-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy path2001.bib
400 lines (373 loc) · 18.9 KB
/
2001.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
@comment{{This file has been generated by bib2bib 1.96}}
@comment{{Command line: bib2bib -ob 2001.bib -c year=2001 csdl-trs.bib}}
@techreport{csdl2-00-05,
author = {Jitender Miglani},
institution = {Department of Information and Computer Sciences,
University of Hawaii, Honolulu, Hawaii 96822},
number = {{CSDL}-01-11},
title = {The design, implementation, and evaluation of {INCA}: a proposal for an
automated system for approval code allocation},
keywords = {Inca, Thesis-Proposals},
type = {{M.S.} Thesis Proposal},
month = {September},
year = 2001,
url = {http://csdl.ics.hawaii.edu/techreports/2000/00-05/00-05.pdf},
abstract = {
The ICS department of the University of Hawaii has faced problems
surrounding approval code distribution as its enrollment has increased. The
manual system for approval code allocation was time-consuming, ineffective
and inefficient. INCA is designed to automate the task of approval code
allocation, improve the quality of course approval decisions, and decrease
the administrative overhead involved in those decisions.
Based upon informal feedback from department administrators, it appears
that INCA reduces their overhead and makes their life easier. What are the
old problems that are solved by INCA? Does INCA introduce new kinds of
problems for the administrator? What about the students? Are they
completely satisfied with the system? In what ways does the system benefit
the department as a whole?
In this thesis, I will discuss design, implementation and evaluation of
INCA. I will evaluate INCA from the viewpoints of students, administrators,
and the department. I will do an email analysis to prove that INCA reduces
the administrative overheads. I will conduct a user survey to investigate
whether INCA improves the predictability and understandability of
students. Finally, I will analyze the INCA database to extract the
information useful to the departments for course curriculum planning. The
evaluation of INCA will provide us with useful insights for future
improvements of INCA and improving the student experience with academic
systems in general.
}
}
@techreport{csdl2-00-13,
keywords = {VCommerce},
author = {Mette L. Moffett and Brian T. Pentland and Philip M. Johnson},
institution = {Department of Information and Computer Sciences,
University of Hawaii, Honolulu, Hawaii 96822},
title = {VCommerce Administrator Guide},
year = {2001},
url = {http://csdl.ics.hawaii.edu/techreports/2000/00-13/00-13.pdf},
number = {{{CSDL}-00-13}},
month = {January},
abstract = {Provides administrative support for installation, configuration, and running the VCommerce simulation.
}
}
@techreport{csdl2-01-01,
keywords = {Thesis-MS, Hardware-Subroutine},
author = {Mark F. Waterson},
institution = {Department of Information and Computer Sciences,
University of Hawaii, Honolulu, Hawaii 96822},
title = {The Hardware Subroutine Approach to Developing Custom Co-Processors},
year = {2001},
type = {{M.S.} Thesis},
url = {http://csdl.ics.hawaii.edu/techreports/2001/01-01/01-01.pdf},
number = {{{CSDL}-01-01}},
month = {May},
abstract = {
The Hardware Subroutine Approach to developing a reconfigurable, custom
co-processor is an architecture and a process for implementing a hardware
subsystem as a direct replacement for a subroutine in a larger program.
The approach provides a framework that helps the developer analyze the
tradeoffs of using hardware acceleration, and a design procedure to guide
the implementation process. To illustrate the design process a HWS
implementation of a derivative estimation subroutine is described. In this
context I show how key performance parameters of the HWS can be estimated
in advance of complete implementation and decisions made regarding the
potential benefit of implementation alternatives to program performance
improvement. Performance of the actual hardware coprocessor is compared to
the software-only implementation and to estimates developed during the
design process.
}
}
@techreport{csdl2-01-04,
keywords = {Hackystat},
author = {Philip M. Johnson and Carleton A. Moore and Jitender Miglani},
institution = {Department of Information and Computer Sciences,
University of Hawaii, Honolulu, Hawaii 96822},
title = {Hackystat Design Notes},
year = {2001},
url = {http://csdl.ics.hawaii.edu/techreports/2001/01-04/01-04.html},
number = {{{CSDL}-01-04}},
month = {June},
abstract = {
This document collects together a series of design notes concerning
Hackystat, a system for automated collection and analysis of software engineering data. Some of the design notes include: Insights from the Presto Development Project: Requirements from the IDE for automated data collection; A roundtable discussion of Hackystat; Change management in Hackystat; Validated idle time
detection; and Defect collection and analysis in Hackystat.
}
}
@techreport{csdl2-01-05,
keywords = {Hackystat},
author = {Philip M. Johnson},
institution = {Department of Information and Computer Sciences,
University of Hawaii, Honolulu, Hawaii 96822},
title = {Hackystat Developer Release Installation Guide},
year = {2001},
url = {http://csdl.ics.hawaii.edu/techreports/2001/01-05/01-05.html},
number = {{{CSDL}-01-05}},
month = {June},
abstract = {
This document provides an overview of the Hackystat developer
distribution. This includes the structure of the source code, the
Java-based component technologies Hackystat is built on (including Tomcat,
Ant, Soap, Xerces, Cocoon, JavaMail, JUnit, HttpUnit, JDOM,
and Jato), configuration instructions, testing, and frequently
asked questions. An updated version of this document is provided
in the actual developer release package; this technical report is
intended to provide easy access to near-current instructions for
those who are evaluating the system and would like to learn more
before downloading the entire package.
}
}
@techreport{csdl2-01-06,
keywords = {Inca},
author = {Jitender Miglani},
institution = {Department of Information and Computer Sciences,
University of Hawaii, Honolulu, Hawaii 96822},
title = {Inca Business Plan},
year = {2001},
url = {http://csdl.ics.hawaii.edu/techreports/2001/01-06/01-06.pdf},
number = {{{CSDL}-01-06}},
month = {April},
abstract = {
Inca is an Enterprise JavaBean based technology to provide Internet-based
allocation of course approval codes. This business plan explores the
commercial potential of this technology. The Inca business plan was
selected as a finalist in the 2001 Business Plan Competition of the
University of Hawaii College of Business Administration.
}
}
@techreport{csdl2-01-07,
author = {Michael J. Staver},
institution = {Department of Information and Computer Sciences,
University of Hawaii, Honolulu, Hawaii 96822},
number = {{CSDL}-01-07},
title = {Lightweight Disaster Management Training and Control},
keywords = {TsunamiSim, Thesis-Proposals},
type = {{M.S.} Thesis Proposal},
month = {July},
year = 2001,
url = {http://csdl.ics.hawaii.edu/techreports/2001/01-07/01-07.pdf},
abstract = {
Disaster management is increasingly a global enterprise for international
organizations, governmental institutions, and arguably individuals. The
tempo at which information is collected and disseminated during natural
and man-made disasters paces the rate and effectiveness of relief
efforts. As the Internet becomes a ubiquitous platform for sharing
information, a browser-based application can provide disaster managers a
lightweight solution for training and control. A heavyweight solution
might include dedicated communications, real-time command and control
software and hardware configurations, and dedicated personnel. In
contrast, a lightweight solution requires trained personnel with Internet
access to a server via computers or hand-held devices. Tsunami Sim
provides asynchronous situational awareness with an interactive, Geographic
Information System (GIS). Tsunami Sim is not capable of providing
real-time situational awareness nor intended to replace or compete with
heavyweight solutions developed for that purpose. Rather, Tsunami Sim
will enhance the disaster managers' abilities to train for and control
disasters in regions where heavyweight solutions are impractical. For
distributed training, Tsunami Sim will provide deterministic and stochastic
scenarios of historical and fictional disasters. Tsunami Sim will be an
open-source, Java application implemented for maintainability and
extensibility. United States Pacific Command (PACOM) located at Camp
Smith, Hawai'i, will enable Tsunami Sim validation and assessment.
}
}
@techreport{csdl2-01-08,
author = {Weifeng Miao},
institution = {Department of Information and Computer Sciences,
University of Hawaii, Honolulu, Hawaii 96822},
number = {{CSDL}-01-08},
title = {J2EEval: A Method for Performance Analysis of Enterprise JavaBean Applications},
keywords = {Inca, Thesis-Proposals},
type = {{M.S.} Thesis Proposal},
month = {July},
year = 2001,
url = {http://csdl.ics.hawaii.edu/techreports/2001/01-08/01-08.pdf},
abstract = {
J2EEval is a method for performance analysis of Enterprise JavaBean (EJB)
applications. This proposal overviews the method and its application in
the context of a case study of the Inca Course approval system.
}
}
@techreport{csdl2-01-09,
author = {Philip M. Johnson},
institution = {Department of Information and Computer Sciences,
University of Hawaii, Honolulu, Hawaii 96822},
number = {{CSDL}-01-09},
title = {Inca Software Requirements Specification},
keywords = {Inca},
month = {April},
year = 2001,
url = {http://csdl.ics.hawaii.edu/techreports/2001/01-09/01-09.html},
abstract = {
Inca is a system designed to improve the
efficiency and effectiveness of course approval request processing.
This software requirements specification details: (a) the traditional
manual process
used by the ICS department for course approval request processing,
(b) the 12 basic requirements Inca must satisfy, the fine-grained rules for
prioritization of requests, (c) several usage scenarios, (d) n-tier architectural
issues for an Enterprise JavaBeans implementation, and (e) miscellaneous
requirements including authentication, data file formats, special topics,
and so forth.
}
}
@techreport{csdl2-01-10,
author = {Joy M. Agustin and William M. Albritton},
institution = {Department of Information and Computer Sciences,
University of Hawaii, Honolulu, Hawaii 96822},
number = {{CSDL}-01-10},
title = {Vendor Relationship Management: Re-engineering the business
process through {B2B} infrastructure to accelerate the growth of small
businesses in geographically isolated areas},
keywords = {VRM},
month = {December},
year = 2001,
url = {http://csdl.ics.hawaii.edu/techreports/2001/01-10/01-10.pdf},
abstract = {
Instead of limiting the business to the local populace, the World Wide Web
gives global access to all companies that have made the transition to
online. Ideally, the Internet seems to offer vast, untapped markets,
lowers the costs of reaching these markets, and frees businesses from
geographical constraints. Applying this to Hawaii, small companies can now
sell their products in the expanding global marketplace, instead of
restricting themselves to an island economy.
The goal of research on the Vendor Relationship Management (VRM) System
is to explore the requirements for new business process models and
associated technological infrastructure for small local businesses in
Hawaii that wish to exploit the global reach of the Internet. In order to
understand the requirements and potential of this approach, we had meetings
with different groups of people that included the host of a virtual mall, a
financial service provider, two courier services, and several local
companies.
The interface of the VRM system includes both a vendor and a host
side. The host side is used by the virtual mall company to send customers
orders to the various vendors. It can also be used to create and edit
vendor company information, create and edit vendor product information,
and enter a contact email address. The vendor side is used by the numerous
vendors to receive the orders, confirm that the orders have been sent,
view the customer information, create and edit product information, and
create and edit contact information.
After creating the first prototype, several experts gave their critiques
of the system. Based on their critiques, we came up with several possible
directions for future research.
}
}
@inproceedings{csdl2-01-12,
author = {Philip M. Johnson},
title = {You can't even ask them to push a button: Toward
ubiquitous, developer-centric, empirical software engineering},
booktitle = {The {NSF} Workshop for New Visions for Software
Design and Productivity: Research and Applications},
year = {2001},
url = {http://csdl.ics.hawaii.edu/techreports/2001/01-12/01-12.pdf},
keywords = {Hackystat, Publications-Workshops},
address = {Nashville, TN},
month = {December},
abstract = {
Collection and analysis of empirical software project data is central to
modern techniques for improving software quality, programmer productivity,
and the economics of software project development. Unfortunately, barriers
surrounding the cost, quality, and utility of empirical project data
hamper effective collection and application in many software
development organizations.
This paper describes Hackystat, an approach to enabling ubiquitous
collection and analysis of empirical software project data. The approach
rests on three design criteria: data collection and analysis must be
developer-centric rather than management-centric; it must be in-process
rather than between-process, and it must be non-disruptive---it must not
require developers to interrupt their activities to collect and/or analyze
data. Hackystat is being implemented via an open source, sensor and web
service based architecture. After a developer instruments their commercial
development environment tools (such as their compiler, editor, version
control system, and so forth) with Hackystat sensors, data is silently and
unobtrusively collected and sent to a centralized web service. The web
service runs analysis mechanisms over the data and sends email
notifications back to a developer when ``interesting'' changes in their
process or product occur.
Our research so far has yielded an initial operational release in daily use
with a small set of sensors and analysis mechanisms, and a research agenda
for expansion in the tools, the sensor data types, and the analyses. Our
research has also identified several critical technical and social
barriers, including: the fidelity of the sensors; the coverage of the
sensors; the APIs exposed by commercial tools for instrumentation; and the
security and privacy considerations required to avoid adoption problems due
to the spectre of ``Big Brother''.
}
}
@techreport{csdl2-01-13,
author = {Philip M. Johnson},
title = {Project Hackystat: Accelerating adoption of empirically guided software development through
non-disruptive, developer-centric, in-process data collection and analysis},
institution = {Department of Information and Computer Sciences,
University of Hawaii, Honolulu, Hawaii 96822},
year = {2001},
month = {November},
keywords = {Hackystat},
url = {http://csdl.ics.hawaii.edu/techreports/2001/01-13/01-13.pdf},
abstract = {
Collection and analysis of empirical software project data is central to
modern techniques for improving software quality, programmer productivity,
and the economics of software project development. Unfortunately,
effective collection and analysis of software project data is rare in
mainstream software development. Prior research suggests that three primary
barriers are: (1) cost: gathering empirical software engineering
project data is frequently expensive in resources and time; (2)
quality: it is often difficult to validate the accuracy of the data; and
(3) utility: many metrics programs succeed in collecting data but
fail to make that data useful to developers.
This report describes Hackystat, a technology initiative and research
project that explores the strengths and weaknesses of a
developer-centric, in-process, and non-disruptive approach
to validation of empirical software project data collection and analysis.
}
}
@techreport{csdl2-01-14,
author = {Timothy Burgess},
institution = {Department of Information and Computer Sciences,
University of Hawaii, Honolulu, Hawaii 96822},
number = {{CSDL}-01-14},
title = {An artificial neural network for recognition of simulated dolphin whistles},
keywords = {Thesis-MS},
type = {{M.S.} Thesis},
month = {May},
year = 2001,
url = {http://csdl.ics.hawaii.edu/techreports/2001/01-14/01-14.pdf},
abstract = {
It is known that dolphins are capable of understanding 200 "word"
vocabularies with sentence complexity of three or more "words", where
words consist of audio tones or hand gestures. An automated recognition
method of words where a word is a defined whistle, within a
predetermined acceptable degree of variance, could allow words to be
both easily reproducible by dolphins and identifiable by humans. We
investigate a neural network to attempt to distinguish four
artificially generated whistles from themselves and from common
underwater environmental noises, where a whistle consists of four
variations of a fundamental whistle style. We play these whistle
variations into the dolphins normal tank environment and then record
from a separate tank hydrophone. This results in slight differences for
each whistle variation's spectrogram, the complete collection of which
we use to form the neural network training set. For a single whistle
variation, the neural network demonstrates strong output node values,
greater than 0.9 on a scale of 0 to 1. However, for combinations of
"words", the network exhibits poor training
performance and an inability to distinguish between words. To validate
this, we used a test set of 41 examples, of which only 22 were
correctly classified. This result suggests that an appropriately
trained backpropagation neural network using spectrographic analysis as
inputs is a viable means for a very specific whistle recognition,
however a large degree of whistle variation will dramatically lower the
performance of the network, past that required for acceptable
recognition.
}
}
@comment{{csdl2-08-06,
author = Robert S. Brewer,
title = Literature review on carbon footprint collection and analysis ,
institution = "Department of Information and Computer Sciences,
University of Hawaii, Honolulu, Hawaii 96822",
NUMBER = CSDL-08-06,
KEYWORDS = Sustainability,
MONTH = December,
YEAR = 2008,
URL = http://csdl.ics.hawaii.edu/techreports/2008/08-06/08-06.pdf,
abstract = Obsolete. Please see by Technical Report 09-05.
}}