Matching Items (980)
150497-Thumbnail Image.png
Description
In recent years, service oriented computing (SOC) has become a widely accepted paradigm for the development of distributed applications such as web services, grid computing and cloud computing systems. In service-based systems (SBS), multiple service requests with specific performance requirements make services compete for system resources. IT service providers need

In recent years, service oriented computing (SOC) has become a widely accepted paradigm for the development of distributed applications such as web services, grid computing and cloud computing systems. In service-based systems (SBS), multiple service requests with specific performance requirements make services compete for system resources. IT service providers need to allocate resources to services so the performance requirements of customers can be satisfied. Workload and performance models are required for efficient resource management and service performance assurance in SBS. This dissertation develops two methods to understand and model the cause-effect relations of service-related activities with resources workload and service performance. Part one presents an empirical method that requires the collection of system dynamics data and the application of statistical analyses. The results show that the method is capable to: 1) uncover the impacts of services on resource workload and service performance, 2) identify interaction effects of multiple services running concurrently, 3) gain insights about resource and performance tradeoffs of services, and 4) build service workload and performance models. In part two, the empirical method is used to investigate the impacts of services, security mechanisms and cyber attacks on resources workload and service performance. The information obtained is used to: 1) uncover interaction effects of services, security mechanisms and cyber attacks, 2) identify tradeoffs within limits of system resources, and 3) develop general/specific strategies for system survivability. Finally, part three presents a framework based on the usage profiles of services competing for resources and the resource-sharing schemes. The framework is used to: 1) uncover the impacts of service parameters (e.g. arrival distribution, execution time distribution, priority, workload intensity, scheduling algorithm) on workload and performance, and 2) build service workload and performance models at individual resources. The estimates obtained from service workload and performance models at individual resources can be aggregated to obtain overall estimates of services through multiple system resources. The workload and performance models of services obtained through both methods can be used for the efficient resource management and service performance assurance in SBS.
ContributorsMartinez Aranda, Billibaldo (Author) / Ye, Nong (Thesis advisor) / Wu, Tong (Committee member) / Sarjoughian, Hessam S. (Committee member) / Pan, Rong (Committee member) / Arizona State University (Publisher)
Created2012
151152-Thumbnail Image.png
Description
Access control is one of the most fundamental security mechanisms used in the design and management of modern information systems. However, there still exists an open question on how formal access control models can be automatically analyzed and fully realized in secure system development. Furthermore, specifying and managing access control

Access control is one of the most fundamental security mechanisms used in the design and management of modern information systems. However, there still exists an open question on how formal access control models can be automatically analyzed and fully realized in secure system development. Furthermore, specifying and managing access control policies are often error-prone due to the lack of effective analysis mechanisms and tools. In this dissertation, I present an Assurance Management Framework (AMF) that is designed to cope with various assurance management requirements from both access control system development and policy-based computing. On one hand, the AMF framework facilitates comprehensive analysis and thorough realization of formal access control models in secure system development. I demonstrate how this method can be applied to build role-based access control systems by adopting the NIST/ANSI RBAC standard as an underlying security model. On the other hand, the AMF framework ensures the correctness of access control policies in policy-based computing through automated reasoning techniques and anomaly management mechanisms. A systematic method is presented to formulate XACML in Answer Set Programming (ASP) that allows users to leverage off-the-shelf ASP solvers for a variety of analysis services. In addition, I introduce a novel anomaly management mechanism, along with a grid-based visualization approach, which enables systematic and effective detection and resolution of policy anomalies. I further evaluate the AMF framework through modeling and analyzing multiparty access control in Online Social Networks (OSNs). A MultiParty Access Control (MPAC) model is formulated to capture the essence of multiparty authorization requirements in OSNs. In particular, I show how AMF can be applied to OSNs for identifying and resolving privacy conflicts, and representing and reasoning about MPAC model and policy. To demonstrate the feasibility of the proposed methodology, a suite of proof-of-concept prototype systems is implemented as well.
ContributorsHu, Hongxin (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Dasgupta, Partha (Committee member) / Ye, Nong (Committee member) / Arizona State University (Publisher)
Created2012
133588-Thumbnail Image.png
Description
With the new independence of adulthood, college students are a group susceptible to adopting unsupported, if not harmful, health practices. A survey of Arizona State University undergraduate students (N=200) was conducted to evaluate supplement use, trust in information sources, and beliefs about supplement regulation. Of those who reported using supplements,

With the new independence of adulthood, college students are a group susceptible to adopting unsupported, if not harmful, health practices. A survey of Arizona State University undergraduate students (N=200) was conducted to evaluate supplement use, trust in information sources, and beliefs about supplement regulation. Of those who reported using supplements, college students most frequently received information from friends and family. STEM majors in fields unrelated to health who were taking a supplement were found to be less likely to receive information about the supplement from a medical practitioner than those in health fields or those in non-STEM majors (-26.9%, p=0.018). STEM majors in health-related fields were 15.0% more likely to treat colds and/or cold symptoms with research-supported methods identified from reliable sources, while non-health STEM and non-STEM majors were more likely to take unsupported cold treatments (p=0.010). Surveyed students, regardless of major, also stated they would trust a medical practitioner for supplement advice above other sources (88.0%), and the majority expressed a belief that dietary supplements are approved/regulated by the government (59.8%).
ContributorsPerez, Jacob Tanner (Author) / Hendrickson, Kirstin (Thesis director) / Lefler, Scott (Committee member) / College of Liberal Arts and Sciences (Contributor) / School of Molecular Sciences (Contributor) / Department of Physics (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
137433-Thumbnail Image.png
ContributorsChandler, N. Kayla (Author) / Neisewander, Janet (Thesis director) / Sanabria, Federico (Committee member) / Olive, M. Foster (Committee member) / Barrett, The Honors College (Contributor) / College of Liberal Arts and Sciences (Contributor)
Created2013-05
137434-Thumbnail Image.png
Description
I propose that norms regulate behaviors that negatively impact an individual's survival and reproduction. But because monitoring and enforcing of norms can be costly, individuals should be selective about which norms they police and under what circumstances they should do so. Two studies tested this idea by experimentally activating fitness-relevant

I propose that norms regulate behaviors that negatively impact an individual's survival and reproduction. But because monitoring and enforcing of norms can be costly, individuals should be selective about which norms they police and under what circumstances they should do so. Two studies tested this idea by experimentally activating fitness-relevant motives and having participants answer questions about the policing of norms. The first study examined a norm prescribing respect for status and another proscribing sexual coercion. Results from Study 1 failed to support the hypotheses; activating a status-seeking motive did not have the predicted effects on policing of the respect-status norm nor did activating a mating motive have the predicted effects on policing of the respect-status norm or anti-coercion norm. Study 2 examined two new norms, one prescribing that people stay home when sick and the other proscribing people from having sex with another person's partners. Study 2 also manipulated whether self or others were the target of the policing. Study 2 failed to provide support; a disease avoidance motive failed to have effects on policing of the stay home when sick norm. Individuals in a relationship under a mating motive wanted less policing of others for violation of the mate poaching norm than those in a baseline condition, opposite of the predicted effects.
ContributorsSmith, M. Kristopher (Author) / Neuberg, L. Steven (Thesis director) / Presson, Clark (Committee member) / Hruschka, J. Daniel (Committee member) / Barrett, The Honors College (Contributor) / College of Liberal Arts and Sciences (Contributor)
Created2013-05
137565-Thumbnail Image.png
Description
Literature in public administration emphasizes a growing dissatisfaction with government on the part of residents. Where there tends to be a lack in the literature is in terms of solutions to this problem. We would like to argue that the engagement process itself has the power to foster a profound

Literature in public administration emphasizes a growing dissatisfaction with government on the part of residents. Where there tends to be a lack in the literature is in terms of solutions to this problem. We would like to argue that the engagement process itself has the power to foster a profound attitudinal shift on the part of both residents and government. This paper explores the structural and cultural barriers to satisfactory public engagement both from literature and a combination of policy analysis, semi-structured interviews and participatory observation within the City of Tempe. We then provide recommendations to the City of Tempe on how to overcome these barriers and effect authentic public engagement practices. With these new suggested practices and mindsets, we provide a way that people can have the power to create their own community.
ContributorsRiffle, Morgan (Co-author) / Tchida, Celina (Co-author) / Ingram-Waters, Mary (Thesis director) / Grzanka, Patrick (Committee member) / King, Cheryl (Committee member) / Barrett, The Honors College (Contributor) / College of Liberal Arts and Sciences (Contributor)
Created2013-05
137451-Thumbnail Image.png
Description
This thesis examines the relationship between unofficial, official, and parallel Islam in Uzbekistan following the end of the Soviet Union. Key touchstone moments in Uzbekistan during the twentieth-century show the history between unofficial and official Islam and the resulting precedents set for Muslims gathering against the government. This historical analysis

This thesis examines the relationship between unofficial, official, and parallel Islam in Uzbekistan following the end of the Soviet Union. Key touchstone moments in Uzbekistan during the twentieth-century show the history between unofficial and official Islam and the resulting precedents set for Muslims gathering against the government. This historical analysis shows how President Karimov and the Uzbek government view and approach Islam in the country following independence.
ContributorsTieslink, Evan (Author) / Batalden, Stephen (Thesis director) / Kefeli, Agnes (Committee member) / Saikia, Yasmin (Committee member) / Barrett, The Honors College (Contributor) / College of Liberal Arts and Sciences (Contributor) / School of Politics and Global Studies (Contributor) / School of Historical, Philosophical and Religious Studies (Contributor)
Created2013-05
137145-Thumbnail Image.png
Description
Through this creative project, I executed a Distracted Driving Awareness Campaign at Arizona State University to raise awareness about the dangers of distracted driving, specifically texting while driving. As an Undergraduate Student Government Senator, my priority is the safety and success of students, both in and out of the classroom.

Through this creative project, I executed a Distracted Driving Awareness Campaign at Arizona State University to raise awareness about the dangers of distracted driving, specifically texting while driving. As an Undergraduate Student Government Senator, my priority is the safety and success of students, both in and out of the classroom. By partnering with State Farm and AT&T, we were able to raise awareness about the dangers of distracted driving and collected over 200 pledges from students to never text and drive.
ContributorsHibbs, Jordan Ashley (Author) / Miller, Clark (Thesis director) / Parmentier, Mary Jane (Committee member) / Barrett, The Honors College (Contributor) / College of Liberal Arts and Sciences (Contributor) / School of Politics and Global Studies (Contributor) / Department of Psychology (Contributor) / Graduate College (Contributor)
Created2014-05
134662-Thumbnail Image.png
Description
The overall energy consumption around the United States has not been reduced even with the advancement of technology over the past decades. Deficiencies exist between design and actual energy performances. Energy Infrastructure Systems (EIS) are impacted when the amount of energy production cannot be accurately and efficiently forecasted. Inaccurate engineering

The overall energy consumption around the United States has not been reduced even with the advancement of technology over the past decades. Deficiencies exist between design and actual energy performances. Energy Infrastructure Systems (EIS) are impacted when the amount of energy production cannot be accurately and efficiently forecasted. Inaccurate engineering assumptions can result when there is a lack of understanding on how energy systems can operate in real-world applications. Energy systems are complex, which results in unknown system behaviors, due to an unknown structural system model. Currently, there exists a lack of data mining techniques in reverse engineering, which are needed to develop efficient structural system models. In this project, a new type of reverse engineering algorithm has been applied to a year's worth of energy data collected from an ASU research building called MacroTechnology Works, to identify the structural system model. Developing and understanding structural system models is the first step in creating accurate predictive analytics for energy production. The associative network of the building's data will be highlighted to accurately depict the structural model. This structural model will enhance energy infrastructure systems' energy efficiency, reduce energy waste, and narrow the gaps between energy infrastructure design, planning, operation and management (DPOM).
ContributorsCamarena, Raquel Jimenez (Author) / Chong, Oswald (Thesis director) / Ye, Nong (Committee member) / Industrial, Systems (Contributor) / Barrett, The Honors College (Contributor)
Created2016-12
135146-Thumbnail Image.png
Description
Teen dating violence is a significant problem in the U.S., with approximately 1 out of 3 teens experiencing some form of dating violence. BLOOM is a not-for-profit organization created by Donna Bartos. BLOOM's educators enter high schools in Arizona and present their educational program on dating abuse prevention. BLOOM's primary

Teen dating violence is a significant problem in the U.S., with approximately 1 out of 3 teens experiencing some form of dating violence. BLOOM is a not-for-profit organization created by Donna Bartos. BLOOM's educators enter high schools in Arizona and present their educational program on dating abuse prevention. BLOOM's primary goal is to educate teens on how to prevent teen dating violence and empower them with the skills leading to healthy relationships. After participants complete their educational program, a feedback card is filled out with an open-response section. This project focused on the open response section to analyze feedback cards through a process of code development, coding, and tallying. Information provided by this project could assist BLOOM in re-evaluating their curriculum, appealing to future investors, and growing their program to reach more students. With a coding system in place, BLOOM will also be able to better assess the impact they have on the participants of their program.
ContributorsHarmon, Ashley Nicole (Author) / Bodman, Denise (Thesis director) / Dumka, Larry (Committee member) / T. Denny Sanford School of Social and Family Dynamics (Contributor) / College of Liberal Arts and Sciences (Contributor) / Barrett, The Honors College (Contributor)
Created2016-05