Matching Items (179)
149668-Thumbnail Image.png
Description
Service based software (SBS) systems are software systems consisting of services based on the service oriented architecture (SOA). Each service in SBS systems provides partial functionalities and collaborates with other services as workflows to provide the functionalities required by the systems. These services may be developed and/or owned by different

Service based software (SBS) systems are software systems consisting of services based on the service oriented architecture (SOA). Each service in SBS systems provides partial functionalities and collaborates with other services as workflows to provide the functionalities required by the systems. These services may be developed and/or owned by different entities and physically distributed across the Internet. Compared with traditional software system components which are usually specifically designed for the target systems and bound tightly, the interfaces of services and their communication protocols are standardized, which allow SBS systems to support late binding, provide better interoperability, better flexibility in dynamic business logics, and higher fault tolerance. The development process of SBS systems can be divided to three major phases: 1) SBS specification, 2) service discovery and matching, and 3) service composition and workflow execution. This dissertation focuses on the second phase, and presents a privacy preserving service discovery and ranking approach for multiple user QoS requirements. This approach helps service providers to register services and service users to search services through public, but untrusted service directories with the protection of their privacy against the service directories. The service directories can match the registered services with service requests, but do not learn any information about them. Our approach also enforces access control on services during the matching process, which prevents unauthorized users from discovering services. After the service directories match a set of services that satisfy the service users' functionality requirements, the service discovery approach presented in this dissertation further considers service users' QoS requirements in two steps. First, this approach optimizes services' QoS by making tradeoff among various QoS aspects with users' QoS requirements and preferences. Second, this approach ranks services based on how well they satisfy users' QoS requirements to help service users select the most suitable service to develop their SBSs.
ContributorsYin, Yin (Author) / Yau, Stephen S. (Thesis advisor) / Candan, Kasim (Committee member) / Dasgupta, Partha (Committee member) / Santanam, Raghu (Committee member) / Arizona State University (Publisher)
Created2011
Description

In an effort to address the lack of literature in on-campus active travel, this study aims to investigate the following primary questions:<br/>• What are the modes that students use to travel on campus?<br/>• What are the motivations that underlie the mode choice of students on campus?<br/>My first stage of research

In an effort to address the lack of literature in on-campus active travel, this study aims to investigate the following primary questions:<br/>• What are the modes that students use to travel on campus?<br/>• What are the motivations that underlie the mode choice of students on campus?<br/>My first stage of research involved a series of qualitative investigations. I held one-on-one virtual interviews with students in which I asked them questions about the mode they use and why they feel that their chosen mode works best for them. These interviews served two functions. First, they provided me with insight into the various motivations underlying student mode choice. Second, they provided me with an indication of what explanatory variables should be included in a model of mode choice on campus.<br/>The first half of the research project informed a quantitative survey that was released via the Honors Digest to attract student respondents. Data was gathered on travel behavior as well as relevant explanatory variables.<br/>My analysis involved developing a logit model to predict student mode choice on campus and presenting the model estimation in conjunction with a discussion of student travel motivations based on the qualitative interviews. I use this information to make a recommendation on how campus infrastructure could be modified to better support the needs of the student population.

ContributorsMirtich, Laura Christine (Author) / Salon, Deborah (Thesis director) / Fang, Kevin (Committee member) / School of Public Affairs (Contributor) / School of Life Sciences (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
150189-Thumbnail Image.png
Description
This thesis research attempts to observe, measure and visualize the communication patterns among developers of an open source community and analyze how this can be inferred in terms of progress of that open source project. Here I attempted to analyze the Ubuntu open source project's email data (9 subproject log

This thesis research attempts to observe, measure and visualize the communication patterns among developers of an open source community and analyze how this can be inferred in terms of progress of that open source project. Here I attempted to analyze the Ubuntu open source project's email data (9 subproject log archives over a period of five years) and focused on drawing more precise metrics from different perspectives of the communication data. Also, I attempted to overcome the scalability issue by using Apache Pig libraries, which run on a MapReduce framework based Hadoop Cluster. I described four metrics based on which I observed and analyzed the data and also presented the results which show the required patterns and anomalies to better understand and infer the communication. Also described the usage experience with Pig Latin (scripting language of Apache Pig Libraries) for this research and how they brought the feature of scalability, simplicity, and visibility in this data intensive research work. These approaches are useful in project monitoring, to augment human observation and reporting, in social network analysis, to track individual contributions.
ContributorsMotamarri, Lakshminarayana (Author) / Santanam, Raghu (Thesis advisor) / Ye, Jieping (Thesis advisor) / Davulcu, Hasan (Committee member) / Arizona State University (Publisher)
Created2011
152144-Thumbnail Image.png
Description
Accumulating evidence implicates exposure to adverse childhood experiences in the development of hypocortisolism in the long-term, and researchers are increasingly examining individual-level mechanisms that may underlie, exacerbate or attenuate this relation among at-risk populations. The current study takes a developmentally and theoretically informed approach to examining episodic childhood stressors, inherent

Accumulating evidence implicates exposure to adverse childhood experiences in the development of hypocortisolism in the long-term, and researchers are increasingly examining individual-level mechanisms that may underlie, exacerbate or attenuate this relation among at-risk populations. The current study takes a developmentally and theoretically informed approach to examining episodic childhood stressors, inherent and voluntary self-regulation, and physiological reactivity among a longitudinal sample of youth who experienced parental divorce. Participants were drawn from a larger randomized controlled trial of a preventive intervention for children of divorce between the ages of 9 and 12. The current sample included 159 young adults (mean age = 25.5 years; 53% male; 94% Caucasian) who participated in six waves of data collection, including a 15-year follow-up study. Participants reported on exposure to negative life events (four times over a 9-month period) during childhood, and mothers rated child temperament. Six years later, youth reported on the use of active and avoidant coping strategies, and 15 years later, they participated in a standardized psychosocial stress task and provided salivary cortisol samples prior to and following the task. Path analyses within a structural equation framework revealed that a multiple mediation model best fit the data. It was found that children with better mother-rated self-regulation (i.e. low impulsivity, low negative emotionality, and high attentional focus) exhibited lower total cortisol output 15 years later. In addition, greater self-regulation in childhood predicted greater use of active coping in adolescence, whereas a greater number of negative life events predicted increased use of avoidant coping in adolescence. Finally, a greater number of negative events in childhood predicted marginally lower total cortisol output, and higher levels of active coping in adolescence were associated with greater total cortisol output in young adulthood. Findings suggest that children of divorce who exhibit better self-regulation evidence lower cortisol output during a standardized psychosocial stress task relative to those who have higher impulsivity, lower attentional focus, and/or higher negative emotionality. The conceptual significance of the current findings, including the lack of evidence for hypothesized relations, methodological issues that arose, and issues in need of future research are discussed.
ContributorsHagan, Melissa (Author) / Luecken, Linda (Thesis advisor) / MacKinnon, David (Committee member) / Wolchik, Sharlene (Committee member) / Doane, Leah (Committee member) / Arizona State University (Publisher)
Created2013
152032-Thumbnail Image.png
Description
In order to analyze data from an instrument administered at multiple time points it is a common practice to form composites of the items at each wave and to fit a longitudinal model to the composites. The advantage of using composites of items is that smaller sample sizes are required

In order to analyze data from an instrument administered at multiple time points it is a common practice to form composites of the items at each wave and to fit a longitudinal model to the composites. The advantage of using composites of items is that smaller sample sizes are required in contrast to second order models that include the measurement and the structural relationships among the variables. However, the use of composites assumes that longitudinal measurement invariance holds; that is, it is assumed that that the relationships among the items and the latent variables remain constant over time. Previous studies conducted on latent growth models (LGM) have shown that when longitudinal metric invariance is violated, the parameter estimates are biased and that mistaken conclusions about growth can be made. The purpose of the current study was to examine the impact of non-invariant loadings and non-invariant intercepts on two longitudinal models: the LGM and the autoregressive quasi-simplex model (AR quasi-simplex). A second purpose was to determine if there are conditions in which researchers can reach adequate conclusions about stability and growth even in the presence of violations of invariance. A Monte Carlo simulation study was conducted to achieve the purposes. The method consisted of generating items under a linear curve of factors model (COFM) or under the AR quasi-simplex. Composites of the items were formed at each time point and analyzed with a linear LGM or an AR quasi-simplex model. The results showed that AR quasi-simplex model yielded biased path coefficients only in the conditions with large violations of invariance. The fit of the AR quasi-simplex was not affected by violations of invariance. In general, the growth parameter estimates of the LGM were biased under violations of invariance. Further, in the presence of non-invariant loadings the rejection rates of the hypothesis of linear growth increased as the proportion of non-invariant items and as the magnitude of violations of invariance increased. A discussion of the results and limitations of the study are provided as well as general recommendations.
ContributorsOlivera-Aguilar, Margarita (Author) / Millsap, Roger E. (Thesis advisor) / Levy, Roy (Committee member) / MacKinnon, David (Committee member) / West, Stephen G. (Committee member) / Arizona State University (Publisher)
Created2013
150493-Thumbnail Image.png
Description
Research shows that general parenting practices (e.g., support and discipline), influence adolescent substance use. However, socialization theory suggests that parental socialization occurs not only through general parenting practices, but also through parents' attempts to influence specific behaviors and values. A growing literature supports links between substance-specific parenting and adolescent substance

Research shows that general parenting practices (e.g., support and discipline), influence adolescent substance use. However, socialization theory suggests that parental socialization occurs not only through general parenting practices, but also through parents' attempts to influence specific behaviors and values. A growing literature supports links between substance-specific parenting and adolescent substance use. For adolescent alcohol use, there are considerable limitations and gaps within this literature. To address these limitations, the present study examined the factor structure of alcohol-specific parenting, investigated the determinants of alcohol-specific parenting, and explored its association with nondrinking adolescents' attitudes about alcohol use. Using a high-risk sample of nondrinking adolescents and their parents, the current study found three dimensions of alcohol-specific parenting using both adolescent and parent reports, but also found evidence of non-invariance across reporters. Results also revealed complex roles of parental alcohol use disorder (AUD; including recovered and current AUD), family history of AUD, and current drinking as determinants of the three dimensions of anti-alcohol parenting behaviors. Moreover, the current study showed that the effects of these determinants varied by the reporter of the parenting behavior. Finally, the current study found the dimensions of alcohol-specific parenting to be unique and significant predictors of nondrinking adolescents' attitudes about alcohol, over and above general parenting practices, parent AUD, and parent current drinking. Given its demonstrated distinctness from general parenting practices, its link with adolescent alcohol attitudes, and its potential malleability, alcohol-specific parenting may be an important complement to interventions targeting parents of adolescents.
ContributorsHandley, Elizabeth D (Author) / Chassin, Laurie (Thesis advisor) / MacKinnon, David (Committee member) / Crnic, Keith (Committee member) / Sandler, Irwin (Committee member) / Arizona State University (Publisher)
Created2012
150987-Thumbnail Image.png
Description
In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in unencrypted forms to remote machines owned

In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in unencrypted forms to remote machines owned and operated by third-party service providers, there are risks of unauthorized use of the users' sensitive data by service providers. Although there are many techniques for protecting users' data from outside attackers, currently there is no effective way to protect users' sensitive data from service providers. In this dissertation, an approach is presented to protecting the confidentiality of users' data from service providers, and ensuring that service providers cannot collect users' confidential data while the data is processed or stored in cloud computing systems. The approach has four major features: (1) separation of software service providers and infrastructure service providers, (2) hiding the information of the owners of data, (3) data obfuscation, and (4) software module decomposition and distributed execution. Since the approach to protecting users' data confidentiality includes software module decomposition and distributed execution, it is very important to effectively allocate the resource of servers in SBS to each of the software module to manage the overall performance of workflows in SBS. An approach is presented to resource allocation for SBS to adaptively allocating the system resources of servers to their software modules in runtime in order to satisfy the performance requirements of multiple workflows in SBS. Experimental results show that the dynamic resource allocation approach can substantially increase the throughput of a SBS and the optimal resource allocation can be found in polynomial time
ContributorsAn, Ho Geun (Author) / Yau, Sik-Sang (Thesis advisor) / Huang, Dijiang (Committee member) / Ahn, Gail-Joon (Committee member) / Santanam, Raghu (Committee member) / Arizona State University (Publisher)
Created2012
151108-Thumbnail Image.png
Description
Information technology (IT) outsourcing, including foreign or offshore outsourcing, has been steadily growing over the last two decades. This growth in IT outsourcing has led to the development of different hubs of services across nations, and has resulted in increased competition among service providers. Firms have been using IT outsourcing

Information technology (IT) outsourcing, including foreign or offshore outsourcing, has been steadily growing over the last two decades. This growth in IT outsourcing has led to the development of different hubs of services across nations, and has resulted in increased competition among service providers. Firms have been using IT outsourcing to not only leverage advanced technologies and services at lower costs, but also to maintain their competitive edge and grow. Furthermore, as prior studies have shown, there are systematic differences among industries in terms of the degree and impact of IT outsourcing. This dissertation uses a three-study approach to investigate issues related to IT outsourcing at the macro and micro levels, and provides different perspectives for understanding the issues associated with IT outsourcing at a firm and industry level. The first study evaluates the diffusion patterns of IT outsourcing across industries at aggregate level and within industries at a firm level. In addition, it analyzes the factors that influence the diffusion of IT outsourcing and tests models that help us understand the rate and patterns of diffusion at the industry level. This study establishes the presence of hierarchical contagion effects in the diffusion of IT outsourcing. The second study explores the role of location and proximity of industries to understand the diffusion patterns of IT outsourcing within clusters using the spatial analysis technique of space-time clustering. It establishes the presence of simultaneous space and time interactions at the global level in the diffusion of IT outsourcing. The third study examines the development of specialized hubs for IT outsourcing services in four developing economies: Brazil, Russia, India, and China (BRIC). In this study, I adopt a theory-building approach involving the identification of explanatory anomalies, and propose a new hybrid theory called- knowledge network theory. The proposed theory suggests that the growth and development of the IT and related services sector is a result of close interactions among adaptive institutions. It is also based on new knowledge that is created, and which flows through a country's national diaspora of expatriate entrepreneurs, technologists and business leaders. In addition, relevant economic history and regional geography factors are important. This view diverges from the traditional view, wherein effective institutions are considered to be the key determinants of long-term economic growth.
ContributorsMann, Arti (Author) / Kauffman, Robert J. (Thesis advisor) / Santanam, Raghu (Thesis advisor) / St. Louis, Robert (Committee member) / Anselin, Luc (Committee member) / Nault, Barrie R (Committee member) / Arizona State University (Publisher)
Created2012
135962-Thumbnail Image.png
Description
Cyber-weapons and the rapid progression of utilizing cyberspace in conflict poses several risks to states and their ability to maintain control of their respective technological infrastructures. Susceptibility to these weapons extend to virtually all existing nations, and indicates a critical need for transnational organizations and their members to establish collective

Cyber-weapons and the rapid progression of utilizing cyberspace in conflict poses several risks to states and their ability to maintain control of their respective technological infrastructures. Susceptibility to these weapons extend to virtually all existing nations, and indicates a critical need for transnational organizations and their members to establish collective strategies for governing cyber-arms. In this paper, the United Nations, as a prime example of an influential transnational organization, is utilized as a case study for a framework that seeks to define and establish guidelines for arms control policy as it relates to cyber-weapons. Presented is a strategy that seeks to define cyber-warfare and cyber-weapons, distinguish it from other existing forms of weapons and warfare, and outline recommended actions for the United Nations and its affiliates, including the United Nations Office for Disarmament Affairs and United Nations Security Council.
ContributorsSidhu, Arman Singh (Author) / Berliner, Daniel (Thesis director) / Santanam, Raghu (Committee member) / Barrett, The Honors College (Contributor) / School of Politics and Global Studies (Contributor) / Department of Information Systems (Contributor)
Created2015-12
136774-Thumbnail Image.png
Description
Considering the overwhelming prevalence of BPH, how can it best be managed in light of the aging population? The purpose of this investigation is to illustrate that BPH and LUTS are conditions that are highly conducive to health literacy technology interventions. This objective will be met by: a) Providing an

Considering the overwhelming prevalence of BPH, how can it best be managed in light of the aging population? The purpose of this investigation is to illustrate that BPH and LUTS are conditions that are highly conducive to health literacy technology interventions. This objective will be met by: a) Providing an overview of the clinically relevant information regarding BPH, including anatomy, physiology, epidemiology, symptoms, and medical treatment for the disease; b) Establishing the necessity for novel health care delivery solutions by identifying past successes and challenges associated with technologic advances in related fields; c) Providing evidence of a lack of a systematic approach to BPH education, especially as it relates to health literacy. The relative successes and failures of previously established clinical decision aids will be discussed, leading to recommendations on how to improve upon these standards. Finally, the procedures and results of a pilot study will be analyzed in an effort to further highlight the necessity of engaging patients in the clinical decision making process.
Created2014-12