Browsing MS Theses - DO NOT EDIT by Title
Now showing items 316-335 of 355
-
Stepping-stone Network Attack Kit (SNEAK) For Evading Timing-based Detection Methods Under The Cloak Of Constant Rate Multimedia Streams
(Computer Science & Engineering, 2008-09-17)With the advent of the Internet, network-based security threats have been constantly on the rise. The source of an attack could be traced by studying the system logs and the source IP address of the attack can be used to ... -
“Strict Moderation?” The Impact of Increased Moderation on Parler Content and User Behavior
(2022-05-18)Social media platforms have brought people from different backgrounds, ethnicity, race, gender, etc together to form a platform to share ideas and opinions and discuss news events among other social events. Unfortunately, ... -
STRUCTURE AWARE HUMAN POSE ESTIMATION USING ADVERSARIAL LEARNING
(2021-05-10)Pose estimation using Deep Neural Networks (DNNs) has shown outstanding performance in recent years, due to the availability of powerful GPUs and larger training datasets. However, there are still many challenges due to ... -
Structure Based XML Indexing
(Computer Science & Engineering, 2007-08-23)The increase in the usage and popularity of semi-structured data has received considerable attention, and a lot of research is going on for the efficient retrieval and storage of semi-structured data. A popular model and ... -
SubRosa 2 : An Experimental Evaluation Of Timing Analysis Attacks And Defenses In Anonymity Systems
(Computer Science & Engineering, 2013-03-20)A circuit-based low-latency anonymous communication service such as Tor helps Internet users hide their IP addresses and thereby conceal their identities when communicating online. However, this kind of service is vulnerable ... -
Subrosa: An Experimental Platform For Studying Timing Analysis Of Real Time Anonymity Systems
(Computer Science & Engineering, 2008-08-08)Timing analysis poses a significant challenge for the mix based anonymous systems that wish to support low-latency applications like web browsing, instant messaging and Voice over IP (VOIP). Research in this area so far ... -
Sybil Defense For Online Social Networks Using Partial Graph Information
(Computer Science & Engineering, 2012-04-11)Online social networks (OSNs) today are proprietary, in the sense that communication between users requires the users to be part of the same OSN. This raises privacy issues and reliability concerns among users, and calls ... -
System For Interpretation Of Reviewer Feedback On Social Web
(Computer Science & Engineering, 2013-03-20)The increasing popularity of social media web sites such as Amazon, Yelp and others has influenced our online decision making. Before making selection decisions on movies and restaurants, we investigate its reviewer ... -
TaPIN: A Two-Factor User Authentication Scheme for Smartwatches through Secret Finger Tapping
(2020-05-11)Nowadays, smartwatches have become one of the most common wearable gadgets as they are small and portable. As more and more personal information is managed and processed inside smartwatches, it is important to have a secure ... -
Target Tracking With Lucas-kanade Optical Flow And Particle Filters Through Affine Transforms And Occlusion
(Computer Science & Engineering, 2011-03-03)This paper investigates a hybrid approach derived from Lucas-Kanade optical flow tracking and particle filters that is capable of tracking objects through occlusion and affine transformations. This approach is inspired ... -
Temporal Potential Function Approach For Path Planning In Dynamic Environments
(Computer Science & Engineering, 2009-09-16)A Dynamic environment is one in which either the obstacles or the goal or both are in motion. In most of the current research, robots attempting to navigate in dynamic environments use reactive systems. Although reactive ... -
Testing Java Monitors By State Space Exploration
(Computer Science & Engineering, 2007-08-23)Java monitors are classes that are intended to be accessed by multiple threads at the same time. Detecting synchronization faults in Java Monitors is considerably more challenging than testing regular classes, due to the ... -
TEXT MINING ON TWITTER DATA TO EVALUATE SENTIMENT
(2018-12-06)Social media platforms have been a major part of our daily lives. But with the freedom of expression there is no way one can check whether the posts/tweets/expressions are classified on which polarity. Since Twitter is one ... -
Texture Measurement And Skid Number Prediction Using Laser Data Acquisition, Digital Signal Processing, And Neural Networks
(Computer Science & Engineering, 2008-08-08)Real-time estimation of the skid number of pavement is difficult. Traditional methods of volumetric measurement are cumbersome and time consuming. It is desired to enable prediction of the skid number of pavement using ... -
The Impact of Toxic Replies on Twitter Conversations
(2019-12-11)Social media has become an empowering agent for individual voices and freedom of expression. Yet, it can also serve as a breeding ground for hate speech. According to a Pew Research Center study, 41% of Americans have been ... -
“Tie the Flags Together”: Migration, Nativism, and the Orange Order in the United States, 1840-1930
(2018-12-07)“Tie the Flags Together”: Migration, Nativism, and the Orange Order in the United States, 1840-1930 Cory Wells Throughout the nineteenth century, tens of thousands of Irish Protestants who migrated to the United States ... -
Top K Query Processing In Distributed Database
(Computer Science & Engineering, 2007-09-19)Today's data is rarely stored in centralized location due to the enormous amount of information that needs to be stored and also to increase reliability, availability and performance of the system. Same data is stored in ... -
TOPOLOGICAL AND FEATURE BASED IDENTIFICATION OF HOLE BOUNDARIES IN POINT CLOUD DATA AND DIFFERENTIATION BETWEEN SURFACE AND PHYSICAL HOLES
(2018-12-13)With the advent of autonomous agents becoming prominent in everyday lives, the importance of processing the surroundings into understandable features becomes more and more important. 3D point clouds play a major role in ... -
Towards A Stronger Peer-to-peer Anonymous System
(Computer Science & Engineering, 2007-08-23)Anonymous communications systems on the Internet provides protection against eavesdroppers and others that seek to link users with their communications. These systems have many important applications in areas such as law ... -
Towards An Implementation Of Avoip: Anonymous Voice-over-ip
(Computer Science & Engineering, 2009-09-16)Voice over IP (VoIP) is one of the fastest growing telecommunicaiton market today. However with great popularity comes greater security risk. When we communicate over the Internet we expose our identity to all the prying ...