270541



    ABSTRACTS VIEWS

    5023



    VIEWS & DOWNLOAD

    Browsing by Title

    Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
    or enter first few letters:  
    Showing results [1193 - 1212] / 1731
    • NR14774.PDF.jpg
    • Thesis


    • Authors: Kabir, Md. Humayun (2006)

    • Streaming audio/video contents over the Internet requires large network bandwidth and timely delivery and playback of the media data. However, large network latency and jitter cause long start-up delay and frequent unwanted pauses in the playback, respectively. An entire audio/video media file cannot be cached due to intellectual property right concerns of the content owners, security reasons, and also due to its large size. This makes a streaming service hard to scale using conventional proxy caches. Media file compression using variable-bit-rate (VBR) encoding is often preferred in order to get constant quality compressed videos. VBR-encoding produces traffic burst, which not only w...

    • 3242334.PDF.jpg
    • Thesis


    • Authors: Abdallah, Sherief (2006)

    • Reinforcement learning techniques have been successfully used to solve single agent optimization problems but many of the real problems involve multiple agents, or multi-agent systems. This explains the growing interest in multi-agent reinforcement learning algorithms, or MARL. To be applicable in large real domains, MARL al¬gorithms need to be both stable and scalable. A scalable MARL will be able to perform adequately as the number of agents increases. A MARL algorithm is stable if all agents (eventually) converge to a stable joint policy. Unfortunately, most of the previous approaches lack at least one of these two crucial properties. This dissertation proposes a scalable and stab...

    • 3242516.PDF.jpg
    • Thesis


    • Authors: Argyraki, Aikaterini (2006)

    • During a distributed bandwidth-flooding attack, a large number of attack sources coordinate to send a high volume of undesired traffic to the intended victim; the goal is to exhaust the victim's band-width, so that the victim fails to respond to its legitimate traffic. These attacks have proved difficult (sometimes impossible) to combat, as they require that action be taken before the victim's tail circuit. Current practice is typically restricted to the administrator of the victim calling their ISP and asking them to manually install filters to block the attack, an approach increasingly insufficient as attacks become more sophisticated. The intuitive response is to automate this proc...

    • 14. The School Librarian as I... Team Up With Teachers to.pdf.jpg
    • Article


    • Authors: Hand, Dorcas (2011-05)

    • As outlined in Information Power: Building Partnerships for Learning, the school librarian works with members of the school community to develop the policies, practices, and curricula to guide student learning. The school librarian collaborates with classroom teachers to develop assignments that are matched to academic standards and include key critical thinking skills, technology and information literacy skills, and core social skills and cultural competencies

    • 20. Second before the big one.pdf.jpg
    • Article


    • Authors: Allen, Richard (2011-04)

    • The author, a professor of geophysics and associate director of the seismological laboratory at the University of California, discusses earthquake detection systems that can detect the earliest stages of an earthquake and sound an alarm to warn people of the danger.

    • 3229708.PDF.jpg
    • Thesis


    • Authors: Walker, Jessie J. (2006)

    • The notion of mobility has always been a prime factor in human endeavor and achievement. This need to migrate by humans has been distilled into software entities, which are their representatives on distant environments. Software agents are developed to act on behalf of a user. Mobile agents were born from the understanding that many times it was much more useful to move the code (program) to where the resources are located, instead of connecting remotely. Within the mobile agent research community, security has traditionally been the most defining issue facing the community and preventing the paradigm from gaining wide acceptance. There are still numerous difficult problems being add...

    • 3237125.PDF.jpg
    • Thesis


    • Authors: Wolf, Denis Fernando (2006)

    • Robotic mapping is the process of automatically constructing an environment representation using mobile robots. We address the problem of semantic mapping, which consists of using mobile robots to create maps that represent not only metric occupancy but also other properties of the environment. Specifically, we develop techniques to build maps that represent mobility, navigability, and activity of the environment. In doing so, we also develop techniques which partially address two important cases in robotic mapping, dynamic environments and large-scale environments. Our approach to semantic mapping is to combine machine learning techniques with standard mapping algorithms. Supervised...

    • 3205028.PDF.jpg
    • Thesis


    • Authors: Zhang, Wei (2006)

    • Doublesex (dsx) and dsx-related genes encode a novel class of transcription factors conserved among metazoans. The members of this family play a critical role in sex differentiation across species from Caenorhabditis elegans to humans. Mutations or deletions of these genes are associated with intersexual abnormalities, including a class of human birth defects termed "9p syndrome". This thesis is focused on the dsx gene from Drosophila melanogaster, the archetype of this class. Sex-specific RNA splicing leads to male and female isoforms, designated DSXM and DSXF. Biochemical and genetic studies of the DM domain and the female-specific C-terminal domain are presented. The importance of ...

    • 6.Short-Duration Mindfulness Training With Adult Learners.pdf.jpg
    • Article


    • Authors: Crumley, Gene; Schutz, Howard (2011)

    • The article discusses the exploratory study on short-duration mindfulness training for adult learners U.S. It notes the selection of participants of the study based on their courses along with the instructions given to them. It mentions the variability of the results as well as the classifications of the responses of the participants. It also proposes the need of instructors to introduce this mindful attention exercise to their students.

    • 2. Sign up for reading.pdf.jpg
    • Article


    • Authors: Hurst, Beth; Scales, Kathleen B; Frecks, Elizabeth (2011-03)

    • Read to the class. This concept of reading performance gives students a reason to practice reading—and practice makes perfect. Or as Nichols, Rupley, and Rasinski (2009) contend, when students hav practiced reading aloud with someone who has helped them and has modeled how to read wit expression. “it is perfect practice that makes perfect performance.”

    • 3199354.PDF.jpg
    • Thesis


    • Authors: Grigorova, Irina L. (2006)

    • σE activity is required to diminish general stress in the envelope of Escherichia coli and to ensure proper insertion of outer membrane porins (OMP) into the outer membrane. Accumulation of unassembled OMP monomers in the periplasm generates a signal that is communicated through the inner membrane to the cytoplasm, where it activates the transcription factor, σE. The signal is conveyed by proteolytic cascade that carries out regulated proteolysis of RseA, a membrane-spanning anti-sigma factor whose cytoplasmic domain inhibits σE - dependent transcription. Upon binding to OMP C-termini, the membrane localized DegS protease is activated to cleave RseA in its periplasmic domain. The memb...

    • 15. A simple scheme for book classfication using wikipedia.pdf.jpg
    • Article


    • Authors: Yelton, Andromeda (2011-03)

    • Because of the rate at which documents are being generated outstrips librarians’ ability to catalog them, an accurate, automated scheme of subject classification is desirable. However, simplistic word-counting schemes miss many important concepts; librarians must enrich algorithms with background knowledge to escape basic problems such as polysemy and synonymy. The author has developed a script that uses Wikipedia as context for analyzing the subjects of nonfiction books. Though a simple method built quickly from freely available parts, it is partially successful, suggesting the promise of such an approach for future research.