This collection includes both ASU Theses and Dissertations, submitted by graduate students, and the Barrett, Honors College theses submitted by undergraduate students. 

Displaying 1 - 10 of 129
152061-Thumbnail Image.png
Description
Most people are experts in some area of information; however, they may not be knowledgeable about other closely related areas. How knowledge is generalized to hierarchically related categories was explored. Past work has found little to no generalization to categories closely related to learned categories. These results do not fit

Most people are experts in some area of information; however, they may not be knowledgeable about other closely related areas. How knowledge is generalized to hierarchically related categories was explored. Past work has found little to no generalization to categories closely related to learned categories. These results do not fit well with other work focusing on attention during and after category learning. The current work attempted to merge these two areas of by creating a category structure with the best chance to detect generalization. Participants learned order level bird categories and family level wading bird categories. Then participants completed multiple measures to test generalization to old wading bird categories, new wading bird categories, owl and raptor categories, and lizard categories. As expected, the generalization measures converged on a single overall pattern of generalization. No generalization was found, except for already learned categories. This pattern fits well with past work on generalization within a hierarchy, but do not fit well with theories of dimensional attention. Reasons why these findings do not match are discussed, as well as directions for future research.
ContributorsLancaster, Matthew E (Author) / Homa, Donald (Thesis advisor) / Glenberg, Arthur (Committee member) / Chi, Michelene (Committee member) / Brewer, Gene (Committee member) / Arizona State University (Publisher)
Created2013
152678-Thumbnail Image.png
Description
Recognition memory was investigated for naturalistic dynamic scenes. Although visual recognition for static objects and scenes has been investigated previously and found to be extremely robust in terms of fidelity and retention, visual recognition for dynamic scenes has received much less attention. In four experiments, participants view a number of

Recognition memory was investigated for naturalistic dynamic scenes. Although visual recognition for static objects and scenes has been investigated previously and found to be extremely robust in terms of fidelity and retention, visual recognition for dynamic scenes has received much less attention. In four experiments, participants view a number of clips from novel films and are then tasked to complete a recognition test containing frames from the previously viewed films and difficult foil frames. Recognition performance is good when foils are taken from other parts of the same film (Experiment 1), but degrades greatly when foils are taken from unseen gaps from within the viewed footage (Experiments 3 and 4). Removing all non-target frames had a serious effect on recognition performance (Experiment 2). Across all experiments, presenting the films as a random series of clips seemed to have no effect on recognition performance. Patterns of accuracy and response latency in Experiments 3 and 4 appear to be a result of a serial-search process. It is concluded that visual representations of dynamic scenes may be stored as units of events, and participant's old
ew judgments of individual frames were better characterized by a cued-recall paradigm than traditional recognition judgments.
ContributorsFerguson, Ryan (Author) / Homa, Donald (Thesis advisor) / Goldinger, Stephen (Committee member) / Glenberg, Arthur (Committee member) / Brewer, Gene (Committee member) / Arizona State University (Publisher)
Created2014
152920-Thumbnail Image.png
Description
Categories are often defined by rules regarding their features. These rules may be intensely complex yet, despite the complexity of these rules, we are often able to learn them with sufficient practice. A possible explanation for how we arrive at consistent category judgments despite these difficulties would be that we

Categories are often defined by rules regarding their features. These rules may be intensely complex yet, despite the complexity of these rules, we are often able to learn them with sufficient practice. A possible explanation for how we arrive at consistent category judgments despite these difficulties would be that we may define these complex categories such as chairs, tables, or stairs by understanding the simpler rules defined by potential interactions with these objects. This concept, called grounding, allows for the learning and transfer of complex categorization rules if said rules are capable of being expressed in a more simple fashion by virtue of meaningful physical interactions. The present experiment tested this hypothesis by having participants engage in either a Rule Based (RB) or Information Integration (II) categorization task with instructions to engage with the stimuli in either a non-interactive or interactive fashion. If participants were capable of grounding the categories, which were defined in the II task with a complex visual rule, to a simpler interactive rule, then participants with interactive instructions should outperform participants with non-interactive instructions. Results indicated that physical interaction with stimuli had a marginally beneficial effect on category learning, but this effect seemed most prevalent in participants were engaged in an II task.
ContributorsCrawford, Thomas (Author) / Homa, Donald (Thesis advisor) / Glenberg, Arthur (Committee member) / McBeath, Michael (Committee member) / Brewer, Gene (Committee member) / Arizona State University (Publisher)
Created2014
152844-Thumbnail Image.png
Description
For this master's thesis, a unique set of cognitive prompts, designed to be delivered through a teachable robotic agent, were developed for students using Tangible Activities for Geometry (TAG), a tangible learning environment developed at Arizona State University. The purpose of these prompts is to enhance the affordances of the

For this master's thesis, a unique set of cognitive prompts, designed to be delivered through a teachable robotic agent, were developed for students using Tangible Activities for Geometry (TAG), a tangible learning environment developed at Arizona State University. The purpose of these prompts is to enhance the affordances of the tangible learning environment and help researchers to better understand how we can design tangible learning environments to best support student learning. Specifically, the prompts explicitly encourage users to make use of their physical environment by asking students to perform a number of gestures and behaviors while prompting students about domain-specific knowledge. To test the effectiveness of these prompts that combine elements of cognition and physical movements, the performance and behavior of students who encounter these prompts while using TAG will be compared against the performance and behavior of students who encounter a more traditional set of cognitive prompts that would typically be used within a virtual learning environment. Following this study, data was analyzed using a novel modeling and analysis tool that combines enhanced log annotation using video and user model generation functionalities to highlight trends amongst students.
ContributorsThomas, Elissa (Author) / Burleson, Winslow (Thesis advisor) / Muldner, Katarzyna (Committee member) / Walker, Erin (Committee member) / Glenberg, Arthur (Committee member) / Arizona State University (Publisher)
Created2014
153437-Thumbnail Image.png
Description
A converging operations approach using response time distribution modeling was adopted to better characterize the cognitive control dynamics underlying ongoing task cost and cue detection in event based prospective memory (PM). In Experiment 1, individual differences analyses revealed that working memory capacity uniquely predicted nonfocal cue detection, while proactive control

A converging operations approach using response time distribution modeling was adopted to better characterize the cognitive control dynamics underlying ongoing task cost and cue detection in event based prospective memory (PM). In Experiment 1, individual differences analyses revealed that working memory capacity uniquely predicted nonfocal cue detection, while proactive control and inhibition predicted variation in ongoing task cost of the ex-Gaussian parameter associated with continuous monitoring strategies (mu). In Experiments 2A and 2B, quasi-experimental techniques aimed at identifying the role of proactive control abilities in PM monitoring and cue detection suggested that low ability participants may have PM deficits during demanding tasks due to inefficient monitoring strategies, but that emphasizing importance of the intention can increase reliance on more efficacious monitoring strategies that boosts performance (Experiment 2A). Furthermore, high proactive control ability participants are able to efficiently regulate their monitoring strategies under scenarios that do not require costly monitoring for successful cue detection (Experiment 2B). In Experiments 3A and 3B, it was found that proactive control benefited cue detection in interference-rich environments, but the neural correlates of cue detection or intention execution did not differ when engaged in proactive versus reactive control. The results from the current set of studies highlight the importance of response time distribution modeling in understanding PM cost. Additionally, these results have important implications for extant theories of PM and have considerable applied ramifications concerning the cognitive control processes that should be targeted to improve PM abilities.
ContributorsBall, Brett Hunter (Author) / Brewer, Gene A. (Thesis advisor) / Goldinger, Stephen (Committee member) / Glenberg, Arthur (Committee member) / Amazeen, Eric (Committee member) / Arizona State University (Publisher)
Created2015
153548-Thumbnail Image.png
Description
Attachment relationships serve a variety of important functions for infants and adults. Despite the importance of attachment relationships in adults, the mechanisms that underlie the formation or maintenance of these kinds of relationships outside of romantic relationships remains chronically understudied. The current research investigated whether the mechanism of synchrony, which

Attachment relationships serve a variety of important functions for infants and adults. Despite the importance of attachment relationships in adults, the mechanisms that underlie the formation or maintenance of these kinds of relationships outside of romantic relationships remains chronically understudied. The current research investigated whether the mechanism of synchrony, which is associated with attachment formation in the parent-infant literature, may still be tied to attachment in adults. To measure this association, these studies showed participants videos to prime synchrony, and then measured activation of attachment concepts in a word completion task. The results of Experiment 1 showed that attachment style moderated the effects of the video prime such that those who were securely attached showed activation of attachment concepts while watching the Synchrony video. Those with a preoccupied attachment style showed activation of attachment concepts when they viewed the Asynchrony video. Those with a dismissive attachment style showed an unhypothesized activation of social distance concepts when viewing the Synchrony video. Experiment 2 suggested an overall effect of the Synchrony video on activation of attachment concepts. However, there was no effect of attachment style on these results. Limits of these studies and future directions are discussed.
ContributorsYee, Claire Ida (Author) / Shiota, Michelle L (Thesis advisor) / Neuberg, Steven L. (Committee member) / Kenrick, Douglas T. (Committee member) / Glenberg, Arthur (Committee member) / Arizona State University (Publisher)
Created2015
153549-Thumbnail Image.png
Description
An emerging literature on the relation between memory and importance has shown that people are able to selectively remember information that is more, relative to less important. Researchers in this field have operationalized importance by assigning value to the different information that participants are asked to study and remember. In

An emerging literature on the relation between memory and importance has shown that people are able to selectively remember information that is more, relative to less important. Researchers in this field have operationalized importance by assigning value to the different information that participants are asked to study and remember. In the present investigation I developed two experiments, using a slightly altered value-directed-remembering (VDR) paradigm, to investigate whether and how value modifies the dynamics of memory organization and search. Moreover, I asked participants to perform a surprise final free recall task in order to examine the effects of value in the recall dynamics of final free recall. In Experiment 1, I compared the recall dynamics of delayed and final free recall between a control and a value condition, in the latter of which numbers appeared next to words, in random order, denoting the value of remembering each word during recall. In Experiment 2, I manipulated the order of presentation of the values by adding an ascending and a descending condition where values were presented in either an ascending or a descending order, respectively. Overall, my results indicated that value affected several measures of delayed and final free recall, without, in most cases, taking away the serial position effects on those same measures.
ContributorsStefanidi, Aikaterini (Author) / Brewer, Gene A. (Thesis advisor) / Glenberg, Arthur (Committee member) / Goldinger, Stephen (Committee member) / Arizona State University (Publisher)
Created2015
153335-Thumbnail Image.png
Description
With the increasing user demand for low latency, elastic provisioning of computing resources coupled with ubiquitous and on-demand access to real-time data, cloud computing has emerged as a popular computing paradigm to meet growing user demands.

With the increasing user demand for low latency, elastic provisioning of computing resources coupled with ubiquitous and on-demand access to real-time data, cloud computing has emerged as a popular computing paradigm to meet growing user demands. However, with the introduction and rising use of wear- able technology and evolving uses of smart-phones, the concept of Internet of Things (IoT) has become a prevailing notion in the currently growing technology industry. Cisco Inc. has projected a data creation of approximately 403 Zetabytes (ZB) by 2018. The combination of bringing benign devices and connecting them to the web has resulted in exploding service and data aggregation requirements, thus requiring a new and innovative computing platform. This platform should have the capability to provide robust real-time data analytics and resource provisioning to clients, such as IoT users, on-demand. Such a computation model would need to function at the edge-of-the-network, forming a bridge between the large cloud data centers and the distributed connected devices.

This research expands on the notion of bringing computational power to the edge- of-the-network, and then integrating it with the cloud computing paradigm whilst providing services to diverse IoT-based applications. This expansion is achieved through the establishment of a new computing model that serves as a platform for IoT-based devices to communicate with services in real-time. We name this paradigm as Gateway-Oriented Reconfigurable Ecosystem (GORE) computing. Finally, this thesis proposes and discusses the development of a policy management framework for accommodating our proposed computational paradigm. The policy framework is designed to serve both the hosted applications and the GORE paradigm by enabling them to function more efficiently. The goal of the framework is to ensure uninterrupted communication and service delivery between users and their applications.
ContributorsDsouza, Clinton (Author) / Ahn, Gail-Joon (Thesis advisor) / Doupe, Adam (Committee member) / Dasgupta, Partha (Committee member) / Arizona State University (Publisher)
Created2015
153094-Thumbnail Image.png
Description
Android is currently the most widely used mobile operating system. The permission model in Android governs the resource access privileges of applications. The permission model however is amenable to various attacks, including re-delegation attacks, background snooping attacks and disclosure of private information. This thesis is aimed at understanding, analyzing and

Android is currently the most widely used mobile operating system. The permission model in Android governs the resource access privileges of applications. The permission model however is amenable to various attacks, including re-delegation attacks, background snooping attacks and disclosure of private information. This thesis is aimed at understanding, analyzing and performing forensics on application behavior. This research sheds light on several security aspects, including the use of inter-process communications (IPC) to perform permission re-delegation attacks.

Android permission system is more of app-driven rather than user controlled, which means it is the applications that specify their permission requirement and the only thing which the user can do is choose not to install a particular application based on the requirements. Given the all or nothing choice, users succumb to pressures and needs to accept permissions requested. This thesis proposes a couple of ways for providing the users finer grained control of application privileges. The same methods can be used to evade the Permission Re-delegation attack.

This thesis also proposes and implements a novel methodology in Android that can be used to control the access privileges of an Android application, taking into consideration the context of the running application. This application-context based permission usage is further used to analyze a set of sample applications. We found the evidence of applications spoofing or divulging user sensitive information such as location information, contact information, phone id and numbers, in the background. Such activities can be used to track users for a variety of privacy-intrusive purposes. We have developed implementations that minimize several forms of privacy leaks that are routinely done by stock applications.
ContributorsGollapudi, Narasimha Aditya (Author) / Dasgupta, Partha (Thesis advisor) / Xue, Guoliang (Committee member) / Doupe, Adam (Committee member) / Arizona State University (Publisher)
Created2014
153126-Thumbnail Image.png
Description
The increasing number of continually connected mobile persons has created an environment conducive to real time user data gathering for many uses both public and private in nature. Publicly, one can envision no longer requiring a census to determine the demographic composition of the country and its sub regions. The

The increasing number of continually connected mobile persons has created an environment conducive to real time user data gathering for many uses both public and private in nature. Publicly, one can envision no longer requiring a census to determine the demographic composition of the country and its sub regions. The information provided is vastly more up to date than that of a census and allows civil authorities to be more agile and preemptive with planning. Privately, advertisers take advantage of a persons stated opinions, demographics, and contextual (where and when) information in order to formulate and present pertinent offers.

Regardless of its use this information can be sensitive in nature and should therefore be under the control of the user. Currently, a user has little say in the manner that their information is processed once it has been released. An ad-hoc approach is currently in use, where the location based service providers each maintain their own policy over personal information usage.

In order to allow more user control over their personal information while still providing for targeted advertising, a systematic approach to the release of the information is needed. It is for that reason we propose a User-Centric Context Aware Spatiotemporal Anonymization framework. At its core the framework will unify the current spatiotemporal anonymization with that of traditional anonymization so that user specified anonymization requirement is met or exceeded while allowing for more demographic information to be released.
ContributorsSanchez, Michael Andrew (Author) / Ahn, Gail-Joon (Thesis advisor) / Doupe, Adam (Committee member) / Dasgupta, Partha (Committee member) / Arizona State University (Publisher)
Created2014