Browsing UMBC Information Systems Department by Title
Now showing items 185-204 of 304
-
Modelling Situated Actions in Collaborative Hypertext Databases
The need to model users' dynamic behaviour in Computer Supported Cooperative Work (CSCW) systems arises in many contexts. This study developed a probabilistic model of the usage of an awareness-maintaining mechanism in a ... -
Multi Authority Access Control in a Cloud EHR System with MA-ABE
(IEEE, 2019-07-08)With the rapid adoption of Cloud-based Electronic Health Record (EHR) systems, health providers are particularly concerned about managing data privacy on the cloud. Existing approaches have either a scalability bottleneck ... -
A Multi-level Clustering Approach for Anonymizing Large-Scale Physical Activity Data
(2019-08-21)Publishing physical activity data can facilitate reproducible health-care research in several areas such as population health management, behavioral health research, and management of chronic health problems. However, ... -
Multidisciplinary Education on Big Data + HPC + Atmospheric Sciences
(National Science Foundation, 2017-11-01)We present a new initiative to create a training program or graduate-level course (cybertraining.umbc.edu) in big data applied to atmospheric sciences as application area and using high-performance computing as indispensable ... -
A Non-visual Approach to Improving Collaboration Between Blind and Sighted Internet Users
(Springer, Berlin, Heidelberg, 2007)Assistive technologies have widened access to the Web, by providing a non-visual representation of page content for blind individuals. However, restrictions imposed by screen readers and Braille output devices have led to ... -
Numerical Methods for Parallel Simulation of Diffusive Pollutant Transport from a Point Source
In an interdisciplinary project combining Atmospheric Physics, High Performance Computing, and Big Data, we explore a numerical method for solving a physical system modeled by a partial differential equation. The application ... -
On Mining Web Access Logs
(1999-10-24)The proliferation of information on the world wide web has made the personalization of this information space a necessity. One possible approach to web personalization is to mine typical user profiles from the vast amount ... -
Ontologies and Artificial Intelligence Systems for the Cooperative Smart Farming Ecosystem
(IEEE, 2020-09-08)Cyber-Physical Systems (CPS) and Internet of Thing (IoT) generate large amounts of data spurring the rise of Artificial Intelligence (AI) based smart applications. Driven by rapid advancements in technologies that support ... -
An Ontology for a HIPAA compliant cloud service
(2016-06-03)With increasing adoption of digitized patient records and physician’s notes, managing patient records and medical data has become a major challenge for healthcare providers. Hence, cloud based healthcare services have ... -
Organizational roles and communication modes in team work
(IEEE, 2001-01-06)We have surveyed ten collaborators' perceptions on the value of nine communication modes: email, telephone, pen-and-paper, computer conferencing, telephone conferencing, face-to-face, fax, post, and whiteboard. Eight roles ... -
An overview of online trust: Concepts, elements, and implications
(Elsevier Ltd., 2004-02-18)Lack of trust has been repeatedly identified as one of the most formidable barriers to people for engaging in e-commerce, involving transactions in which financial and personal information is submitted to merchants via the ... -
Parallel Performance Studies for an Elliptic Test Problem on the Stampede2 Cluster and Comparison of Networks
(2018)We study the parallel performance of dual-socket compute nodes with Intel Xeon Platinum 8160 Skylake CPUs with 24 cores and 192 GB of memory, connected by a 100 Gbps Intel Omni-Path (OPA) interconnect. The experimenets use ... -
Parallelizing Natural Language Techniques for Knowledge Extraction from Cloud Service Level Agreements
(IEEE, 2015-10-19)To efficiently utilize their cloud based services, consumers have to continuously monitor and manage the Service Level Agreements (SLA) that define the service performance measures. Currently this is still a time and labor ... -
Parents Views And Rules About Technology: As Told By Their Middle School Children in Hungary and India
(Murdoch University, Australia, 2012-06-18)To help us explore parental attitudes towards and usage of technology, we interviewed students ages 10-15 in Hungary and India in focus groups regarding their technology use. This paper focuses on the preliminary results ... -
Participatory Design for Inclusion and Empowerment
(2019-03-08)Participatory and inclusive design approaches advocate for the engagement of stakeholders early on in the design process, both to ensure that outcomes are informed by the needs and desires of real-world users, and to avoid ... -
Perceptions of Mobile Device Authentication Mechanisms by Individuals who are Blind
(Association for Computing Machinery, 2017-10)This paper describes an exploratory study focusing on the methods of mobile authentication currently utilized by individuals who are blind. Perceptions of security are discussed, along with the trade-offs with usability ... -
Performance Benchmarking of Data Augmentation and Deep Learning for Tornado Prediction
(2019)Predicting violent storms and dangerous weather conditions with current models can take a long time due to the immense complexity associated with weather simulation. Machine learning has the potential to classify tornadic ... -
Performance Benchmarking of Parallel Hyperparameter Tuning for Deep Learning based Tornado Predictions
(UMBC, 2020-05-31)Predicting violent storms and dangerous weather conditions with current models can take a long time due to the immense complexity associated with weather simulation. Machine learning has the potential to classify tornadic ... -
Performance of Eyes-Free Mobile Authentication
(The Internet Society, 2018-02-18)Mobile device users avoiding observational attacks and coping with situational impairments may employ techniques for eyes-free mobile unlock authentication, where a user enters his/her passcode without looking at the device. ...