Current Search: Management science. (x)
View All Items
Pages
- Title
- THE IMPACT OF THE MANAGERIAL GRID ON ORGANIZATION CHANGE.
- Creator
- HART, HOWARD ARTHUR., Florida Atlantic University, Clare, Donald A.
- Abstract/Description
-
The Managerial Grid is examined as an organization development approach for a large manufacturing corporation. Using the case study method, the results of a seven year history of Grid activities are measured in terms of performance, culture, and several other categories. Conclusions are reached that Phase 2 of the Grid has a statistically significant impact on the organization when measured against Phase ø (no Grid activity) and the results of Phase 1 (the Grid Seminar). The paper also...
Show moreThe Managerial Grid is examined as an organization development approach for a large manufacturing corporation. Using the case study method, the results of a seven year history of Grid activities are measured in terms of performance, culture, and several other categories. Conclusions are reached that Phase 2 of the Grid has a statistically significant impact on the organization when measured against Phase ø (no Grid activity) and the results of Phase 1 (the Grid Seminar). The paper also discusses the significance of change and five other approaches to behavioral science-based organization development.
Show less - Date Issued
- 1973
- PURL
- http://purl.flvc.org/fcla/dt/13538
- Subject Headings
- Management science, Industrial organization
- Format
- Document (PDF)
- Title
- THE DESIGN AND IMPLEMENTATION OF A DECENTRALIZED SECURITY ADMINISTRATION SYSTEM.
- Creator
- KANG, SHYHJER., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Modern computer systems have strong requirements for security. The decentralization of the security functions is becoming necessary due to the complexity and physical distribution of many systems. This study uses a previous model of authorization for decentralized security administration. The concept of file classes is proposed and used for the entire system design as a main motive. Algorithms for delegation of administrative access rights with revocation are designed and implemented. For...
Show moreModern computer systems have strong requirements for security. The decentralization of the security functions is becoming necessary due to the complexity and physical distribution of many systems. This study uses a previous model of authorization for decentralized security administration. The concept of file classes is proposed and used for the entire system design as a main motive. Algorithms for delegation of administrative access rights with revocation are designed and implemented. For development of software, top-down and bottom-up methods are adopted. The strategy for design is borrowed from the object-oriented approach. The special "unit" feature of the implementation language--Meridian-Pascal, serves as a window to observe the interaction and coordination of the fundamental data representations. Four basic table structures are defined to control the authorization system. For the delegation and revocation of the administrative access rights, two graph structures are used and implemented to illustrate the logical view of the operations.
Show less - Date Issued
- 1987
- PURL
- http://purl.flvc.org/fcla/dt/14394
- Subject Headings
- File organization (Computer science), Decentralization in management
- Format
- Document (PDF)
- Title
- Will we learn to manage the new electronic technologies before they overwhelm us - Charleston Library Acquisitions Conference.
- Creator
- Kachmar, Diane
- Date Issued
- 1994-01
- PURL
- http://purl.flvc.org/fcla/dt/11526
- Subject Headings
- Library science--Information technology, Collection management (Libraries), Acquisitions (Libraries)
- Format
- Document (PDF)
- Title
- The Effect of Alliance Portfolio Size on Firm Performance Revisited: The Role of Firm- and Portfolio-Level Contingencies.
- Creator
- Siqueira Barreto, Tais, Lenartowicz, Tomasz, Florida Atlantic University, College of Business, Department of Management
- Abstract/Description
-
Alliance portfolios, or a firm collection of simultaneous alliances, have become common phenomena particularly in technology industries. These portfolios have been found to have a significant impact on firms’ financial performance. At the same time, there is little consensus regarding the direction of this effect. Findings have shown positive, negative, curvilinear, and non-significant relationships. In this dissertation, I employed an organizational learning perspective to investigate the...
Show moreAlliance portfolios, or a firm collection of simultaneous alliances, have become common phenomena particularly in technology industries. These portfolios have been found to have a significant impact on firms’ financial performance. At the same time, there is little consensus regarding the direction of this effect. Findings have shown positive, negative, curvilinear, and non-significant relationships. In this dissertation, I employed an organizational learning perspective to investigate the effect of alliance portfolio size on firm financial performance. Using a sample of 343 firm-year observations in the U.S. software industry, I explored portfolio- and firm-level characteristics as moderators of this relationship. Findings provide evidence for a curvilinear, inverted U-shaped relationship between portfolio size and firm performance that is moderated by the timing of the alliances within the portfolio and by the firms’ Top Management Team (TMT) turnover.
Show less - Date Issued
- 2017
- PURL
- http://purl.flvc.org/fau/fd/FA00004888, http://purl.flvc.org/fau/fd/FA00004888
- Subject Headings
- Strategic alliances (Business)--Management., Management science., Corporate governance., Interorganizational relations., Business networks., Organizational behavior.
- Format
- Document (PDF)
- Title
- Examining the governance and administration of public higher education in Florida: An exploratory study of organizational elite theory.
- Creator
- O'Flannery, Jennifer Lunardini, Florida Atlantic University, Farazmand, Ali
- Abstract/Description
-
Who has power and control over education, one of the most treasured and significant values of American society? This study examines the presence of the elite power structure in higher education and how organizations are used as instruments of institutional power. The research questions consider the manner in which elites are involved in the policy process and governance, the reasons why elites are so involved in Florida's public higher education, and how elites convey and implement their...
Show moreWho has power and control over education, one of the most treasured and significant values of American society? This study examines the presence of the elite power structure in higher education and how organizations are used as instruments of institutional power. The research questions consider the manner in which elites are involved in the policy process and governance, the reasons why elites are so involved in Florida's public higher education, and how elites convey and implement their priorities and values. An exploratory research approach examines the presence of Farazmand's (1994, 1999) concept of organizational elites by combining qualitative and quantitative methods of data collection. The findings support the research propositions. The reason for governance change builds on three factors throughout which power and control persist, a change in membership of the State Cabinet, the Governor's desire to be accountable for education policy, and a lack of confidence in the existing governance system. Trustees advocate for their university and education in general through alumni programs, fundraising, political affiliations, business and research partnerships, and other university and community college boards. Trustees are successful business people, savvy politicians, and well connected to state political leaders. They recognize their collective assets as influence with the Florida legislature, bringing financial order and accountability, and increasing funding and resources. The existence of organizational elites and their effect are seen in several areas: lack of knowledge of trustee meetings and decisions; limited communications, a perceived disconnect between faculty and trustees, a budget process perceived as not being transparent, and a level of decision making at which most staff members are not participants. This study suggests boards work to enhance and improve their communication, outreach, professionalism, and faculty relations. Trustees, elected officials and state leaders must work to resolve the power and organization of the Board of Governors.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/12145
- Subject Headings
- Elite (Social sciences)--Florida, Educational sociology--Florida, Power (Social sciences)--Florida, School management and organization--Florida
- Format
- Document (PDF)
- Title
- A survey of object-oriented features in SQL3.
- Creator
- Wu, Zaiwu., Florida Atlantic University, Solomon, Martin K., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This thesis, based on (ISO/ANSI) X3H2-93-091 Working Draft Database Language SQL (SQL3) (Melton, 1993, 1994), systematically specifies the characteristics and manipulation of object-oriented techniques in SQL3. An essential difference between SQL3 and the previous SQL standards lies in the fact that the abstract data type (ADT) facility supported in SQL3 causes SQL3 to become an extended relational data model rather than a "pure" relational data model. This master's thesis focuses on the...
Show moreThis thesis, based on (ISO/ANSI) X3H2-93-091 Working Draft Database Language SQL (SQL3) (Melton, 1993, 1994), systematically specifies the characteristics and manipulation of object-oriented techniques in SQL3. An essential difference between SQL3 and the previous SQL standards lies in the fact that the abstract data type (ADT) facility supported in SQL3 causes SQL3 to become an extended relational data model rather than a "pure" relational data model. This master's thesis focuses on the careful examination and explication of ADTs and the corresponding families--type templates as they are used in SQL3. These topics involve four aspects: (1) general concepts and technologies in object-oriented data models, (2) the definition of ADTs and their advantages, (3) the manipulation of ADTs in SQL3, including type templates (e.g., distinct types, explicit ADTs, user-defined type templates, standard type templates) and collection types, (4) "tables of ADTs" (row types with table), and (5) conclusions and challenges.
Show less - Date Issued
- 1994
- PURL
- http://purl.flvc.org/fcla/dt/15044
- Subject Headings
- Abstract data types (Computer science), Object-oriented programming (Computer science), Database management, SQL (Computer program language)
- Format
- Document (PDF)
- Title
- An Empirical Test of a General Theory of Problem-Solving.
- Creator
- Hall, Justin, Shaw, Eric H., Florida Atlantic University, College of Business, Department of Marketing
- Abstract/Description
-
The purpose of this research is to better understand how marketers and consumers solve problems. This research first reviews the problem-solving literature, discusses several areas of confusion related to problem-solving, and offers solutions. After resolving the confusion, this research then develops a theoretical model of problemsolving. Four hypotheses are derived from the model, and then empirically tested. The model states that the distinct cognitive domain of problem-solving begins with...
Show moreThe purpose of this research is to better understand how marketers and consumers solve problems. This research first reviews the problem-solving literature, discusses several areas of confusion related to problem-solving, and offers solutions. After resolving the confusion, this research then develops a theoretical model of problemsolving. Four hypotheses are derived from the model, and then empirically tested. The model states that the distinct cognitive domain of problem-solving begins with problem recognition. Given a problem, associative memory and associative activation provide a solution (H #1). This solution is either satisfactory or unsatisfactory. If satisfactory, the individual engages in the satisficing process and accepts the solution (H#2). If unsatisfactory, the individual engages in the decision-making process and searches for information related to an alternative solution (H #3). Thus, the difference between satisficing and decision-making is the search for information (H #4). Problemsolving ends when an intended solution is chosen. A pretest and two studies are conducted to test the four hypotheses. The Pretest demonstrated situations that elicited problem recognition. Study 1 tested hypothesis #1 and found that at least 75 percent of the time associative memory and associative activation provided a solution. Study 2 tested hypotheses #2, #3, and #4. Hypotheses #2 and #3 were tested using a two-way ANOVA, Chi-Square, and Point Biserial Correlation and hypothesis #4 was tested using an independent sample t-test and Point Biserial Correlation. Results of all empirical tests confirm each of the hypotheses, which in turn support the theoretical model.
Show less - Date Issued
- 2017
- PURL
- http://purl.flvc.org/fau/fd/FA00004807, http://purl.flvc.org/fau/fd/FA00004807
- Subject Headings
- Game theory., Problem solving., Decision making., Management science., System theory., Creative thinking., Creative ability in business.
- Format
- Document (PDF)
- Title
- Changing cooperation to competition disrupts attitudes and valence: first test of a dynamical model.
- Creator
- Michaels, Jay L., Charles E. Schmidt College of Science, Department of Psychology
- Abstract/Description
-
With the cessation of cooperation between groups or individuals comes the threat that temporary competition transforms into destructive intractable conflict. To better understand how intractable conflicts develop, Liebovitch, Naudot, Vallacher, Nowak, Bui-Wrzosinksa, and Coleman (2008) recently developed a non-linear model of two-actor cooperation-competition incorporating interaction feedback and valence. This study tested their model's predictions by investigating attitude and valence...
Show moreWith the cessation of cooperation between groups or individuals comes the threat that temporary competition transforms into destructive intractable conflict. To better understand how intractable conflicts develop, Liebovitch, Naudot, Vallacher, Nowak, Bui-Wrzosinksa, and Coleman (2008) recently developed a non-linear model of two-actor cooperation-competition incorporating interaction feedback and valence. This study tested their model's predictions by investigating attitude and valence change depending on whether a social exchange was cooperative or competitive. Participants experiencing an exchange that switched from cooperation to competition exhibited greater attitude change than participants in the control or the continuously competitive interaction condition and more valence change than the control or competition switching to cooperation condition. These results support the model's prediction that greater attitude and valence fluctuation manifests in interactions transitioning from cooperation to competition, providing the first verification of the model. These findings offer new insights into how human cooperation and competition evolve over time.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/369196
- Subject Headings
- Conflict management, Power (Social sciences), Social psychology, Collective behavior, Interpersonal relations
- Format
- Document (PDF)
- Title
- Fifth-grade teachers' social studies knowledge and beliefs and their relationship to classroom practices.
- Creator
- Harcarik, Michele., College of Education, Department of Curriculum, Culture, and Educational Inquiry
- Abstract/Description
-
This mixed methods study investigates the relationship between fifth-grade teachers' social studies knowledge and beliefs and their relationship to classroom practices. Quantitative data were collected through a beliefs and classroom practices survey and 60-item knowledge test covering the areas of American History, America and the World, Political Philosophy and American Government, and The Market Economy, in order to provide a comprehensive picture of fifth-grade teachers' knowledge,...
Show moreThis mixed methods study investigates the relationship between fifth-grade teachers' social studies knowledge and beliefs and their relationship to classroom practices. Quantitative data were collected through a beliefs and classroom practices survey and 60-item knowledge test covering the areas of American History, America and the World, Political Philosophy and American Government, and The Market Economy, in order to provide a comprehensive picture of fifth-grade teachers' knowledge, beliefs, and self-reported classroom practices relating to social studies. Additionally, qualitative data were collected through individual and focus group interviews. These data were used to provide an in-depth look that expanded on fifth-grade teachers' knowledge, beliefs, and self-reported classroom practices relating to social studies. The findings of this study indicate that there is a relationship between teachers' beliefs and their self-reported classroom practices in the areas of resources, best practice, time, the Sunshine State Standards, and personal interest. While there were no significant relationships between teachers' knowledge of social studies as a whole and their self-reported classroom practices, there were several significant correlations found in the areas of American History and Political Philosophy and American Government. Further findings indicate that teaching experience and demographic variables, such as age, gender, and education level moderate some of these relationships. Implications and suggestions for further research are offered for elementary education, teacher education, and the field of social studies.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/369195
- Subject Headings
- Classroom management, Social sciences, Study and teaching (Elementary), Effective teaching, Educational accountability, Teacher effectiveness
- Format
- Document (PDF)
- Title
- A private school leadership perspective on highly qualified middle school science teachers.
- Creator
- Bogaski, Carolyn Siniscalchi, Maslin-Ostrowski, Patricia, Florida Atlantic University, College of Education, Department of Educational Leadership and Research Methodology
- Abstract/Description
-
The purpose of this study was to determine how Florida (FL) private, middle school (MS) leaders define highly qualified (HQ) MS science teachers, and how congruent their definitions are. The study also determines how congruent these leaders’ definitions are with FL, national, and National Science Teachers Association (NSTA) definitions. Lastly, the study determines the major challenges these private MS leaders have in hiring MS science teachers who meet the NSTA definition of HQ.
- Date Issued
- 2015
- PURL
- http://purl.flvc.org/fau/fd/FA00004349, http://purl.flvc.org/fau/fd/FA00004349
- Subject Headings
- Comparative education, Educational leadership, School management and organization, Science -- Study and teaching (Middle school)
- Format
- Document (PDF)
- Title
- Power, instability and regulatory focus: uncovering a hidden motivation for the maintenance and resolution of conflict.
- Creator
- Trew, Noel J.M., Charles E. Schmidt College of Science, Department of Psychology
- Abstract/Description
-
This thesis applies Higgins (1997) Regulatory Focus Theory to the study of conflict by exploring the relationship between power and promotion vs. prevention orientation. After considering the earlier work of Keltner, Gruenfeld & Anderson (2003) that established the considerable effect that power has on approach and avoidance behaviors, the present research shows that this link also applies to regulatory focus. In this study, participants had their sense of power experimentally manipulated by...
Show moreThis thesis applies Higgins (1997) Regulatory Focus Theory to the study of conflict by exploring the relationship between power and promotion vs. prevention orientation. After considering the earlier work of Keltner, Gruenfeld & Anderson (2003) that established the considerable effect that power has on approach and avoidance behaviors, the present research shows that this link also applies to regulatory focus. In this study, participants had their sense of power experimentally manipulated by a set of vignettes and then answered follow-up questions to determine what effect this had on their regulatory focus orientation. Results indicated that high power is associated with a promotion focus, while low power, a prevention focus. The implication of these findings were discussed and were integrated with the work of Cesario, Higgins & Scholer (2008) on regulatory fit and persuasion to create a novel strategy for conflict resolution.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/369388
- Subject Headings
- Conflict management, Conflict (Psychology), Attribution (Social psychology), Power (Social sciences), Self, Social aspects
- Format
- Document (PDF)
- Title
- A pattern-driven process for secure service-oriented applications.
- Creator
- Delessy, Nelly A., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
During the last few years, Service-Oriented Architecture (SOA) has been considered to be the new phase in the evolution of distributed enterprise applications. Even though there is a common acceptance of this concept, a real problem hinders the widespread use of SOA : A methodology to design and build secure service-oriented applications is needed. In this dissertation, we design a novel process to secure service-oriented applications. Our contribution is original not only because it applies...
Show moreDuring the last few years, Service-Oriented Architecture (SOA) has been considered to be the new phase in the evolution of distributed enterprise applications. Even though there is a common acceptance of this concept, a real problem hinders the widespread use of SOA : A methodology to design and build secure service-oriented applications is needed. In this dissertation, we design a novel process to secure service-oriented applications. Our contribution is original not only because it applies the MDA approach to the design of service-oriented applications but also because it allows their securing by dynamically applying security patterns throughout the whole process. Security patterns capture security knowledge and describe security mechanisms. In our process, we present a structured map of security patterns for SOA and web services and its corresponding catalog. At the different steps of a software lifecycle, the architect or designer needs to make some security decisions., An approach using a decision tree made of security pattern nodes is proposed to help making these choices. We show how to extract a decision tree from our map of security patterns. Model-Driven Architecture (MDA) is an approach which promotes the systematic use of models during a system's development lifecycle. In the dissertation we describe a chain of transformations necessary to obtain secure models of the service-oriented application. A main benefit of this process is that it decouples the application domain expertise from the security expertise that are both needed to build a secure application. Security knowledge is captured by pre-defined security patterns, their selection is rendered easier by using the decision trees and their application can be automated. A consequence is that the inclusion of security during the software development process becomes more convenient for the architects/designers., A second benefit is that the insertion of security is semi-automated and traceable. Thus, the process is flexible and can easily adapt to changing requirements. Given that SOA was developed in order to provide enterprises with modular, reusable and adaptable architectures, but that security was the principal factor that hindered its use, we believe that our process can act as an enabler for service-oriented applications.
Show less - Date Issued
- 2008
- PURL
- http://purl.flvc.org/FAU/58003
- Subject Headings
- Computer network architectures, Web servers, Management, Software engineering, Expert systems (Computer science)
- Format
- Document (PDF)
- Title
- An efficient and scalable core allocation strategy for multicore systems.
- Creator
- Rani, Manira S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Multiple threads can run concurrently on multiple cores in a multicore system and improve performance/power ratio. However, effective core allocation in multicore and manycore systems is very challenging. In this thesis, we propose an effective and scalable core allocation strategy for multicore systems to achieve optimal core utilization by reducing both internal and external fragmentations. Our proposed strategy helps evenly spreading the servicing cores on the chip to facilitate better...
Show moreMultiple threads can run concurrently on multiple cores in a multicore system and improve performance/power ratio. However, effective core allocation in multicore and manycore systems is very challenging. In this thesis, we propose an effective and scalable core allocation strategy for multicore systems to achieve optimal core utilization by reducing both internal and external fragmentations. Our proposed strategy helps evenly spreading the servicing cores on the chip to facilitate better heat dissipation. We introduce a multi-stage power management scheme to reduce the total power consumption by managing the power states of the cores. We simulate three multicore systems, with 16, 32, and 64 cores, respectively, using synthetic workload. Experimental results show that our proposed strategy performs better than Square-shaped, Rectangle-shaped, L-Shaped, and Hybrid (contiguous and non-contiguous) schemes in multicore systems in terms of fragmentation and completion time. Among these strategies, our strategy provides a better heat dissipation mechanism.
Show less - Date Issued
- 2011
- PURL
- http://purl.flvc.org/FAU/3172698
- Subject Headings
- Modularity (Engineering), Multicasting (Computer networks), Convergence (Telecommunication), Computer architecture, Memory management (Computer science), Cache memory
- Format
- Document (PDF)
- Title
- A Comparison of Model Checking Tools for Service Oriented Architectures.
- Creator
- Venkat, Raghava, Khoshgoftaar, Taghi M., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Recently most of the research pertaining to Service-Oriented Architecture (SOA) is based on web services and how secure they are in terms of efficiency and effectiveness. This requires validation, verification, and evaluation of web services. Verification and validation should be collaborative when web services from different vendors are integrated together to carry out a coherent task. For this purpose, novel model checking technologies have been devised and applied to web services. "Model...
Show moreRecently most of the research pertaining to Service-Oriented Architecture (SOA) is based on web services and how secure they are in terms of efficiency and effectiveness. This requires validation, verification, and evaluation of web services. Verification and validation should be collaborative when web services from different vendors are integrated together to carry out a coherent task. For this purpose, novel model checking technologies have been devised and applied to web services. "Model Checking" is a promising technique for verification and validation of software systems. WS-BPEL (Business Process Execution Language for Web Services) is an emerging standard language to describe web service composition behavior. The advanced features of BPEL such as concurrency and hierarchy make it challenging to verify BPEL models. Based on all such factors my thesis surveys a few important technologies (tools) for model checking and comparing each of them based on their "functional" and "non-functional" properties. The comparison is based on three case studies (first being the small case, second medium and the third one a large case) where we construct synthetic web service compositions for each case (as there are not many publicly available compositions [1]). The first case study is "Enhanced LoanApproval Process" and is considered a small case. The second is "Enhanced Purchase Order Process" which is of medium size and the third, and largest is based on a scientific workflow pattern, called the "Service Oriented Architecture Implementing BOINC Workflow" based on BOINC (Berkeley Open Infrastructure Network Computing) architecture.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012565
- Subject Headings
- Computer network architectures, Expert systems (Computer science), Software engineering, Web servers--Management
- Format
- Document (PDF)
- Title
- An object-oriented model for a manufacturing resource planning system.
- Creator
- Kastritis, Karen Mary., Florida Atlantic University, Han, Chingping (Jim), Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Ocean and Mechanical Engineering
- Abstract/Description
-
Manufacturing Resource Planning systems are functionally complex systems. In providing effective resource management tools, they support the integration of a wide variety of complex functions. These systems also undergo frequent changes as business needs change. For these reasons, analysis techniques which provide methods to create clear, flexible systems must be sought. Object oriented analysis is such a technique. This thesis presents the development of an object oriented model for a...
Show moreManufacturing Resource Planning systems are functionally complex systems. In providing effective resource management tools, they support the integration of a wide variety of complex functions. These systems also undergo frequent changes as business needs change. For these reasons, analysis techniques which provide methods to create clear, flexible systems must be sought. Object oriented analysis is such a technique. This thesis presents the development of an object oriented model for a Manufacturing Resource Planning system (MRPII). It will be shown that the use of objects and object oriented techniques to model complex systems such as MRPII results in system models which are more easily understood and more flexible to change than other more conventional representations. Future research may include the formal design and implementation of the model. The flexibility of the implemented system could then be compared to the level of flexibility of a non-object based system.
Show less - Date Issued
- 1996
- PURL
- http://purl.flvc.org/fcla/dt/15288
- Subject Headings
- Manufacturing processes, Manufacturing resource planning, Production management--Data processing, Object-oriented programming (Computer science)
- Format
- Document (PDF)
- Title
- Modeling and analysis of security.
- Creator
- Ajaj, Ola, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Cloud Computing is a new computing model consists of a large pool of hardware and software resources on remote datacenters that are accessed through the Internet. Cloud Computing faces significant obstacles to its acceptance, such as security, virtualization, and lack of standardization. For Cloud standards, there is a long debate about their role, and more demands for Cloud standards are put on the table. The Cloud standardization landscape is so ambiguous. To model and analyze security...
Show moreCloud Computing is a new computing model consists of a large pool of hardware and software resources on remote datacenters that are accessed through the Internet. Cloud Computing faces significant obstacles to its acceptance, such as security, virtualization, and lack of standardization. For Cloud standards, there is a long debate about their role, and more demands for Cloud standards are put on the table. The Cloud standardization landscape is so ambiguous. To model and analyze security standards for Cloud Computing and web services, we have surveyed Cloud standards focusing more on the standards for security, and we classified them by groups of interests. Cloud Computing leverages a number of technologies such as: Web 2.0, virtualization, and Service Oriented Architecture (SOA). SOA uses web services to facilitate the creation of SOA systems by adopting different technologies despite their differences in formats and protocols. Several committees such as W3C and OASIS are developing standards for web services; their standards are rather complex and verbose. We have expressed web services security standards as patterns to make it easy for designers and users to understand their key points. We have written two patterns for two web services standards; WS-Secure Conversation, and WS-Federation. This completed an earlier work we have done on web services standards. We showed relationships between web services security standards and used them to solve major Cloud security issues, such as, authorization and access control, trust, and identity management. Close to web services, we investigated Business Process Execution Language (BPEL), and we addressed security considerations in BPEL and how to enforce them. To see how Cloud vendors look at web services standards, we took Amazon Web Services (AWS) as a case-study. By reviewing AWS documentations, web services security standards are barely mentioned. We highlighted some areas where web services security standards could solve some AWS limitations, and improve AWS security process. Finally, we studied the security guidance of two major Cloud-developing organizations, CSA and NIST. Both missed the quality of attributes offered by web services security standards. We expanded their work and added benefits of adopting web services security standards in securing the Cloud.
Show less - Date Issued
- 2013
- PURL
- http://purl.flvc.org/fau/fd/FA0004001
- Subject Headings
- Cloud Computing, Computational grids (Computer systems), Computer network architectures, Expert systems (Computer science), Web services -- Management
- Format
- Document (PDF)
- Title
- The future will be better tomorrow: a novel of apocalyptic sarcasm.
- Creator
- Irving, Christopher J., Bucak, Ayse Papatya, Florida Atlantic University, Dorothy F. Schmidt College of Arts and Letters, Department of English
- Abstract/Description
-
The Future Will Be Better Tomorrow is a satirical post-apocalyptic novel that examines the personal and social ironies that occur in a society that is unbalanced by an unexplained apocalyptic event. Working with a combination of dark humor and the terrifying realities of an apocalyptic event – in this case: a blackout – the novel aims to challenge the machinery established by this particular subset of the science fiction genre.
- Date Issued
- 2014
- PURL
- http://purl.flvc.org/fau/fd/FA00004124, http://purl.flvc.org/fau/fd/FA00004124
- Subject Headings
- Computer science., Computer communication systems., Data structures (Computer science)., Database management., Information storage and retrieval., Artificial intelligence., Computer Science., Data Structures, Cryptology and Information Theory., Database Management., Information Storage and Retrieval.
- Format
- Document (PDF)
- Title
- Animalia.
- Creator
- Parham, Benjamin Hill, Furman, Andrew, Florida Atlantic University, Dorothy F. Schmidt College of Arts and Letters, Department of English
- Abstract/Description
-
The novel Animalia is the representation of not just human relationships, but also, of human beings’ relationships to other animals. While the story revolves around a family, the narrative as a whole is meant to bring the reader into a microcosmic ecosystem. Essentially, I am examining an ecosystem. An ecosystem, not in the traditional sense, but an ecosystem nonetheless, because the narrative is a study of how varying species of heterotrophs interact with one another for both physical and...
Show moreThe novel Animalia is the representation of not just human relationships, but also, of human beings’ relationships to other animals. While the story revolves around a family, the narrative as a whole is meant to bring the reader into a microcosmic ecosystem. Essentially, I am examining an ecosystem. An ecosystem, not in the traditional sense, but an ecosystem nonetheless, because the narrative is a study of how varying species of heterotrophs interact with one another for both physical and emotional sustenance. Russell Water’s story is paramount, but the animals’ affect on one another is what lies below the peak and forms the mountain (an unintentional Hemingway reference). “It has often been observed that an object in a story does not derive its density of existence from the number and length of descriptions devoted to it, but from the complexity of its connections with the different characters” (Sartre 1210). Essentially, through complex and multiple connections between the human species and other species within Kingdom Animalia, I am attempting to develop an “ecosystem” that allows for narrative progression and the interconnection of relationships and thematic elements which range from the capitalistic class system to natural selection.
Show less - Date Issued
- 2014
- PURL
- http://purl.flvc.org/fau/fd/FA00004147, http://purl.flvc.org/fau/fd/FA00004147
- Subject Headings
- Computer science., Computer communication systems., User interfaces (Computer systems)., Application software., Computers and civilization., Computers., Law and legislation., Management information systems., Computer Science., Computers and Society.
- Format
- Document (PDF)
- Title
- Effect of Electronic Water Treatment System on Calcium Carbonate Scaling.
- Creator
- Shaha, Bishow Nath, Meeroff, Daniel E., Florida Atlantic University, College of Engineering and Computer Science, Department of Civil, Environmental and Geomatics Engineering
- Abstract/Description
-
Calcium carbonate precipitation and formation of clog particles inside the leachate collection pipe can cause catastrophic failures in landfill operation. This study focuses on quantifying the effectiveness of electronic scale control to reduce the clog formation within the pipe network. A field scale model (40ft × 20ft) was constructed, featuring side-by-side flow of electronically treated and untreated composite leachate. Data obtained in the first phase of this study indicate that...
Show moreCalcium carbonate precipitation and formation of clog particles inside the leachate collection pipe can cause catastrophic failures in landfill operation. This study focuses on quantifying the effectiveness of electronic scale control to reduce the clog formation within the pipe network. A field scale model (40ft × 20ft) was constructed, featuring side-by-side flow of electronically treated and untreated composite leachate. Data obtained in the first phase of this study indicate that electronic scale control system does not have any statistically significant effect on water quality parameters. The second phase of this study identified calcite (CaCO3) to be the predominant phase present in the precipitates using XRD/XRF diffraction pattern analyzed through a search match calculation program (MATCH! Version 3.2.0) which concur with the previous studies. Furthermore, Rietveld refinement using FullProf Suite confirms that there were no differences between the treated and untreated precipitate based on the phases identified in the respective samples.
Show less - Date Issued
- 2016
- PURL
- http://purl.flvc.org/fau/fd/FA00004706, http://purl.flvc.org/fau/fd/FA00004706
- Subject Headings
- Calcium carbonate, Engineered barrier systems (Waste disposal), Environmental engineering, Green technology, Incrustations, Materials science, Water -- Hardness, Water quality management
- Format
- Document (PDF)
- Title
- Progress towards push button verification for business process execution language artifacts.
- Creator
- Vargas, Augusto., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Web Service Business Process Execution Language (BPEL) has become a standard language in the world of Service Oriented Architecture (SOA) for specifying interactions between internet services. This standard frees developers from low-level concerns involving platform, implementation, and versioning. These freedoms risk development of less robust artifacts that may even become part of a mission-critical system. Model checking a BPEL artifact for correctness with respect to temporal logic...
Show moreWeb Service Business Process Execution Language (BPEL) has become a standard language in the world of Service Oriented Architecture (SOA) for specifying interactions between internet services. This standard frees developers from low-level concerns involving platform, implementation, and versioning. These freedoms risk development of less robust artifacts that may even become part of a mission-critical system. Model checking a BPEL artifact for correctness with respect to temporal logic properties is computationally complex, since it requires enumerating all communication and synchronization amongst various services with itself. This entails modeling BPEL features such as concurrency, hierarchy, interleaving, and non-deterministic choice. The thesis will provide rules and procedures for translating these features to a veriable model written in Promela. We will use these rules to build a program which automates the translation process, bringing us one step closer to push button verification. Finally, two BPEL artifacts will be translated, manually edited, verified, and analyzed.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/369386
- Subject Headings
- Electronic commerce, Computer programs, Computer network architectures, Expert systems (Computer science), Web servers, Management, Computer systems, Verification
- Format
- Document (PDF)