Browsing Department of Computer Science and Engineering by Title
Now showing items 88-107 of 606
-
Combating DoS Attacks In Wireless Networks Using Lightweight Key Mangement Schemes
(Computer Science & Engineering, 2010-11-01)The unique features of wireless networks lead to many attractive applications in both military and civilian operations. Wireles networking devices usually use batteries as power supply, which requires all the operations ... -
COMPACT REPRESENTATIVES OF DATABASES AND RESPONSIBLE DATA MANAGEMENT
(2023-08-08)With the advent of advanced computational models, we are being constantly judged by AI systems, complex algorithmic systems based on data that has been collected about us. These analysis are critical as they span many wide ... -
Comparing Web Application Scanners For XSS Attacks
(Computer Science & Engineering, 2013-03-20)As software industry is paying increasing attention to web application security, various testing tools with black box testing feature have been developed. To better evaluate their performance, researchers have made efforts ... -
A Comparison And Evaluation Of Motion Indexing Techniques
(Computer Science & Engineering, 2010-11-01)Motion capture (mocap) is a way to digitally represent the spatio-temporalstructure of human movement. Human motion is generally captured in long sequences to record the natural and complex aspects of human actions, its ... -
COMPARISON OF MACHINE LEARNING ALGORITHMS IN SUGGESTING CANDIDATE EDGES TO CONSTRUCT A QUERY ON HETEROGENEOUS GRAPHS
(2016-05-11)Querying graph data can be difficult as it requires the user to have knowledge of the underlying schema and the query language. Visual query builders allow users to formulate the intended query by drawing nodes and edges ... -
Comparison Of Search-based And Kernel-based Methods For Graph-based Relational Learning
(Computer Science & Engineering, 2007-08-23)Graph-based relational learning has been the focus of relational learning for quite some time. As most of the real-world data is structured, and hence cannot be represented in a single table, various logic-based and ... -
Compensation Of Photobleached Images For A Cell Dynamics System
(Computer Science & Engineering, 2007-08-23)Progress in the field of medicine attributes to the discoveries in biology that require an extensive knowledge of cell dynamics. Intracellular Cell Dynamics Analysis System (ICellDAS) is a web based tool aimed at automating ... -
Complementing Current Active Queue Management Schemes With RECHOKe And Receiver-window Modification (RWM)
(Computer Science & Engineering, 2007-08-23)Explicit Congestion Notification (ECN) and Active Queue Management (AQM) schemes have been proposed for present-day TCP/IP networks to better manage network congestion. ECN enabled AQMs were shown to have a promising ... -
Comprehensive Data Analysis For Biomarker Pattern Discovery Using DNA/protein Microarrays
(Computer Science & Engineering, 2008-09-17)During the last decade, the advent of microarray technology has stimulated rapid research advances in bioinformatics. Microarray data pose great challenges for computational data analysis, because of their large dimensionality ... -
COMPREHENSIVE STUDY OF GENERATIVE METHODS ON DRUG DISCOVERY
(2019-12-09)Observing the recent success of the deep learning (DL) technology in multiple life-changing application areas, e.g., autonomous driving, image/video search and discovery, natural language processing, etc., many new ... -
Computational Analysis Of Structure And Function Of Genomic Sequences
(Computer Science & Engineering, 2009-09-16)The genetic code consists of long chains of deoxyribonucleic acid (DNA) present in every cell of a living organism. These chains contain both functional and non-functional DNA sequences, and their proportion in the mix ... -
Computational Analysis Of Variability Of Recombination In Mice
(Computer Science & Engineering, 2008-09-17)Rapid advances in engineering and technology have fueled research in areas such as molecular biology and genetics to a new level and thus have given birth to multidisciplinary fields like bioinformatics and computational ... -
COMPUTATIONAL APPROACHES FOR FINDING DISEASE RELATED GENES AND RNAS
(2019-06-18)Finding candidate genes that could cause specific diseases has been the subject of many studies. This is an important research task, however in the biological experimentation domain it can be very expensive and time ... -
A Computational Framework For Human-Centered Multimodal Data Analysis
(Computer Science & Engineering, 2012-04-11)Human-Centered computing defines a field of study in which computational processes affect the human being, either through ubiquitous and pervasive use of devices or any effect that improves the human condition. Human-Centered ... -
Computer Vision Methods for Sign Language and Cognitive Evaluation through Physical Tasks
(2020-08-05)Analyzing human motion is vital for a multitude of tasks including human-computer interaction, sign language recognition, and the assessment of cognitive disorders. Providing automatic assessments for cognitive disorders ... -
Computing Best Coverage Path In The Presence Of Obstacles In Wireless Sensor Networks
(Computer Science & Engineering, 2007-08-23)Given a set S = {S1,...,Sn} of n homogeneous wireless sensors deployed in a two dimensional area, a source point s and a destination point t, the least protected point p along a path (s,t) is that point such that the ... -
Concept-based Search Using Parallel Query Expansion
(Computer Science & Engineering, 2007-08-23)We address the problem of irrelevant results for short queries on Web search engines. Short queries fail to provide sufficient context to disambiguate possible meanings associated with the search terms resulting in a set ... -
Concurrent Polyglot: An Extensible Compiler Framework
(Computer Science & Engineering, 2011-07-14)We have today crossed the threshold of increasing clock frequencies as the dominant solution to faster computing, and it is imperative for software developers to be able to think in the concurrent and parallel paradigm. ... -
Congestion Control For Networks In Challenged Environments
(Computer Science & Engineering, 2008-09-17)Congestion occurs when resource demands exceed the capacity of a network. The goal of congestion control is to use the network as efficiently as possible. While extensive efforts have been devoted to providing optimization ... -
Context Aware Energy Conservation In Pervasive Computing Environments
(Computer Science & Engineering, 2007-08-23)Extending battery lifetime is one of the most critical and challenging problems in mobile systems. When the mobile device sounds a low battery alarm, the user is given an ultimatum to quickly find a power source or suspend ...