Now showing items 1-20 of 39

    • A Multi-Level Analysis of Collaborations in Computer Science 

      Divakarmurthy, Pramod (2015-05)
      Working in collaboration is common in today’s highly connected scientific community. By collaborating, researchers can solve challenging multi-disciplinary problems, increase knowledge dissemination as well as productivity. ...
    • Digital Quorum Sensing for Self-Organizing Malware 

      Fioravanti, Mark Edward (2016-12)
      INTRODUCTION: Malware authors present an interesting problem for the security community as they evolve and adapt to overcome network and host defenses. The determined adversary is a special class of malware author who ...
    • Cross-Spectral Biometric Performance Analysis on High-Resolution Face Images 

      Pandian Shanmuganathan, Praveen Kumar (2016-12)
      Biometrics is increasingly being used to authenticate the identity of individuals in critical use case devices like smart phones, laptops, and several other access-control systems in our day-to-day lives. Additionally, ...
    • A Self-Organized Approach For Detecting Communities in Networks 

      Collingsworth, Bennett C (2016-12)
      The community structure of networks reveals hidden information about the whole network structure that cannot be discerned using other topological properties. Yet, the importance of identifying community structure in ...
    • Studies with Dynamic Nuclear Imaging Image Reconstruction Algorithm 

      Chang, Haoran (2016-12)
      Non-negative matrix factorization (NMF) is a useful method for those non-negative multivariate data. In nuclear imaging, NMF, which is also called factor analysis, is used to analyze the 4D image of positron emission ...
    • Proactive Approach for the Prevention of DDoS Attacks in Cloud Computing Environments 

      Alshehry, Badr (2016-12)
      Contemporary security systems attempt to provide protection against distributed denial-of-service (DDoS) attacks; however, they mostly use a variety of computing and hardware resources for load distribution and request ...
    • Soteria: A Persuasive eSecurity Assistant 

      Bhardwaj, Punica (2016-12)
      “…security is only as good as the weakest link, and people are the weakest link in the chain.” – B Schneier, 2002 Humans are often referred to as the “weakest link” in the security chain because of the poor security ...
    • Robotic Arm Tracing Curves Recognized by Camera 

      Findling, Timothy Karl (2016-12)
      Applications such like soldering require robot arms to follow the soldering line as present on a surface. We assume here that the surface to be soldered is remote from the robotic arm, that the soldering is performed via ...
    • Language Relations on Twitter: A Network Science Approach 

      Saha, Priya (2017-04)
      Online social networks (e.g., Twitter and Facebook) play a vital role in the spreading of information in today’s world. Interestingly, the spread of information is enabled by the existence of an underlying connectivity ...
    • A Survey of Impact Analysis Tools for Effective Code Evolution 

      Galbo, Stephanie Perez Day (2017-04)
      Background: Software maintenance and evolution are becoming noticeably more important activities in the software development process, with the growing popularity of Agile/SCRUM and continuous integration. Impact analysis, ...
    • Effects of Virtualization in Database Benchmarking 

      Rathod, Jigarkumar Jayantibhai (2017-05)
      Many applications are being deployed on the cloud because virtualization provides inexpensive virtual machines which are easy to create and use. To perform benchmark in scale, one has to rely on virtualization. Virtualization ...
    • High Fidelity Adaptive Cyber Emulation 

      Mammadov, Samir (2017-05)
      While looking for a high-level adaptive traffic generation tool, we came to realize that no such tool exists that can be used for rapid development while being platform agnostic. Having reviewed a wide array of tools to ...
    • Open Census for Addressing False Identity Attacks in Decentralized Social Networks 

      Qin, Song (2017-05)
      We address the problem of estimating the population of a given area (e.g., a city). Unlike a centralized census where identities are reported to a single principal agency (e.g., U.S. Census Bureau) and are stored on a ...
    • A Reinforcement Learning Approach to Autonomous Speed Control in Robotic Systems 

      Aghli, Nima (2017-05)
      Model-free reinforcement learning techniques have been successfully used in diverse robotic applications. In this thesis, we Implement the Q-learning algorithm as one of the most used model-free algorithms to find an ...
    • The Growth, Structure, and Dynamics of Crime in Cities 

      Da Cunha Oliveira Junior, Marcos Antonio (2017-12)
      Crime is ubiquitous in cities but lacks a statistical characterization that could lead to uncovering its underlying mechanisms. Cities are, however, in a constant process of organization making difficult to analyze urban ...
    • High Volume Test Automation With Yeager 

      Doran, Casey Daniel (2017-12)
      High Volume Automated Testing is a powerful family of software testing techniques which enable a variety of testing goals, including the discovery of hard-to-reproduce bugs, which can enable new levels of quality assurance ...
    • Mining Location and User Information from Users' Trajectories 

      Tomasini, Marcello (2017-12)
      The understanding of human mobility is integral to the advancement of many fields including public health, city planning, economic forecasting, and it attracts the interest of researchers from a broad number of fields. ...
    • A Mixed-Reality Approach for Cyber-situation Awareness 

      Joshi, Tapas Dipakkumar (2017-12)
      As the proliferation and adoption of smart devices increase, there is an unprecedented amount of data being released into the network every second. Computer networks are the carriers for the movement of this ever generating ...
    • A Context-Free Method of Visualizing Streaming Object Data for the Purpose of Identifying Known Events: an Implementation and Analysis 

      Carver, Quinn Gregory (2017-12)
      This year, every second, five gigabytes of new data will be streamed to storage and yet less than half a percent of all this data will ever be analyzed. Much of this muted data is high-variety object data, unnoticed in ...
    • Decision Support for Shared Responsibility of Cloud Security Metrics 

      Al Moteri, Moteeb Aieed (2017-12)
      With the rapid growth of cloud computing and the increasing importance of measuring the security of cloud systems, more attention has been focused on the need for security metrics that are specific to cloud computing. ...