Search
Now showing items 1-10 of 32
A Source Code Search Engine For Keyword Based Structural Relationship Search
(Computer Science & Engineering, 2013-07-22)
In an Object Oriented Program, we often see that a package contains several classes, a class contains several methods, a method calls other methods. We may say, there is a contains relationship between a package and a class ...
Measurements Of A Latency-biased Expander Topology In The Tor Anonymity System
(Computer Science & Engineering, 2013-03-20)
Anonymous communication systems protect the privacy of their users by hiding who is communicating with whom. With the widespread use of the Internet, anonymity systems are all the more essential to support applications ...
Quantitative Analysis Of Surface Enhanced Raman Spectra
(Computer Science & Engineering, 2013-10-22)
Quantitative analysis of Raman spectra using surface-enhanced Raman scattering (SERS) nanoparticles has shown the potential and promising trend of development in vivo molecular imaging. One of the key job is from the ...
Development And Simulation Of Focus Of Attention Using Reinforcement Learning And Function Approximation
(Computer Science & Engineering, 2013-10-22)
Without short-term memory, people would have little hope to learn and accomplish tasks. The same can be said for artificially intelligent agents. Often referred as Miller's Law, the number of working objects that a human ...
Shaping And Maintenance Of Low-latency Anonymity Systems
(Computer Science & Engineering, 2013-03-20)
Surveillance of users on the Internet is growing. This makes it increasingly important to protect users' identity when they communicate online, especially for users like journalists, whistleblowers, and military officials. ...
Implementation Of A Middleware Architecture For Collaboration Among Mobile Devices In Opportunistic Networks.
(Computer Science & Engineering, 2013-03-20)
Opportunistic networks provide a viable platform for mobile communications due to the ubiquity of smart phones. These networks are characterized by lack of end to-end reliable connections. In such networks, establishing ...
Effective And Secure Use Of Human Relation Networks
(Computer Science & Engineering, 2013-03-20)
With the advent of Web 2.0 and advanced techniques of wireless devices (e.g., smart phones or iPhones), Online Social Networks (OSNs) and Mobile Social Networks (MSNs) are becoming integral part of our lives as two main ...
Hydrological Visualization And Analysis System And Drought Related Feature Selection Based On Sectional Correlation Measurement
(Computer Science & Engineering, 2013-03-20)
Because of the larger data storage and the faster computational power, computer can process and store much finer resolution data. Aside from data analysis, data visualization is also an important task to understand the ...
Control Framework Dynamic Walking Of A Bipedal Robot
(Computer Science & Engineering, 2013-03-20)
Despite significant progress in recent years, the capabilities of today's Humanoid robots still lack behind the walking abilities of humans in terms of competence, robustness, flexibility, and speed. Furthermore, unknown ...
Reducing The Complexity Of Reinforcement Learning In POMDPs By Decomposition Into Decision And Perceptual Processes
(Computer Science & Engineering, 2013-03-20)
Markov Decision Processes (MDPs) and Partially Observable Markov Decision Processes (POMDPs) are very powerful and general frameworks to model decision and decision learning tasks in a wide range of problem domains. As a ...