Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
My thesis is that a realistic image of a human face can be generated using a computational simulation of light transport. I demonstrate this thesis by acquiring the three-dimensional geometry of a face, measuring the reflectance function...
This thesis presents the Sampling-Based Model Predictive Control (SBMPC) Algorithm, a novel sampling-based planning algorithm. This algorithm was originally designed for dynamic system which are described by a set of system states and a...
Protein is a linear chain of amino acids bonded by peptide bonds. Protein plays a vital role in almost every biological process. For most proteins, they need to fold into a stable 3D structure (native state) in order to function properly...
Near point problems are widely used in computational geometry as well as a variety of other scientific fields. This work examines four common near point problems and presents original algorithms that solve them. Planar nearest neighbor...
Methods from shape analysis are used in morphometry, which is the quantitative analysis of macroscopic anatomical features. We assume that anatomy is flexible, and this brings us to the first problem of resolving how ``shape'' should be...
DNA is the fundamental storage for the genetic "blueprints" of all living organisms. It provides the information used to create the functional proteins in an organism. One of the key factors regulating the use of this blueprint is the...
Estimating normals for 3D point clouds and reconstructing a surface interpolating the points are important problems in Computational Geometry and Computer Graphics. Massive point clouds and surfaces with sharp features are active areas...
Bayesian inference with Bayesian networks is a #P-complete problem in general. Exact Bayesian inference is feasible in practice only on small-scale Bayesian networks or networks that are dramatically simplified, such as with naive Bayes...
Autonomous ground vehicles (AGVs) are commonly used for search and rescue, military and forestry purposes. To safely and efficiently perform missions in these environments the AGV must adapt its driving and control strategies based on...
Three dimensional scalar heightfields, also known as volumetric datasets, abound in science and medicine. Viewing the isosurfaces, or level sets, is one of the two main ways to display these datasets, the other being volume visualization...
This thesis presents and evaluates a new algorithm which generates random numbers. The algorithm uses a Number Theory class of numbers called Normal Numbers. Normal Numbers consist of an infinite sequence of digits which are uniformly...
This thesis describes the implementation of a fast, dynamic, approximate, nearest-neighbor search algorithm that works well in fixed dimensions (d The implementation is competitive with the best approximate nearest neighbor searching...
At its heart, a password cracking attack is just a guessing attack. An attacker makes guesses about a user's password until they guess correctly or they give up. While the defender may limit the number of guesses an attacker is allowed, ...
Intrusion Detection has become an essential component of security mechanisms for information systems. Traditional Intrusion Detection Systems generally apply a single detection model and data source. Thus, they tend to suffer from large...
This dissertation presents contributions to several problems relevant to cyber physical system (CPS) vulnerability research. Cyber physical systems encompass any computational systems that interact with physical processes, encompassing...
Collaborative filtering is a class of methods that analyze past user feedback to find relationship among users and items, or to predict a relationship between a user and a new item. Predicting user preferences is an important problem...
In this dissertation, I present a table-driven streaming XML (Extensible Markup Language) parsing and searching technique, called TDX, and investigate related techniques. TDX expedites XML parsing, validation and searching by pre...
No-Reference Natural Image/Video Quality Assessment of Noisy, Blurry, or Compressed Images/Videos Based on Hybrid Curvelet, Wavelet and Cosine Transforms
In this thesis, we first propose a new Image Quality Assessment (IQA) method based on a hybrid of curvelet, wavelet, and cosine transforms, called the Hybrid No-reference (HNR) model. From the properties of natural scene statistics, the...
Recent advances in multicasting present new opportunities for improving communication performance for clusters of workstations. The standard IP multicast, however, only supports unreliable multicast, which is diffcult to use for building...
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.