Now showing items 1-20 of 256

    • Wang, Weichen (2015-03-23)
      Department: Computer Science
      Cyber-security for Internet-connected applications has become a critical area of research. Applications are continually under attack and finding ways to better defend them is a critical concern. This thesis explores a newer ...
    • Williams, Jonathon (2011-12-09)
      Department: Computer Science
      Mobile devices, such as smartphones, are becoming increasingly common in everyday life, and enable the development of dynamic, data driven applications which weren’t possible prior to the advent of the smartphone. This ...
    • Yan, Wei (2015-07-23)
      Department: Computer Science
      In the era of “Big Data”, a variety of data processing and analysis frameworks (such as MapReduce/Hadoop, Dremel/Impala, and Storm) have emerged as a solution to support large-scale data processing and analysis tasks. The ...
    • Hei, Songtao (2015-04-08)
      Department: Computer Science
      A challenge for companies hiring software engineers is the large number of candidate profiles on LinkedIn, Monster.com, and other job websites and the inability to easily filter top candidates from these lists. In this ...
    • Stoebner, Zachary Andrew; 0000-0001-6947-6638 (2022-07-18)
      Department: Computer Science
      Image segmentation has been increasingly applied in medical settings as recent developments have skyrocketed the potential applications of deep learning. Urology, specifically, is one field of medicine that is primed for ...
    • Nuttall, Brandon O'Dell (2006-03-02)
      Department: Computer Science
      The fact that all software has defects is one of the few things that are true across all software projects. Traditionally, few proprietary software project managers would risk cultivating a reputation for producing ``buggy' ...
    • Koul, Kastur; 0009-0007-5598-9505 (2023-03-27)
      Department: Computer Science
      While it is advisable to be cautious in the face of new technological developments, aggressive negativity towards a piece of technology can cause fear and distrust in the technology. This is the case for deepfakes, which ...
    • Bonnin Cadogan, Jose M (2011-08-01)
      Department: Computer Science
      This thesis introduces graph class C, a recognition algorithm for graphs in the class, and shows that some problems are NP-complete on the class. Class C is a generalization of chordal graphs. Informally, a graph is in ...
    • Saxena, Tripti (2012-08-13)
      Department: Computer Science
      As the complexity of software systems rises, designers are often faced with the challenge of identifying potential design solutions from a large space of possible design alternatives before the actual implementation. Design ...
    • Darrah, Timothy; 0000-0002-4696-2905 (2023-10-16)
      Department: Computer Science
      The use of autonomous systems such as Unmanned Aerial Vehicles (UAVs) in civilian and military operations has drastically increased over the last 10 years, requiring significant advances in health management technologies ...
    • Alsoubai, Alsoubai T; 0000-0003-1569-9662 (2024-03-08)
      Department: Computer Science
      Computational risk detection holds promise for shielding particularly vulnerable groups from online harm. A thorough literature review on real-time computational risk detection methods revealed that most research defined ...
    • Irimia, Andrei (2004-08-02)
      Department: Computer Science
      The study of bioelectric and biomagnetic activity in the human gastrointestinal (GI) tract is of great interest in clinical research due to the proven possibility to detect pathological conditions thereof from electric and ...
    • Liu, Lian (2016-07-22)
      Department: Computer Science
      The popularity of online social networks has grown at an exponential scale since they connect people all over the world enabling them to remain in touch with each other despite the geographical distance among them. These ...
    • Stein, Gordon; 0000-0002-1422-2814 (2024-03-22)
      Department: Computer Science
      Despite its potential for STEM education, educational robotics remains out of reach for many classrooms. Physical robots have an upfront purchase cost, maintenance requirements, storage space, and many more costs and ...
    • Stein, Gordon; 0000-0002-1422-2814 (2024-03-22)
      Department: Computer Science
      Despite its potential for STEM education, educational robotics remains out of reach for many classrooms. Physical robots have an upfront purchase cost, maintenance requirements, storage space, and many more costs and ...
    • Stein, Gordon; 0000-0002-1422-2814 (2024-03-22)
      Department: Computer Science
      Despite its potential for STEM education, educational robotics remains out of reach for many classrooms. Physical robots have an upfront purchase cost, maintenance requirements, storage space, and many more costs and ...
    • Stein, Gordon; 0000-0002-1422-2814 (2024-03-22)
      Department: Computer Science
      Despite its potential for STEM education, educational robotics remains out of reach for many classrooms. Physical robots have an upfront purchase cost, maintenance requirements, storage space, and many more costs and ...
    • Kenigsberg, Matthew; 0000-0003-1621-6343 (2021-03-29)
      Department: Computer Science
      Current solutions for software deployment in cloud computing and high performance computing (HPC) incur a significant amount of storage overhead in order to allow scalability while guaranteeing reproducibility. Containerization, ...
    • Wu, Dili (2013-04-17)
      Department: Computer Science
      As a parallel data processing framework, MapReduce has been proved to be one of the most popular topics in the age of Cloud Computing since it was firstly proposed by Google. Despite its advantages such as scalability, ...
    • Daigle, Matthew John (2008-04-21)
      Department: Computer Science
      Fault diagnosis is crucial for ensuring the safe operation of complex engineering systems. Many present-day systems combine physical and computational processes, and are best modeled as hybrid systems, where the dynamic ...