Browsing Dissertations & Theses by Title
Now showing items 198-217 of 596
-
Enabling Context-aware Applications In Smart Environments
(Computer Science & Engineering, 2010-07-19)Recognizing human activities is an important feature for the development of contextaware applications that are so fundamental to enabling assistive environments. Only once these applications are able to determine the ... -
Enabling Exploratory Mining Over Hidden Databases
Almost all popular websites (such as Amazon, EBay, microblogs such as Twitter, Instagram, collaborative content sites such as IMDB, Yelp etc) are powered internally by large data repositories. We designate them as hidden ... -
ENABLING THIRD PARTY SERVICES OVER DEEP WEB DATABASES AND LOCATION BASED SERVICES
(2018-05-08)Deep web databases are pillars of today’s internet services hidden behind HTML forms and Top-K search interfaces. While Top-K search interfaces provide a good way to retrieve information, it still lacks in addressing the ... -
End-to-end Optimal Algorithms For Traffic Engineering, Failure Detection And Recovery In Connectionless Networks
(Computer Science & Engineering, 2007-08-23)In this thesis we propose a novel scheme to achieve intra-domain Traffic Engineering (TE), Failure Detection and Recovery (FR) in connectionless networks. This scheme addresses rate adaptation, load balancing and stability ... -
END-USER FRAMEWORK FOR ROBOT CONTROL
(2021-05-10)This thesis describes in detail a developed end-user framework for a humanrobot collaborative system for common tasks, such as pick and place. The system is designed for semi-automated pick and place tasks as well as manual ... -
Energy Efficient Routing Structures And Wakeup Schemes For Wireless Sensor Networks
(Computer Science & Engineering, 2009-09-16)Wireless sensor networks, which consist of a large number of sensor nodes and a base station, are used for many applications aimed at collecting information. Each sensor node is equipped with a small amount of battery, ... -
Energy-efficient Connected K-coverage, Duty-cycling, And Geographic Forwarding In Wireless Sensor Networks
(Computer Science & Engineering, 2008-08-08)With the fast advances in inexpensive sensor technology and wireless communications, the design and development of large-scale wireless sensor networks has become cost-effective and viable enough to attract the attention ... -
Energy-efficient Protocols And Systems For Wireless Sensor Networks And Smart Environments
(Computer Science & Engineering, 2013-03-20)In a wireless sensor network, small computing devices, called sensors, sense the surrounding environment and relay the sensed data to a base station over a multi-hop wireless network, eventually processing them en-route. ... -
Enhanced Bioinformatics Data Modeling Concepts And Their Use In Querying And Integration
(Computer Science & Engineering, 2008-09-17)In bioinformatics research, scientists usually face the problems of modeling complex data types and integrating diverse resources. Traditional data models such as EER lack the expressing power to capture many characteristics ... -
Enhanced Targeting In A Haptic User Interface For The Physically Disabled Using A Force Feedback Mouse
(Computer Science & Engineering, 2007-10-08)Although the human computer interface continues to evolve by engaging sight, voice, sound, and touch to manipulate the environment, the marriage between mouse and graphic based operating systems remains one of the primary ... -
Enhancements To The SAM-grid Infrastructure
(Computer Science & Engineering, 2007-08-23)SAM-Grid is a grid computing infrastructure for high energy physics (HEP) experiments in Fermilab. It is composed of data handling, job management and information management components. There are several challenges when ... -
Enhancing Health Tweet Classification: An evaluation of Transformer-based models for Comprehensive Analysis
(2023-05-10)The task of health tweet classification entails identifying whether a given tweet is health-related or not. While existing research in this area has made significant progress in classifying tweets into specific sub-domains ... -
Enhancing JSWAT For Monitor-based Executions
(Computer Science & Engineering, 2008-08-08)Concurrent programs contain more than one thread that executes concurrently to accomplish a particular task. Since the threads in a concurrent program work together to accomplish a common goal, they share the data, code, ... -
Enhancing Personalized Search And Improving Accuracy And Performance For Keyword-based XML Queries
(Computer Science & Engineering, 2010-07-19)This dissertation research focuses on three aspects related to querying of XML data. The three focus areas are: (1) Improving accuracy of XML keyword queries by modeling the contexts of XML elements; (2) Enhancing XML-based ... -
Episodic Task Planning And Learning In Pervasive Environments
(Computer Science & Engineering, 2011-03-03)During planning and control of autonomous robots in a pervasive environment designed to serve people, we will inevitably face the situations of needing to perform multiple complex tasks. Management and optimization of the ... -
Estimation Myopia: Tinkering With Perception In Software Estimation And Placebo Estimation In Edw
(Computer Science & Engineering, 2014-12)The goal of this study is to explore an effective way to provide timely and accurate size estimates for software and for an enterprise data warehouse (EDW). Several research papers attempt to adapt function point (FP) ... -
EStream: An Integration Of Event And Stream Processing
(Computer Science & Engineering, 2007-08-23)Event and stream data processing models have been researched extensively and are utilized in diverse application domains. Advanced applications require both event and stream processing, which is currently not supported. ... -
EukaSimBioSys: A Stochastic Discrete Event-based Simulation Software For In-silico Study Of Insulin Signaling And Metabolism In Cardiac Myocytes
(Computer Science & Engineering, 2008-09-17)The advent of human genome annotation in the early years of third millennium has enabled the scientist to interlink the processes of life at the molecular level. The coincidence of this breakthrough along with advances ... -
Evading Existing Stepping Stone Detection Methods Using Buffering
(Computer Science & Engineering, 2007-08-23)To gain anonymity and complicate their apprehension, attackers launch attacks not from their own systems but from previously compromised systems called stepping stones. An effective way to detect stepping stones is by ... -
EVALUATE THE USE OF FPGA SoC FOR REAL TIME DATA ACQUISITION AND AGGREGATE MICRO-TEXTURE MEASUREMENT USING LASER SENSORS
(2016-08-22)Aggregate texture has been found to play an important role in improving the longevity of highways and pavements. Aggregates with appropriate surface roughness level have an improved bonding with asphalt binder and concrete ...