Browsing UMBC Computer Science and Electrical Engineering Department by Title
Now showing items 97-116 of 918
-
CADET: Computer Assisted Discovery Extraction and Translation
(2017-11-27)Computer Assisted Discovery Extraction and Translation (CADET) is a workbench for helping knowledge workers find, label, and translate documents of interest. It combines a multitude of analytics together with a flexible ... -
Calculation of the expected output spectrum for a mid-infrared supercontinuum source based on As₂S₃ chalcogenide photonic crystal fibers
(Optical Society of America, 2014-09-08)We computationally investigate supercontinuum generation in an As₂S₃ solid core photonic crystal fiber (PCF) with a hexagonal cladding of air holes. With a goal of obtaining a supercontinuum output spectrum that can predict ... -
Calculation of the impulse response and phase noise of a high-current photodetector using the drift-diffusion equations
(OSA, 2019)We describe a procedure to calculate the impulse response and phase noise of high-current photodetectors using the drift-diffusion equations while avoiding computationally expensive Monte Carlo simulations. We apply this ... -
Capturing policies for fine-grained access control on mobile devices
(IEEE, 2016-11-01)As of 2016, there are more mobile devices than humans on earth. Today, mobile devices are a critical part of our lives and often hold sensitive corporate and personal data. As a result, they are a lucrative target for ... -
CARE-CPS: Context-Aware tRust Evaluation for Wireless Networks in Cyber-Physical System Using Policies
(IEEE, 2011-06-06)A Cyber-Physical System (CPS) involves a tight coupling between the physical and computational elements. Security is a key challenge for the deployment of CPS. Therefore, it is highly desirable to extract correct information ... -
CASIE: Extracting Cybersecurity Event Information from Text
(2020-02)We present CASIE, a system that extracts information about cybersecurity events from text and populates a semantic model, with the ultimate goal of integration into a knowledge graph of cybersecurity data. It was trained ... -
CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using Policies
Due to lack of pre-deployed infrastructure, nodes in Mobile Ad-hoc Networks (MANETs) are required to relay data packets for other nodes to enable multi-hop communication between nodes that are not in the radio range with ... -
Catching the Cuckoo: Verifying TPM Proximity Using a Quote Timing Side-Channel
(Springer, Berlin, Heidelberg, 2011-06-22)We present a Trusted Platform Module (TPM) application protocol that detects a certain man in the middle attack where an adversary captures and replaces a legitimate computing platform with an imposter that forwards ... -
The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories
(2019-01-29)For two days in February 2018, 17 cybersecurity educators and professionals from government and industry met in a "hackathon" to refine existing draft multiple-choice test items, and to create new ones, for a Cybersecurity ... -
CCID: Cross-Correlation Identity Distinction Method for Detecting Shrew DDoS
(Hindawi, 2019-02-20)This study presents a new method for detecting ShrewDDoS (DistributedDenial of Service) attacks and analyzes the characteristics of the Shrew DDoS attack. Shrew DDoS is periodic to be suitable for the server’s TCP ... -
CCVis: Visual Analytics of Student Online Learning Behaviors Using Course Clickstream Data
As more and more college classrooms utilize online platforms to facilitate teaching and learning activities, analyzing student online behaviors becomes increasingly important for instructors to effectively monitor and ... -
Centaurus : A Framework for Intelligent Services in a Mobile Environment
(IEEE, 2001-04-01)In an age where wirelessly networked appliances and devices are becoming commonplace, there is a necessity for connecting them to work together for a mobile user. The design outlined in this paper provides an infrastructure ... -
Characterizing the Semantic Web on the Web
(2006-11-05)Semantic Web languages are being used to represent, encode and exchange semantic data in many contexts beyond the Web -- in databases, multiagent systems, mobile computing, and ad hoc networking environments. The core ... -
Characterizing the Splogosphere
(2006-05-23)Weblogs or blogs collectively constitute the Blogosphere, forming an influential and interesting subset on theWeb. As with most Internet-enabled applications, the ease of content creation and distribution makes the blogosphere ... -
Chatbot Application on Cryptocurrency
(IEEE, 2019-07-11)Many chatbots have been developed that provide a multitude of services through a wide range of methods. A chatbot is a brand-new conversational agent in the highspeed changing technology world. With the advance of Artificial ... -
Chemical and biological sensing using polarity of material
(SPIE, 2020-04-24)Polarity is very important in developing materials with colossal dielectric. To meet the demands for the tunable devices and high dielectric parallel plate capacitors, several perovskites such as CaCu₃Ti₄O₁₂ (CCTO), ... -
Choose Your Color from the Photonic Band Edge Nonlinear Frequency Conversion
(OSA Publishing, 2001)Ordinary Bragg reflectors, also known as one-dimensional photonic band gap structures (PBGs), display extraordinary linear and nonlinear optical properties that present a remarkable opportunity: the simultaneous availability ... -
Cleaning Noisy Knowledge Graphs
(CEUR Workshop Proceedings, 2017-10-22)My dissertation research is developing an approach to identify and explain errors in a knowledge graph constructed by extracting entities and relations from text. Information extraction systems can automatically construct ... -
Cluster Quality Analysis Using Silhouette Score
(IEEE, 2020-11-20)Clustering is an important phase in data mining. Selecting the number of clusters in a clustering algorithm, e.g. choosing the best value of k in the various k-means algorithms [1], can be difficult. We studied the use of ... -
Cluster-based Instance Consolidation For Subsequent Matching
(2012-11-11)Instance consolidation is a way to merge instances that are thought to be the same or closely related that can be used to support coreference resolution and entity linking. For Semantic Web data, consolidating instances ...