This collection includes both ASU Theses and Dissertations, submitted by graduate students, and the Barrett, Honors College theses submitted by undergraduate students. 

Displaying 1 - 10 of 93
152061-Thumbnail Image.png
Description
Most people are experts in some area of information; however, they may not be knowledgeable about other closely related areas. How knowledge is generalized to hierarchically related categories was explored. Past work has found little to no generalization to categories closely related to learned categories. These results do not fit

Most people are experts in some area of information; however, they may not be knowledgeable about other closely related areas. How knowledge is generalized to hierarchically related categories was explored. Past work has found little to no generalization to categories closely related to learned categories. These results do not fit well with other work focusing on attention during and after category learning. The current work attempted to merge these two areas of by creating a category structure with the best chance to detect generalization. Participants learned order level bird categories and family level wading bird categories. Then participants completed multiple measures to test generalization to old wading bird categories, new wading bird categories, owl and raptor categories, and lizard categories. As expected, the generalization measures converged on a single overall pattern of generalization. No generalization was found, except for already learned categories. This pattern fits well with past work on generalization within a hierarchy, but do not fit well with theories of dimensional attention. Reasons why these findings do not match are discussed, as well as directions for future research.
ContributorsLancaster, Matthew E (Author) / Homa, Donald (Thesis advisor) / Glenberg, Arthur (Committee member) / Chi, Michelene (Committee member) / Brewer, Gene (Committee member) / Arizona State University (Publisher)
Created2013
151930-Thumbnail Image.png
Description
Incidental learning of sequential information occurs in visual, auditory and tactile domains. It occurs throughout our lifetime and even in nonhuman species. It is likely to be one of the most important foundations for the development of normal learning. To date, there is no agreement as to how incidental learning

Incidental learning of sequential information occurs in visual, auditory and tactile domains. It occurs throughout our lifetime and even in nonhuman species. It is likely to be one of the most important foundations for the development of normal learning. To date, there is no agreement as to how incidental learning occurs. The goal of the present set of experiments is to determine if visual sequential information is learned in terms of abstract rules or stimulus-specific details. Two experiments test the extent to which interaction with the stimuli can influence the information that is encoded by the learner. The results of both experiments support the claim that stimulus and domain specific details directly shape what is learned, through a process of tuning the neuromuscular systems involved in the interaction between the learner and the materials.
ContributorsMarsh, Elizabeth R (Author) / Glenberg, Arthur M. (Thesis advisor) / Amazeen, Eric (Committee member) / Brewer, Gene (Committee member) / Arizona State University (Publisher)
Created2013
152678-Thumbnail Image.png
Description
Recognition memory was investigated for naturalistic dynamic scenes. Although visual recognition for static objects and scenes has been investigated previously and found to be extremely robust in terms of fidelity and retention, visual recognition for dynamic scenes has received much less attention. In four experiments, participants view a number of

Recognition memory was investigated for naturalistic dynamic scenes. Although visual recognition for static objects and scenes has been investigated previously and found to be extremely robust in terms of fidelity and retention, visual recognition for dynamic scenes has received much less attention. In four experiments, participants view a number of clips from novel films and are then tasked to complete a recognition test containing frames from the previously viewed films and difficult foil frames. Recognition performance is good when foils are taken from other parts of the same film (Experiment 1), but degrades greatly when foils are taken from unseen gaps from within the viewed footage (Experiments 3 and 4). Removing all non-target frames had a serious effect on recognition performance (Experiment 2). Across all experiments, presenting the films as a random series of clips seemed to have no effect on recognition performance. Patterns of accuracy and response latency in Experiments 3 and 4 appear to be a result of a serial-search process. It is concluded that visual representations of dynamic scenes may be stored as units of events, and participant's old
ew judgments of individual frames were better characterized by a cued-recall paradigm than traditional recognition judgments.
ContributorsFerguson, Ryan (Author) / Homa, Donald (Thesis advisor) / Goldinger, Stephen (Committee member) / Glenberg, Arthur (Committee member) / Brewer, Gene (Committee member) / Arizona State University (Publisher)
Created2014
152920-Thumbnail Image.png
Description
Categories are often defined by rules regarding their features. These rules may be intensely complex yet, despite the complexity of these rules, we are often able to learn them with sufficient practice. A possible explanation for how we arrive at consistent category judgments despite these difficulties would be that we

Categories are often defined by rules regarding their features. These rules may be intensely complex yet, despite the complexity of these rules, we are often able to learn them with sufficient practice. A possible explanation for how we arrive at consistent category judgments despite these difficulties would be that we may define these complex categories such as chairs, tables, or stairs by understanding the simpler rules defined by potential interactions with these objects. This concept, called grounding, allows for the learning and transfer of complex categorization rules if said rules are capable of being expressed in a more simple fashion by virtue of meaningful physical interactions. The present experiment tested this hypothesis by having participants engage in either a Rule Based (RB) or Information Integration (II) categorization task with instructions to engage with the stimuli in either a non-interactive or interactive fashion. If participants were capable of grounding the categories, which were defined in the II task with a complex visual rule, to a simpler interactive rule, then participants with interactive instructions should outperform participants with non-interactive instructions. Results indicated that physical interaction with stimuli had a marginally beneficial effect on category learning, but this effect seemed most prevalent in participants were engaged in an II task.
ContributorsCrawford, Thomas (Author) / Homa, Donald (Thesis advisor) / Glenberg, Arthur (Committee member) / McBeath, Michael (Committee member) / Brewer, Gene (Committee member) / Arizona State University (Publisher)
Created2014
153335-Thumbnail Image.png
Description
With the increasing user demand for low latency, elastic provisioning of computing resources coupled with ubiquitous and on-demand access to real-time data, cloud computing has emerged as a popular computing paradigm to meet growing user demands.

With the increasing user demand for low latency, elastic provisioning of computing resources coupled with ubiquitous and on-demand access to real-time data, cloud computing has emerged as a popular computing paradigm to meet growing user demands. However, with the introduction and rising use of wear- able technology and evolving uses of smart-phones, the concept of Internet of Things (IoT) has become a prevailing notion in the currently growing technology industry. Cisco Inc. has projected a data creation of approximately 403 Zetabytes (ZB) by 2018. The combination of bringing benign devices and connecting them to the web has resulted in exploding service and data aggregation requirements, thus requiring a new and innovative computing platform. This platform should have the capability to provide robust real-time data analytics and resource provisioning to clients, such as IoT users, on-demand. Such a computation model would need to function at the edge-of-the-network, forming a bridge between the large cloud data centers and the distributed connected devices.

This research expands on the notion of bringing computational power to the edge- of-the-network, and then integrating it with the cloud computing paradigm whilst providing services to diverse IoT-based applications. This expansion is achieved through the establishment of a new computing model that serves as a platform for IoT-based devices to communicate with services in real-time. We name this paradigm as Gateway-Oriented Reconfigurable Ecosystem (GORE) computing. Finally, this thesis proposes and discusses the development of a policy management framework for accommodating our proposed computational paradigm. The policy framework is designed to serve both the hosted applications and the GORE paradigm by enabling them to function more efficiently. The goal of the framework is to ensure uninterrupted communication and service delivery between users and their applications.
ContributorsDsouza, Clinton (Author) / Ahn, Gail-Joon (Thesis advisor) / Doupe, Adam (Committee member) / Dasgupta, Partha (Committee member) / Arizona State University (Publisher)
Created2015
153094-Thumbnail Image.png
Description
Android is currently the most widely used mobile operating system. The permission model in Android governs the resource access privileges of applications. The permission model however is amenable to various attacks, including re-delegation attacks, background snooping attacks and disclosure of private information. This thesis is aimed at understanding, analyzing and

Android is currently the most widely used mobile operating system. The permission model in Android governs the resource access privileges of applications. The permission model however is amenable to various attacks, including re-delegation attacks, background snooping attacks and disclosure of private information. This thesis is aimed at understanding, analyzing and performing forensics on application behavior. This research sheds light on several security aspects, including the use of inter-process communications (IPC) to perform permission re-delegation attacks.

Android permission system is more of app-driven rather than user controlled, which means it is the applications that specify their permission requirement and the only thing which the user can do is choose not to install a particular application based on the requirements. Given the all or nothing choice, users succumb to pressures and needs to accept permissions requested. This thesis proposes a couple of ways for providing the users finer grained control of application privileges. The same methods can be used to evade the Permission Re-delegation attack.

This thesis also proposes and implements a novel methodology in Android that can be used to control the access privileges of an Android application, taking into consideration the context of the running application. This application-context based permission usage is further used to analyze a set of sample applications. We found the evidence of applications spoofing or divulging user sensitive information such as location information, contact information, phone id and numbers, in the background. Such activities can be used to track users for a variety of privacy-intrusive purposes. We have developed implementations that minimize several forms of privacy leaks that are routinely done by stock applications.
ContributorsGollapudi, Narasimha Aditya (Author) / Dasgupta, Partha (Thesis advisor) / Xue, Guoliang (Committee member) / Doupe, Adam (Committee member) / Arizona State University (Publisher)
Created2014
153126-Thumbnail Image.png
Description
The increasing number of continually connected mobile persons has created an environment conducive to real time user data gathering for many uses both public and private in nature. Publicly, one can envision no longer requiring a census to determine the demographic composition of the country and its sub regions. The

The increasing number of continually connected mobile persons has created an environment conducive to real time user data gathering for many uses both public and private in nature. Publicly, one can envision no longer requiring a census to determine the demographic composition of the country and its sub regions. The information provided is vastly more up to date than that of a census and allows civil authorities to be more agile and preemptive with planning. Privately, advertisers take advantage of a persons stated opinions, demographics, and contextual (where and when) information in order to formulate and present pertinent offers.

Regardless of its use this information can be sensitive in nature and should therefore be under the control of the user. Currently, a user has little say in the manner that their information is processed once it has been released. An ad-hoc approach is currently in use, where the location based service providers each maintain their own policy over personal information usage.

In order to allow more user control over their personal information while still providing for targeted advertising, a systematic approach to the release of the information is needed. It is for that reason we propose a User-Centric Context Aware Spatiotemporal Anonymization framework. At its core the framework will unify the current spatiotemporal anonymization with that of traditional anonymization so that user specified anonymization requirement is met or exceeded while allowing for more demographic information to be released.
ContributorsSanchez, Michael Andrew (Author) / Ahn, Gail-Joon (Thesis advisor) / Doupe, Adam (Committee member) / Dasgupta, Partha (Committee member) / Arizona State University (Publisher)
Created2014
153147-Thumbnail Image.png
Description
The rate at which new malicious software (Malware) is created is consistently increasing each year. These new malwares are designed to bypass the current anti-virus countermeasures employed to protect computer systems. Security Analysts must understand the nature and intent of the malware sample in order to protect computer systems from

The rate at which new malicious software (Malware) is created is consistently increasing each year. These new malwares are designed to bypass the current anti-virus countermeasures employed to protect computer systems. Security Analysts must understand the nature and intent of the malware sample in order to protect computer systems from these attacks. The large number of new malware samples received daily by computer security companies require Security Analysts to quickly determine the type, threat, and countermeasure for newly identied samples. Our approach provides for a visualization tool to assist the Security Analyst in these tasks that allows the Analyst to visually identify relationships between malware samples.

This approach consists of three steps. First, the received samples are processed by a sandbox environment to perform a dynamic behavior analysis. Second, the reports of the dynamic behavior analysis are parsed to extract identifying features which are matched against other known and analyzed samples. Lastly, those matches that are determined to express a relationship are visualized as an edge connected pair of nodes in an undirected graph.
ContributorsHolmes, James Edward (Author) / Ahn, Gail-Joon (Thesis advisor) / Dasgupta, Partha (Committee member) / Doupe, Adam (Committee member) / Arizona State University (Publisher)
Created2014
153814-Thumbnail Image.png
Description
The current work investigated the emergence of leader-follower roles during social motor coordination. Previous research has presumed a leader during coordination assumes a spatiotemporally advanced position (e.g., relative phase lead). While intuitive, this definition discounts what role-taking implies. Leading and following is defined as one person (or limb) having a

The current work investigated the emergence of leader-follower roles during social motor coordination. Previous research has presumed a leader during coordination assumes a spatiotemporally advanced position (e.g., relative phase lead). While intuitive, this definition discounts what role-taking implies. Leading and following is defined as one person (or limb) having a larger influence on the motor state changes of another; the coupling is asymmetric. Three experiments demonstrated asymmetric coupling effects emerge when task or biomechanical asymmetries are imputed between actors. Participants coordinated in-phase (Ф =0o) swinging of handheld pendulums, which differed in their uncoupled eigenfrequencies (frequency detuning). Coupling effects were recovered through phase-amplitude modeling. Experiment 1 examined leader-follower coupling during a bidirectional task. Experiment 2 employed an additional coupling asymmetry by assigning an explicit leader and follower. Both experiment 1 and 2 demonstrated asymmetric coupling effects with increased detuning. In experiment 2, though, the explicit follower exhibited a phase lead in nearly all conditions. These results confirm that coupling direction was not determined strictly by relative phasing. A third experiment examined the question raised by the previous two, which is how could someone follow from ahead (i.e., phase lead in experiment 2). This was tested using a combination of frequency detuning and amplitude asymmetry requirements (e.g., 1:1 or 1:2 & 2:1). Results demonstrated larger amplitude movements drove the coupling towards the person with the smaller amplitude; small amplitude movements exhibited a phase lead, despite being a follower in coupling terms. These results suggest leader-follower coupling is a general property of social motor coordination. Predicting when such coupling effects occur is emphasized by the stability reducing effects of coordinating asymmetric components. Generally, the implication is role-taking is an emergent strategy of dividing up coordination stabilizing efforts unequally between actors (or limbs).
ContributorsFine, Justin (Author) / Amazeen, Eric L. (Thesis advisor) / Amazeen, Polemnia G. (Committee member) / Brewer, Gene (Committee member) / Santello, Marco (Committee member) / Arizona State University (Publisher)
Created2015
154138-Thumbnail Image.png
Description
Theories of interval timing have largely focused on accounting for the aggregate properties of behavior engendered by periodic reinforcement, such as sigmoidal psychophysical functions and their scalar property. Many theories of timing also stipulate that timing and motivation are inseparable processes. Such a claim is challenged by fluctuations in and

Theories of interval timing have largely focused on accounting for the aggregate properties of behavior engendered by periodic reinforcement, such as sigmoidal psychophysical functions and their scalar property. Many theories of timing also stipulate that timing and motivation are inseparable processes. Such a claim is challenged by fluctuations in and out of states of schedule control, making it unclear whether motivation directly affects states related to timing. The present paper seeks to advance our understanding of timing performance by analyzing and comparing the distribution of latencies and inter-response times (IRTs) of rats in two fixed-interval (FI) schedules of food reinforcement (FI 30-s and FI 90-s), and in two levels of food deprivation. Computational modeling revealed that each component was well described by mixture probability distributions embodying two-state Markov chains. Analysis of these models revealed that only a subset of latencies are sensitive to the periodicity of reinforcement, and pre-feeding only reduces the size of this subset. The distribution of IRTs suggests that behavior in FI schedules is organized in bouts that lengthen and ramp up in frequency with proximity to reinforcement. Pre-feeding slowed down the lengthening of bouts and increased the time between bouts. When concatenated, these models adequately reproduced sigmoidal FI response functions. These findings suggest that behavior in FI fluctuates in and out of schedule control; an account of such fluctuation suggests that timing and motivation are dissociable components of FI performance. These mixture-distribution models also provide novel insights on the motivational, associative, and timing processes expressed in FI performance, which need to be accounted for by causal theories of interval timing.
ContributorsDaniels, Carter W (Author) / Sanabria, Federico (Thesis advisor) / Brewer, Gene (Committee member) / Wynne, Clive (Committee member) / Arizona State University (Publisher)
Created2015