This paper examines computing academics' conceptions of the Unix operating system, and the purpose of teaching Unix. Interview transcripts from nine academics were analysed phenomenographically. A small number of qualitatively... more
White matter tractography enables studies of fiber bundle characteristics. Stochastic tractography facilitates these investigations by providing a measure of confidence regarding the inferred fiber bundles. This article presents a... more
Many human-computer interfaces are designed with the assumption that the user must adapt to the system, that users must be trained and their behavior altered to fit a given interface. The research presented here proceeds from the... more
In recent years the power of Grid computing has grown exponentially through the development of advanced middleware systems. While usage has increased, the penetration of Grid computing in the scientific community has been less than... more
Workflow management is an important part of scientific experiments. A common pattern that scientists are using is based on repetitive job execution on a variety of different systems, and managing such job execution is necessary for... more
Makalah ini membahas langkah-langkah rinci dalam proses instalasi Windows 10 menggunakan VirtualBox, serta pemanfaatan perintah dasar berbasis teks (Command Line Interface/CLI) di lingkungan Windows. Proses instalasi mencakup persiapan... more
The CMS experiment has to move Petabytes of data among dozens of computing centres with low latency in order to make efficient use of its resources. Transfer operations are well established to achieve the desired level of throughput, but... more
Keamanan sebuah aplikasi merupakan permasalahan terpenting dalam sebuah proses integrasi sistem informasi. Proses authentication dan authorization biasanya dilakukan menggunakan Single Sign On (SSO). Metode authentication dan... more
Early undergraduate Grid computing courses generally took a bottom-up approach to Grid computing education starting with network protocols, client-server concepts, creating Web and Grid services, and then progressing through the... more
Many human-computer interfaces are designed with the assumption that the user must adapt to the system, that users must be trained and their behavior altered to fit a given interface. The research presented here proceeds from the... more
Previous work has found that recent computer science graduates often experience difficulty transitioning into their new roles in industry due to a significant gap between their academic experiences and industry's expectations. Although... more
Programming by demonstration enables users to easily personalize their applications, automating repetitive tasks simply by executing a few examples. We formalize programming by demonstration as a machine learning problem: given the... more
Technological systems and infrastructures form the bedrock of modern society and it is system administrators (sysadmins) who configure, maintain and operate these infrastructures. More often than not, they do so behind the scenes. The... more
Programming by demonstration enables users to easily personalize their applications, automating repetitive tasks simply by executing a few examples. We formalize programming by demonstration as a machine learning problem: given the... more
Emerging technologies in the experimental sciences have opened the way for largescale experiments. Such experiments generate ever growing amounts of data from which researchers need to extract relevant pieces for subsequent analysis. R... more
In this position paper, we examine factors, such as trust and usability, which can affect the adoption of an autonomic system. We argue that a system that exhibits initiative and strong communication skills is more likely to be adopted,... more
Emerging technologies in the experimental sciences have opened the way for largescale experiments. Such experiments generate ever growing amounts of data from which researchers need to extract relevant pieces for subsequent analysis. R... more
The ongoing global COVID-19 pandemic made working from home -- wherever working remotely is possible -- the norm for what had previously been office-based jobs across the world. This change in how we work created a challenging situation... more
Background Characterizing root system architecture (RSA) is essential to understanding the development and function of vascular plants. Identifying RSA-associated genes also represents an underexplored opportunity for crop improvement.... more
Existing audio tools handle the increasing amount of computer audio data inadequately. The typical tape-recorder paradigm for audio interfaces is inflexible and time consuming, especially for large data sets. On the other hand, completely... more
Proteins are post-translationally modified in vivo as part of cellular regulation and signaling, and undergo further chemical modifications during laboratory processing. Even relatively simple protein samples may carry a wide range of... more
RESTful Web services have opened the door to clients to use Web sites in ways the original designers never imagined giving rise to the mashup phenomenon. The main advantage of the model based approach in Web engineering is that the models... more
In this paper, we explore how anonymizing data to preserve privacy affects the utility of the classification rules discoverable in the data. In order for an analysis of anonymized data to provide useful results, the data should have as... more
The next generation of telemetry systems will rely heavily on XML-based standards. Multiple standards are currently being developed and reviewed by the T&E community, including iNET’s Metadata Description Language (MDL), the XML-version... more
Information and computing infrastructures (ICT) involve levels of complexity that are highly dynamic in nature. This is due in no small measure to the proliferation of technologies, such as: cloud computing and distributed systems... more
Computer system administrators are the unsung heroes of the information age, working behind the scenes to configure, maintain, and troubleshoot the computer infrastructure that underlies much of modern life. However, little can be found... more
Emerging technologies in the experimental sciences have opened the way for largescale experiments. Such experiments generate ever growing amounts of data from which researchers need to extract relevant pieces for subsequent analysis. R... more
Programming by demonstration enables users to easily personalize their applications, automating repetitive tasks simply by executing a few examples. We formalize programming by demonstration as a machine learning problem: given the... more
RESTful Web services have opened the door to clients to use Web sites in ways the original designers never imagined giving rise to the mashup phenomenon. The main advantage of the model based approach in Web engineering is that the models... more
Command-line interfaces are heavily used by system admin- istrators to manage computer systems. Tasks performed at a command line may often be repetitive, leading to a desire for automation. However, the critical nature of system adminis-... more
Establishing users' identities before they access research infrastructure resources is a key feature of science gateways. With many science gateways now relying on general purpose gateway platform services, the challenges of managing... more
One of the primary motivations behind autonomic computing (AC) is the problem of administrating highly complex systems. AC seeks to solve this problem through increased automation, relieving system administrators of many burdensome... more
We have created open-source Simulink block libraries for ITK and VTK that allow pipelines for these toolkits to be built in a visual, drag-and-drop style within MATLAB. Each block contains an instance of an ITK or VTK class. Any block... more
White matter tractography enables studies of fiber bundle characteristics. Stochastic tractography facilitates these investigations by providing a measure of confidence regarding the inferred fiber bundles. This article presents a... more
This paper presents a tool for automatic generation of ANSI C code from models expressed in IOPT (Input-Output Place-Transition) Petri Nets. The inputs of the tool are PNML (Petri Nets Markup Language) files containing the IOPT Petri net... more
White matter tractography enables studies of fiber bundle characteristics. Stochastic tractography facilitates these investigations by providing a measure of confidence regarding the inferred fiber bundles. This article presents a... more
Previous work has found that recent computer science graduates often experience difficulty transitioning into their new roles in industry due to a significant gap between their academic experiences and industry's expectations. Although... more
Interpretation of human genomes is a major challenge. We present the Scripps Genome ADVISER (SG-ADVISER) suite, which aims to fill the gap between data generation and genome interpretation by performing holistic, in-depth, annotations and... more
Knowledge about computer users is very beneficial for assisting them, predicting their future actions or detecting masqueraders. In this paper, an approach for creating and recognizing automatically the behavior profile of a user from the... more
Managing file systems of large organizations can present significant challenges in terms of the number of users, shared access to parts of the file system, and securing and monitoring critical parts of the file system. We present an... more
For the past few years, a multidisciplinary team of computer and earth scientists at Lawrence Berkeley National Laboratory has been exploring the use of advanced user interfaces, commonly called {open_quotes}Virtual Reality{close_quotes}... more
Knowledge about computer users is very beneficial for assisting them, predicting their future actions or detecting masqueraders. In this paper, an approach for creating and recognizing automatically the behavior profile of a user from the... more
The Covid-19 that hit the world had an impact on the economy, especially in the trade sector, one of which was experienced by Small and Medium Enterprises (SMEs). Hanura Takeaway (Haway) is an SME engaged in the delivery of goods and... more
Students in the same statistics course learn different things, and view the role of the lecturer in different ways. We report on empirical research on students' conceptions of learning statistics, their expectations of teaching, and... more
In this paper, we describe a research methodology phenomenography and its application in investigating the experience of an ensemble the recorder consort Fortune in negotiating a shared conception of pieces of music being prepared for... more
The paper focuses on security and performance concerns in mobile web development. The approach used in the study involved surveying journal publications to identify security and performance concerns. The paper highlights some of the... more
Universities must compete in an increasingly difficult global market place. In order to successfully do so they must identify and profile market segments in order to achieve a unique selling position. Partnering may provide only part of... more
Knowledge about computer users is very beneficial for assisting them, predicting their future actions or detecting masqueraders. In this paper, a new approach for creating and recognizing automatically the behaviour profile of a computer... more