Michael Soltys

ORCID: 0000-0002-3834-1914
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • semigroups and automata theory
  • Algorithms and Data Compression
  • Computability, Logic, AI Algorithms
  • Complexity and Algorithms in Graphs
  • Information and Cyber Security
  • Logic, Reasoning, and Knowledge
  • Rough Sets and Fuzzy Logic
  • Multi-Criteria Decision Making
  • Logic, programming, and type systems
  • Computational Geometry and Mesh Generation
  • graph theory and CDMA systems
  • Advanced Malware Detection Techniques
  • Statistical and Computational Modeling
  • Formal Methods in Verification
  • Advanced Algebra and Logic
  • Cloud Computing and Remote Desktop Technologies
  • Advanced Graph Theory Research
  • Polynomial and algebraic computation
  • Natural Language Processing Techniques
  • Network Security and Intrusion Detection
  • Graph Labeling and Dimension Problems
  • Advanced Text Analysis Techniques
  • Topological and Geometric Data Analysis
  • Machine Learning and Algorithms
  • Bayesian Modeling and Causal Inference

California State University, Channel Islands
2015-2021

McMaster University
2003-2013

Southern Illinois University Carbondale
2009

Software (Spain)
2004

University of Missouri
1988

This study has been inspired by numerous requests for clarification from researchers who often confuse Saaty's Analytic Hierarchy Process (AHP) with the pairwise comparisons (PC) method, taking AHP as only representation of PC. should be regarded an interpretation and clarificatio n past investigations In addition, this article is a reflection on general PC research at higher level abstraction: philosophy science. It delves into foundations implications comparisons. Some results are based...

10.3233/fi-2016-1336 article EN Fundamenta Informaticae 2016-05-02

This study examines the problem of decay uniform resource locators (URLs) in health care management journals and seeks to determine whether continued availability at a given URL relates date publication, type resource, or top-level domain.The authors determined web-based resources cited articles published five source from 2002 2004. The data were analyzed using correlation, chi-square, descriptive statistics. Attempts made locate unavailable resources.After checking twice, 49.3% original...

10.3163/1536-5050.97.2.009 article EN cc-by Journal of the Medical Library Association JMLA 2009-04-01

An approximation is proposed for the posterior mean and standard deviation of ability parameter in an item response model. The procedure assumes that approximations to covariance matrix parameters are available. It based on a Taylor series conditional parameters. method illustrated two-parameter logistic model using data from ACT math test with 39 items. A numerical comparison empirical Bayes n = 400 examinees shows point estimates very similar but deviations under about 2% smaller than...

10.3102/10769986013002117 article EN Journal of Educational Statistics 1988-06-01

10.1016/j.ejor.2019.01.046 article EN European Journal of Operational Research 2019-01-29

A shuffle of two strings is formed by interleaving the characters into a new string, keeping each string in order. square if it identical strings. There known polynomial time dynamic programming algorithm to determine given z x, y; however, has been an open question whether there square. We resolve this proving that problem NP-complete via many-one reduction from 3-Partition.

10.1016/j.jcss.2013.11.002 article EN publisher-specific-oa Journal of Computer and System Sciences 2013-12-05

10.1016/j.apal.2003.10.018 article EN publisher-specific-oa Annals of Pure and Applied Logic 2004-08-05

10.1007/s00153-004-0249-8 article EN Archive for Mathematical Logic 2004-10-07

We introduce three formal theories of increasing strength for linear algebra in order to study the complexity concepts needed prove basic theorems subject. give what is apparently first feasible proofs Cayley-Hamilton theorem and other properties determinant, propositional proof matrix identities.

10.1109/lics.2002.1029841 article EN 2003-06-25

In the public imagination Cybersecurity is very much about malware, even though malware constitutes only part of all threats faced by experts. However, still one best methods to gain persistent access and control a target system. Malware often combined with well socially-engineered phishing attack that deceives user foothold on Once attakcer gains beachhead in victim's network, it may be used download additional payloads exploit vulnerabilities, more within network. Using as their foothold,...

10.1016/j.procs.2020.08.010 article EN Procedia Computer Science 2020-01-01

The threat of social engineering is one that affects not only the financial and reputational well-being corporate entities but also basic rights individuals to privacy. Methods common health campaigns used disseminate information warning against have potential for success. By providing scenarios exact descriptions threats, recipients messages might become more aware dangers posed through Internet. Case studies effective will be examined, as well specific threats could avoided by awareness on...

10.1016/j.procs.2019.09.241 article EN Procedia Computer Science 2019-01-01

As our world of digital devices continues to expand, the amount evidence encountered by law enforcement during case investigation is ever increasing. Faced with a preponderance high capacity media devices, forensic investigators must be able review them quickly, and establish which merit further attention. Utilizing small single-board computer called Raspberry Pi, this mobile forensics triage device provides fast, targeted feedback for immediate assessment. A presented in paper. It named...

10.1016/j.procs.2019.09.335 article EN Procedia Computer Science 2019-01-01

10.2307/1164749 article EN Journal of Educational Statistics 1988-01-01

10.1016/j.tcs.2017.02.016 article EN publisher-specific-oa Theoretical Computer Science 2017-03-02

This is an Innovate Practice Full Paper. The Cloud has become a principal paradigm of computing in the last ten years, and Computer Science curricula must be updated to reflect that reality. paper examines simple ways accomplish curriculum cloudification using Amazon Web Services (AWS), for other disciplines such as Business, Communication Mathematics.

10.1109/fie49875.2021.9637242 article EN 2021 IEEE Frontiers in Education Conference (FIE) 2021-10-13

We propose a research program for developing formal framework ranking procedures based on the Pairwise Comparisons method. are interested in case where relatively few items to be ranked with complex procedure and according large number of criteria. A typical example this scenario is competition several companies bid contract, selection winner done multiple criteria an intricate procedure. Several other applications suggested.

10.3233/fi-2016-1331 article EN Fundamenta Informaticae 2016-05-02

10.1007/s00153-003-0205-z article EN Archive for Mathematical Logic 2004-04-01

10.1016/j.jda.2018.03.002 article EN Journal of Discrete Algorithms 2018-01-01

Fair and transparent procurement procedures are a cornerstone of well functioning free-market economy. In particular, bidding is mechanism whereby companies compete for contracts; when well, the process rewards both quality proposal, "reasonableness" quote. This way, company public win. The requires fair ranking procedure. Once parameters competition established, issuing bid required by law to abide those parameters. Not surprisingly, opposing interests may try "game system." more complex...

10.1016/j.procs.2014.08.207 article EN Procedia Computer Science 2014-01-01
Coming Soon ...