Search
Now showing items 11-20 of 24
Demonstrating Bid Rigging with a Shopping Agent Application Using JADE
(North Dakota State University, 2011)
This paper presents the implementation of a shopping-cart agent that demonstrated collusion in online bidding. Collusion is an agreement between two or more persons, sometimes illegal and therefore secretive, to limit open ...
Graph Data Conversion and Tree Visualization
(North Dakota State University, 2011)
The first part of the paper is converting graph data format from GXL to GraphML. GXL and GraphML are both XML-based languages for representing graph data. The HP page segmentation tool produces output graph data in GXL ...
Analysis of Security Vulnerabilities in Web Applications using Threat Modeling
(North Dakota State University, 2011)
Software security issues have been a major concern to the cyberspace community; therefore, a great deal of research on security testing has been performed, and various security testing techniques have been developed. A ...
Positioning of Relay Stations in Wireless Sensor Networks
(North Dakota State University, 2011)
A sensor is a device which can detect or measure a physical property and which records, indicates, or otherwise responds to the signal received. A wireless sensor in a network can communicate with the sensors located within ...
Modeling of Dynamic Pricing of Energy for a Smart Grid Using a Multi-agent Framework
(North Dakota State University, 2011)
The use of smart grids is being promoted to address issues such as energy independence, global warming and emergency resilience. A smart grid is a digitized form of the power grid and is comprised of an intelligent monitoring ...
POMDP Planning in Service Composition
(North Dakota State University, 2011)
Automated vVeb service composition is becoming an increasingly important
research topic. It describes the automatic process of composing atomic services into
a chain of services that provide a specific functionality that ...
Graduate School Application Archive System (GSAAS)
(North Dakota State University, 2011)
The advent of using web applications has dramatically changed the way people
access data and understand these concepts. Users have expressed problems involved with
accessing the data in an easy and effective way with ...
Frequent Substring-Based Sequence Classification Using Reduced Alphabets
(North Dakota State University, 2011)
In recent years, various disciplines have generated large quantities of sequence
data which has necessitated automated techniques for classifying these sequences
into different categories of interest. Especially with the ...
Automated Tool for Software Requirements Inspection
(North Dakota State University, 2011)
The software inspection process is a very cost effective method of identifying
defects in documents produced during the software life cycle, leading to higher quality
software with lower field failures. Manual inspections ...
Bayesian Approach for Detection Classification
(North Dakota State University, 2011)
The objective of this paper is to develop and test a software system that uses
incomplete information from a collection of sensors to classify different objects present in
a particular area with a pre-specified probability. ...