Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
In wireless LANs, a packet may be received correctly for the most part but contains only a few errors. Such packets are usually referred to as partial packets. The current 802.11 standard will retransmit the entire packet even if the...
The objective of my doctoral dissertation research is to formulate, implement, and validate metrics and techniques towards perceiving some of the influences on software development, predicting the impact of user initiated changes on a...
Speech-to-text technologies continues to become more accessible and more accurate. But while automated personal assistants and transcription software is improving, it still falters in many cases that involve domain-specific terminology, ...
Pseudorandom number generators (PRNGs) are an essential tool in many areas, including simulation studies of stochastic processes, modeling, randomized algorithms, and games. The performance of any PRNGs depends on the quality of the...
Many of today's underwater vehicles have a limited set of pre-planned behaviors that are of varying utility. This is due, in part, to very low underwater communication rates and difficulties observing the vehicle's underwater behavior...
In many multi-user cryptographic applications (e.g., electronic voting, digital lotteries, e-cash application, anonymous access to some resources, etc.), anonymity pops up as one of the main security objectives. Protecting private...
Soft Computing is the fusion of methodologies that were designed to model and enable solutions to real world problems, which are not modeled, or too difficult to model, mathematically. These problems are typically associated with fuzzy, ...
Biological databases are growing at an exponential rate. Designing algorithms to deal with the inherent redundancy in these databases which can cope with the overwhelming amount of data returned from similarity searches is an active area...
The amount of data stored on smart phones and other mobile devices has increased phenomenally over the last decade. As a result there has been a spike in the use of these devices for documenting different scenarios that are encountered...
Chan-Vese is a level set method that simultaneously evolves a level set surface and fits locally constant intensity models for the interior and exterior regions to minimize a Mumford-Shah integral. However, the length-based contour...
Similarity join has been widely studied and used in various scientific and commercial applications. Given two datasets, similarity join finds all pairs of similar objects (one from each input dataset), subject to a distance metric and a...
Within the last decade, commodity Graphics Processing Units (GPUs) specialized for 2D and 3D scene rendering have seen an explosive growth in processing power compared to their general purpose counterpart, the CPU. Currently capable of...
Over the years, the storage substrate of operating systems has evolved with changing storage devices and workloads [2, 6, 7, 8, 12, 15, 18, 26, 29, 33, 34, 35, 39, 41, 42, 44, 47, 48, 54]. Both academia and industry have devoted...
The performance of a content-based image retrieval system depends on the representation of images. As a typical image consists of different objects, an image segmentation is needed for more accurate representations of contents. The first...
Managing the effects of changing requirements remains one of the greatest challenges of enterprise software development. The iterative and incremental model provides an expedient framework for addressing such concerns. This thesis...
Message Passing Interface (MPI) is broadly used in parallel applications. As High Performance Computing (HPC) systems become massively parallel, the efficiency of communication among processes has become more critical. Since the birth of...
Research into routing protocol development for mobile ad hoc networks has been a significant undertaking since the late 1990's. Secure routing protocols for mobile ad hoc networks provide the necessary functionality for proper network...
This thesis introduces in detail how we apply deep neural networks to solve several natural language processing problems, including Word Sense Disambiguation (WSD), word representation and knowledge-base completion. We apply...
Human activity recognition is a technology field that automatically detects a person's movements and actions. The primary objective is identifying an individual's activities through various means such as cameras, motion sensors, and time...
Python Package Index (PyPI) is a repository that hosts all the packages ever developed for the Python community. It hosts thousands of packages from different developers and for the Python community, it is the primary source for...
Since the growth of electronic voting systems in the United States after the year 2000, electronic voting products have received significant scrutiny and examination. Subsequently, studies and reports have identified vulnerabilities as...
Teachers are expected to plan the daily learning environment in the classroom, and incorporate technology effectively in the curriculum and instruction. They need to provide information to parents and educational materials to students in...
This research explores the idea of extracting three-dimensional features from video clips, in order to aid various video analysis and mining tasks. Although video analysis problems are well-established in the literature, the use of three...
Developers often need additional knowledge to complete some programming tasks, and they oftenseek information online to solve the problem at hand. Fortunately, online resources contain a vast amount of information at the developers’...
The research goal of this dissertation is to point the way towards a better understanding for the hidden complexities of knowledge communication and content markup, with a view to cleaner, more principled designs. The following four...
Most algorithms for Group Key distribution were not created with ad hoc networks in mind. In a wired network with a distinct infrastructure, generating a key distribution algorithm is based on a static environment and, therefore, more...
Wireless networks have been widely adopted in homes, offices and public hot spots. Two problems with wireless networks are the limited range and unavoidable packet loss. Much effort has been investigated in these problems, such as packet...
Topology Aggregation is concerned about summarizing a network domain in a concise manner. This thesis deals with topology aggregation for networks with two additive metrics. Summarizing such a network domain is difficult for a number of...
As distance learning becomes increasingly prevalent in higher education in the 21st century, students and educators alike face new challenges to achieving key learning objectives, such as the attainment of critical thinking skills....
Performance modeling and simulation of parallel applications are critical performance analysis techniques in High Performance Computing (HPC). Efficient and accurate performance modeling and simulation can aid the tuning and optimization...
DNA is the fundamental storage for the genetic "blueprints" of all living organisms. It provides the information used to create the functional proteins in an organism. One of the key factors regulating the use of this blueprint is the...
Wireless sensor networks are undoubtedly one of the largest growing types of networks today. Much research has been done to make these networks operate more efficiently including the application of data aggregation. Recently, more...
The study of user-behavior and decision-making dynamics in transportation network are vital in modeling and simulation of user interactions. Different users access transportation network in order to accomplish different activities. Such...
This study is a preliminary exploration of adoption of generative adversarial network (GAN)-derived avatar healthcare providers (HCPs). To our knowledge, GAN-derived avatars as de facto HCPs have not been investigated in relation to user...
Traditionally, if two files are considered identical, they are understood to be byte-by-byte equivalent. However, many files are semantically identical without being byte-to-byte identical. We assert that by using a contextual or...
This thesis is composed of two parts. Part one is on Appearance-Based Classification and Recognition Using Spectral Histogram Representations. We present a unified method for appearance-based applications including texture classification...
The presence of data dependences between statements in a loop iteration space imposes strict constraints on statement order and loop restructuring when preserving program semantics. A compiler determines the safe partial ordering of...
Passwords are critical for security in many different domains such as social networks, emails, encryption of sensitive data and online banking. Human memorable passwords are thus a key element in the security of such systems. It is...
This thesis describes an architectural visualization tool developed to illustrate the instruction flow in a modern processor pipeline simulation. It was designed to aid in better understanding the complexities of a modern pipeline design...
Supercomputers play an essential role in performing computationally intensive tasks in various scientific fields. As supercomputers move toward the next milestone in computing power, exascale computing, interconnection networks become a...
Passwords are still one of the most common means of securing computer systems. Most organizations rely on password authentication systems, and therefore, it is very important for them to enforce their users to have strong passwords. They...
With the maturity of mobile technologies, voice biometrics is becoming increasingly popular as a promising alternative to traditional passwords for user authentication on smartphones. Moreover, with the popularity of voice user interface...
Estimating normals for 3D point clouds and reconstructing a surface interpolating the points are important problems in Computational Geometry and Computer Graphics. Massive point clouds and surfaces with sharp features are active areas...
This thesis presents the efforts made to develop new tools for non-technical law enforcement agents to effectively respond to electronic crimes. We present two tools: one that combats online predators and cyber-stalking; and a second...
This thesis describes the Language Abstraction for Rule-based Knowledge-systems (LARK) Engine. The goal of this engine is to process various expert system rulesets and generate the required semantics for multiple production systems –...
This report shall discuss the threats to information and services in open systems. In it we shall provide an illustration where these threats are confronted, describe the three basic techniques of authentication, and comment on the...
The use of fat-tree topologies is a popular choice for high performance computing systems. Good routing algorithms are crucial to exploiting the high connectivity of the fat-tree topology. My research considers a family of fat-tree...
The rising number of senior citizens is approaching an all time high. With this comes a rising number of common chronic conditions where treatment is costly and time consuming. Frequently these conditions make it unsafe for older adults...
Monte Carlo (MC) linear solvers are fundamentally based on the ability to estimate a matrix-vector product, using a random sampling process. They use the fact that deterministic stationary iterative processes to solve linear systems can...
This thesis describes the support provided in VISTA for finding effective sequences of optimization phases. VISTA is a software tool for a compiler which supports an interactive compilation paradigm. It has long been known that a single...
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.