Computing and Information Systems - Research Publications

Permanent URI for this collection

Search Results

Now showing 1 - 10 of 21
  • Item
    Thumbnail Image
    An anthological review of research using MontyLingua: a python-based end-to-end text processor
    Ling, Maurice H. T. (CG Publisher, 2006-12)
    MontyLingua, an integral part of ConceptNet which is currently the largest commonsense knowledge base, is an English text processor developed using Python programming language in MIT Media Lab. The main feature of MontyLingua is the coverage for all aspects of English text processing from raw input text to semantic meanings and summary generation, yet each component in MontyLingua is loosely-coupled to each other at the architectural and code level, which enabled individual components to be used independently or substituted. However, there has been no review exploring the role of MontyLingua in recent research work utilizing it. This paper aims to review the use of and roles played by MontyLingua and its components in research work published in 19 articles between October 2004 and August 2006. We had observed a diversified use of MontyLingua in many different areas, both generic and domain specific. Although the use of text summarizing component had not been observe, we areoptimistic that it will have a crucial role in managing the current trend of information overload in future research.
  • Item
    Thumbnail Image
    Decoding prefix codes
    Liddell, M ; Moffat, A (WILEY-BLACKWELL, 2006-12)
  • Item
    Thumbnail Image
    "Stretching the friendship" On the politics of replicating a dairy in East Timor
    Shepherd, CJ ; Gibbs, MR (SAGE PUBLICATIONS INC, 2006-11)
    In this article, we address the problem of how technoscience knowledge and practices are translated when they are relocated during the highly organized, international encounters between cultures, often called “development.” We examine efforts to build a “model” Australian dairy and instantiate Australian dairy practices in East Timor following East Timor’s recent emergence as a nation-state. Through this ethnography of development’s construction of a heterogeneous sociotechnical assemblage, we show how knowledge and power inform the practices that enable Western models of production and exchange to be reassembled in postcolonial spaces. In aiming to conduct a symmetrical anthropology of development based in the actor-network approach, we follow development’s actors and actants as well as its epistemic divisions—nature and culture, human and nonhuman, us and them—into East Timor, arguing that the politics and agency of technology transfer is distributed among discourse, epistemology, and human and nonhuman actors.
  • Item
    Thumbnail Image
    A taxonomy of data grids for distributed data sharing, management, and processing
    Venugopal, S ; Buyya, R ; Ramamohanarao, K (Association for Computing Machinery (ACM), 2006)
    Data Grids have been adopted as the next generation platform by many scientific communities that need to share, access, transport, process, and manage large data collections distributed worldwide. They combine high-end computing technologies with high-performance networking and wide-area storage management techniques. In this article, we discuss the key concepts behind Data Grids and compare them with other data sharing and distribution paradigms such as content delivery networks, peer-to-peer networks, and distributed databases. We then provide comprehensive taxonomies that cover various aspects of architecture, data transportation, data replication and resource allocation, and scheduling. Finally, we map the proposed taxonomy to various Data Grid systems not only to validate the taxonomy but also to identify areas for future exploration.
  • Item
    Thumbnail Image
    Intrusion detection for routing attacks in sensor networks
    Loo, CE ; Ng, MY ; Leckie, C ; Palaniswami, M (SAGE PUBLICATIONS INC, 2006)
    Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central base station. In this paper, we present a method for intrusion detection in wireless sensor networks. Our intrusion detection scheme uses a clustering algorithm to build a model of normal traffic behavior, and then uses this model of normal traffic to detect abnormal traffic patterns. A key advantage of our approach is that it is able to detect attacks that have not previously been seen. Moreover, our detection scheme is based on a set of traffic features that can potentially be applied to a wide range of routing attacks. In order to evaluate our intrusion detection scheme, we have extended a sensor network simulator to generate routing attacks in wireless sensor networks. We demonstrate that our intrusion detection scheme is able to achieve high detection accuracy with a low false positive rate for a variety of simulated routing attacks.
  • Item
  • Item
    Thumbnail Image
    XSLTGen: A system for automatically generating XML transformations via semantic mappings
    Waworuntu, S ; Bailey, J ; Spaccapietra, S ; Atzeni, P ; Chu, WW ; Catarci, T ; Sycara, KP (SPRINGER-VERLAG BERLIN, 2006)
  • Item
    Thumbnail Image
    Inverted files for text search engines
    Zobel, J ; Moffat, A (ASSOC COMPUTING MACHINERY, 2006)
  • Item
    Thumbnail Image
    Decentralized media streaming infrastructure (DeMSI): An adaptive and high-performance peer-to-peer content delivery network
    Wah Yim, AK ; Buyya, R (ELSEVIER SCIENCE BV, 2006)
    Hosting an on-demand media content streaming service has been a challenging task mainly because of the outrageously enormous network and server bandwidth required to deliver large amount of content data to users simultaneously. We propose an infrastructure that helps online media content providers offload their server and network resources for media streaming. Using application level resource diversity together with the peer-to-peer resource-sharing model is a feasible approach to decentralize the content storage, server and network bandwidth. Each subscriber is responsible for only a small fraction of such resources. Most importantly, the cost of maintaining the service can also be shared amongst subscribers, especially when the subscriber base is large. As a result, subscribers can be benefit from lower subscription cost. There have been a few solutions out there that focused only on sharing the load of network bandwidth by division of a streaming task to be carried out by multiple sources. However, existing solutions require that the content to be replicated in full and stored in each source, which is impractical for a subscriber as the owner of the storage resource that is of consumer capacity. Our solution focuses on the division of responsibility on both the network bandwidth and content storage such that each subscriber is responsible for only a small portion of the content. We propose a light-weighted candidate peer selection strategy based on avoidance of network congestion and an adaptive re-scheduling algorithm in order to enhance smoothness of the aggregated streaming rate perceived at the consumer side. Experiments show that the performance of our peer-selection strategy out performs the traditional strategy based on end-to-end streaming bandwidth.
  • Item
    Thumbnail Image
    Binary codes for locally homogeneous sequences
    Moffat, A ; Anh, VN (ELSEVIER SCIENCE BV, 2006-09-15)