- Mobile Ad Hoc Networks
- Opportunistic and Delay-Tolerant Networks
- Teaching and Learning Programming
- Wireless Networks and Protocols
- Gender and Technology in Education
- Vehicular Ad Hoc Networks (VANETs)
- Energy Efficient Wireless Sensor Networks
- Distributed systems and fault tolerance
- Parallel Computing and Optimization Techniques
- Experimental Learning in Engineering
- Advanced Data Storage Technologies
- Cooperative Communication and Network Coding
- Indoor and Outdoor Localization Technologies
- Online Learning and Analytics
- Human Mobility and Location-Based Analysis
- Mobile Agent-Based Network Management
- Information Systems Education and Curriculum Development
- Anomaly Detection Techniques and Applications
- Underwater Vehicles and Communication Systems
- Dam Engineering and Safety
- Internet Traffic Analysis and Secure E-voting
- Genetics, Bioinformatics, and Biomedical Research
- Cloud Computing and Resource Management
- Caching and Content Delivery
- ICT Impact and Policies
Computing Research Association
2023
Colorado School of Mines
2013-2022
College of the Holy Cross
2020
University of Illinois at Springfield
2020
Association for Computing Machinery
2002-2018
Northwestern University
2016
University of Southern California
2016
University of Colorado Denver
2013-2014
Sea Research Foundation
2011
Oregon State University
2004
Abstract In the performance evaluation of a protocol for an ad hoc network, should be tested under realistic conditions including, but not limited to, sensible transmission range, buffer space storage messages, representative data traffic models and movements mobile users (i.e. mobility model). This paper is survey that are used in simulations networks. We describe several represent nodes whose independent each other entity models) dependent on group models). The goal this to present number...
Network wide broadcasting in Mobile Ad Hoc Networks provides important control and route establishment functionality for a number of unicast multicast protocols. Considering its use as building block other network layer protocols, the MANET community needs to standardize single methodology that efficiently delivers packet from one node all nodes. Despite considerable proposed schemes, no comprehensive comparative analysis has been previously done. This paper such by classifying existing...
Simulation is the research tool of choice for a majority mobile ad hoc network (MANET) community. However, while use simulation has increased, credibility results decreased. To determine state MANET studies, we surveyed 2000-2005 proceedings ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). From our survey, found significant shortfalls. We present survey in this paper. then summarize common study pitfalls survey. Finally, discuss tools available that aid...
In simulations of mobile ad hoc networks, the probability distribution governing movement nodes typically varies over time and converges to a "steady-state" distribution, known in literature as stationary distribution. Some published simulation results ignore this initialization discrepancy. For those that attempt account for discrepancy, practice is discard an initial sequence observations from hope remaining values will closely represent This approach inefficient not always reliable....
article Free Access Share on The incredible shrinking pipeline Author: Tracy Camp Univ. of Alabama AlabamaView Profile Authors Info & Claims Communications the ACMVolume 40Issue 10Oct. 1997 pp 103–110https://doi.org/10.1145/262793.262813Published:01 October 1997Publication History 281citation2,339DownloadsMetricsTotal Citations281Total Downloads2,339Last 12 Months95Last 6 weeks42 Get Citation AlertsNew Alert added!This alert has been successfully added and will be sent to:You notified...
The pipeline shrinkage problem for women in computer science is a well-known and documented phenomenon where the ratio of to men involved computing shrinks dramatically from early student years working [19, 22, 23, 32, 42, 93, 112], also see this issue [24]. During last decade, considerable research ensued understand reasons behind existence shrinking some cases take action increase numbers computing. Through work National Science Foundation funded project [56], ACM's Committee on Women...
Many location based routing protocols have been developed for ad hoc networks. This paper presents the results of a detailed performance evaluation on two these protocols: location-aided (LAR) and distance effect algorithm mobility (DREAM). We compare with dynamic source (DSR) protocol minimum standard (i.e., that floods all data packets). used NS-2 to simulate 50 nodes moving according random waypoint model. Our main goal investigation was stress evaluated high loads during both low speeds....
Computer Science (CS) Unplugged activities have been deployed in many informal settings to present computing concepts an engaging manner. To justify use the classroom, however, it is critical for a strong educational component. For past three years, we developing and refining CS curriculum middle school classrooms. In this paper, describe assessment that maps questions from comprehensive project computational thinking (CT) skills Bloom's Taxonomy. We results two different deployments discuss...
In previous years, many location based routing protocols have been developed for ad hoc networks. Some of these assume a service exists which provides information on all the mobile nodes in network. We evaluate three alternatives. One is reactive protocol; other two are proactive protocols. Of protocols, one sends tables to neighbors and nodes. our evaluation, protocol proved best performance overall. Thus, we also main input parameter associated with this optimal performance.
Computer Science Unplugged activities have been shown to be successful in increasing student interest computer science when used outreach and after school events. There is less research available on adapting these extra-curricular for use a classroom setting, where there are more students the must support educational goals, not just changes attitude. We describe our work updating several existing CS as well introducing some new an American middle classroom. One challenge using determine...
Across North America, universities and colleges are facing a significant increase in enrollment both undergraduate computer science (CS) courses programs. The current surge has exceeded previous CS booms, there is general sense that the growth substantially different from of mid-1980s late 1990s. For example, since 1990s, U.S. Bureau Labor data shows number jobs where computing skills needed on an upward slope [1], illustrating increased reliance our society computing. We also know more...
Network wide broadcasting in Mobile Ad Hoc Networks provides important control and route establishment functionality for a number of unicast multicast protocols. Considering its use as building block other network layer protocols, the MANET community needs to standardize single methodology that efficiently delivers packet from one node all nodes. Despite considerable proposed schemes, no comprehensive comparative analysis has been previously done. This paper such by classifying existing...
In addition to being realistic, a mobility model should be easy understand and use. Unfortunately, most of the simple models proposed thus far are not realistic The main contribution this work is present SMOOTH, new that (e.g., SMOOTH based on several known features human movement) use does have any complex input parameters). We first SMOOTH. then validate imitates movement patterns in real traces collected from range diverse scenarios. addition, we compare with other developed these traces....
We investigate techniques for earth dam and levee health monitoring automatic detection of anomalous events in passive seismic data. have developed a novel data-driven workflow that uses machine learning geophysical data collected from sensors located on the surface to identify internal erosion events. In this paper, we describe our research experiments with binary one-class Support Vector Machines (SVMs). used experimental laboratory embankment (80% normal 20% anomalies) extracted nine...
An analysis of the human chromosome 22 genomic sequence shows that both Z-DNA forming regions (ZDRs) and promoter sites for nuclear factor-I (NFI) are correlated with locations known predicted genes across accumulate around transcriptional start genes. Thus, occurrence sequences mirrors a eukaryotic transcription factor. In addition, 43 383 fully annotated chromosomal have ZDRs within 2 nucleosomes upstream strong NFIs. This suggests distinct class may potentially be transcriptionally...
During the 2010-2011 winter season, we deployed seven geophones on a mountain outside of Davos, Switzerland and collected over 100 days seismic data containing 385 possible avalanche events (33 confirmed slab avalanches). In this article, describe our efforts to develop pattern recognition workflow automatically detect snow from passive data. Our initial consisted frequency domain feature extraction, cluster-based stratified subsampling, runs training testing 12 different classification...
This paper concerns the development and performance evaluation of protocols that provide geocast communication in an ad hoc netw ork. The goal a geocasting protocol is to deliver pac kets group nodes are within speci ed geographical area, i.e., region. consists this region at given time. We present three di erent approaches for delivering packets then evaluate these via simulation. In addition, we consider e ect random waypoint mobility model has on ork general.
In May 2005, Jim Foley (Board Chair of the Computing Research Association) published an abstract that was titled with these words: "Computing, We Have a Problem …". The main purpose Dr. Foley's article to discuss image problem within computing, "the public does not fully understand, and hence appreciate, what computing is why research are important" [1]. He then considered consequences this (e.g., decreased enrollments in degree programs) stated CRA planned do rectify situation. While did...
article Share on The incredible shrinking pipeline Author: Tracy Camp "The Incredible Shrinking Pipeline", Communications of the ACM ACMView Profile Authors Info & Claims SIGCSE BulletinVolume 34Issue 2June 2002 pp 129–134https://doi.org/10.1145/543812.543846Online:01 June 2002Publication History 25citation1,225DownloadsMetricsTotal Citations25Total Downloads1,225Last 12 Months77Last 6 weeks14 Get Citation AlertsNew Alert added!This alert has been successfully added and will be sent to:You...