Browsing MS Theses - DO NOT EDIT by Title
Now showing items 220-239 of 355
-
M-infosift : A Graph-based Approach For Multiclass Document Classification
(Computer Science & Engineering, 2007-09-17)With the increase in the amount of data being introduced into the Internet on a daily basis, the problem of managing large amount of data is an unavoidable problem. The area of document classification has been examined, ... -
MACHINE LEARNING BASED DATACENTER MONITORING FRAMEWORK
(2016-12-09)Monitoring the health of large data centers is a major concern with the ever-increasing demand of grid/cloud computing and the higher need of computational power. In a High Performance Computing (HPC) environment, the need ... -
MALWARE EARLY-STAGE DETECTION USING MACHINE LEARNING ON HARDWARE PERFORMANCE COUNTERS
(2018-08-03)Systems affected by Malware in the past 10 years has risen from 29 million to 780 million, which tells us it’s a rapidly growing threat. Viruses, ransomware, worms, backdoors, botnets etc. all come under malware. Ransomware ... -
Mathematical Modeling For Phagocyte Transmigration And Reverse Engineering
(Computer Science & Engineering, 2010-11-01)Computational modeling and simulation have been used as an important tool to analyze the behavior of a complex biology system. Typically, the biology system is a complex non-linear system where a large number of components ... -
MAVROOMIE: AN END-TO-END ARCHITECTURE FOR FINDING COMPATIBLE ROOMMATES BASED ON USER PREFERENCES
(2016-12-07)Team Formation is widely studied in literature as a method for forming teams or groups under certain constraints. However, very few works address the aspect of collaboration while forming groups under certain constraints. ... -
MavVStream: Expressing and Processing Situations on Videos Using the Stream Processing Paradigm
(2018-05-04)Image and Video Analysis (IVA) has been ongoing for several decades and has come up with impressive techniques for object identification, re-identification, activity detection etc. A large number of techniques have been ... -
Maximizing Code Coverage in Database Applications
(2017-12-07)A database application takes input as user-defined queries and determines the program logic to be executed based on the results returned by the queries. A change in existing application or a new application is expected ... -
Measurements Of A Latency-biased Expander Topology In The Tor Anonymity System
(Computer Science & Engineering, 2013-03-20)Anonymous communication systems protect the privacy of their users by hiding who is communicating with whom. With the widespread use of the Internet, anonymity systems are all the more essential to support applications ... -
Measuring Named Entity Similarity Through Wikipedia Category Hierarchies
(Computer Science & Engineering, 2011-03-03)Identifying the semantic similarity between named entities has many applications in NLP, including information extraction and retrieval, word sense disambiguation, text summarization and type classification. Similarity ... -
Medical Decision Support System Using Augmentable Guideline Engine
(Computer Science & Engineering, 2007-08-23)Increasing life expectancy accompanied by existing growth of wireless infrastructure and ubiquitous computing technologies has given healthcare providers access to vital information within their healthcare networks. Medical ... -
A Method To Evade Keyword Based Censorship
(Computer Science & Engineering, 2014-12)Many countries block the content of web pages which are deemed against the morals, religious rules or policies set by government or organization. Countries like China block the post which is against their government interest. ... -
Microblog Analyzer Aggregate Estimation Over A Micro Blog Platform
Microblogging is a new mode of communication in which users can share their current status in brief and agile way in the form of text, image, video etc over smart phones, email or web. Recently, Microblogs such as Twitter, ... -
Mimic: An Active Covert Channel That Evades Regularity-based Detection
(Computer Science & Engineering, 2010-07-19)A covert timing channel is a hidden communication channel based on network timing that an attacker can use to sneak secrets out of a secure system. Active covert channels, in which the attacker uses a program to automatically ... -
MLN-Subdue: Decoupling Approach-Based Substructure Discovery In Multilayer Networks (MLNs)
(2020-06-03)Substructure discovery is well-researched for single graphs (both simple and attribute) as it is an important component of knowledge discovery for many applications such as finding the core substructure in a protein, ... -
Modeling An Intelligent Intruder In A Region Monitored By A Wireless Sensor Network
(Computer Science & Engineering, 2014-03-12)Monitoring to detect unauthorized border crossing is very important for protecting national security. To accomplish this by continuous physical monitoring by border patrol agents is impractical. Networks of low-cost wireless ... -
Modeling And Simulation Of A General Motors Conveyor System Using A Custom Decision Optimizer
(Computer Science & Engineering, 2009-09-16)The temporal behavior of conveyor systems can be modeled using discrete event (DE) simulations. DE modeling provides a quick and cost effective method for analyzing complex problems as different scenarios can be tested ... -
Monitorexplorer: A State-space Exploration Based Tool To Test Java Monitors Implementations
(Computer Science & Engineering, 2007-08-23)A monitor is a concurrency construct that encapsulates data. There are many application classes which are written using the Java Monitors and these are difficult to test due to the inherent complexities of the concurrent ... -
Monitoring And Analyzing Distributed Cluster Performance And Statistics Of Atlas Job Flow
(Computer Science & Engineering, 2007-08-23)Grid3 is a Grid facility used by many High Energy Physics experiments to enable physicists to process data intensive and CPU intensive jobs more effectively as well as more efficiently. Amongst other things, the highlights ... -
Monitoring Health By Detecting Drifts And Outliers In Patterns Of An Inhabitant In A Smart Home
(Computer Science & Engineering, 2007-08-23)The elderly, along with people with disabilities or chronic illness, are most often dependent on some kind of formal or informal care. They are forced to move to a place where they can be cared for. Automatic health ... -
MONITORING OF SWT2 DATA CLUSTERS FOR THE ATLAS EXPERIMENT
(2018-12-06)Monitoring of the South West Tier 2 RSEs is done by CERN with the help of Rucio. The challenge faced by the team monitoring the servers at the University of Texas site was that the monitoring data is pictorially represented ...