Now showing items 1-10 of 53
Radiation Search Operations using Scene Understanding with Autonomous UAV and UGV
(Virginia Tech, 2016-08-31)
Autonomously searching for hazardous radiation sources requires the ability of the aerial and ground systems to understand the scene they are scouting. In this paper, we present systems, algorithms, and experiments to ...
Secure Coding Practices in Java: Challenges and Vulnerabilities
(Virginia Tech, 2017-09-28)
Java platform and third-party libraries provide various security features to facilitate secure coding. However, misusing these features can cost tremendous time and effort of developers or cause security vulnerabilities ...
Towards Optimal Secure Distributed Storage Systems with Exact Repair
Distributed storage systems in the presence of a wiretapper are considered. A distributed storage system (DSS) is parameterized by three parameters (𝑛, 𝑘, 𝑑), in which a file stored across n distributed nodes, can be ...
Determination Of Unit Costs For Library Services
(ACRL Publications, 1979-05-01)
As with other public service activities, inflationary trends and public opinion provide a clear mandate for attempts to control the increasing costs of providing library services. Cost control necessarily requires knowledge ...
A Hybrid Model for Role-related User Classification on Twitter
(Virginia Tech, 2018-11-15)
To aid a variety of research studies, we propose TWIROLE, a hybrid model for role-related user classification on Twitter, which detects male-related, female-related, and brand-related (i.e., organization or institution) ...
Integrated Airline Schedule Design and Fleet Assignment: Polyhedral Analysis and Benders' Decomposition Approach
The main airline operations consist of schedule planning, fleet assignment, aircraft routing, and crew scheduling. To improve profitability, we present in this paper an integrated fleet assignment model with schedule ...
Intractability results in discrete-event simulation
(EDP SCIENCES, 1995)
Simulation is often viewed as a modeling methodology of last resort. This is due to the lack of automated algorithms and procedures that exist to aid in the construction and analysis of simulation models. Jacobson and ...
An XML Log Standard and Tool for Digital Library Logging Analysis
Log analysis can be a primary source of knowledge about how digital library patrons actually use DL systems and services and how systems behave while trying to support user information seeking activities. Log recording and ...
Response to "Comments on "Design of active structural acoustic control systems by eigenproperty assignment [J. Acoust. Soc. Am. 99, 1785-1788 (1996)]
(Acoustical Society of America, 1996-03-01)
The authors thank Professor Cunefare for his interest in our paper on the design of active structural acoustic control systems. This Letter is to clarify questions raised in his Comments. (C) 1996 Acoustical Society of America.