MSCS Faculty Research and PublicationsCopyright (c) 2016 Marquette University All rights reserved.
http://epublications.marquette.edu/mscs_fac
Recent documents in MSCS Faculty Research and Publicationsen-usFri, 29 Jan 2016 01:48:24 PST3600Equal and Full {0,1} - Matrix Ranks of Local Out-Tournaments
http://epublications.marquette.edu/mscs_fac/397
http://epublications.marquette.edu/mscs_fac/397Wed, 27 Jan 2016 09:09:20 PSTKim FactorDomination and Network Stability: An Application
http://epublications.marquette.edu/mscs_fac/396
http://epublications.marquette.edu/mscs_fac/396Wed, 27 Jan 2016 09:05:29 PSTKim FactorDigraphs with Isomorphic Underlying and Domination Graphs: Components of <em>K</em><sub>1</sub>, <em>K</em><sub>2</sub>, or <em>C</em><sub>4</sub> in <em>UG</em><sup>c</sup><em>(D)</em>
http://epublications.marquette.edu/mscs_fac/395
http://epublications.marquette.edu/mscs_fac/395Wed, 27 Jan 2016 09:01:20 PSTKim FactorDomination-Stable Forms of Complete Biorientations of Some Classes of Graphs
http://epublications.marquette.edu/mscs_fac/394
http://epublications.marquette.edu/mscs_fac/394Wed, 27 Jan 2016 08:55:22 PSTKim FactorPartial Domination Graphs of Extended Tournaments
http://epublications.marquette.edu/mscs_fac/393
http://epublications.marquette.edu/mscs_fac/393Wed, 27 Jan 2016 08:49:54 PSTKim FactorDomination Graphs of Compressed Tournaments
http://epublications.marquette.edu/mscs_fac/392
http://epublications.marquette.edu/mscs_fac/392Wed, 27 Jan 2016 08:42:50 PSTKim FactorBiclique Covers of Bigraphs and Digraphs and Minimum Semiring Ranks of {0,1}-Matrices
http://epublications.marquette.edu/mscs_fac/391
http://epublications.marquette.edu/mscs_fac/391Wed, 27 Jan 2016 08:27:41 PSTKim FactorSecurity in Pervasive Computing: Current Status and Open Issues
http://epublications.marquette.edu/mscs_fac/390
http://epublications.marquette.edu/mscs_fac/390Wed, 23 Dec 2015 13:05:08 PST
Million of wireless device users are ever on the move, becoming more dependent on their PDAs, smart phones, and other handheld devices. With the advancement of pervasive computing, new and unique capabilities are available to aid mobile societies. The wireless nature of these devices has fostered a new era of mobility. Thousands of pervasive devices are able to arbitrarily join and leave a network, creating a nomadic environment known as a pervasive ad hoc network. However, mobile devices have vulnerabilities, and some are proving to be challenging. Security in pervasive computing is the most critical challenge. Security is needed to ensure exact and accurate confidentiality, integrity, authentication, and access control, to name a few. Security for mobile devices, though still in its infancy, has drawn the attention of various researchers. As pervasive devices become incorporated in our day-to-day lives, security will increasingly becoming a common concern for all users - - though for most it will be an afterthought, like many other computing functions. The usability and expansion of pervasive computing applications depends greatly on the security and reliability provided by the applications. At this critical juncture, security research is growing. This paper examines the recent trends and forward thinking investigation in several fields of security, along with a brief history of previous accomplishments in the corresponding areas. Some open issues have been discussed for further investigation.
]]>
Munirul Haque et al.ETS (Efficient, Transparent, and Secured) Self-healing Service for Pervasive Computing Applications
http://epublications.marquette.edu/mscs_fac/389
http://epublications.marquette.edu/mscs_fac/389Wed, 23 Dec 2015 12:18:01 PST
To ensure smooth functioning of numerous handheld devices anywhere anytime, the importance of self-healing mechanism cannot be overlooked. Incorporation of efficient fault detection and recovery in device itself is the quest for long but there is no existing self-healing scheme for devices running in pervasive computing environments that can be claimed as the ultimate solution. Moreover, the highest degree of transparency, security and privacy attainability should also be maintained. ETS Self-healing service, an integral part of our developing middleware named MARKS (Middleware Adaptability for Resource discovery, Knowledge usability, and Self-healing), holds promise for offering all of those functionalities.
]]>
Shameem Ahmed et al.Remarks on a Paper of Lee and Lim
http://epublications.marquette.edu/mscs_fac/388
http://epublications.marquette.edu/mscs_fac/388Wed, 23 Dec 2015 11:46:35 PST
Lee and Lim (2009) state three characterizations of Loamax, exponential and power function distributions, the proofs of which, are based on the solutions of certain second order non-linear differential equations. For these characterizations, they make the following statement : "Therefore there exists a unique solution of the differential equation that satisfies the given initial conditions". Although the general solution of their first differential equation is easily obtainable, they do not obtain the general solutions of the other two differential equations to ensure their claim via initial conditions. In this very short report, we present the general solutions of these equations and show that the particular solutions satisfying the initial conditions are uniquely determined to be Lomax, exponential and power function distributions respectively.
]]>
Gholamhossein Hamedani et al.Biclique Covers and Partitions of Digraphs: A Set Theoretical Approach
http://epublications.marquette.edu/mscs_fac/387
http://epublications.marquette.edu/mscs_fac/387Tue, 22 Dec 2015 06:33:27 PSTKim A. S. FactorLocal Out-Tournaments with Upset Tournament Strong Components II: Existence of Equal {0,1} - Matrix Ranks of less than <em>n</em>
http://epublications.marquette.edu/mscs_fac/386
http://epublications.marquette.edu/mscs_fac/386Thu, 17 Dec 2015 13:18:45 PSTKim A. S. FactorPhase Regression and Dynamic B-Field Correction Reduce Global Time Series Correlations and Increase Functional Correlations
http://epublications.marquette.edu/mscs_fac/385
http://epublications.marquette.edu/mscs_fac/385Mon, 14 Dec 2015 08:53:37 PSTDaniel B. RoweBiclique Covers and Partitions of Acyclic Digraphs
http://epublications.marquette.edu/mscs_fac/384
http://epublications.marquette.edu/mscs_fac/384Fri, 11 Dec 2015 09:56:54 PSTKim A. S. FactorBiclique Covers of the Complements of Cycles and Paths in Digraphs
http://epublications.marquette.edu/mscs_fac/383
http://epublications.marquette.edu/mscs_fac/383Fri, 11 Dec 2015 09:52:20 PSTKim A. S. FactorThe (1,2)-step Competition Number of a Graph
http://epublications.marquette.edu/mscs_fac/382
http://epublications.marquette.edu/mscs_fac/382Fri, 11 Dec 2015 09:48:15 PSTKim A. S. FactorOn "Ultraproducts and Topology"
http://epublications.marquette.edu/mscs_fac/381
http://epublications.marquette.edu/mscs_fac/381Mon, 23 Nov 2015 08:52:17 PST
We correct an error in the above-mentioned paper and provide a solution to an open problem contained therein.
]]>
Paul BankstonAddendum to "On Partitions of Plane Sets into Simple Closed Curves. II"
http://epublications.marquette.edu/mscs_fac/380
http://epublications.marquette.edu/mscs_fac/380Mon, 23 Nov 2015 08:47:36 PSTPaul BankstonCorrigendum to "Some Obstacles to Duality in Topological Algebra"
http://epublications.marquette.edu/mscs_fac/379
http://epublications.marquette.edu/mscs_fac/379Mon, 23 Nov 2015 08:41:24 PSTPaul BankstonCorrigendum to "Taxonomies of Model-theoretically Defined Topological Properties"
http://epublications.marquette.edu/mscs_fac/378
http://epublications.marquette.edu/mscs_fac/378Mon, 23 Nov 2015 08:36:28 PST
An error has been found in the cited paper; namely, Theorem 3.1 is false.
]]>
Paul Bankston