To see the other types of publications on this topic, follow the link: Computer and Information Sciences.

Dissertations / Theses on the topic 'Computer and Information Sciences'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Computer and Information Sciences.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Bianco, Joseph. "Web Information System(WIS): Information Delivery Through Web Browsers." NSUWorks, 2000. http://nsuworks.nova.edu/gscis_etd/412.

Full text
Abstract:
The Web Information System (WIS) is a new type of Web browser capable of retrieving and displaying the physical attributes (retrieval time, age, size) of a digital document. In addition, the WIS can display the status of Hypertext Markup Language (HTML) links using an interface that is easy to use and interpret. The WIS also has the ability to dynamically update HTML links, thereby informing the user regarding the status of the information. The first generation of World Web browsers allowed for the retrieval and rendering of HTML documents for reading and printing. These browsers also provided
APA, Harvard, Vancouver, ISO, and other styles
2

Layouni, Mohamed. "Privacy-preserving personal information management." Thesis, McGill University, 2010. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=86764.

Full text
Abstract:
The spread of Information and Communication Technologies (ICTs) has transformed the way we deliver services, and has made them in general more efficient and more accessible to users. With these improvements however came new challenges. The extensive use of electronic services in our daily life, and the massive gathering of transactional data have led to serious privacy violations.<br>In this thesis we provide techniques to enhance users' privacy, and to give them greater control over their data. We propose a protocol allowing users to authorize access to their remotely-stored records, accordin
APA, Harvard, Vancouver, ISO, and other styles
3

Whitaker, Robert Bruce. "Applying Information Visualization to Computer Security Applications." DigitalCommons@USU, 2010. https://digitalcommons.usu.edu/etd/636.

Full text
Abstract:
This thesis presents two phases of research in applying visualization to network security challenges. The first phase included discovering the most useful and powerful features in existing computer security visualizations and incorporating them into the AdviseAid visualization platform, an existing software package. The incorporation of such a complete feature set required novel resolution of software engineering, human factors, and computer graphics issues. We also designed additional novel features, such as plugin interfaces, allowing for rapid prototyping and experimentation with novel v
APA, Harvard, Vancouver, ISO, and other styles
4

Alvarez, Elma L. "Semantic geographic information system." FIU Digital Commons, 1996. http://digitalcommons.fiu.edu/etd/1262.

Full text
Abstract:
This thesis research describes the design and implementation of a Semantic Geographic Information System (GIS) and the creation of its spatial database. The database schema is designed and created, and all textual and spatial data are loaded into the database with the help of the Semantic DBMS's Binary Database Interface currently being developed at the FIU's High Performance Database Research Center (HPDRC). A friendly graphical user interface is created together with the other main system's areas: displaying process, data animation, and data retrieval. All these components are tightly integr
APA, Harvard, Vancouver, ISO, and other styles
5

Mancuso, Vincent M. "Fighter Pilot Ground-Based Information Acquisition: A Conceptual Model for Information Systems Design." NSUWorks, 1993. http://nsuworks.nova.edu/gscis_etd/696.

Full text
Abstract:
The primary purpose of this dissertation was to develop a conceptual model for information systems design based on a qualitative analysis of the fighter pilot's environment. The model was derived from the fighter pilot's conceptions and perceptions of his informational environment. The resultant model and the corresponding environmental specification can serve as the conceptual cornerstones for further development by providing the designers a common conceptual focal point for further information system design. The model used for overall information systems design was the Rolland & Cauvet devel
APA, Harvard, Vancouver, ISO, and other styles
6

Sayad-Rahim, Azin. "Motif discovery algorithms incorporating nucleosome positioning information." Thesis, McGill University, 2010. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=86682.

Full text
Abstract:
Transcription factor binding sites are essential components of the machinery that controls gene expression. In the absence of experimental data, computational approaches are used to predict binding sites based on promoter DNA sequence. However transcription factor binding depends not just on sequence but also the packaging of the DNA molecule. Nucleosomes, as the smallest unit of DNA packaging, affect transcription factor binding by obstructing protein-DNA interactions.<br>We use an empirically-derived relationship between binding sites and nucleosome positioning to augment an existing computa
APA, Harvard, Vancouver, ISO, and other styles
7

Savov, Ivan. "Network information theory for classical-quantum channels." Thesis, McGill University, 2012. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=110349.

Full text
Abstract:
Network information theory is the study of communication problems involving multiple senders, multiple receivers and intermediate relay stations. The purpose of this thesis is to extend the main ideas of classical network information theory to the study of classical-quantum channels. We prove coding theorems for the following communication problems: quantum multiple access channels, quantum interference channels, quantum broadcast channels and quantum relay channels. A quantum model for a communication channel describes more accurately the channel's ability to transmit information. By using ph
APA, Harvard, Vancouver, ISO, and other styles
8

Ophir, Adi. "Functional dependency detection: an information theoretic algorithm." Thesis, McGill University, 2009. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=32553.

Full text
Abstract:
There are many statistical measures of correlation, such as Pearson's correlation coefficient for real random variables, the chi-square statistic for discrete random variables, and mutual information. Most such measures are symmetric and do not allow detection of influence direction. We propose a novel information theory measure whose value indicates direction of functional dependency. The measure calculation algorithm is performed on real-valued data being quantized into bins. This quantization is a corn
APA, Harvard, Vancouver, ISO, and other styles
9

Houston, Andrea Lynn 1954. "Knowledge integration for medical informatics: An experiment on a cancer information system." Diss., The University of Arizona, 1998. http://hdl.handle.net/10150/288868.

Full text
Abstract:
This research investigated the question of whether automatic or system-generated information classification methods can help humans better manage information. A series of four experiments were conducted; they investigated the usability (i.e., usefulness) of two automatic approaches to information classification, the concept space approach and a Kohonen-based SOM approach in the context of information retrieval. The concept space approach was evaluated in three different domains: Electronic Brainstorming (EBS) sessions, the Internet, and medical literature (the CancerLit collection). The Kohone
APA, Harvard, Vancouver, ISO, and other styles
10

Pickrell, Nathan. "Efficiently managing the computer engineering and Computer Science labs." Thesis, California State University, Long Beach, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=1522647.

Full text
Abstract:
<p> University lab environments are handled differently than corporate, government, and commercial Information Technology (IT) environments. While all environments have the common issues of scalability and cross-platform interoperability, educational lab environments must additionally handle student permissions, student files, student printing, and special education labs. The emphasis is on uniformity across lab machines for a uniform course curriculum.</p><p> This thesis construes how a specific set of Computer Science labs are maintained. It describes how documentation is maintained, how t
APA, Harvard, Vancouver, ISO, and other styles
11

Rehder, John J. "Semantic software scouts for information retrieval." W&M ScholarWorks, 2000. https://scholarworks.wm.edu/etd/1539623977.

Full text
Abstract:
A new concept for information storage and retrieval is proposed that links chunks of information within and among documents based on semantic relationships and uses those connections to efficiently retrieve all the information that closely matches the user's request. The storage method is semantic hypertext, in which conventional hypertext links are enriched with semantic information that includes the strength and type of the relationship between the chunks of information being linked. A retrieval method was devised in which a set of cooperating software agents, called scouts, traverse the con
APA, Harvard, Vancouver, ISO, and other styles
12

Petrosyan, Gayane. "Discovering information relevant to API elements using text classification." Thesis, McGill University, 2014. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=121537.

Full text
Abstract:
With the growing size of Application Programming Interfaces (APIs), both API usability and API learning become more challenging. API learning resources are often crucial for helping developers learn an API, but they are distributed across different documents, which makes finding the necessary information more challenging. This work focuses on discovering relevant sections of tutorials for a given API type. We approach this problem by identifying API types in an API tutorial, dividing the tutorial into small fragments and classifying them based on linguistic and structural features. The system
APA, Harvard, Vancouver, ISO, and other styles
13

Lu, Xiaofan. "Implementation of an information retrieval system for stock option analysis." Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=19677.

Full text
Abstract:
Stock option trading has been very active since options were invented. Option analysis is very useful in helping investors decide investing strategies and predict the trend of the future stock movements. In this thesis, basic theory about stock option trading and some important approaches of option analysis such as option volume, open interest, put/call ratios and breakeven stock prices are discussed. A system called Stock Option Analyzer that can perform the option analysis based on these approaches is described in detail. The Stock Option Analyzer is able to automatically retrieve option quo
APA, Harvard, Vancouver, ISO, and other styles
14

Gethers, Malcom Bernard II. "Information Integration for Software Maintenance and Evolution." W&M ScholarWorks, 2012. https://scholarworks.wm.edu/etd/1539720326.

Full text
Abstract:
Software maintenance and evolution is a particularly complex phenomenon in the case of long-lived, large-scale systems. It is not uncommon for such systems to progress through years of development history, a number of developers, and a multitude of software artifacts including millions of lines of code. Therefore, realizing even the slightest change may not always be straightforward. Clearly, changes are the central force driving software evolution. Therefore, it is not surprising that a significant effort has been (and should be) devoted in the software engineering community to systematically
APA, Harvard, Vancouver, ISO, and other styles
15

West, Robert. "Extracting semantic information from Wikipedia using human computation and dimensionality reduction." Thesis, McGill University, 2010. http://digitool.Library.McGill.CA:8881/R/?func=dbin-jump-full&object_id=92335.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Aktas, Mehmet S. "Information federation in grid information services." [Bloomington, Ind.] : Indiana University, 2007. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3277981.

Full text
Abstract:
Thesis (Ph.D.)--Indiana University, Dept. of Computer Science, 2007.<br>Source: Dissertation Abstracts International, Volume: 68-09, Section: B, page: 6057. Adviser: Geoffrey C. Fox. Title from dissertation home page (viewed May 9, 2008).
APA, Harvard, Vancouver, ISO, and other styles
17

Sawsaa, Ahlam. "A generic model of ontology to visualize information science domain (OIS)." Thesis, University of Huddersfield, 2013. http://eprints.hud.ac.uk/id/eprint/17545/.

Full text
Abstract:
Ontology has been a subject of many studies carried out in artificial intelligence (AI) and information system communities. Ontology has become an important component of the semantic web, covering a variety of knowledge domains. Although building domain ontologies still remains a big challenge with regard to its designing and implementation, there are still many areas that need to create ontologies. Information Science (IS) is one of these areas that need a unified ontology model to facilitate information access among the heterogeneous data resources and share a common understanding of the dom
APA, Harvard, Vancouver, ISO, and other styles
18

McKevitt, George G. "A Model for an Agent-Based Information System." NSUWorks, 2000. http://nsuworks.nova.edu/gscis_etd/719.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Schneider, Helen. "A Case Study of Information Assurance Field Experience." NSUWorks, 2006. http://nsuworks.nova.edu/gscis_etd/825.

Full text
Abstract:
Information assurance CIA) needs of 21st century businesses require expertise that had not yet been conceived when most employees attended college. Additional people are needed, particularly those with practical knowledge of the employers' business. Many employees do not have the requisite education or training in this field and small businesses lack the resources to deal adequately with their needs. In non-metropolitan areas, there is a lack of paid services available. Even in metropolitan areas, non-profit organizations struggle with the cost of information security services. The solution pr
APA, Harvard, Vancouver, ISO, and other styles
20

Williams, Michael J. "Training Aviation Maintenance Technicians with Information Retrieval Systems." NSUWorks, 2000. http://nsuworks.nova.edu/gscis_etd/924.

Full text
Abstract:
The goal of this dissertation has been to examine changes in computing technology skills possessed by aircraft maintenance technicians. The perspective of this project has been from that of a Federal Aviation Administration (FAA) approved Aviation Maintenance Technician School (AMTS). Specifically, the AMTS curriculum at Embry-Riddle Aeronautical University (ERAU) in Daytona Beach, Florida, provided participants for the study. Recommendations for integrating computing technology training into the AMTS curriculum at ERAU are being proposed for planned changes to the existing curriculum. With th
APA, Harvard, Vancouver, ISO, and other styles
21

Hawthorne, Elizabeth K. "Chiro-information © : Towards a Semantic Web Health Record and Ontology for Coordination of Patient Information Between Chiropractic and Allopathic Physicians." NSUWorks, 2006. http://nsuworks.nova.edu/gscis_etd/573.

Full text
Abstract:
The lack of coordination of clinical information communicated between chiropractic and allopathic physicians is detrimental to patients' overall health care. This lack of coordination and communication contributes significantly to the fragmentation of shared patient care among these medical providers. The goal of this research was to identify effective ways to improve coordination of patient information between chiropractic and allopathic physicians through secure methods of electronic communication. This research investigated applying digital pen-and-paper technology, Semantic Web technology
APA, Harvard, Vancouver, ISO, and other styles
22

Seeholzer, Roger V. "Investigating Roles of Information Security Strategy." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/49.

Full text
Abstract:
A fundamental understanding of the complexities comprising an information security strategy (ISS) in an organization is lacking. Most ISS implementations in government organizations equate anti-virus or installing a firewall to that of an ISS. While use of hardware and software forms a good defense; neither comprises the essence of an ISS. The ISS best integrates with business and information system strategies from the start, forming and shaping the direction of overall strategy synergistically within large government organizations. The researcher used grounded theory and investigated what a l
APA, Harvard, Vancouver, ISO, and other styles
23

Chrystie, Jeanetta R. "A Model for Applying Total Quality Management in Computer Information Systems Management." NSUWorks, 1998. http://nsuworks.nova.edu/gscis_etd/454.

Full text
Abstract:
Total Quality Management addressed the importance of an organization listening to its customers and taking a structured, strategic approach to providing improved products and services. Problems were no stranger to most information systems departments. Software quality problems, work backlogs, negative user perceptions of IS; all pointed to a need for total quality management concepts and techniques to be applied in the processes and to the products of an IS department. TQM provided the tools and techniques necessary to bring continuous quality improvements in IS. In this study, the researcher
APA, Harvard, Vancouver, ISO, and other styles
24

Novakovic, Christopher. "Computing and estimating information leakage with a quantitative point-to-point information flow model." Thesis, University of Birmingham, 2015. http://etheses.bham.ac.uk//id/eprint/5900/.

Full text
Abstract:
Information leakage occurs when a system exposes its secret information to an unauthorised entity. Information flow analysis is concerned with tracking flows of information through systems to determine whether they process information securely or leak information. We present a novel information flow model that permits an arbitrary amount of secret and publicly-observable information to occur at any point and in any order in a system. This is an improvement over previous models, which generally assume that systems process a single piece of secret information present before execution and produce
APA, Harvard, Vancouver, ISO, and other styles
25

Ma, Yongsen. "Improving Wifi Sensing And Networking With Channel State Information." W&M ScholarWorks, 2019. https://scholarworks.wm.edu/etd/1593091976.

Full text
Abstract:
In recent years, WiFi has a very rapid growth due to its high throughput, high efficiency, and low costs. Multiple-Input Multiple-Output (MIMO) and Orthogonal Frequency-Division Multiplexing (OFDM) are two key technologies for providing high throughput and efficiency for WiFi systems. MIMO-OFDM provides Channel State Information (CSI) which represents the amplitude attenuation and phase shift of each transmit-receiver antenna pair of each carrier frequency. CSI helps WiFi achieve high throughput to meet the growing demands of wireless data traffic. CSI captures how wireless signals travel thro
APA, Harvard, Vancouver, ISO, and other styles
26

Viren, John J. "Implication of Contrats and Sizze Sensitivities in Information Cueing." NSUWorks, 2000. http://nsuworks.nova.edu/gscis_etd/899.

Full text
Abstract:
Psychometric and photometric studies have shown that psychophysical retinoptical reactions occur when slight changes are made to contrast and size attributes even if those changes are not consciously seen. It was hypothesized that minimum response thresholds for contrast and size exist and that, if these minimum thresholds could be identified, instructional designers and others could subtly encourage computer users to follow optimal yet optional navigation strategies. The goal of this study was to determine the minimum thresholds of contrast and size attributes needed to visually cue computer
APA, Harvard, Vancouver, ISO, and other styles
27

Read, Tony J. "Strategic Information Technology Investment Decisions in the Banking Industry." NSUWorks, 2005. http://nsuworks.nova.edu/gscis_etd/794.

Full text
Abstract:
Spending on IT has continually increased over the last 10 years within the North American retail banking industry, but debate remains as to whether organizations have seen the expected value from these IT investments. Greater management focus is being placed on evaluating and realizing shareholder value from IT investments. The challenge is to reduce IT costs from operational infrastructure and move spending to strategic IT investments for business growth and shareholder value. Banks need to develop and implement improved techniques for planning, investing, value realization, and governing str
APA, Harvard, Vancouver, ISO, and other styles
28

Dail, Mathias. "Clustering unstructured life sciences experiments with unsupervised machine learning : Natural language processing for unstructured life sciences texts." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-265549.

Full text
Abstract:
The purpose of this master’s thesis is to analyse different types of document representations in the context of improving, in an unsupervised manner, the searchability of unstructured textual life sciences experiments by clustering similar experiments together. The challenge is to produce, analyse and compare different representations of the life sciences data by using traditional and advanced unsupervised Machine learning models. The text data analysed in this work is noisy and very heterogeneous, as it comes from a real-world Electronic Lab Notebook. Clustering unstructured and unlabeled tex
APA, Harvard, Vancouver, ISO, and other styles
29

Whiting, Stewart William. "Temporal dynamics in information retrieval." Thesis, University of Glasgow, 2015. http://theses.gla.ac.uk/6850/.

Full text
Abstract:
The passage of time is unrelenting. Time is an omnipresent feature of our existence, serving as a context to frame change driven by events and phenomena in our personal lives and social constructs. Accordingly, various elements of time are woven throughout information itself, and information behaviours such as creation, seeking and utilisation. Time plays a central role in many aspects of information retrieval (IR). It can not only distinguish the interpretation of information, but also profoundly influence the intentions and expectations of users' information seeking activity. Many time-based
APA, Harvard, Vancouver, ISO, and other styles
30

Sharma, Dipesh. "Automatically Extract Information from Web Documents." TopSCHOLAR®, 2007. http://digitalcommons.wku.edu/theses/376.

Full text
Abstract:
The Internet could be considered to be a reservoir of useful information in textual form — product catalogs, airline schedules, stock market quotations, weather forecast etc. There has been much interest in building systems that gather such information on a user's behalf. But because these information resources are formatted differently, mechanically extracting their content is difficult. Systems using such resources typically use hand-coded wrappers, customized procedures for information extraction. Structured data objects are a very important type of information on the Web. Such data objects
APA, Harvard, Vancouver, ISO, and other styles
31

Cai, Di. "IfD - information for discrimination." Thesis, University of Glasgow, 2004. http://theses.gla.ac.uk/3972/.

Full text
Abstract:
The problem of term mismatch and ambiguity has long been serious and outstanding in IR. The problem can result in the system formulating an incomplete and imprecise query representation, leading to a failure of retrieval. Many query reformulation methods have been proposed to address the problem. These methods employ term classes which are considered as related to individual query terms. They are hindered by the computational cost of term classification, and by the fact that the terms in some class are generally related to some specific query term belonging to the class rather than relevant to
APA, Harvard, Vancouver, ISO, and other styles
32

Plachouras, Vasileios. "Selective web information retrieval." Thesis, University of Glasgow, 2006. http://theses.gla.ac.uk/1945/.

Full text
Abstract:
This thesis proposes selective Web information retrieval, a framework formulated in terms of statistical decision theory, with the aim to apply an appropriate retrieval approach on a per-query basis. The main component of the framework is a decision mechanism that selects an appropriate retrieval approach on a per-query basis. The selection of a particular retrieval approach is based on the outcome of an experiment, which is performed before the final ranking of the retrieved documents. The experiment is a process that extracts features from a sample of the set of retrieved documents. This the
APA, Harvard, Vancouver, ISO, and other styles
33

Ioannidou, Polyxeni. "Anomaly Detection in Computer Networks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-295762.

Full text
Abstract:
In this degree project, we study the anomaly detection problem in log files of computer networks. In particular, we try to find an efficient way to detect anomalies in our data, which consist of different logging messages from different systems in CERN’s network for the LHC-b experiment. The contributions of the thesis are double: 1) The thesis serves as a survey on how we can detect threats, and errors in systems that are logging a huge amount of messages in the databases of a computer network. 2) Scientists in the LHC-b experiment make use of the Elasticsearch, which is an open source search
APA, Harvard, Vancouver, ISO, and other styles
34

Abboud, Fayez. "Utilizing Image-based Formats to Optimize Pattern Data Format and Processing In Mask and Maskless Pattern Generation Lithography." NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/73.

Full text
Abstract:
According to Moore's law, the IC (Integrated Circuit) minimum feature size is to shrink node over node, resulting in denser compaction of the design. Such compaction results in more polygons per design. The extension of optical lithography to print features at a fraction of the wavelength is only possible with the use of optical tricks, like RET (Resolution Enhancement Techniques) and ILT (Inverse Lithography Technology), to account for systematic corrections needed between the mask and the wafer exposure. Such optical tricks add extensive decorations and edge jogs to the primary features, cre
APA, Harvard, Vancouver, ISO, and other styles
35

Gianvecchio, Steven. "Application of information theory and statistical learning to anomaly detection." W&M ScholarWorks, 2010. https://scholarworks.wm.edu/etd/1539623563.

Full text
Abstract:
In today's highly networked world, computer intrusions and other attacks area constant threat. The detection of such attacks, especially attacks that are new or previously unknown, is important to secure networks and computers. A major focus of current research efforts in this area is on anomaly detection.;In this dissertation, we explore applications of information theory and statistical learning to anomaly detection. Specifically, we look at two difficult detection problems in network and system security, (1) detecting covert channels, and (2) determining if a user is a human or bot. We link
APA, Harvard, Vancouver, ISO, and other styles
36

Rodrigo, Maria Mercedes T. "Information Technology Usage in Metro Manila Public and Private Schools." NSUWorks, 2002. http://nsuworks.nova.edu/gscis_etd/872.

Full text
Abstract:
Both public and private schools in the Philippines are using information technology (IT) as a tool to improve teaching and learning. While both government and private sector initiatives indicate national commitment to IT in education, there is little up-to-date information on how extensively the Philippines are using computers and for what purposes. The researcher's goals were to determine the extent to which Metro Manila public and private schools used IT and to determine how these results compared with analogous data on schools in other developing and developed countries. The researcher gath
APA, Harvard, Vancouver, ISO, and other styles
37

Brown, Wayne A. "A Study of Chief Information Officer Effectiveness in Higher Education." NSUWorks, 2004. http://nsuworks.nova.edu/gscis_etd/429.

Full text
Abstract:
For almost as long as information technology (IT) has existed, there has been a communication and action gap between IT departments and their institutions. The gaps cause a variety of dysfunctional outcomes that include multimillion dollar failed projects, inefficient operations, and the inability of other departments to focus on their jobs. The consequential effects are well documented in the IT-leadership literature. Responsibility for resolving the negative effects rests with the senior IT-executive or chief information officer (CIO). CIOs come from any number of varying backgrounds and eac
APA, Harvard, Vancouver, ISO, and other styles
38

Giuliani, Peter R. "The Role of Information Systems Courses In Postgraduate Business Education." NSUWorks, 1993. http://nsuworks.nova.edu/gscis_etd/539.

Full text
Abstract:
Franklin University, was considering the development of a postgraduate program in business administration. Administrators found that curriculum planners first need to evaluate the changes caused by information systems to competencies and capabilities of the business manager in a highly technical and information intensive business environment. For this study, the competencies were investigated through an analysis of stated information systems course objectives within 160 MBA catalogs and through a survey of 77 Central Ohio management recruiters. Despite the wide range of topics introduced in th
APA, Harvard, Vancouver, ISO, and other styles
39

Paverd, Wayne. "Information visualisation." Master's thesis, University of Cape Town, 1996. http://hdl.handle.net/11427/13528.

Full text
Abstract:
Bibliography: leaves 100-102.<br>Information visualisation uses interactive three-dimensional (3D) graphics to create an immersive environment for the exploration of large amounts of data. Unlike scientific visualisation, where the underlying physical process usually takes place in 3D space, information visualisation deals with purely abstract data. Because abstract data often lacks an intuitive visual representation, selecting an appropriate representation of the data becomes a challenge. As a result, the creation of information visualisation involves as much exploration and investigation as
APA, Harvard, Vancouver, ISO, and other styles
40

McManigal, Chris A. "Towards More Comprehensive Information Retrieval Systems: Entity Extraction Using XSLT." UNF Digital Commons, 2005. http://digitalcommons.unf.edu/etd/222.

Full text
Abstract:
One problem that exists in today's document management arena is the issue of retrieving information from electronic documents such as images, Microsoft Office documents, and e-mail. Specific data entities must be extracted from these documents so that the data can be searched and queried. This study presents a unique approach to extracting these entities: using Extensible Stylesheet Language Transformations (XSLT) to match patterns in text. Because XSLT is processed at run time, new XSLT templates can be created and used without having to recompile and redeploy the application. The specific im
APA, Harvard, Vancouver, ISO, and other styles
41

Ardeshir-Larijani, Ebrahim. "Automated equivalence checking of quantum information systems." Thesis, University of Warwick, 2014. http://wrap.warwick.ac.uk/63940/.

Full text
Abstract:
Quantum technologies have progressed beyond the laboratory setting and are beginning to make an impact on industrial development. The construction of practical, general purpose quantum computers has been challenging, to say the least. But quantum cryptographic and communication devices have been available in the commercial marketplace for a few years. Quantum networks have been built in various cities around the world, and plans are afoot to launch a dedicated satellite for quantum communication. Such new technologies demand rigorous analysis and verification before they can be trusted in safe
APA, Harvard, Vancouver, ISO, and other styles
42

Anjum, Chaudhary. "Learner’s Interaction With Information and Communication Technologies." Thesis, Umeå universitet, Institutionen för datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-44994.

Full text
Abstract:
This Master’s thesis aims to explore how children and teen-agers (i.e. learners) interact and create a use for information and communication technology in the classroom during their lectures. The study is based on distributed cognition theory in order to describe a cognitive  system which involves interactions among humans (i.e. learners), artifacts which they use (i.e. information and communication technology active boards) and the environment in which they interact (i.e. a classroom). User’s (such as the children, teen-agers and teachers) interaction with information and communication techno
APA, Harvard, Vancouver, ISO, and other styles
43

BERGMARK, FABIAN, and JOHAN STENBERG. "Heuristics in MCTS-based Computer Go : Can heuristics improve the performance of MCTS-based computer go?" Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-157529.

Full text
Abstract:
The subject of computer Go is an active eld under AI and has achieved much attention in research. The current state of the art computer Go im-plementations uses a game tree search approach rather than advanced heuristics. This thesis aims to bridge these two approaches and combineMonte Carlo Tree Search with heuristics to deduce if any general results can be found. The results of the thesis indicate that the performance of a combined MCTS-heuristic approach correlates strongly with performance of the heuristic. Furthermore, MCTS can be used with any heuristic to improve its performance.1
APA, Harvard, Vancouver, ISO, and other styles
44

Yates, Jan M. "An Assessment of Trends And Factors Affecting Future Directions In Library And Information Science Education." NSUWorks, 1992. http://nsuworks.nova.edu/gscis_etd/937.

Full text
Abstract:
The purpose of this study was to determine qualifications for the position of librarian as advertised in Chronicle of Higher Education, (February 1991 through May 1991 issues). An assessment of library science catalogs of all schools currently accepting students (n a 58), which are approved by the American Library Association (ALA), was conducted. This assessment included issues relating to faculty, courses, entry and graduation requirements, and distance education. These qualifications of skill and training, as advertised in The Chronicle of Higher Education, were compared to the curricula of
APA, Harvard, Vancouver, ISO, and other styles
45

Nguyen, Tien Dung. "Enhancing Mobile Device System using Information from Users and Upper Layers." W&M ScholarWorks, 2016. https://scholarworks.wm.edu/etd/1477067964.

Full text
Abstract:
Despite the rapid hardware upgrades, a common complaint among smartphone owners is the poor battery life. to many users, being required to charge the smartphone after a single day of moderate usage is unacceptable. Moreover, current smartphones suffer various unpredictable delays during operation, e.g., when launching an app, leading to poor user experience. In this dissertation, we provide solutions that enhance systems on portable devices using information obtained from their users and upper layers on the I/O path. First, we provide an experimental study on how storage I/O path upper layers
APA, Harvard, Vancouver, ISO, and other styles
46

Wismer, Donald R. "State Government Cost Recovery for Electronic Information Dissemination: A Comparative Study." NSUWorks, 2000. http://nsuworks.nova.edu/gscis_etd/928.

Full text
Abstract:
Prior to this study, no paradigm common among state governments regarding public policy principles on cost recovery for the dissemination of public information had been described. The study revealed that U.S. federal government policy has served as a model from which a majority of the states have proceeded. This study has compared the states with the federal government and with themselves to determine the policy boundaries. Themes from in the literature were presented and summarized, and measurable elements were isolated. Data from statutory, regulatory, and case law, and from explicit policy
APA, Harvard, Vancouver, ISO, and other styles
47

Lane, Robert H. "Information Systems in Non-Profit Organizations: Enhancing Performance Through Online Help." NSUWorks, 1996. http://nsuworks.nova.edu/gscis_etd/656.

Full text
Abstract:
The purpose of this dissertation is to focus attention on the problems which non-profit organizations face in dealing with employee dissatisfaction and turnover among clerical staff whose principal responsibility is data entry. To address the problem, a presentation on the background, a discussion of the managerial and information systems implications, and an end-user needs assessment culminated in the development of an online help system for an IDM AS/400-based membership management package. The system enables the data entry staff to easily locate the answers to most of their commonly asked q
APA, Harvard, Vancouver, ISO, and other styles
48

Nguyen, Victor Allen. "A Simplified Faceted Approach To Information Retrieval for Reusable Software Classification." NSUWorks, 1998. http://nsuworks.nova.edu/gscis_etd/749.

Full text
Abstract:
Software Reuse is widely recognized as the most promising technique presently available in reducing the cost of software production. It is the adaptation or incorporation of previously developed software components, designs or other software-related artifacts (i.e. test plans) into new software or software development regimes. Researchers and vendors are doubling their efforts and devoting their time primarily to the topic of software reuse. Most have focused on mechanisms to construct reusable software but few have focused on the problem of discovering components or designs to meet specific n
APA, Harvard, Vancouver, ISO, and other styles
49

Dit, Bogdan. "Configuring and Assembling Information Retrieval based Solutions for Software Engineering Tasks." W&M ScholarWorks, 2015. https://scholarworks.wm.edu/etd/1593092105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Hayes, Diane S. "Intellectual Capital Management Among Project Managers in the Information Technology Domain." NSUWorks, 2001. http://nsuworks.nova.edu/gscis_etd/575.

Full text
Abstract:
Intellectual capital - the intangible assets of skill, experience, productivity, information, knowledge, infrastructure, and relationships - can be used to provide a source of competitive advantage. When human, structural, and relational components are properly formalized, captured, and leveraged, a higher value asset can result, directly affecting a company's prosperity. It is advantageous for knowledge-based companies with assets consisting mainly of skill, ideas, and intellectual ability to adopt organizational learning and knowledge management as strategic initiatives and include the intan
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!