Now showing items 21-29 of 29

  • [2012-07-05] Privacy-preserving techniques for computer and network forensics 

    Shebaro, Bilal
    Clients, administrators, and law enforcement personnel have many privacy concerns when it comes to network forensics. Clients would like to use network services in a freedom-friendly environment that protects their privacy ...
  • [2010-06-25] Programmer feedback and dynamic analysis to enable optimization in Java applications: the D.U.P.O. framework 

    Mohr, David
    It is inherently difficult for static analyses to make precise decisions about dynamic features of modern object-oriented languages. This makes it more difficult to apply optimizations aggressively. This thesis introduces ...
  • [2010-06-28] A protocol reconfiguration and optimization system for MPI 

    Gorentla Venkata, Manjunath
    Modern high performance computing (HPC) applications, for example adaptive mesh refinement and multi-physics codes, have dynamic communication characteristics which result in poor performance on current Message Passing ...
  • [2010-09-09] Security in network games 

    Navin, Rustagi
    Attacks on the Internet are characterized by several alarming trends: 1) increases in frequency; 2) increases in speed; and 3) increases in severity. Modern computer worms simply propagate too quickly for human detection. ...
  • [2011-02-08] Simulating the evolution of recruitment behavior in foraging Ants 

    Letendre, Kenneth
    Spatial heterogeneity in the distribution of food is an important determinant of species' optimal foraging strategies, and of the dynamics of populations and communities. In order to explore the interaction of food ...
  • [2010-02-09] Supervised manifold distance segmentation 

    Wang, Guanyu
    In this paper, I will propose a simple and robust method for image and volume data segmentation based on manifold distance metrics. In this approach, pixels in an image are not considered as points with color values arranged ...
  • [2010-02-09] Term rewriting with built-in numbers and collection data structures 

    Falke, Stephan
    Term rewrite systems have been extensively used in order to model computer programs for the purpose of formal verification. This is in particular true if the termination behavior of computer programs is investigated, and ...
  • [2011-02-09] Three algorithms for causal learning 

    Rammohan, Roshan Ram
    The field of causal learning has grown in the past decade, establishing itself as a major focus in artificial intelligence research. Traditionally, approaches to causal learning are split into two areas. One area involves ...
  • [2010-02-09] Using ant colony optimization for routing in microprocesors 

    Arora, Tamanna
    Power consumption is an important constraint on VLSI systems. With the advancement in technology, it is now possible to pack a large range of functionalities into VLSI devices. Hence it is important to find out ways to ...