Search
Now showing items 1-10 of 12
Efficient Exploration Techniques On Large Databases
(Computer Science & Engineering, 2011-07-14)
Search, retrieval, and exploration of information have become some of the most intense and principal research challenges in many enterprize and e-commerce applications off late. The mainstay of this dissertation is to ...
Improving Privacy And Performance In Anonymous Communications
(Computer Science & Engineering, 2011-03-03)
Anonymous communications systems provide an important privacy service by keeping passive eavesdroppers from linking communicating parties. However, an attacker can use long-term statistical analysis of traffic sent to and ...
A Holistic, Similarity-based Approach For Personalized Ranking In Web Databases
(Computer Science & Engineering, 2011-10-11)
With the advent of the Web, the notion of ``information retrieval'' has acquired a completely new connotation and currently encompasses several disciplines ranging from traditional forms of text and data retrieval in ...
Performance Analysis And Resource Allocation For Multithreaded Multicore Processors
(Computer Science & Engineering, 2011-10-11)
With ever expanding design space and workload space in multicore era, a key challenge to program a multithreaded multicore processor is how to evaluate the performance of various possible program-task-to-core mapping choices ...
Generalized Reinforcement Learning With An Application In Generic Workload Management Systems
(Computer Science & Engineering, 2011-10-11)
Learning by trial and error and being able to form levels of abstraction from the past experience has been an important factor for sentient beings to develop intelligent behaviors and cope with an ever-changing environment. ...
Reinforcement Learning Based Strategies For Adaptive Wireless Sensor Network Management
(Computer Science & Engineering, 2011-03-03)
In wireless sensor networks (WSN), resource-constrained nodes are expected to operate in highly dynamic and often unattended environments. WSN applications need to cope with such dynamicity and uncertainty intrinsic in ...
Distributed Services In Pervasive Systems
(Computer Science & Engineering, 2011-03-03)
Devices in pervasive systems are generally resource constrained, heterogeneous, personal, and mobile. These constraints limit the services and quality of service offered by the devices. For example, execution of such tasks ...
Episodic Task Planning And Learning In Pervasive Environments
(Computer Science & Engineering, 2011-03-03)
During planning and control of autonomous robots in a pervasive environment designed to serve people, we will inevitably face the situations of needing to perform multiple complex tasks. Management and optimization of the ...
Detect Program Vulnerabilities Using Trace-based Security Testing
(Computer Science & Engineering, 2011-10-11)
Software vulnerabilities are program flaws that can be exploited by attackers to compromise the security of a software system. Although many approaches have been proposed to detect or prevent software attacks, software ...
Context Reasoning Under Uncertainty Based On Evidential Fusion Networks In Home-based Care
(Computer Science & Engineering, 2011-03-03)
Pervasive computing technologies use embedded intelligent systems to enable various real-time applications. Some of these applications are: continuous healthcare monitoring, autonomous diagnosis and treatment, and remote ...