Matching Items (50)
Filtering by

Clear all filters

149668-Thumbnail Image.png
Description
Service based software (SBS) systems are software systems consisting of services based on the service oriented architecture (SOA). Each service in SBS systems provides partial functionalities and collaborates with other services as workflows to provide the functionalities required by the systems. These services may be developed and/or owned by different

Service based software (SBS) systems are software systems consisting of services based on the service oriented architecture (SOA). Each service in SBS systems provides partial functionalities and collaborates with other services as workflows to provide the functionalities required by the systems. These services may be developed and/or owned by different entities and physically distributed across the Internet. Compared with traditional software system components which are usually specifically designed for the target systems and bound tightly, the interfaces of services and their communication protocols are standardized, which allow SBS systems to support late binding, provide better interoperability, better flexibility in dynamic business logics, and higher fault tolerance. The development process of SBS systems can be divided to three major phases: 1) SBS specification, 2) service discovery and matching, and 3) service composition and workflow execution. This dissertation focuses on the second phase, and presents a privacy preserving service discovery and ranking approach for multiple user QoS requirements. This approach helps service providers to register services and service users to search services through public, but untrusted service directories with the protection of their privacy against the service directories. The service directories can match the registered services with service requests, but do not learn any information about them. Our approach also enforces access control on services during the matching process, which prevents unauthorized users from discovering services. After the service directories match a set of services that satisfy the service users' functionality requirements, the service discovery approach presented in this dissertation further considers service users' QoS requirements in two steps. First, this approach optimizes services' QoS by making tradeoff among various QoS aspects with users' QoS requirements and preferences. Second, this approach ranks services based on how well they satisfy users' QoS requirements to help service users select the most suitable service to develop their SBSs.
ContributorsYin, Yin (Author) / Yau, Stephen S. (Thesis advisor) / Candan, Kasim (Committee member) / Dasgupta, Partha (Committee member) / Santanam, Raghu (Committee member) / Arizona State University (Publisher)
Created2011
152264-Thumbnail Image.png
Description
In order to cope with the decreasing availability of symphony jobs and collegiate faculty positions, many musicians are starting to pursue less traditional career paths. Also, to combat declining audiences, musicians are exploring ways to cultivate new and enthusiastic listeners through relevant and engaging performances. Due to these challenges, many

In order to cope with the decreasing availability of symphony jobs and collegiate faculty positions, many musicians are starting to pursue less traditional career paths. Also, to combat declining audiences, musicians are exploring ways to cultivate new and enthusiastic listeners through relevant and engaging performances. Due to these challenges, many community-based chamber music ensembles have been formed throughout the United States. These groups not only focus on performing classical music, but serve the needs of their communities as well. The problem, however, is that many musicians have not learned the business skills necessary to create these career opportunities. In this document I discuss the steps ensembles must take to develop sustainable careers. I first analyze how groups build a strong foundation through getting to know their communities and creating core values. I then discuss branding and marketing so ensembles can develop a public image and learn how to publicize themselves. This is followed by an investigation of how ensembles make and organize their money. I then examine the ways groups ensure long-lasting relationships with their communities and within the ensemble. I end by presenting three case studies of professional ensembles to show how groups create and maintain successful careers. Ensembles must develop entrepreneurship skills in addition to cultivating their artistry. These business concepts are crucial to the longevity of chamber groups. Through interviews of successful ensemble members and my own personal experiences in the Tetra String Quartet, I provide a guide for musicians to use when creating a community-based ensemble.
ContributorsDalbey, Jenna (Author) / Landschoot, Thomas (Thesis advisor) / McLin, Katherine (Committee member) / Ryan, Russell (Committee member) / Solis, Theodore (Committee member) / Spring, Robert (Committee member) / Arizona State University (Publisher)
Created2013
Description
The reed quintet is an intriguing and innovative chamber ensemble that offers adistinctive soundscape to the genre of chamber music. Through significant efforts to legitimize the ensemble, the reed quintet now exists as a viable option for chamber musicians. However, a significant challenge remains in the limited accessibility of repertoire suitable for developing

The reed quintet is an intriguing and innovative chamber ensemble that offers adistinctive soundscape to the genre of chamber music. Through significant efforts to legitimize the ensemble, the reed quintet now exists as a viable option for chamber musicians. However, a significant challenge remains in the limited accessibility of repertoire suitable for developing musicians interested in reed quintets. REED REVOLUTION: A Fundamental Approach to Reed Quintet represents a comprehensive solution, offering aspiring student chamber musicians the essential pedagogical tools and materials needed to excel in a reed quintet setting. This method book encompasses a wide array of strategies aimed at fostering a functional and collaborative ensemble, establishing foundational chamber music skills, and introducing five original compositions commissioned specifically for this project. With REED REVOLUTION, student reed quintets can begin their chamber music journey equipped with tools to become a successful ensemble prepared to explore the existing reed quintet repertoire. Additionally, the method book includes a collection of online resources and recordings, performed by the Arcane Reed Quintet, produced by Dr. Joshua Gardner, and recorded by Jin Studios, LLC. These resources include reference recordings and practice tracks for each instrument and the ensemble, serving as invaluable aids in the learning process.
ContributorsMacDonald, Benjamin Xavier (Author) / Creviston, Christopher (Thesis advisor) / Gardner, Joshua (Committee member) / Shea, Nicholas (Committee member) / Arizona State University (Publisher)
Created2023
ContributorsJiang, Danwen (Performer) / McLin, Katherine (Performer) / Swartz, Jonathan (Performer) / Buck, Nancy (Performer) / Landschoot, Thomas (Performer) / Rotaru, Catalin (Performer) / Schuring, Martin (Performer) / Spring, Robert (Performer) / Pagano, Caio, 1940- (Performer) / ASU Library. Music Library (Publisher)
Created2006-03-26
ContributorsCampbell, Andrew (Pianist) (Performer) / McLin, Katherine (Performer) / Spring, Robert (Performer) / Schupp, Karen (Performer) / FitzPatrick, Carole (Performer) / Cosand, Walter, 1950- (Performer) / ASU Library. Music Library (Publisher)
Created2008-01-19
ContributorsBronkhorst, Julia (Performer) / McLin, Katherine (Performer) / Buck, Nancy (Performer) / Gardner, Joshua (Performer) / Campbell, Andrew (Pianist) (Performer) / ASU Library. Music Library (Publisher)
Created2013-09-16
ContributorsSchuring, Martin (Performer) / Campbell, Andrew (Pianist) (Performer) / McLin, Katherine (Performer) / Buck, Nancy (Performer) / Micklich, Albie (Performer) / Cueva, Darren (Performer) / ASU Library. Music Library (Publisher)
Created2013-09-29
ContributorsCampbell, Andrew (Pianist) (Performer) / FitzPatrick, Carole (Performer) / McLin, Katherine (Performer) / Buck, Elizabeth (Performer) / Schuring, Martin (Performer) / Spring, Robert (Performer) / Ericson, John Q. (John Quincy), 1962- (Performer) / Micklich, Albie (Performer) / Dreyfoos, Dale (Narrator) / Peterman, Jeremy (Graphic technician deprecated, use Artist)) / ASU Library. Music Library (Publisher)
Created2013-01-30
187820-Thumbnail Image.png
Description
With the advent of new advanced analysis tools and access to related published data, it is getting more difficult for data owners to suppress private information from published data while still providing useful information. This dual problem of providing useful, accurate information and protecting it at the same time has

With the advent of new advanced analysis tools and access to related published data, it is getting more difficult for data owners to suppress private information from published data while still providing useful information. This dual problem of providing useful, accurate information and protecting it at the same time has been challenging, especially in healthcare. The data owners lack an automated resource that provides layers of protection on a published dataset with validated statistical values for usability. Differential privacy (DP) has gained a lot of attention in the past few years as a solution to the above-mentioned dual problem. DP is defined as a statistical anonymity model that can protect the data from adversarial observation while still providing intended usage. This dissertation introduces a novel DP protection mechanism called Inexact Data Cloning (IDC), which simultaneously protects and preserves information in published data while conveying source data intent. IDC preserves the privacy of the records by converting the raw data records into clonesets. The clonesets then pass through a classifier that removes potential compromising clonesets, filtering only good inexact cloneset. The mechanism of IDC is dependent on a set of privacy protection metrics called differential privacy protection metrics (DPPM), which represents the overall protection level. IDC uses two novel performance values, differential privacy protection score (DPPS) and clone classifier selection percentage (CCSP), to estimate the privacy level of protected data. In support of using IDC as a viable data security product, a software tool chain prototype, differential privacy protection architecture (DPPA), was developed to utilize the IDC. DPPA used the engineering security mechanism of IDC. DPPA is a hub which facilitates a market for data DP security mechanisms. DPPA works by incorporating standalone IDC mechanisms and provides automation, IDC protected published datasets and statistically verified IDC dataset diagnostic report. DPPA is currently doing functional, and operational benchmark processes that quantifies the DP protection of a given published dataset. The DPPA tool was recently used to test a couple of health datasets. The test results further validate the IDC mechanism as being feasible.
Contributorsthomas, zelpha (Author) / Bliss, Daniel W (Thesis advisor) / Papandreou-Suppappola, Antonia (Committee member) / Banerjee, Ayan (Committee member) / Shrivastava, Aviral (Committee member) / Arizona State University (Publisher)
Created2023