Browsing Dissertations & Theses by Title
Now showing items 489-508 of 596
-
ROBUST NOISE-BASED ATTACKS AGAINST AUDIO EVENT DETECTION SYSTEMS
(2022-04-14)The massive advances on the field of deep neural networks in the 2000 and 2010 decades led to an overwhelming adoption of these algorithms on all sorts of domains and applications. Under this widespread adoption scenario, ... -
Routing And Channel Assignment Schemes For Interference Avoidance In Wireless Mesh Networks
(Computer Science & Engineering, 2012-07-25)This dissertation presents efficient routing and channel assignment schemes for interference avoidance in wireless mesh networks (WMNs). The most significant contributions of this dissertation are the development and ... -
Run-time Compilation And Dynamic Memory Use Analysis For GPUs
(Computer Science & Engineering, 2014-09-17)Powerful Graphics Processing Units (commonly called GPUs) are proliferatingrapidly and are becoming a viable choice for a wide range of user applications. Forperforming computationally intensive tasks on these processors, ... -
Runtime Optimization And Load Shedding In MavStream: Design And Implementation
(Computer Science & Engineering, 2007-08-23)In data stream processing systems Quality of Service (or QoS) is extremely important. The system should try its best to meet the QoS requirements specified by a user. On account of this difference, unlike in a database ... -
SCALABLE CONVERSION OF TEXTUAL UNSTRUCTURED DATA TO NoSQL GRAPH REPRESENTATION USING BERKELEY DB KEY-VALUE STORE FOR EFFICIENT QUERYING
(2017-12-13)Graph database is a popular choice for representing data with relationships. It facilitates easy modifications to the relational information without the need for structural redefinition, as in case of relational databases. ... -
Scalable Parallel Processing Of Multi-objective Optimized DNA Sequence Assembly
(Computer Science & Engineering, 2012-04-11)Bioinformatics is an emerging branch of science where issues pertaining to molecular biology are evaluated and resolved by leveraging the techniques and algorithms devised in the field of computer science. Most of these ... -
Searching and Classifying Mobile Application Screenshots
(2016-12-16)Searching for a particular application layout image is a challenging task. No search provider gives an adequate method to filter the query results to the look of a mobile application. Searching for a particular style of ... -
Searching And Ranking Xml Data In A Distributed Environment
(Computer Science & Engineering, 2009-09-16)Due to the increasing number of independent data providers on the web, there is a growing number of web applications that require searching and querying data sources distributed at different locations over the internet. ... -
Secure Data Aggregation In Wireless Sensor Networks
(Computer Science & Engineering, 2008-08-08)Recent advances in micro-electro-mechanical systems (MEMS) technology and wireless communications technologies have enabled the deployment of wireless sensor networks (WSNs) in a plethora of applications, ranging widely ... -
SEES - An Adaptive Multimodal User Interface For The Visually Impaired
(Computer Science & Engineering, 2007-08-23)The enormous amount of electronic data present today can be a daunting task to access and process for a regular person, let alone someone with a disability. The World Wide Web and Electronic Mail have transformed the way ... -
Selective Cross Correlation In Passive Timing Analysis Attacks Against Low-latency Mixes
(Computer Science & Engineering, 2010-07-19)A mix is a communication proxy that hides the relationship between incoming and outgoing messages. Routing traffic through a path of mixes is a powerful tool for providing privacy. When mixes are used for interactive ... -
Selective Grouping Algorithm For Low Latency Anonymous Systems
(Computer Science & Engineering, 2013-03-20)Low latency anonymous communications are prone to timing analysis attacks. It is a technique by which the adversary can de-anonymize the user by correlating packet timing patterns. A recent proposal to stop these attacks ... -
Semi Automatic Hand Pose Annotation using a Single Depth Camera
(2022-08-05)This thesis investigates the problem of 3D hand pose annotation using a single depth camera. While hand pose annotations are critically important for training deep neural networks, creating such reliable training data is ... -
SEMI-AUTOMATIC HAND POSE ESTIMATION USING A SINGLE DEPTH CAMERA
(2020-11-30)This paper addresses the problem of 3D hand pose annotations using a single depth camera. Although hand pose estimation methods rely critically on accurate 3D training data, creating such reliable training data is challenging ... -
SEMI-SUPERVISED DEEP LEARNING WITH APPLICATIONS IN SURGICAL VIDEO ANALYSIS AND BIOINFORMATICS
(2020-05-14)In the current era of big data, deep learning has been the state-of-the-art model for various applications. Image-based applications such as image classification, object detection, image segmentation, benefit most from ... -
Semi-supervised Learning using Triple-Siamese Network
(2020-06-04)Missing data problem is inevitable in mostly all research areas including Artificial Intelligence, Machine Learning and Computer Vision where we have modicum knowledge about the complete dataset. One of the key reasons of ... -
Sequence Alignment Editor - A New Tool To Assist With Inferring Phylogenetic And Functional Relationships In Biological Data
(Computer Science & Engineering, 2007-09-17)Biologists study evolution, discover functional and structural information in genomic or protein data through the extensive use of sequence alignments. It is very difficult to manually align long regions, so development ... -
Service Discovery By Automated Structural And Semantic Matching
(Computer Science & Engineering, 2007-08-23)Pervasive computing systems need to locate and use services dynamically. Current models of service location and interaction rely on a fixed contract, or service description, located by name and/or a combination of keywords. ... -
Shaping And Maintenance Of Low-latency Anonymity Systems
(Computer Science & Engineering, 2013-03-20)Surveillance of users on the Internet is growing. This makes it increasingly important to protect users' identity when they communicate online, especially for users like journalists, whistleblowers, and military officials. ... -
Shaping Network Topology For Privacy And Performance
(Computer Science & Engineering, 2013-03-20)Anonymity systems provide privacy for Internet communication and are becoming popular. Unfortunately, users experience slow Internet connection through existing systems because paths used to route traffic are selected ...