, and other sources tell you what words/phrases are supposed to mean (somewhat complicated by the fact that they often contradict each other), they do not tell you how people are actually using them. If we are to have an effective solution, it is important that all the parties understand each other or, at least, understand that there are different perspectives. For the purpose of this paper and to demonstrate our methodology, we consider the case of the words, cyberspace and cyber space. When we started, we assumed that cyberspace and cyber space were essentially the same word with just a minor variation in punctuation (i.e., the space, or lack thereof, between cyber and space ) and that the choice of the punctuation was a rather random occurrence. With that assumption in mind, we would expect that the usage of these words (as determined by the taxonomies that would be constructed by our algorithms) would be basically the same. As it turned out, they were quite different, both in overall shape and groupings within the taxonomy. Since the overall field of cybersecurity is so new, understanding the field and how people think about it (as evidenced by their actual usage of terminology, and how usage changes over time) is an important goal. Our approach helps to illuminate these understandings. 1
3 1. INTRODUCTION Although there are many technology challenges and approaches to attaining cybersecurity, ihuman actions (or inactions) also often pose large risks. There are many reasons, but one problem is whether we all see the world the same way. That is, what does cybersecurity actually mean as well as the many related concepts, such as cyberthreat, cybercrime, etc. Although dictionaries, glossaries, and other sources tell you what words/phrases are supposed to mean (somewhat complicated by the fact that they often contradict each other), they do not tell you how people are actually using them.. If we are to have an effective solution, it is important that all the parties understand each other or, at least, understand that there are different perspectives. This paper is an extension of the work in [Camina 2010] that investigates the modeling of research landscapes through the automatic generation of hierarchical structures (taxonomies) comprised of terms related to a given research field. Taxonomy generation algorithms are based on the analysis of a data set of bibliometric information obtained from credible academic online publication databases. In particular, this paper analyzes the online publication databases within Engineering Village, namely Compendex and Inspec. For the purpose of this paper and to demonstrate our methodology, we consider the words, cyberspace and cyber space (the seed terms used.) When we started, we assumed that "cyberspace" and "cyber space" were essentially the same word with just a minor variation in punctuation (i.e., the space, or lack thereof, between "cyber" and "space") and that the choice of the punctuation was a rather random occurrence. With that assumption in mind, we would expect that the usage of these words (as determined by the taxonomies that would be constructed by our algorithms) would be basically the same. As it turned out, they were quite different, both in overall shape and groupings within the taxonomy 2. SOURCES OF DATA 2.1 Sources Used Engineering Village 1 is a combination of several online publication databases, in particular Compendex and Inspec. Compendex is a comprehensive bibliographic database of scientific and technical engineering research, covering all engineering disciplines. Compendex includes over 5 million summaries of journal articles and conference proceedings and there are 220,000 new additions every year. Inspec includes bibliographic citations and indexed abstracts from publications in the fields of physics, electrical and electronic engineering, communications, computer science, control engineering, information technology, manufacturing and mechanical engineering, operations research, material science, oceanography, engineering mathematics, nuclear engineering, environmental science, geophysics, nanotechnology, biomedical technology and biophysics. Inspec contains over eight million bibliographic records taken from 3,000 scientific and technical journals and 2,000 conference proceedings. Over 400,000 new records are added to the database annually. Online coverage is from 1969 to the present. 2.2 Data Obtained by Querying the Sources Querying each database using the seed terms produces results which are a set of documents related to the seed term. Figure 1 shows a screenshot of a results page in Engineering Village for the search term renewable energy. 1 Available via 2
4 Total Number of Results Link to document s bibliometric information Figure 1: Screenshot of Results Page in Engineering Village. Highlighted within the figure are the locations in the website where the total number of results are shown and a link to a document s bibliometric information Software has been developed to extract (often referred to as scraping ) each document s bibliometric information from the website. Specifically, we use the document s title, abstract, and keywords. Each document has multiple controlled and uncontrolled keywords, which we refer to as the terms of each document. The bibliometric information of the various articles scraped from online publication databases is then stored into a local file, which can then manipulated. We refer to the collection of documents stored in the local file as the data set of bibliometric information. With the data set on hand, the rest of the analysis can be done without the need of further internet connection. Using the data set it is possible to: 1. Analyze all the keywords, which we refer to as terms, within all the documents in the data set. 2. Use the terms and data set to generate a taxonomy, which is a hierarchical organization of the terms. In gathering the results using the seed terms mentioned previously, both Compendex and Inspec was used by querying each database using the seed term and seeing which database generated more results. The one that had more results is the one we chose to gather bibliometric information from. 3
5 2.3 Choosing which of Compendex / Inspec to use to gather bibliometric information from Seed Term Compendex Document Count Inspec Document Count cyberspace cyber space Table 1: Result Counts for Seed Term Queries to Compendex and Inspec Based on the results shown in Table 1 above, it can be seen that Compendex is the better online publication database to use when collecting bibliometric information related to cyberspace and cyber space. 2.4 Terms in Each Data Set and Terms in Common The next step is to gather all the keywords related to the seed term, which in this case was either cyberspace or cyber space. This is done by gathering all the keywords from the documents related to the seed term. Of course, duplicate occurrences of keywords are removed. Table 2 summarizes the number of terms contained in each data set generated by a particular seed term. Seed Term Used to Generate Data Set Total Number of Terms in Data Set cyberspace 3,488 cyber space 4,717 Table 2: Summary of Terms Contained in Each Data Set Of these term sets, 886 terms were found to be common across both data sets. These terms represent the concepts common to both the cyberspace and cyber space landscapes, which we used for further analysis. 3. TAXONOMY GENERATION 3.1 Algorithms used for Taxonomy Generation The next step was to generate both taxonomies and compare the results, using the 886 terms in common mentioned above. The algorithms used for taxonomy generation were motivated by and described in detail in [Camina 2010]. These algorithms make use of the Heymann algorithm, closeness centrality, cosine similarity metric (which we refer to as H-CC.) [Heymann 2006] [Sanchez 2004] [Woon et al 2009] [Ziegler 2009] Without going into the details, the taxonomy generation process involves the following steps: 1. Creating a co-occurrence matrix with the count of the number of times that the two terms occurred in the same document which is a measure of the degree of closeness of the two terms. 2. Determining the root of the taxonomy by finding which term is most central in the graph represented by the co-occurrence matrix. 3. Filling out the first level of the taxonomy by finding the terms closest to the root term, then the second level is filled out by finding the terms closest to each of the terms in the first level, etc. The two resulting taxonomies, for cyberspace and cyber space, are shown in Figure 2a and 2b below. It is not expected that the reader will be able to see each of the 886 terms in each of these taxonomies. The point is to note that the shapes of these taxonomies are quite different. The key differences will be discussed in the following sections. 4
6 Figure 2: Taxonomies for (a) Cyberspace and (b) Cyber Space Root Terms in Taxonomies Generated In our taxonomy generation, the seed term used to generate the data set is not necessarily the same as the root term, or term at the root of the hierarchy in the taxonomy generated. The choice as to which term becomes the generated root term is dependent upon the centrality of the term in the distance matrix, which is an abstract representation of the data set. Table 3 summarizes the root term found for each taxonomy generated. Seed Term Used to Generate Data Set cyberspace cyber space Taxonomy Root Term Cyberspace Computers Table 3: Root Terms for Each Taxonomy Generated 3.3 Comparison of Taxonomies Generated Table 4 below shows pairwise comparisons between each of the two taxonomies generated. The first two columns indicate the taxonomies compared and the third column shows the percentage similarity within the links of the taxonomies. Note that since the two taxonomies compared both use the same term list (the 886 term list mentioned previously), the taxonomies are directly comparable. Taxonomies are compared by calculating the number of similar links they share as a percentage of the total number of links in the taxonomy. 2 High resolution copies of the GIF files for Figure 2a and 2b can be found and downloaded from It is recommended that a flexible viewer be used, such as zgrviewer (from ). 5
7 Seed Term Used to Generate Data Set that Serves as the Backend of the Taxonomy Seed Term Used to Generate Data Set that Serves as the Backend of the Taxonomy Percentage of Similar Links in Taxonomies Generated cyberspace cyber space 19.41% Table 4: Percentage Similarity of Taxonomies Generated using H-CC algorithm Based on our prior expectations (i.e., that cyberspace and cyber space were basically the same), it was surprising how low was the percent of similar links, only about 19%. But this was not surprising given the significant differences in shape evident in Figures 2a and 2b. 3.4 Analysis of Taxonomy Differences Cyberspace Taxonomy As mentioned above, Figure 2a shows a birds-eye view of the cyber space taxonomy. Some of the interesting observations and distinctions about the taxonomy are: 1. The root of the taxonomy is cyberspace 2. There is a cluster with computers as the root, leading to terms such as computer crime, computer software, computer networks, and network security 3. There is a cluster with internet as the root Cyber space Taxonomy Figure 2b shows a birds-eye view of the cyber space taxonomy generated. Some of the interesting observations about the taxonomy are: 1. The root term of the taxonomy is computers 2. This taxonomy included telecommunication, speech and algorithms clusters 3. There is a cluster with technology as the root, leading to terms such as information technology, cyberspaces, and innovation 4. There is a cluster with disaster prevention as the root, leading to terms such as environmental impact, and security infrastructure 5. There also appears to be a lot of noise / nonsense links in this taxonomy. For example, there is a large cluster with image enhancement as the root, leading to several unrelated terms such as identification, tracking, congestion control, internet protocol, etc. 4. CONCLUSIONS AND FUTURE RESEARCH 4.1 Are cybersecurity and cyber security the same? Referring back to the sub-title, are cybersecurity and cyber security the same? The results reported above indicate the taxonomies generated and displayed in Figures 2a and 2b are clearly very different. What is the reason (or reasons)? Some hypotheses might be: (a) authors of papers in different academic fields use different words (e.g., policy people vs. technology people), (b) authors from different parts of the world use different words, (c) the words were used (with different meanings) in different time periods, etc. the reader may have other hypotheses to suggest. Through further investigation, we were able to answer this question, but due to lack of space, and to leave a bit of anticipation for the reader, this will not be included in this paper. 4.2 Future Research The terms cyberspace and cyber space were used just to demonstrate the process and because they led to some interesting results. We plan to use these techniques to study other terms, such as cybersecurity, cyberthreat, cybercrime, etc. 6
8 In addition, some areas for future extension of the methodology include (with very abbreviated explanations): Choice of specific publication sources: How different are the taxonomies that are generated using different publication sources, such as Google Scholar, Scirus, Scopus, Web of Science, Engineering Village, etc. as the pool of publications? Choice of type of sources: We used a database of academic publications. We could use blogs and news which could provide much more timely information. What would that look like? Choice of language: We have mainly focused on English publications, what if we included publications from other languages - possibly translating the keywords into English Finer grain source differences: What if we filtered the documents to separate them by region (what country they came from) or role (technology author vs. policy author.) Would the taxonomies be similar or very different? Temporal differences: How does the meaning and usage of terms, as represented by the taxonomy, change over time? Algorithms: We have experimented with various algorithms for the automated generation of taxonomies. The H-CC combination was used in this paper. How would the results differ if other possible algorithms were used? Metric: What are the best ways to measure the quality of the algorithms and the results produced? "Face validity : It would be good to show our automatically generated taxonomies to more Subject Matter Experts (SMEs) to get their reactions. ACKNOWLEDGEMENTS This work is funded by the Office of Naval Research under award number N Any opinion or findings, and conclusions or recommendations expressed in this publication are those of the authors and do not necessarily reflect the views of the Office of Naval Research REFERENCES [Blaschke 2002] Blaschke, C., Valencia, A. Automatic Ontology Construction from the Literature. Genome Informatics, Volume 13, 2002, pp [Camina 2010] Camina, Steven. A Comparison of Taxonomy Generation Techniques Using Bibliometric Methods: Applied to Research Strategy Formulation. EECS Thesis, Massachusetts Institute of Technology, [Chuang et al. 2002] Chuang S., Chien L., Towards Automatic Generation of Query Taxonomy: A Hierarchical Query Clustering Approach. Academia Sinica, Taipei, 2002 [Henschel at al. 2009] Henschel A., Woon W., Wachter, T., Madnick, S. Comparison of Generality Based Algorithm Variants for Automatic Taxonomy Generation. Composite Information Systems Laboratory (CISL), Massachusetts Institute of Technology, [Heymann 2006] Heymann, P., Garcia-Molina, H., Collaborative Creation of Communal Hierarchical Taxonomies in Social Tagging Systems. InfoLab Technical Report, Stanford University, [Krishnapuram 2003] Krishnapuram, R., Kimmamuru K., Automatic Taxonomy Generation: Issues and Possiblities. Lecture Notes in Computer Science, Springer, Berlin,
9 [Sanchez 2004] Sanchez, D., Moreno, A., Automatic Generation of Taxonomies from the WWW. Practical Aspects of Knowledge Management, Volume 3336, 2004, pp [Woon et al 2009] Woon, W., Henschel, A., Madnick, S. A Framework for Technology Forecasting and Visualization. Composite Information Systems Laboratory (CISL), Massachusetts Institute of Technology, 2009 [Ziegler 2009] Ziegler, B. Methods for Bibliometric Analysis of Research: Renewable Energy Case Study. Composite Information Systems Laboratory (CISL), Massachusetts Institute of Technology,
Clustering Connectionist and Statistical Language Processing
Clustering Connectionist and Statistical Language Processing Frank Keller [email protected] Computerlinguistik Universität des Saarlandes Clustering p.1/21 Overview clustering vs. classification supervised
Database Optimizing Services
Database Systems Journal vol. I, no. 2/2010 55 Database Optimizing Services Adrian GHENCEA 1, Immo GIEGER 2 1 University Titu Maiorescu Bucharest, Romania 2 Bodenstedt-Wilhelmschule Peine, Deutschland
Bibliometrics and Transaction Log Analysis. Bibliometrics Citation Analysis Transaction Log Analysis
and Transaction Log Analysis Bibliometrics Citation Analysis Transaction Log Analysis Definitions: Quantitative study of literatures as reflected in bibliographies Use of quantitative analysis and statistics
Semantic Search in Portals using Ontologies
Semantic Search in Portals using Ontologies Wallace Anacleto Pinheiro Ana Maria de C. Moura Military Institute of Engineering - IME/RJ Department of Computer Engineering - Rio de Janeiro - Brazil [awallace,anamoura]@de9.ime.eb.br
How to Write a Quality Technical Paper and Where to Publish within IEEE Part 1. George Plosker IEEE Client Services Manager September 2015
How to Write a Quality Technical Paper and Where to Publish within IEEE Part 1 George Plosker IEEE Client Services Manager September 2015 About the IEEE World s largest technical membership association
CHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION Exploration is a process of discovery. In the database exploration process, an analyst executes a sequence of transformations over a collection of data structures to discover useful
Bibliometric Big Data and its Uses. Dr. Gali Halevi Elsevier, NY
Bibliometric Big Data and its Uses Dr. Gali Halevi Elsevier, NY In memoriam https://www.youtube.com/watch?v=srbqtqtmncw The Multidimensional Research Assessment Matrix Unit of assessment Purpose Output
Web Mining Seminar CSE 450. Spring 2008 MWF 11:10 12:00pm Maginnes 113
CSE 450 Web Mining Seminar Spring 2008 MWF 11:10 12:00pm Maginnes 113 Instructor: Dr. Brian D. Davison Dept. of Computer Science & Engineering Lehigh University [email protected] http://www.cse.lehigh.edu/~brian/course/webmining/
CS 207 - Data Science and Visualization Spring 2016
CS 207 - Data Science and Visualization Spring 2016 Professor: Sorelle Friedler [email protected] An introduction to techniques for the automated and human-assisted analysis of data sets. These
So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we
Automatic measurement of Social Media Use
Automatic measurement of Social Media Use Iwan Timmer University of Twente P.O. Box 217, 7500AE Enschede The Netherlands [email protected] ABSTRACT Today Social Media is not only used for personal
A Cognitive Approach to Vision for a Mobile Robot
A Cognitive Approach to Vision for a Mobile Robot D. Paul Benjamin Christopher Funk Pace University, 1 Pace Plaza, New York, New York 10038, 212-346-1012 [email protected] Damian Lyons Fordham University,
Master Thesis Proposal
Master Thesis Proposal Web Data Extraction of University Staff Competencies Edin Zildzo, 1125449 Supervisor: Ao.Univ.Prof.Dr. Jürgen Dorn Septemeber 11, 2014 1 Problem Statement Web data extraction is
A Statistical Text Mining Method for Patent Analysis
A Statistical Text Mining Method for Patent Analysis Department of Statistics Cheongju University, [email protected] Abstract Most text data from diverse document databases are unsuitable for analytical
Knowledge Discovery from patents using KMX Text Analytics
Knowledge Discovery from patents using KMX Text Analytics Dr. Anton Heijs [email protected] Treparel Abstract In this white paper we discuss how the KMX technology of Treparel can help searchers
Using Big Data Analytics
Using Big Data Analytics to find your Competitive Advantage Alexander van Servellen [email protected] 2013 Electronic Resources and Consortia (November 6 th, 2013) The Topic What is Big Data
ProteinQuest user guide
ProteinQuest user guide 1. Introduction... 3 1.1 With ProteinQuest you can... 3 1.2 ProteinQuest basic version 4 1.3 ProteinQuest extended version... 5 2. ProteinQuest dictionaries... 6 3. Directions for
Why dread a bump on the head?
Why dread a bump on the head? The neuroscience of traumatic brain injury Lesson 6: Exploring the data behind brain injury I. Overview This lesson exposes students to the role data access and analysis can
Data Mining Cluster Analysis: Basic Concepts and Algorithms. Lecture Notes for Chapter 8. Introduction to Data Mining
Data Mining Cluster Analysis: Basic Concepts and Algorithms Lecture Notes for Chapter 8 Introduction to Data Mining by Tan, Steinbach, Kumar Tan,Steinbach, Kumar Introduction to Data Mining 4/8/2004 Hierarchical
Indiana University East Faculty Senate
Indiana University East Faculty Senate General Education Curriculum for Baccalaureate Degree Programs at Indiana University East The purpose of the General Education Curriculum is to ensure that every
Ten Steps to Quality Data and Trusted Information
Ten Steps to Quality Data and Trusted Information ABSTRACT Do these situations sound familiar? Your company is involved in a data integration project such as building a data warehouse or migrating several
Technical Report. The KNIME Text Processing Feature:
Technical Report The KNIME Text Processing Feature: An Introduction Dr. Killian Thiel Dr. Michael Berthold [email protected] [email protected] Copyright 2012 by KNIME.com AG
School Library Standards. for California Public Schools, Grades Nine through Twelve
School Library Standards for California Public Schools, Grades Nine through Twelve STANDARD 1 Students Access Information The student will access information by applying knowledge of the organization of
Review Easy Guide for Administrators. Version 1.0
Review Easy Guide for Administrators Version 1.0 Notice to Users Verve software as a service is a software application that has been developed, copyrighted, and licensed by Kroll Ontrack Inc. Use of the
Data Quality Assessment
Data Quality Assessment Leo L. Pipino, Yang W. Lee, and Richard Y. Wang How good is a company s data quality? Answering this question requires usable data quality metrics. Currently, most data quality
IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper
IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and
TDPA: Trend Detection and Predictive Analytics
TDPA: Trend Detection and Predictive Analytics M. Sakthi ganesh 1, CH.Pradeep Reddy 2, N.Manikandan 3, DR.P.Venkata krishna 4 1. Assistant Professor, School of Information Technology & Engineering (SITE),
Course Scheduling Support System
Course Scheduling Support System Roy Levow, Jawad Khan, and Sam Hsu Department of Computer Science and Engineering, Florida Atlantic University Boca Raton, FL 33431 {levow, jkhan, samh}@fau.edu Abstract
200630 - FBIO - Fundations of Bioinformatics
Coordinating unit: Teaching unit: Academic year: Degree: ECTS credits: 2015 200 - FME - School of Mathematics and Statistics 1004 - UB - (ENG)Universitat de Barcelona MASTER'S DEGREE IN STATISTICS AND
The Big Data Paradigm Shift. Insight Through Automation
The Big Data Paradigm Shift Insight Through Automation Agenda The Problem Emcien s Solution: Algorithms solve data related business problems How Does the Technology Work? Case Studies 2013 Emcien, Inc.
ALIAS: A Tool for Disambiguating Authors in Microsoft Academic Search
Project for Michael Pitts Course TCSS 702A University of Washington Tacoma Institute of Technology ALIAS: A Tool for Disambiguating Authors in Microsoft Academic Search Under supervision of : Dr. Senjuti
Tracking System for GPS Devices and Mining of Spatial Data
Tracking System for GPS Devices and Mining of Spatial Data AIDA ALISPAHIC, DZENANA DONKO Department for Computer Science and Informatics Faculty of Electrical Engineering, University of Sarajevo Zmaja
IC05 Introduction on Networks &Visualization Nov. 2009. <[email protected]>
IC05 Introduction on Networks &Visualization Nov. 2009 Overview 1. Networks Introduction Networks across disciplines Properties Models 2. Visualization InfoVis Data exploration
The Information Literacy Competency
standards and guidelines Information literacy competency standards for nursing Approved by the ACRL Board of Directors, October 2013 The Information Literacy Competency Standards for Nursing were completed
www.engineeringvillage.com QUICK REFERENCE GUIDE
www.engineeringvillage.com QUICK REFERENCE GUIDE Quick Search The first page you see in Engineering Village is the Quick Search page. This page is designed for quick, straightforward searches. The interface
Contact Recommendations from Aggegrated On-Line Activity
Contact Recommendations from Aggegrated On-Line Activity Abigail Gertner, Justin Richer, and Thomas Bartee The MITRE Corporation 202 Burlington Road, Bedford, MA 01730 {gertner,jricher,tbartee}@mitre.org
MIDLAND ISD ADVANCED PLACEMENT CURRICULUM STANDARDS AP ENVIRONMENTAL SCIENCE
Science Practices Standard SP.1: Scientific Questions and Predictions Asking scientific questions that can be tested empirically and structuring these questions in the form of testable predictions SP.1.1
Characterizing Task Usage Shapes in Google s Compute Clusters
Characterizing Task Usage Shapes in Google s Compute Clusters Qi Zhang 1, Joseph L. Hellerstein 2, Raouf Boutaba 1 1 University of Waterloo, 2 Google Inc. Introduction Cloud computing is becoming a key
From Databases to Natural Language: The Unusual Direction
From Databases to Natural Language: The Unusual Direction Yannis Ioannidis Dept. of Informatics & Telecommunications, MaDgIK Lab University of Athens, Hellas (Greece) [email protected] http://www.di.uoa.gr/
Approaches of Using a Word-Image Ontology and an Annotated Image Corpus as Intermedia for Cross-Language Image Retrieval
Approaches of Using a Word-Image Ontology and an Annotated Image Corpus as Intermedia for Cross-Language Image Retrieval Yih-Chen Chang and Hsin-Hsi Chen Department of Computer Science and Information
THE ALGORITHMIC AUDITORIUM. A computational model for auditorium design. 1. Introduction
THE ALGORITHMIC AUDITORIUM A computational model for auditorium design GANAPATHY MAHALINGAM Department of Architecture and Landscape Architecture North Dakota State University Fargo, North Dakota USA Abstract.
SPECIAL PERTURBATIONS UNCORRELATED TRACK PROCESSING
AAS 07-228 SPECIAL PERTURBATIONS UNCORRELATED TRACK PROCESSING INTRODUCTION James G. Miller * Two historical uncorrelated track (UCT) processing approaches have been employed using general perturbations
Complexity and Scalability in Semantic Graph Analysis Semantic Days 2013
Complexity and Scalability in Semantic Graph Analysis Semantic Days 2013 James Maltby, Ph.D 1 Outline of Presentation Semantic Graph Analytics Database Architectures In-memory Semantic Database Formulation
Table of Contents Chapter 1 - Getting Started with Oracle Data Relationship Management (DRM) 1
Table of Contents Chapter 1 - Getting Started with Oracle Data Relationship Management (DRM) 1 Master Data Management 1 Benefits of Master Data Management 2 Master Data Management Implementations 2 Data
Cyber Graphics. Abstract. 1. What is cyber graphics? 2. An incrementally modular abstraction hierarchy of shape invariants
Preprint of the Keynote Paper: Tosiyasu L. Kunii, Cyber Graphics, Proceedings of the First International Symposium on Cyber Worlds (CW2002), November 6-8 2002 Tokyo, Japan, in press, IEEE Computer Society
Writing a Project Report: Style Matters
Writing a Project Report: Style Matters Prof. Alan F. Smeaton Centre for Digital Video Processing and School of Computing Writing for Computing Why ask me to do this? I write a lot papers, chapters, project
2. SUMMER ADVISEMENT AND ORIENTATION PERIODS FOR NEWLY ADMITTED FRESHMEN AND TRANSFER STUDENTS
Chemistry Department Policy Assessment: Undergraduate Programs 1. MISSION STATEMENT The Chemistry Department offers academic programs which provide students with a liberal arts background and the theoretical
Chapter 20: Data Analysis
Chapter 20: Data Analysis Database System Concepts, 6 th Ed. See www.db-book.com for conditions on re-use Chapter 20: Data Analysis Decision Support Systems Data Warehousing Data Mining Classification
Self Organizing Maps for Visualization of Categories
Self Organizing Maps for Visualization of Categories Julian Szymański 1 and Włodzisław Duch 2,3 1 Department of Computer Systems Architecture, Gdańsk University of Technology, Poland, [email protected]
Weldon School of Biomedical Engineering Continuous Improvement Guide
Weldon School of Biomedical Engineering Continuous Improvement Guide The intent of this document is to assist faculty, staff, students, and constituents of the Weldon School of Biomedical Engineering in
Site-Specific versus General Purpose Web Search Engines: A Comparative Evaluation
Panhellenic Conference on Informatics Site-Specific versus General Purpose Web Search Engines: A Comparative Evaluation G. Atsaros, D. Spinellis, P. Louridas Department of Management Science and Technology
Search and Information Retrieval
Search and Information Retrieval Search on the Web 1 is a daily activity for many people throughout the world Search and communication are most popular uses of the computer Applications involving search
RUN-LENGTH ENCODING FOR VOLUMETRIC TEXTURE
RUN-LENGTH ENCODING FOR VOLUMETRIC TEXTURE Dong-Hui Xu, Arati S. Kurani, Jacob D. Furst, Daniela S. Raicu Intelligent Multimedia Processing Laboratory, School of Computer Science, Telecommunications, and
At a Glance A short portrait of the Technical University of Crete
At a Glance A short portrait of the Technical University of Crete Contact: Technical University of Crete Public & International Relations Department University Campus Akrotiri 731 00 Chania Crete Greece
Patent Big Data Analysis by R Data Language for Technology Management
, pp. 69-78 http://dx.doi.org/10.14257/ijseia.2016.10.1.08 Patent Big Data Analysis by R Data Language for Technology Management Sunghae Jun * Department of Statistics, Cheongju University, 360-764, Korea
DATA MINING CLUSTER ANALYSIS: BASIC CONCEPTS
DATA MINING CLUSTER ANALYSIS: BASIC CONCEPTS 1 AND ALGORITHMS Chiara Renso KDD-LAB ISTI- CNR, Pisa, Italy WHAT IS CLUSTER ANALYSIS? Finding groups of objects such that the objects in a group will be similar
How To Understand And Understand Cyber Security
Special Sessions on Cybersecurity Research for Critical Infrastructure Thursday, February 12, 2015 In Oceans 12 Session 1, 8:30 10:00, Oceans 12 Michael Siegel Principal Research Scientist, and Associate
Survey Results: Requirements and Use Cases for Linguistic Linked Data
Survey Results: Requirements and Use Cases for Linguistic Linked Data 1 Introduction This survey was conducted by the FP7 Project LIDER (http://www.lider-project.eu/) as input into the W3C Community Group
Nonprofit Technology Collaboration. Web Analytics
Web Analytics Contents What is Web Analytics?... 2 Why is Web Analytics Important?... 2 Google Analytics... 3 Using Major Metrics in Google Analytics... 6 Traffic Sources... 6 Visitor Loyalty... 9 Top
Environmental Remote Sensing GEOG 2021
Environmental Remote Sensing GEOG 2021 Lecture 4 Image classification 2 Purpose categorising data data abstraction / simplification data interpretation mapping for land cover mapping use land cover class
EcoSysNetworks: A Method for Visualizing Software Ecosystems
EcoSysNetworks: A Method for Visualizing Software Ecosystems Bala Iyer 1 1 Babson College, Babson MA 02437 Abstract. This paper summarized the keynote talk on ecosystems delivered at the 4 th Software
Writing Academic Essays at University. Philip Seaton, Hokkaido University
Writing Academic Essays at University Philip Seaton, Hokkaido University Writing Academic Essays at University Page 2/ What is Research? Video 1 In this video series, I will be introducing you to the basics
SEARCH ENGINE WITH PARALLEL PROCESSING AND INCREMENTAL K-MEANS FOR FAST SEARCH AND RETRIEVAL
SEARCH ENGINE WITH PARALLEL PROCESSING AND INCREMENTAL K-MEANS FOR FAST SEARCH AND RETRIEVAL Krishna Kiran Kattamuri 1 and Rupa Chiramdasu 2 Department of Computer Science Engineering, VVIT, Guntur, India
Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
International Journal of Engineering Research-Online A Peer Reviewed International Journal Articles are freely available online:http://www.ijoer.
RESEARCH ARTICLE SURVEY ON PAGERANK ALGORITHMS USING WEB-LINK STRUCTURE SOWMYA.M 1, V.S.SREELAXMI 2, MUNESHWARA M.S 3, ANIL G.N 4 Department of CSE, BMS Institute of Technology, Avalahalli, Yelahanka,
Taxonomies in Practice Welcome to the second decade of online taxonomy construction
Building a Taxonomy for Auto-classification by Wendi Pohs EDITOR S SUMMARY Taxonomies have expanded from browsing aids to the foundation for automatic classification. Early auto-classification methods
THE SEMANTIC WEB AND IT`S APPLICATIONS
15-16 September 2011, BULGARIA 1 Proceedings of the International Conference on Information Technologies (InfoTech-2011) 15-16 September 2011, Bulgaria THE SEMANTIC WEB AND IT`S APPLICATIONS Dimitar Vuldzhev
How To Understand The Hype Around Cybersecurity
Cybersecurity in the news A grounded theory approach to better understand its emerging prominence Tjalling Reijmer Marco Spruit Technical Report 2014-006 March 2014 Department of Information and Computing
Indiana Statewide Transfer General Education Core
Indiana Statewide Transfer General Education Core Preamble In 2012 the Indiana legislature enacted Senate Enrolled Act 182, thereby establishing the requirements for a Statewide Transfer General Education
How To Write The English Language Learner Can Do Booklet
WORLD-CLASS INSTRUCTIONAL DESIGN AND ASSESSMENT The English Language Learner CAN DO Booklet Grades 9-12 Includes: Performance Definitions CAN DO Descriptors For use in conjunction with the WIDA English
Library and information science research trends in India
Annals of Library and Studies Vol. 58, December 011, pp. 319-35 Library and information science research trends in India Rekha Mittal Senior Principal Scientist, CSIR-National Institute of Science Communication
Introduction. A. Bellaachia Page: 1
Introduction 1. Objectives... 3 2. What is Data Mining?... 4 3. Knowledge Discovery Process... 5 4. KD Process Example... 7 5. Typical Data Mining Architecture... 8 6. Database vs. Data Mining... 9 7.
Precision and Relative Recall of Search Engines: A Comparative Study of Google and Yahoo
and Relative Recall of Engines: A Comparative Study of Google and Yahoo B.T. Sampath Kumar J.N. Prakash Kuvempu University Abstract This paper compared the retrieval effectiveness of the Google and Yahoo.
BASIC STATISTICAL METHODS FOR GENOMIC DATA ANALYSIS
BASIC STATISTICAL METHODS FOR GENOMIC DATA ANALYSIS SEEMA JAGGI Indian Agricultural Statistics Research Institute Library Avenue, New Delhi-110 012 [email protected] Genomics A genome is an organism s
Exploration and Visualization of Post-Market Data
Exploration and Visualization of Post-Market Data Jianying Hu, PhD Joint work with David Gotz, Shahram Ebadollahi, Jimeng Sun, Fei Wang, Marianthi Markatou Healthcare Analytics Research IBM T.J. Watson
Card-Sorting: What You Need to Know about Analyzing and Interpreting Card Sorting Results
October 2008, Vol. 10 Issue 2 Volume 10 Issue 2 Past Issues A-Z List Usability News is a free web newsletter that is produced by the Software Usability Research Laboratory (SURL) at Wichita State University.
ScreenMatch: Providing Context to Software Translators by Displaying Screenshots
ScreenMatch: Providing Context to Software Translators by Displaying Screenshots Geza Kovacs MIT CSAIL 32 Vassar St, Cambridge MA 02139 USA [email protected] Abstract Translators often encounter ambiguous
NeMO - NeDiMAH Methods Ontology. Use Case manual: How to report your case using throughout the Excel template
NeMO - NeDiMAH Methods Ontology Use Case manual: How to report your case using throughout the Excel template Version: 1.0 Date: 11/12/2014 Author: DCU Ontology Team Use Case manual - How to report your
User Profile Refinement using explicit User Interest Modeling
User Profile Refinement using explicit User Interest Modeling Gerald Stermsek, Mark Strembeck, Gustaf Neumann Institute of Information Systems and New Media Vienna University of Economics and BA Austria
The Scientific Data Mining Process
Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In
Experiment #1, Analyze Data using Excel, Calculator and Graphs.
Physics 182 - Fall 2014 - Experiment #1 1 Experiment #1, Analyze Data using Excel, Calculator and Graphs. 1 Purpose (5 Points, Including Title. Points apply to your lab report.) Before we start measuring
Distance Metric Learning in Data Mining (Part I) Fei Wang and Jimeng Sun IBM TJ Watson Research Center
Distance Metric Learning in Data Mining (Part I) Fei Wang and Jimeng Sun IBM TJ Watson Research Center 1 Outline Part I - Applications Motivation and Introduction Patient similarity application Part II
Scopus. Quick Reference Guide
Scopus Quick Reference Guide Quick Reference Guide An eye on global research. Scopus is the largest abstract and citation database of peer-reviewed literature, with bibliometrics tools to track, analyze
A Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks
A Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks Text Analytics World, Boston, 2013 Lars Hard, CTO Agenda Difficult text analytics tasks Feature extraction Bio-inspired
