Matching Items (40)
151699-Thumbnail Image.png
Description
The causes and consequences of stylistic change have been a concern of archaeologists over the past several decades. The actual process of stylistic innovation, however, has received less attention. This project explores the relationship between the process of stylistic innovation on decorated pottery and the social context in which it

The causes and consequences of stylistic change have been a concern of archaeologists over the past several decades. The actual process of stylistic innovation, however, has received less attention. This project explores the relationship between the process of stylistic innovation on decorated pottery and the social context in which it occurred in the Hohokam area of south-central Arizona between A.D. 800 and 1300. This interval was punctuated by three episodes of reorganization, each of which was characterized to varying degrees by significant shifts in ideology, economics, and politics. Each reorganization episode was also accompanied by a rapid profusion of stylistic innovation on buff ware pottery. The goal of this study was to build a framework to understand the variation in the process of innovation as a response to different incentives and opportunities perceived in the changing social environment. By bringing stylistic analyses and provenance data together for the first time in Hohokam red-on-buff studies, I investigated how the process of innovation was variously influenced by social reorganizations at three different periods of time: the 9th, 11th, and 12th centuries A.D. Four variables were used to evaluate the process of innovation at each temporal period: 1) The origin of a stylistic invention, 2) the rate of its adoption, 3) the pattern of its adoption, and 4) the uniformity of its adoption among all buff ware potting communities. To accomplish the task, stylistic innovations and provenance were recorded on over 3,700 red-on-buff sherds were analyzed from 20 sites in the Phoenix Basin. The innovation process was found to vary with each reorganization episode, but often in different ways than expected. The results revealed the complexity and unpredictability of the process of stylistic innovation among the Hohokam. They also challenged some assumptions archaeologists have made regarding the scale and extent of the changes associated with some of the reorganization episodes. The variables utilized to measure the innovation process were found to be effective at providing a composite picture of that process, and thus warrant broader application to other archaeological contexts.
ContributorsLack, Andrew D (Author) / Abbott, David R. (Thesis advisor) / Hegmon, Michelle (Committee member) / Spielmann, Katherine A. (Committee member) / Nelson, Ben A. (Committee member) / Arizona State University (Publisher)
Created2013
151940-Thumbnail Image.png
Description
Biological systems are complex in many dimensions as endless transportation and communication networks all function simultaneously. Our ability to intervene within both healthy and diseased systems is tied directly to our ability to understand and model core functionality. The progress in increasingly accurate and thorough high-throughput measurement technologies has provided

Biological systems are complex in many dimensions as endless transportation and communication networks all function simultaneously. Our ability to intervene within both healthy and diseased systems is tied directly to our ability to understand and model core functionality. The progress in increasingly accurate and thorough high-throughput measurement technologies has provided a deluge of data from which we may attempt to infer a representation of the true genetic regulatory system. A gene regulatory network model, if accurate enough, may allow us to perform hypothesis testing in the form of computational experiments. Of great importance to modeling accuracy is the acknowledgment of biological contexts within the models -- i.e. recognizing the heterogeneous nature of the true biological system and the data it generates. This marriage of engineering, mathematics and computer science with systems biology creates a cycle of progress between computer simulation and lab experimentation, rapidly translating interventions and treatments for patients from the bench to the bedside. This dissertation will first discuss the landscape for modeling the biological system, explore the identification of targets for intervention in Boolean network models of biological interactions, and explore context specificity both in new graphical depictions of models embodying context-specific genomic regulation and in novel analysis approaches designed to reveal embedded contextual information. Overall, the dissertation will explore a spectrum of biological modeling with a goal towards therapeutic intervention, with both formal and informal notions of biological context, in such a way that will enable future work to have an even greater impact in terms of direct patient benefit on an individualized level.
ContributorsVerdicchio, Michael (Author) / Kim, Seungchan (Thesis advisor) / Baral, Chitta (Committee member) / Stolovitzky, Gustavo (Committee member) / Collofello, James (Committee member) / Arizona State University (Publisher)
Created2013
Description
Laboratory automation systems have seen a lot of technological advances in recent times. As a result, the software that is written for them are becoming increasingly sophisticated. Existing software architectures and standards are targeted to a wider domain of software development and need to be customized in order to use

Laboratory automation systems have seen a lot of technological advances in recent times. As a result, the software that is written for them are becoming increasingly sophisticated. Existing software architectures and standards are targeted to a wider domain of software development and need to be customized in order to use them for developing software for laboratory automation systems. This thesis proposes an architecture that is based on existing software architectural paradigms and is specifically tailored to developing software for a laboratory automation system. The architecture is based on fairly autonomous software components that can be distributed across multiple computers. The components in the architecture make use of asynchronous communication methodologies that are facilitated by passing messages between one another. The architecture can be used to develop software that is distributed, responsive and thread-safe. The thesis also proposes a framework that has been developed to implement the ideas proposed by the architecture. The framework is used to develop software that is scalable, distributed, responsive and thread-safe. The framework currently has components to control very commonly used laboratory automation devices such as mechanical stages, cameras, and also to do common laboratory automation functionalities such as imaging.
ContributorsKuppuswamy, Venkataramanan (Author) / Meldrum, Deirdre (Thesis advisor) / Collofello, James (Thesis advisor) / Sarjoughian, Hessam S. (Committee member) / Johnson, Roger (Committee member) / Arizona State University (Publisher)
Created2012
151275-Thumbnail Image.png
Description
The pay-as-you-go economic model of cloud computing increases the visibility, traceability, and verifiability of software costs. Application developers must understand how their software uses resources when running in the cloud in order to stay within budgeted costs and/or produce expected profits. Cloud computing's unique economic model also leads naturally to

The pay-as-you-go economic model of cloud computing increases the visibility, traceability, and verifiability of software costs. Application developers must understand how their software uses resources when running in the cloud in order to stay within budgeted costs and/or produce expected profits. Cloud computing's unique economic model also leads naturally to an earn-as-you-go profit model for many cloud based applications. These applications can benefit from low level analyses for cost optimization and verification. Testing cloud applications to ensure they meet monetary cost objectives has not been well explored in the current literature. When considering revenues and costs for cloud applications, the resource economic model can be scaled down to the transaction level in order to associate source code with costs incurred while running in the cloud. Both static and dynamic analysis techniques can be developed and applied to understand how and where cloud applications incur costs. Such analyses can help optimize (i.e. minimize) costs and verify that they stay within expected tolerances. An adaptation of Worst Case Execution Time (WCET) analysis is presented here to statically determine worst case monetary costs of cloud applications. This analysis is used to produce an algorithm for determining control flow paths within an application that can exceed a given cost threshold. The corresponding results are used to identify path sections that contribute most to cost excess. A hybrid approach for determining cost excesses is also presented that is comprised mostly of dynamic measurements but that also incorporates calculations that are based on the static analysis approach. This approach uses operational profiles to increase the precision and usefulness of the calculations.
ContributorsBuell, Kevin, Ph.D (Author) / Collofello, James (Thesis advisor) / Davulcu, Hasan (Committee member) / Lindquist, Timothy (Committee member) / Sen, Arunabha (Committee member) / Arizona State University (Publisher)
Created2012
152590-Thumbnail Image.png
Description
Access control is necessary for information assurance in many of today's applications such as banking and electronic health record. Access control breaches are critical security problems that can result from unintended and improper implementation of security policies. Security testing can help identify security vulnerabilities early and avoid unexpected expensive cost

Access control is necessary for information assurance in many of today's applications such as banking and electronic health record. Access control breaches are critical security problems that can result from unintended and improper implementation of security policies. Security testing can help identify security vulnerabilities early and avoid unexpected expensive cost in handling breaches for security architects and security engineers. The process of security testing which involves creating tests that effectively examine vulnerabilities is a challenging task. Role-Based Access Control (RBAC) has been widely adopted to support fine-grained access control. However, in practice, due to its complexity including role management, role hierarchy with hundreds of roles, and their associated privileges and users, systematically testing RBAC systems is crucial to ensure the security in various domains ranging from cyber-infrastructure to mission-critical applications. In this thesis, we introduce i) a security testing technique for RBAC systems considering the principle of maximum privileges, the structure of the role hierarchy, and a new security test coverage criterion; ii) a MTBDD (Multi-Terminal Binary Decision Diagram) based representation of RBAC security policy including RHMTBDD (Role Hierarchy MTBDD) to efficiently generate effective positive and negative security test cases; and iii) a security testing framework which takes an XACML-based RBAC security policy as an input, parses it into a RHMTBDD representation and then generates positive and negative test cases. We also demonstrate the efficacy of our approach through case studies.
ContributorsGupta, Poonam (Author) / Ahn, Gail-Joon (Thesis advisor) / Collofello, James (Committee member) / Huang, Dijiang (Committee member) / Arizona State University (Publisher)
Created2014
152560-Thumbnail Image.png
Description
Exchange is fundamental to human society, and anthropologists have long documented the large size and complexity of exchange systems in a range of societies. Recent work on the banking system of today's world suggests that complex exchange systems may become systemically fragile and in some types of complex exchange systems

Exchange is fundamental to human society, and anthropologists have long documented the large size and complexity of exchange systems in a range of societies. Recent work on the banking system of today's world suggests that complex exchange systems may become systemically fragile and in some types of complex exchange systems that involve feedbacks there exists a fundamental trade-off between robustness (stability) and systemic fragility. These properties may be observable in the archaeological record as well. In southern Arizona, the Hohokam system involved market-based exchange of large quantities of goods (including corn, pottery, stone, and shell) across southern Arizona and beyond, but after a few generations of expansion it collapsed rapidly around A.D. 1070. In this case, increasing the scale of a pre-existing system (i.e., expanding beyond the Hohokam region) may have reduced the efficacy of established robustness-fragility trade-offs, which, in turn, amplified the fragility of the system, increasing its risk of collapse. My research examines (1) the structural and organizational properties of a transregional system of shell exchange between the Hohokam region and California, and (2) the effect of the presence and loss of a very large freshwater lake (Lake Cahuilla) in southeastern California on the stability of the Hohokam system. I address these issues with analysis of ethnographic, ethnohistoric, and archaeological data, and with mathematical modeling. My study (1) produced a simple network model of a transregional system of interaction that links the Hohokam region and California during the centuries from A.D. 700 to 1100; (2) uses network and statistical analysis of the network model and archaeological data to strongly suggest that the transregional exchange system existed and was directional and structured; (3) uses network and other analysis to identify robustness-fragility properties of the transregional system and to show that trade between Lake Cahuilla fishers and the Hohokam system should be included in a mathematical model of this system; and (4) develops and analyzes a mathematical model of renewable resource use and trade that provides important insights into the robustness and systemic fragility of the Hohokam system (A.D. 900-1100).
ContributorsMerrill, Michael (Author) / Hegmon, Michelle (Thesis advisor) / Anderies, John M (Thesis advisor) / Brandt, Elizabeth, (Committee member) / Arizona State University (Publisher)
Created2014
152372-Thumbnail Image.png
Description
In this dissertation I argue that medieval peoples used a different style of identity from those applied to them by later scholarship and question the relevance of applying modern terms for identity groups (e.g., ethnicity or nationality) to the description of medieval social units. I propose we think of identity

In this dissertation I argue that medieval peoples used a different style of identity from those applied to them by later scholarship and question the relevance of applying modern terms for identity groups (e.g., ethnicity or nationality) to the description of medieval social units. I propose we think of identity as a social construct comprised of three articulating facets, which I call: form, aspect, and definition. The form of identity is its manifestation in behavior and symbolic markers; its aspect is the perception of these forms by people; and its definition is the combination of these perceptions into a social category. Taking an interdisciplinary approach, I examine each facet individually before synthesizing the results. I study the form of identity through an analysis of styles in material culture using a consensus analysis to determine how well objects decorated with the same motif do communicating a shared idea to members of a social group. I explore the aspect of identity through a whole-corpus linguistics approach to Old English, in which I study the co-occurrence of words for "a people" and other semantic fields to refine our understanding of Old English perceptions of social identity. Finally, I investigate the definition of identity by comparing narrations of identity in Old English verse and prose in order to see how authors were able to use vocabulary and imagery to describe the identity of their subjects. In my conclusion I demonstrate that the people of Medieval England had a concept of identity based on the metaphor of a village meeting or a feast, in which smaller, innate groups were thought to aggregate into new heterogeneous wholes. The nature and scale of these groups changed over the course of the Anglo-Saxon period but some of the names used to refer to these units remained constant. Thus, I suggest scholars need to apply a culturally relevant concept of identity when describing the people who lived in Medieval Britain, one that might not match contemporary models, and be cognizant of the fact that medieval groups were not the same as their modern descendants.
ContributorsRoberts, Christopher M (Author) / Hegmon, Michelle (Thesis advisor) / Bjork, Robert (Thesis advisor) / Van Der Leeuw, Sander (Committee member) / Wicker, Nancy (Committee member) / Arizona State University (Publisher)
Created2013
150258-Thumbnail Image.png
Description
This dissertation explores the interrelationships between periods of rapid social change and regional-scale social identities. Using archaeological data from the Cibola region of the U.S. Southwest, I examine changes in the nature and scale of social identification across a period of demographic and social upheaval (A.D. 1150-1325) marked by a

This dissertation explores the interrelationships between periods of rapid social change and regional-scale social identities. Using archaeological data from the Cibola region of the U.S. Southwest, I examine changes in the nature and scale of social identification across a period of demographic and social upheaval (A.D. 1150-1325) marked by a shift from dispersed hamlets, to clustered villages, and eventually, to a small number of large nucleated towns. This transformation in settlement organization entailed a fundamental reconfiguration of the relationships among households and communities across an area of over 45,000 km2. This study draws on contemporary social theory focused on political mobilization and social movements to investigate how changes in the process of social identification can influence the potential for such widespread and rapid transformations. This framework suggests that social identification can be divided into two primary modes; relational identification based on networks of interaction among individuals, and categorical identification based on active expressions of affiliation with social roles or groups to which one can belong. Importantly, trajectories of social transformations are closely tied to the interrelationships between these two modes of identification. This study has three components: Social transformation, indicated by rapid demographic and settlement transitions, is documented through settlement studies drawing on a massive, regional database including over 1,500 sites. Relational identities, indicated by networks of interaction, are documented through ceramic compositional analyses of over 2,100 potsherds, technological characterizations of over 2,000 utilitarian ceramic vessels, and the distributions of different types of domestic architectural features across the region. Categorical identities are documented through stylistic comparisons of a large sample of polychrome ceramic vessels and characterizations of public architectural spaces. Contrary to assumptions underlying traditional approaches to social identity in archaeology, this study demonstrates that relational and categorical identities are not necessarily coterminous. Importantly, however, the strongest patterns of relational connections prior to the period of social transformation in the Cibola region largely predict the scale and structure of changes associated with that transformation. This suggests that the social transformation in the Cibola region, despite occurring in a non-state setting, was governed by similar dynamics to well-documented contemporary examples.
ContributorsPeeples, Matthew A. (Author) / Kintigh, Keith W. (Thesis advisor) / Hegmon, Michelle (Thesis advisor) / Spielmann, Katherine A. (Committee member) / Arizona State University (Publisher)
Created2011
150789-Thumbnail Image.png
Description
In this study, the researcher develops a documentary-driven methodology to understand the ways four women in the United States use their involvement in the belly dance phenomenon to shape their ongoing individual identity development. The filmmaking process itself and its efficacy as a process to promote self-understanding and identity growth

In this study, the researcher develops a documentary-driven methodology to understand the ways four women in the United States use their involvement in the belly dance phenomenon to shape their ongoing individual identity development. The filmmaking process itself and its efficacy as a process to promote self-understanding and identity growth among the participating belly dancers, are also investigated phenomenologically. Methodological steps taken in the documentary-driven methodology include: initial filmed interviews, co-produced filmed dance performances, editorial interviews to review footage with each dancer, documentary film production, dancer-led focus groups to screen the film, and exit interviews with each dancer. The project generates new understandings about the ways women use belly dance to shape their individual identities to include: finding community with other women in private women's spaces, embodying the music through the dance movements, and finding liberation from their everyday "selves" through costume and performance.
ContributorsWatkins, Ramsi Kathryn (Author) / Bolin, Bob (Thesis advisor) / Hegmon, Michelle (Committee member) / Hjorleifur Jonsson (Committee member) / Arizona State University (Publisher)
Created2012
150234-Thumbnail Image.png
Description
Introductory programming courses, also known as CS1, have a specific set of expected outcomes related to the learning of the most basic and essential computational concepts in computer science (CS). However, two of the most often heard complaints in such courses are that (1) they are divorced from the reality

Introductory programming courses, also known as CS1, have a specific set of expected outcomes related to the learning of the most basic and essential computational concepts in computer science (CS). However, two of the most often heard complaints in such courses are that (1) they are divorced from the reality of application and (2) they make the learning of the basic concepts tedious. The concepts introduced in CS1 courses are highly abstract and not easily comprehensible. In general, the difficulty is intrinsic to the field of computing, often described as "too mathematical or too abstract." This dissertation presents a small-scale mixed method study conducted during the fall 2009 semester of CS1 courses at Arizona State University. This study explored and assessed students' comprehension of three core computational concepts - abstraction, arrays of objects, and inheritance - in both algorithm design and problem solving. Through this investigation students' profiles were categorized based on their scores and based on their mistakes categorized into instances of five computational thinking concepts: abstraction, algorithm, scalability, linguistics, and reasoning. It was shown that even though the notion of computational thinking is not explicit in the curriculum, participants possessed and/or developed this skill through the learning and application of the CS1 core concepts. Furthermore, problem-solving experiences had a direct impact on participants' knowledge skills, explanation skills, and confidence. Implications for teaching CS1 and for future research are also considered.
ContributorsBillionniere, Elodie V (Author) / Collofello, James (Thesis advisor) / Ganesh, Tirupalavanam G. (Thesis advisor) / VanLehn, Kurt (Committee member) / Burleson, Winslow (Committee member) / Arizona State University (Publisher)
Created2011