Browsing Department of Computer Science and Engineering by Title
Now showing items 386-405 of 606
-
Mathematical Modeling For Phagocyte Transmigration And Reverse Engineering
(Computer Science & Engineering, 2010-11-01)Computational modeling and simulation have been used as an important tool to analyze the behavior of a complex biology system. Typically, the biology system is a complex non-linear system where a large number of components ... -
MAVROOMIE: AN END-TO-END ARCHITECTURE FOR FINDING COMPATIBLE ROOMMATES BASED ON USER PREFERENCES
(2016-12-07)Team Formation is widely studied in literature as a method for forming teams or groups under certain constraints. However, very few works address the aspect of collaboration while forming groups under certain constraints. ... -
MavVStream: Expressing and Processing Situations on Videos Using the Stream Processing Paradigm
(2018-05-04)Image and Video Analysis (IVA) has been ongoing for several decades and has come up with impressive techniques for object identification, re-identification, activity detection etc. A large number of techniques have been ... -
Maximizing Code Coverage in Database Applications
(2017-12-07)A database application takes input as user-defined queries and determines the program logic to be executed based on the results returned by the queries. A change in existing application or a new application is expected ... -
Measurements Of A Latency-biased Expander Topology In The Tor Anonymity System
(Computer Science & Engineering, 2013-03-20)Anonymous communication systems protect the privacy of their users by hiding who is communicating with whom. With the widespread use of the Internet, anonymity systems are all the more essential to support applications ... -
Measuring Named Entity Similarity Through Wikipedia Category Hierarchies
(Computer Science & Engineering, 2011-03-03)Identifying the semantic similarity between named entities has many applications in NLP, including information extraction and retrieval, word sense disambiguation, text summarization and type classification. Similarity ... -
Mechanical Reliability Of Porous Low-k Dielectrics For Advanced Interconnect: Study Of The Instability Mechanisms In Porous Low-k Dielectrics And Their Mediation Through Inert Plasma Induced Re-polymerization Of The Backbone Structure
(Materials Science & Engineering, 2015)Continuous scaling down of critical dimensions in interconnect structures requires the use of ultralow dielectric constant (k) films as interlayer dielectrics to reduce resistance-capacitance delays. Porous carbon-doped ... -
Medical Decision Support System Using Augmentable Guideline Engine
(Computer Science & Engineering, 2007-08-23)Increasing life expectancy accompanied by existing growth of wireless infrastructure and ubiquitous computing technologies has given healthcare providers access to vital information within their healthcare networks. Medical ... -
A Method To Evade Keyword Based Censorship
(Computer Science & Engineering, 2014-12)Many countries block the content of web pages which are deemed against the morals, religious rules or policies set by government or organization. Countries like China block the post which is against their government interest. ... -
Methods For Human Motion Analysis For American Sign Language Recognition And Assistive Environments
The broad application domain of the work presented in this thesis is human motion analysis with a focus on hand detection for American Sign Language recognition and fall detection for assistive environments.One of the ... -
Methods For Large-scale Machine Learning And Computer Vision
(Computer Science & Engineering, 2015)With the advance of the Internet and information technology, nowadays people can easily collect and store tremendous amounts of data such as images and videos. Developing machine learning and computer vision to analysis ... -
Microblog Analyzer Aggregate Estimation Over A Micro Blog Platform
Microblogging is a new mode of communication in which users can share their current status in brief and agile way in the form of text, image, video etc over smart phones, email or web. Recently, Microblogs such as Twitter, ... -
Mimic: An Active Covert Channel That Evades Regularity-based Detection
(Computer Science & Engineering, 2010-07-19)A covert timing channel is a hidden communication channel based on network timing that an attacker can use to sneak secrets out of a secure system. Active covert channels, in which the attacker uses a program to automatically ... -
MLN-Subdue: Decoupling Approach-Based Substructure Discovery In Multilayer Networks (MLNs)
(2020-06-03)Substructure discovery is well-researched for single graphs (both simple and attribute) as it is an important component of knowledge discovery for many applications such as finding the core substructure in a protein, ... -
Modeling An Intelligent Intruder In A Region Monitored By A Wireless Sensor Network
(Computer Science & Engineering, 2014-03-12)Monitoring to detect unauthorized border crossing is very important for protecting national security. To accomplish this by continuous physical monitoring by border patrol agents is impractical. Networks of low-cost wireless ... -
Modeling And Simulation Of A General Motors Conveyor System Using A Custom Decision Optimizer
(Computer Science & Engineering, 2009-09-16)The temporal behavior of conveyor systems can be modeled using discrete event (DE) simulations. DE modeling provides a quick and cost effective method for analyzing complex problems as different scenarios can be tested ... -
MODELING FACTUAL CLAIMS WITH SEMANTIC FRAMES: DEFINITIONS, DATASETS, TOOLS, AND FACT-CHECKING APPLICATIONS
(2021-08-26)As social media sites have become major channels for the quick dissemination of news, misinformation has become a significant challenge for our society to tackle. Today fact-checking rests primarily on the shoulders of ... -
Monitorexplorer: A State-space Exploration Based Tool To Test Java Monitors Implementations
(Computer Science & Engineering, 2007-08-23)A monitor is a concurrency construct that encapsulates data. There are many application classes which are written using the Java Monitors and these are difficult to test due to the inherent complexities of the concurrent ... -
Monitoring And Analyzing Distributed Cluster Performance And Statistics Of Atlas Job Flow
(Computer Science & Engineering, 2007-08-23)Grid3 is a Grid facility used by many High Energy Physics experiments to enable physicists to process data intensive and CPU intensive jobs more effectively as well as more efficiently. Amongst other things, the highlights ... -
Monitoring Health By Detecting Drifts And Outliers In Patterns Of An Inhabitant In A Smart Home
(Computer Science & Engineering, 2007-08-23)The elderly, along with people with disabilities or chronic illness, are most often dependent on some kind of formal or informal care. They are forced to move to a place where they can be cared for. Automatic health ...