Browsing Department of Computer Science and Engineering by Title
Now showing items 366-385 of 606
-
Learning Video Preferences Using Visual Features And Closed Captions
(Computer Science & Engineering, 2008-04-22)Viewers of video now have more choices than ever. As the number of choices increases, the task of searching through these choices to locate video of interest is becoming more difficult. Current methods for learning a ... -
Lilac: Architecture For Anonymous Light Weight Communication
(Computer Science & Engineering, 2013-10-23)We present lilac; a circuit based low latency anonymous light weight instant messaging communication system. This browser based chat platform provides anonymity in context with unlinkability and unobservability for the ... -
LILAC: THE SECOND GENERATION LIGHTWEIGHT LOW-LATENCY ANONYMOUS CHAT.
(2016-08-15)Instant messaging is one of the most used modes of communication and there are many instant messaging systems available online. Studies from the Electronic Frontier Foundation show that there are only a few instant messengers ... -
Limitations Of IEEE 802.15.4 Based Wireless Mesh Networks For Wireless Localization
(Computer Science & Engineering, 2008-04-22)It is highly desirable to create rapidly and inexpensively deployable mesh networks in certain scenarios. Consider the case of a large storage warehouse; workers are constantly moving in the area and not only do they need ... -
LINCHPIN: A YAML TEMPLATE BASED CROSS CLOUD RESOURCE PROVISIONING TOOL
(2016-12-09)A cloud application developed, will have a specific requirement of particular cloud resources and software stack to be deployed to make it run. Resource templates enable the environment design and deployment required for ... -
LINK PREDICTION BASED FACE CLUSTERING USING VARIATIONAL ATTENTIONAL GRAPH AUTOENCODER
(2020-12-01)In this work, we address the problem of clustering faces according to their individual identities present inherently in the dataset.The current clustering frameworks are either based on some heuristic method or require ... -
Linking Entity Profiles
(Computer Science & Engineering, 2014-09-17)Entity linking allows one to have collections of data from multiple sources as a global dataset and then query those data. Entity linking allows us to do knowledge discovery on this global dataset which might result in the ... -
Liquid: A Detection Resistant Covert Timing Channel Based On Ipd Shaping
(Computer Science & Engineering, 2009-09-16)Covert timing channels provide a way to surreptitiously leak information from an entity in a higher-security level to an entity in a lower level. The difficulty of detecting or eliminating such channels makes them a desirable ... -
LOCALIZATION AND CONTROL OF DISTRIBUTED MOBILE ROBOTS WITH THE MICROSOFT KINECT AND STARL
(2016-05-11)With the increasing availability of mobile robotic platforms, interest in swarm robotics has been growing rapidly. The coordinated effort of many robots has the potential to perform a myriad of useful and possibly dangerous ... -
Location Privacy In Sensor Networks Against A Global Eavesdropper
(Computer Science & Engineering, 2008-09-17)While many protocols for sensor network security provide con dentiality for the content of messages, contextual information usually remains exposed. Such contextual information can be exploited by an adversary to derive ... -
LOW-DOSE CT IMAGE DENOISING USING DEEP LEARNING METHODS
(2021-05-07)Low-dose computed tomography (LDCT) has raised highly attention since the counterpart, full-dose computed tomography (FDCT), brings potential ionizing radiation influence to patients. However, LDCT still suffers from several ... -
LUNG CANCER SUBTYPE CLASSIFICATION FROM WHOLE SLIDE HISTOPATHOLOGICAL IMAGES
(2015-12-16)Lung Cancer is one of the most serious diseases causing death for human be- ings. The progression of the disease and response to treatment di ers widely among patients. Thus it is very important to classify the type of ... -
M-infosift : A Graph-based Approach For Multiclass Document Classification
(Computer Science & Engineering, 2007-09-17)With the increase in the amount of data being introduced into the Internet on a daily basis, the problem of managing large amount of data is an unavoidable problem. The area of document classification has been examined, ... -
MACHINE LEARNING BASED DATACENTER MONITORING FRAMEWORK
(2016-12-09)Monitoring the health of large data centers is a major concern with the ever-increasing demand of grid/cloud computing and the higher need of computational power. In a High Performance Computing (HPC) environment, the need ... -
Machine Learning Methods for Statistical Analysis and Representation Learning on Neuroimaging Data
(2022-05-17)With the recent advance and widespread adoption of imaging technological innovations, clinical practitioner and scientists can easily acquire and store a large amount of various neuroimaging modalities, such as Diffusion ... -
MACHINE LEARNING METHODS TO IMPROVE FAIRNESS AND PREDICTION ACCURACY ON LARGESOCIALLY RELEVANT DATASETS
(2021-08-16)Machine learning-based decision support systems bring relief to the decision-makers in many domains such as loan application acceptance, dating, hiring, granting parole, insurance coverage, and medical diagnoses. These ... -
MACHINE LEARNING WITH GRAPHS
(2021-05-09)In recent years, graph-based machine learning methods have attracted great attention because of their effectiveness and efficiency. Inspired by this trend, this thesis summarizes my research topics on machine learning ... -
Machine Learning: Several Advances in Linear Discriminant Analysis, Multi-View Regression and Support Vector Machine
(2017-04-24)Machine learning technology is now widely used in engineering, science, finance, healthcare, etc. In this dissertation, we make several advances in machine learning technologies for high dimensional data analysis, image ... -
MALWARE EARLY-STAGE DETECTION USING MACHINE LEARNING ON HARDWARE PERFORMANCE COUNTERS
(2018-08-03)Systems affected by Malware in the past 10 years has risen from 29 million to 780 million, which tells us it’s a rapidly growing threat. Viruses, ransomware, worms, backdoors, botnets etc. all come under malware. Ransomware ... -
Mass Spectrometry Based Proteomic Biomarker Selection And Sample Prediction
(Computer Science & Engineering, 2008-09-17)High-resolution MALDI-TOF (matrix-assisted laser desorption/ionization time-of-flight) mass spectrometry has recently shown promise as a screening tool for detecting discriminatory peptide/protein patterns. The major ...