Browsing Department of Computer Science and Engineering by Title
Now showing items 544-563 of 606
-
Subrosa: An Experimental Platform For Studying Timing Analysis Of Real Time Anonymity Systems
(Computer Science & Engineering, 2008-08-08)Timing analysis poses a significant challenge for the mix based anonymous systems that wish to support low-latency applications like web browsing, instant messaging and Voice over IP (VOIP). Research in this area so far ... -
Supervised Learning From Embedded Subgraphs
(Computer Science & Engineering, 2007-08-23)We develop a machine learning algorithm which learns rules for classification from training examples in a graph representation. However, unlike most other such algorithms which use one graph for each example, ours allows ... -
SUPPORTING EFFICIENT LARGE-SCALE KEY-VALUE SYSTEMS WITH AN OPTIMIZED STORAGE HIERARCHY
(2018-06-15)Driven by the growing demands from big-data applications, the focus of their data management has been largely shifted from traditional SQL databases to NoSQL (Not-only- SQL) databases, such as key-value (KV) stores, which ... -
Sybil Defense For Online Social Networks Using Partial Graph Information
(Computer Science & Engineering, 2012-04-11)Online social networks (OSNs) today are proprietary, in the sense that communication between users requires the users to be part of the same OSN. This raises privacy issues and reliability concerns among users, and calls ... -
System For Interpretation Of Reviewer Feedback On Social Web
(Computer Science & Engineering, 2013-03-20)The increasing popularity of social media web sites such as Amazon, Yelp and others has influenced our online decision making. Before making selection decisions on movies and restaurants, we investigate its reviewer ... -
TAIL LATENCY PREDICTION FOR FORK-JOIN STRUCTURES
(2020-07-13)The workflows of the predominant user-facing datacenter services, including web searching and social networking, are underlaid by various Fork-Join structures. Due to the lack of understanding the performance of Fork-Join ... -
TaPIN: A Two-Factor User Authentication Scheme for Smartwatches through Secret Finger Tapping
(2020-05-11)Nowadays, smartwatches have become one of the most common wearable gadgets as they are small and portable. As more and more personal information is managed and processed inside smartwatches, it is important to have a secure ... -
Target Tracking With Lucas-kanade Optical Flow And Particle Filters Through Affine Transforms And Occlusion
(Computer Science & Engineering, 2011-03-03)This paper investigates a hybrid approach derived from Lucas-Kanade optical flow tracking and particle filters that is capable of tracking objects through occlusion and affine transformations. This approach is inspired ... -
Techniques for Spatio-temporal Analysis of Trajectory Data
(2016-09-09)The goal of this thesis is to develop novel techniques for the analysis of spatio-temporal trajectory data. Recent advances in tracking devices such as Global Positioning System (GPS) and mobile phones have resulted in an ... -
A Teleoperation Framework for Robots Utilizing Control Barrier Functions in Virtual Reality
(ACM, 2023-07)This paper describes a novel shared control teleoperation framework for mobile robots that utilizes Control Barrier Functions (CBFs) as filtering mechanism to prevent a human operator from making dangerous actions. The ... -
Temporal Potential Function Approach For Path Planning In Dynamic Environments
(Computer Science & Engineering, 2009-09-16)A Dynamic environment is one in which either the obstacles or the goal or both are in motion. In most of the current research, robots attempting to navigate in dynamic environments use reactive systems. Although reactive ... -
TESTING ARTIFICIAL INTELLIGENCE-BASED SOFTWARE SYSTEMS
(2021-08-13)Artificial Intelligence (AI)-based software systems are increasingly used in high-stake and safety-critical domains, including recidivism prediction, medical diagnosis, and autonomous driving. There is an urgent need to ... -
Testing Java Monitors By State Space Exploration
(Computer Science & Engineering, 2007-08-23)Java monitors are classes that are intended to be accessed by multiple threads at the same time. Detecting synchronization faults in Java Monitors is considerably more challenging than testing regular classes, due to the ... -
TEXT MINING ON TWITTER DATA TO EVALUATE SENTIMENT
(2018-12-06)Social media platforms have been a major part of our daily lives. But with the freedom of expression there is no way one can check whether the posts/tweets/expressions are classified on which polarity. Since Twitter is one ... -
Texture Measurement And Skid Number Prediction Using Laser Data Acquisition, Digital Signal Processing, And Neural Networks
(Computer Science & Engineering, 2008-08-08)Real-time estimation of the skid number of pavement is difficult. Traditional methods of volumetric measurement are cumbersome and time consuming. It is desired to enable prediction of the skid number of pavement using ... -
The Impact of Cues and User Interaction on the Memorability of System-assigned Random Passwords
(2016-05-02)Given the choice, users produce passwords reflecting common strategies and patterns that ease recall but offer uncertain and often weak security. Addressing this usability-security tension in user authentication remains ... -
The Impact of Toxic Replies on Twitter Conversations
(2019-12-11)Social media has become an empowering agent for individual voices and freedom of expression. Yet, it can also serve as a breeding ground for hate speech. According to a Pew Research Center study, 41% of Americans have been ... -
A Theoretical Framework For Design Space Exploration Of Manycore Processors
(Computer Science & Engineering, 2012-04-11)As design space and workload space in multicore era are continuously expanding, it is a challenge to identify optimal design points quickly during the early stage of multicore processor design or programming phase. To meet ... -
THINK2ACT: USING MULTIMODAL DATA TO ASSESS HUMAN COGNITIVE AND PHYSICAL PERFORMANCE
(2019-12-10)As computers become more advanced, affordable, and smaller in size, we start to use them in almost every aspect of our daily life. Nowadays, the use of computers is not just limited to accomplish work-related tasks. Instead, ... -
“Tie the Flags Together”: Migration, Nativism, and the Orange Order in the United States, 1840-1930
(2018-12-07)“Tie the Flags Together”: Migration, Nativism, and the Orange Order in the United States, 1840-1930 Cory Wells Throughout the nineteenth century, tens of thousands of Irish Protestants who migrated to the United States ...