Computer Science and Software Engineering Technical Reports: Recent submissions
Now showing items 1-20 of 73
-
A Detailed Stylometric Investigation of the İnce Memed Tetralogy*
We analyze four İnce Memed novels of Yaşar Kemal using six style markers: “most frequent words,” “syllable counts,” “word type -or part of speech- information,” “sentence length in terms of words,” “word length in text,” ... -
Effectiveness Assessment of the Cover Coefficient Based Clustering Methodology
An algorithm for document clustering is introduced. The basic concept of the algorithm, Cover Coefficient (CC) concept, provides means of estimating the number of clusters within a document database and relates indexing ... -
Towards the Realization of a DSML for Machine Learning: A Baseball Analytics Use Case
Using machine learning (ML) for big data is challenging, requiring specialized knowledge of the domain, learning algorithms, and software engineering. To demonstrate the viability of model-driven engineering in the ML ... -
A Survey of Baseball Machine Learning: A Technical Report
Statistical analysis of baseball has long been popular, albeit only in limited capacity until relatively recently. The recent proliferation of computers has added tremendous power and opportunity to this field. Even an ... -
Application of Object-oriented Programming in Simulation: A Simulation of Case Study Using Microsoft Visual C++
(1995-08-01)In this thesis, a prototype simulation environment is introduced. Simulation has always been important for systems analysis. The original idea of this thesis stems from the fact that more flexible simulation programming ... -
HypIR: Hypertext Based Information Retrieval
(1992-08-01)Information Retrieval (IR), which is also known as text or document retrieval, is the process of locating and retrieving docri)nents that are relevant to the user queries. In hypertext environments, docuinent databases are ... -
Visual Programming: Concepts and Implementations
(1994-08-01)The computing environment has changed dramatically since the advent of the computer. Enhanced computer graphics and sheer processing power have ushered in a new age of computing. User interfaces have advanced from simple ... -
System Programming - The Human and the Machine
(1991-12-01)The purpose of this paper is to document my experiences in planning, generating, and modifying the IBM VM/SP operating system (systems programming), survey literature on systems programming, and to draw conclusions as to ... -
An Empirical Investigation of Four Strategies for Serializing Schedules in Transaction Processing
(1992-12-01)A database management system (DBMS) is a very large program that allows users to create and maintain databases. A DBMS has many capabilities. This study will focus on the capability known as transaction management, the ... -
Node Re-Usability in Structured Hypertext Systems
(1992-08-01)When the size of a graph-based hyperdocument exceeds a certain limit, the graph structure gets complicated and causes navigation and document management problems. A simple solution for this problem is the structuring ofthe ... -
Compressed Bit-sliced Signature Files An Index Structure for Large Lexicons
(1999-04-01)We use the signature file method to search for partially specified terms in large lexicons. To optimize efficiency, we use the concepts of the partially evaluated bit-sliced signature file method and memory resident data ... -
Interface-based Programming Assignments and Automatic Grading of Java Programs
(2006-01-01)AutoGrader is a framework developed at Miami University for the automatic grading of student programming assignments written in the Java programming language. AutoGrader leverages the abstract concept of interfaces, brought ... -
Analysis of Signature Generation Schemes for Multiterm Queries In Partitioned Signature File Environments
(1993-05-01)Our analysis explores the performance of three superimposed signature generation schemes as they are applied to a dynamic sigrtature file organization based on linear hashing: Linear Hashing with Superinzposed Signatures ... -
A Methodology for the Implementation and Maintenance Of a Data Warehouse
(1995-12-01)A methodology for the implementation and maintenance of a data warehouse is described. The data warehouse forms the basis for a marketing decision support system for use by a large surgical equipment manufacturer and ... -
"PanaeaMud An Online, Object-oriented Multiple User Interactive Geologic Database Tool"
(1993-12-01)This paper provides an overview of the design, development, and use of the PangaeaMud Database System. Section I gives an introduction to pertinent concepts and discusses previous work in the area. Section I1 is devoted ... -
Investigation of Programming Languages for an Automated Manufacturing System
(1995-07-01)This paper is an investigation of alternative programming languages for use in manufacturing control applications. After reviewing several types of languages, two alternative languages for programming the flexible manufacturing ... -
Concepts and Effectiveness of the Cover Coefficient Based Clustering Methodology for Text Databases
(1987-12-01)An algorithm for document clustering is introduced. The base concept of the algorithm, Cover Coefficient (CC) concept, provides means of estimating the number of clusters within a document database. The CC concept is used ... -
Analysis of Signature Generation Schemes for Multiterm Queries In Linear Hashing with Superimposed Signatures
(1995-12-01)Signature files provide efficient retrieval of data by reflecting the essence of the data objects into bit patterns. Our analysis explores the performance of three superimposed signature generation schemes as they are ... -
Experiments on Tunable Indexing
(1988-04-01)The effectiveness and efficiency of an Information Retrieval (IR) system depends on the quality of its indexing system. Indexing con be used in inverted file systemsor in cluster-based retrieval. In this article, new concept ... -
Dynamic Signature File Partitioning Based on Term Characteristics
(1992-08-01)Signature files act as a filter on retrieval to discard a large number of non-qualifying data items. Linear hashing with superimposed signatures (LHSS) provides an effective retrieval filter to process queries in dynamic ...