Browsing MS Theses - DO NOT EDIT by Title
Now showing items 225-244 of 355
-
MavVStream: Expressing and Processing Situations on Videos Using the Stream Processing Paradigm
(2018-05-04)Image and Video Analysis (IVA) has been ongoing for several decades and has come up with impressive techniques for object identification, re-identification, activity detection etc. A large number of techniques have been ... -
Maximizing Code Coverage in Database Applications
(2017-12-07)A database application takes input as user-defined queries and determines the program logic to be executed based on the results returned by the queries. A change in existing application or a new application is expected ... -
Measurements Of A Latency-biased Expander Topology In The Tor Anonymity System
(Computer Science & Engineering, 2013-03-20)Anonymous communication systems protect the privacy of their users by hiding who is communicating with whom. With the widespread use of the Internet, anonymity systems are all the more essential to support applications ... -
Measuring Named Entity Similarity Through Wikipedia Category Hierarchies
(Computer Science & Engineering, 2011-03-03)Identifying the semantic similarity between named entities has many applications in NLP, including information extraction and retrieval, word sense disambiguation, text summarization and type classification. Similarity ... -
Medical Decision Support System Using Augmentable Guideline Engine
(Computer Science & Engineering, 2007-08-23)Increasing life expectancy accompanied by existing growth of wireless infrastructure and ubiquitous computing technologies has given healthcare providers access to vital information within their healthcare networks. Medical ... -
A Method To Evade Keyword Based Censorship
(Computer Science & Engineering, 2014-12)Many countries block the content of web pages which are deemed against the morals, religious rules or policies set by government or organization. Countries like China block the post which is against their government interest. ... -
Microblog Analyzer Aggregate Estimation Over A Micro Blog Platform
Microblogging is a new mode of communication in which users can share their current status in brief and agile way in the form of text, image, video etc over smart phones, email or web. Recently, Microblogs such as Twitter, ... -
Mimic: An Active Covert Channel That Evades Regularity-based Detection
(Computer Science & Engineering, 2010-07-19)A covert timing channel is a hidden communication channel based on network timing that an attacker can use to sneak secrets out of a secure system. Active covert channels, in which the attacker uses a program to automatically ... -
MLN-Subdue: Decoupling Approach-Based Substructure Discovery In Multilayer Networks (MLNs)
(2020-06-03)Substructure discovery is well-researched for single graphs (both simple and attribute) as it is an important component of knowledge discovery for many applications such as finding the core substructure in a protein, ... -
Modeling An Intelligent Intruder In A Region Monitored By A Wireless Sensor Network
(Computer Science & Engineering, 2014-03-12)Monitoring to detect unauthorized border crossing is very important for protecting national security. To accomplish this by continuous physical monitoring by border patrol agents is impractical. Networks of low-cost wireless ... -
Modeling And Simulation Of A General Motors Conveyor System Using A Custom Decision Optimizer
(Computer Science & Engineering, 2009-09-16)The temporal behavior of conveyor systems can be modeled using discrete event (DE) simulations. DE modeling provides a quick and cost effective method for analyzing complex problems as different scenarios can be tested ... -
Monitorexplorer: A State-space Exploration Based Tool To Test Java Monitors Implementations
(Computer Science & Engineering, 2007-08-23)A monitor is a concurrency construct that encapsulates data. There are many application classes which are written using the Java Monitors and these are difficult to test due to the inherent complexities of the concurrent ... -
Monitoring And Analyzing Distributed Cluster Performance And Statistics Of Atlas Job Flow
(Computer Science & Engineering, 2007-08-23)Grid3 is a Grid facility used by many High Energy Physics experiments to enable physicists to process data intensive and CPU intensive jobs more effectively as well as more efficiently. Amongst other things, the highlights ... -
Monitoring Health By Detecting Drifts And Outliers In Patterns Of An Inhabitant In A Smart Home
(Computer Science & Engineering, 2007-08-23)The elderly, along with people with disabilities or chronic illness, are most often dependent on some kind of formal or informal care. They are forced to move to a place where they can be cared for. Automatic health ... -
MONITORING OF SWT2 DATA CLUSTERS FOR THE ATLAS EXPERIMENT
(2018-12-06)Monitoring of the South West Tier 2 RSEs is done by CERN with the help of Rucio. The challenge faced by the team monitoring the servers at the University of Texas site was that the monitoring data is pictorially represented ... -
MR_QP: A Scalable Approach To Query Processing on Arbitrary-Size Graphs Using The Map/Reduce Framework
(2020-06-03)The utility and widespread use of Relational Database Management Systems(RDBMSs) comes not only from its simple, easy-to-understand data model (a relation or a set) but mainly from the ability to write non-procedural queries ... -
Multi-dimensional Indexing For XML Data
(Computer Science & Engineering, 2007-08-23)The Extensible Markup Language (XML) is becoming a dominant standard for exchanging and retrieving data over the internet. As XML in data exchanging grows, various XML indexing techniques have been proposed for fast and ... -
Multiple Object Tracking Using Particle Filters
(Computer Science & Engineering, 2007-08-23)We describe a novel extension to the Particle filter algorithm for tracking multiple objects. The recently proposed algorithms and the variants for multiple object tacking algorithms estimate multi-modal posterior distributions ... -
A Novel Architecture For Mobility Enabled Video Conferencing In Next Generation Wireless Networks
(Computer Science & Engineering, 2010-11-01)The Heterogeneous nature of next generation networks requires architecture and technologies that have an intrinsic support for diversity. The plethora of existing wireless access technologies will soon be connected to ... -
A Novel Scheme For Contact Predictions In Opportunistic Networks
(Computer Science & Engineering, 2013-03-20)In the opportunistic network (ON) paradigm information is exchanged between two devices as they encounter each other. For such information exchange to take place the devices must know about the presence of other devices ...