Now showing items 41-60 of 606

    • A Distributed Sensor Data Management Infrastructure Based On 802.15.4/ZigBee Networks 

      Li, Tianqiang (Computer Science & Engineering, 2007-08-23)
      Wireless sensor networks consist of a certain number of autonomous devices with sensor, every device has certain detection functionality like light, temperature pressure etc. Communication by using the radio frequency make ...
    • CA-OLE- A Collaborative And Adaptive Online Learning Environment 

      Gomez, Paola (Computer Science & Engineering, 2007-08-23)
      Demand for online learning environments has grown in the past few years, and schools have been offering more distance courses to their students. Designing adequate online learning environments is considerably more challenging ...
    • Adaptive Load Balancing And Change Visualization For WebVigil 

      Chelladurai Hari Hara, Subramanian (Computer Science & Engineering, 2007-08-23)
      There is a need for selective monitoring, the contents of web pages. Periodical visit for understanding changes to a web page is both inefficient and time consuming. WebVigiL is a system developed for automating the change ...
    • Generalization And Enforcement Of Role-based Access Control Using A Novel Event-based Approach 

      Adaikkalavan, Raman (Computer Science & Engineering, 2007-08-23)
      Protecting information against unauthorized access is a key issue in information system security. Advanced access control models and mechanisms have now become necessary for applications and systems due to emerging acts, ...
    • WiLDCAT: An Integrated Stealth Environment For Dynamic Malware Analysis 

      Vasudevan, Amit (Computer Science & Engineering, 2007-08-23)
      Malware -- a term that refers to viruses, trojans, worms, spyware or any form of malicious code -- is widespread today. Given the devastating effects that malware have on the computing world, detecting and countering malware ...
    • Querying Microarray Databases 

      Raja, Zoe Alexandra (Computer Science & Engineering, 2007-08-23)
      Microarray technology has rapidly taken a key position among bioinformatics research tools. After the completion of the Human Genome Project, microarray databases have become particularly important to the management and ...
    • Complementing Current Active Queue Management Schemes With RECHOKe And Receiver-window Modification (RWM) 

      Govindaswamy, Visvasuresh (Computer Science & Engineering, 2007-08-23)
      Explicit Congestion Notification (ECN) and Active Queue Management (AQM) schemes have been proposed for present-day TCP/IP networks to better manage network congestion. ECN enabled AQMs were shown to have a promising ...
    • A Performance Evaluation Of Alternate Numbering Based XML Indexing Techniques 

      Ahn, Chul Ho (Computer Science & Engineering, 2007-08-23)
      Since XML became a standard of representing semi-structured data and exchanging format over the web, the sheer volume of XML data has become larger. While relational database represents data as a structured format, XML ...
    • Solving The Rubik's Cube With Parallel Processing 

      Nargolkar, Aslesha Pramod (Computer Science & Engineering, 2007-08-23)
      This thesis investigates parallel processing techniques for solving the 3 x 3 x 3 Rubik's Cube. We explore various state-space search based algorithmic approaches to optimally solve the Cube. The parallel processing approach ...
    • Group Key Distribution Via Local Collaboration In Wireless Sensor Networks 

      Chadha, Anuj (Computer Science & Engineering, 2007-08-23)
      Wireless sensor networks have been recognized as one of the most important technologies in the networking world. Security of sensor networks is one of the major concerns today. To this end, a whole suite of protocols have ...
    • Probabilistic Localization Of Mobile Ad Hoc Networks 

      Huang, Rui (Computer Science & Engineering, 2007-08-23)
      The mobile ad hoc network localization problem deals with estimating the physical location of the nodes that do not have a direct way (e.g., GPS) to determine their own locations. Being an enabling technology that is ...
    • Efficient Visualization Of Streaming Sensor Network Data Using Approximation Technique 

      Pai, Sunil (Computer Science & Engineering, 2007-08-23)
      By commanding a large number of wireless sensor nodes capable of sensing, communicating, and computing, wireless sensor networks have revealed their vast potential in a plethora of applications. However, due to the stringent ...
    • Supervised Learning From Embedded Subgraphs 

      Potts, Joseph T. (Computer Science & Engineering, 2007-08-23)
      We develop a machine learning algorithm which learns rules for classification from training examples in a graph representation. However, unlike most other such algorithms which use one graph for each example, ours allows ...
    • Adaptive, Multimodal, Application Independent User Interfaces For People With Disabilites Using Computers 

      Sambath, Padmapriya (Computer Science & Engineering, 2007-08-23)
      The goal of this thesis is to create more adaptive and flexible user interfaces for people with disabilities and presenting information to everyone and on every device at any time. Delivering information at any time leads ...
    • HEROS: A Patient-centered Goal-directed Electronic Medical Record System For The Homeless 

      Mahata, Kallol Silas (Computer Science & Engineering, 2007-08-23)
      Homelessness is a growing problem in the United States. Numerous barriers keep the street homeless from obtaining healthcare. Medical Street Outreach (MSO) programs are designed to reach out to the homeless. Gathering ...
    • Efficient And Adaptive Schemes For Consistent Information Sharing In Wireless Mobile And Peer-to-peer Networks 

      Wang, Zhijun (Computer Science & Engineering, 2007-08-23)
      With the tremendous growth of applications in wireless mobile and Peer-to-Peer (P2P) networks, significant research efforts have been made to improve the quality of sevice. Caching and replicating frequently used data ...
    • Tracing And Replay Of Real-time Concurrent Programs In Vxworks 

      Patel, Daxa Keshavji (Computer Science & Engineering, 2007-08-23)
      Real-time concurrent programs are difficult to analyze, debug and test because of the existence of race conditions. In particular, cyclic debugging requires the ability to reproduce a failed execution. That is, when a ...
    • A Novel Game Theoretic Framework For Security In Wireless Sensor Networks 

      Agah, Afrand (Computer Science & Engineering, 2007-08-23)
      Due to severe resource limitations and often lack of centralized infrastructure, providing security in wireless sensor networks is a great challenge. Misbehavior due to malicious or faulty nodes can significantly degrade ...
    • Anytime Top-k Queries On Exact And Fuzzy Data 

      Chaudhari, Bhushan P (Computer Science & Engineering, 2007-08-23)
      Top-k queries on large multi-attribute data sets are fundamental operations in information retrieval and ranking applications. In this thesis, we initiate research on the anytime behavior of top-k algorithms on exact and ...
    • SQL-based Approach To Significant Interval Discovery In Time-Series Data 

      Shrestha, Sunit (Computer Science & Engineering, 2007-08-23)
      With time-series data, events (like turning off a light, opening garage door, turning on TV) occur with a high degree of certainty not at specific time points but within time intervals (sequence of time points). So, it is ...