{"title":"On the efficacy of present grid computing software for deploying a medical grid","authors":"Javier Delgado, M. Adjouadi","doi":"10.1145/1565799.1565818","DOIUrl":"https://doi.org/10.1145/1565799.1565818","url":null,"abstract":"Grid computing promises improvements in collaboration. This includes sharing of computational resources as well as improved collaboration amongst professionals of different areas of expertise. Several mature software applications are available for simplifying the deployment of an arbitrary grid. In this work, we share our experience with some of these applications for collaboration between a consortium of hospitals and our research lab, which specializes in neuroscience and image processing applications. We explain the suitability of the Grid tools through extensions and enhancements made to an existing Grid Computing Software platform and the visualization mechanisms of the display wall. This paper describes our grid computing prototype infrastructure, which uses Globus Toolkit-4 (GT4) and third-party components.","PeriodicalId":326471,"journal":{"name":"Richard Tapia Celebration of Diversity in Computing Conference","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127711643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Briana Lowe Wellman, James E. Davis, Monica Anderson
{"title":"Alice and robotics in introductory CS courses","authors":"Briana Lowe Wellman, James E. Davis, Monica Anderson","doi":"10.1145/1565799.1565822","DOIUrl":"https://doi.org/10.1145/1565799.1565822","url":null,"abstract":"Statistics for underrepresented minority groups and women continue to show low numbers in enrollment and rates of retention in academic computer science programs. A new approach to increase student interest in computer science in a first year program is introduced.\u0000 Laboratory modules for an introductory programming course have been developed at the University of Alabama with the goal to increase student motivation and understanding of fundamental programming concepts. The course utilizes robots and Alice, a 3D graphical programming environment. The drag and drop interface of Alice allows students to program real robots using instructions that correspond to statements of programming languages such as Java, C++, and C#. Students gain programming experience that is transferable to upper level courses by engaging in a stimulating and less frustrating environment using Alice interfaced with robots.","PeriodicalId":326471,"journal":{"name":"Richard Tapia Celebration of Diversity in Computing Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129598324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Engaging students in software development course projects","authors":"Jacqueline Hundley, Winard Britt","doi":"10.1145/1565799.1565820","DOIUrl":"https://doi.org/10.1145/1565799.1565820","url":null,"abstract":"This work seeks to contribute to software development education by motivating the use of engaging in-class and laboratory assignments. Ideally, these assignments should involve considerable student buy-in and should also evolve throughout the course to mimic real-world software development. Prior research is discussed, as well as several specific examples from two introductory programming classes. The ultimate contribution is a convincing argument to spend the extra effort to design better student projects.","PeriodicalId":326471,"journal":{"name":"Richard Tapia Celebration of Diversity in Computing Conference","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123236061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Broadening participation: a community college strategy","authors":"W. R. Adrion, Renee Fall","doi":"10.1145/1565799.1565811","DOIUrl":"https://doi.org/10.1145/1565799.1565811","url":null,"abstract":"The Commonwealth Alliance for Information Technology Education (CAITE) is an alliance of 15 Massachusetts public campuses that focuses on community colleges because of their role as a gateway to careers and further higher education for underserved populations. CAITE outreach extends into four regions that have high percentages of students who are under-represented in the knowledge and innovation economy. Building on two years' experience and extensive data, we are strengthening our efforts to develop nurturing educational pathways and to ensure that students are adequately prepared to enter them. CAITE can serve as a transferable model for statewide collaborations.","PeriodicalId":326471,"journal":{"name":"Richard Tapia Celebration of Diversity in Computing Conference","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115492297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kevin S. Bauer, Damon McCoy, Ben Greenstein, D. Grunwald, D. Sicker
{"title":"Performing traffic analysis on a wireless identifier-free link layer","authors":"Kevin S. Bauer, Damon McCoy, Ben Greenstein, D. Grunwald, D. Sicker","doi":"10.1145/1565799.1565804","DOIUrl":"https://doi.org/10.1145/1565799.1565804","url":null,"abstract":"Recent work has focused on removing explicit network identifiers (such as MAC addresses) from the wireless link layer to protect users' privacy. However, despite comprehensive proposals to conceal all information encoded in the bits of the headers and payloads of network packets, we find that a straightforward attack on a physical layer property yields information that aids in the profiling of users. In this paper, a statistical technique is developed to associate wireless packets with their respective transmitters solely using the signal strengths of overheard packets. Through experiments conducted in a real indoor office building environment, we demonstrate that packets with no explicit identifiers can be grouped together by their respective transmitters with high accuracy. We next show that this technique is sufficiently accurate to allow an adversary to conduct a variety of complex traffic analysis attacks. As an example, we demonstrate that one type of traffic analysis--a website fingerprinting attack--can be successfully implemented after packets have been associated with their transmitters. Finally, we propose and evaluate techniques that can introduce noise into the measurements of such physical layer phenomena to obfuscate the identifiers derived from them.","PeriodicalId":326471,"journal":{"name":"Richard Tapia Celebration of Diversity in Computing Conference","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117078718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Later stages support for security requirements","authors":"Jose Romero-Mariona, H. Ziv, D. Richardson","doi":"10.1145/1565799.1565823","DOIUrl":"https://doi.org/10.1145/1565799.1565823","url":null,"abstract":"Software security concerns are frequent, widespread, and with potentially harmful consequences. We believe that security concerns should not only be specified as part of software requirements, but should also be supported during later stages of development (architecture, design, implementation, testing, and maintenance). This paper focuses on security requirements and the support available for them past their creation. As part of ongoing research we surveyed 12 approaches to security requirements engineering and identified the level of support each approach provides on a variety of areas related to later stages support. We show that support for security requirements after they are specified is lacking at best, creating opportunities for significant improvement and further research in this area.","PeriodicalId":326471,"journal":{"name":"Richard Tapia Celebration of Diversity in Computing Conference","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126166260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Characterizing the association between mobile users using wireless network traces","authors":"Pierrot Chery, Jiang Li, L. Burge","doi":"10.1145/1565799.1565816","DOIUrl":"https://doi.org/10.1145/1565799.1565816","url":null,"abstract":"In Delay Tolerant Networks (DTN), the performance heavily depends on the association between mobile users, which decides how frequently the users meet with each other. It is therefore very important to understand the association.\u0000 In this paper, by analyzing a number of wireless network traces, we verified the exponential distribution of the association of mobile users, which means that most mobile users are not closely associated. Furthermore, we examined the distribution of the inter-connectivity time of those mobile users more closely associated.","PeriodicalId":326471,"journal":{"name":"Richard Tapia Celebration of Diversity in Computing Conference","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126033231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Densmore, A. Devender, Matthew Johnson, N. Sritanyaratana
{"title":"A platform-based design environment for synthetic biological systems","authors":"D. Densmore, A. Devender, Matthew Johnson, N. Sritanyaratana","doi":"10.1145/1565799.1565806","DOIUrl":"https://doi.org/10.1145/1565799.1565806","url":null,"abstract":"Genomics has reached the stage at which the amount of DNA sequence information in existing databases is quite large. Synthetic biology is now using these databases to catalog sequences according to their functionality thus creating a system of standard biological parts. Flexible tools are needed which both permit access and modification to that data and also allow one to perform meaningful, intelligent manipulation. A Platform-Based Design approach views genetic information as having a particular functionality and assembles platforms (collections of DNA elements) to perform this functionality. Specifically this paper presents the Clotho toolset which uses these concepts to create a complete design environment for standardized biological parts.","PeriodicalId":326471,"journal":{"name":"Richard Tapia Celebration of Diversity in Computing Conference","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115359077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DANCING, Dance ANd Choreography: an Intelligent Nondeterministic Generator","authors":"Mario Nakazawa, Andrea Paezold-Ruehl","doi":"10.1145/1565799.1565807","DOIUrl":"https://doi.org/10.1145/1565799.1565807","url":null,"abstract":"In this paper, we describe our proof of concept system that uses genetic algorithms to generate choreography for the waltz, a ballroom dance. We detail the representation of the dance steps and sequences our system manipulates, and our design of the fitness function to guide the algorithm. Preliminary results show that we have successfully incorporated several rudimentary choreography principles and that our system thus can generate effective waltz sequences. There are many potential areas of future development for our system, such as extending it to generate more sophisticated choreography for a variety of ballroom dances.","PeriodicalId":326471,"journal":{"name":"Richard Tapia Celebration of Diversity in Computing Conference","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126894066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Driving simulation environment for modeling of human behavior","authors":"M. Guajardo","doi":"10.1145/1347787.1347806","DOIUrl":"https://doi.org/10.1145/1347787.1347806","url":null,"abstract":"The goal of our research is to build a realistic model of human behavior that predicts the distribution of cognitive and bodily resources when performing complex tasks such as driving a car. Our driving environment is full of varied time-critical inputs that humans are familiar with handling. It provides a set of components and functions that facilitate the staging of experiments and the monitoring of advanced human behaviors. Hence, we can test humans and human behavioral models in a realistic VR setting with roads, traffic lights, STOP signs, pedestrians and other vehicles to study everyday behaviors in real time. Copyright is held by author/owner(s) Tapia'07, October 14-17, 2007, Lake Buena Vista, Florida, USA ACM 978-1-59593-866-4/07/0010","PeriodicalId":326471,"journal":{"name":"Richard Tapia Celebration of Diversity in Computing Conference","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133246296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}