Recent Submissions

  • [2013-01-31] Fault-tolerant wireless sensor networks using evolutionary games 

    Ricardo, Villalon
    This dissertation proposes an approach to creating robust communication systems in wireless sensor networks, inspired by biological and ecological systems, particularly by evolutionary game theory. In this approach, a ...
  • [2013-01-31] Multivalent Random Walkers:A computational model of superdiffusive transport at the nanoscale 

    Olah, Mark Joseph
    We present a stochastic model and numerical simulation framework for a synthetic nanoscale walker that can be used to transport materials and information at superdiffusive rates in artificial molecular systems. Our ...
  • [2013-01-31] Energy conserving privacy enhancing algorithms for resource-constrained devices 

    Groat, Michael
    Resource-constrained devices such as wireless sensor networks, body area networks, or smart phones collect confidential and sensitive information about their users. Traditional solutions to protect these data, such as ...
  • [2013-01-31] Methods for speculatively bootstrapping better intrusion detection system performance 

    Fugate, Sunny
    During the last three decades, the designers of computer IDSs have been continuously challenged with performance bottlenecks and scalability issues. The number of threats is enormous. The performance of ID systems depends ...
  • [2012-08-27] Energy consumption in networks on chip : efficiency and scaling 

    Bezerra, George
    Computer architecture design is in a new era where performance is increased by replicating processing cores on a chip rather than making CPUs larger and faster. This design strategy is motivated by the superior energy ...
  • [2012-07-05] Privacy-preserving techniques for computer and network forensics 

    Shebaro, Bilal
    Clients, administrators, and law enforcement personnel have many privacy concerns when it comes to network forensics. Clients would like to use network services in a freedom-friendly environment that protects their privacy ...
  • [2011-08-31] Parallel network protocol stacks using replication 

    Sizemore, Charles Donour
    Computing applications demand good performance from networking systems. This includes high-bandwidth communication using protocols with sophisticated features such as ordering, reliability, and congestion control. Much of ...
  • [2011-08-30] Fine-grained reasoning about the security and usability trade-off in modern security tools 

    Al-Saleh, Mohammed I
    Defense techniques detect or prevent attacks based on their ability to model the attacks. A balance between security and usability should always be established in any kind of defense technique. Attacks that exploit the ...
  • [2011-02-09] Three algorithms for causal learning 

    Rammohan, Roshan Ram
    The field of causal learning has grown in the past decade, establishing itself as a major focus in artificial intelligence research. Traditionally, approaches to causal learning are split into two areas. One area involves ...
  • [2010-09-09] Security in network games 

    Navin, Rustagi
    Attacks on the Internet are characterized by several alarming trends: 1) increases in frequency; 2) increases in speed; and 3) increases in severity. Modern computer worms simply propagate too quickly for human detection. ...
  • [2010-06-28] Markov random field modeling of the spatial distribution of proteins on cell membranes 

    Zhang, Jun
    Cell membranes display a range of receptors that bind ligands and activate signaling pathways. Signaling is characterized by dramatic changes in membrane molecular topography, including the co-clustering of receptors with ...
  • [2010-06-28] Algorithms for self-healing networks 

    Trehan, Amitabh
    Many modern networks are reconfigurable, in the sense that the topology of the network can be changed by the nodes in the network. For example, peer-to-peer, wireless and ad-hoc networks are reconfigurable. More generally, ...
  • [2010-06-28] Efficient algorithms for phylogenetic post-analysis 

    Pattengale, Nicholas
    A variety of tasks are typically performed after a phylogenetic reconstruction proper -- tasks which fall under the category phylogenetic post-analysis. In this dissertation, we present novel approaches and efficient ...
  • [2010-06-28] Collective belief models for representing consensus and divergence in communities of Bayesian decision-makers 

    Greene, Kshanti
    Bayesian belief aggregation is the process of forming a consensus model from the probabilistic beliefs of multiple individuals. Preference aggregation attempts to find an optimal solution for a population considering each ...
  • [2010-06-28] A protocol reconfiguration and optimization system for MPI 

    Gorentla Venkata, Manjunath
    Modern high performance computing (HPC) applications, for example adaptive mesh refinement and multi-physics codes, have dynamic communication characteristics which result in poor performance on current Message Passing ...
  • [2010-02-09] Learning condition-specific networks 

    Roy, Sushmita
    Condition-specific cellular networks are networks of genes and proteins that describe functional interactions among genes occurring under different environmental conditions. These networks provide a systems-level view of ...
  • [2010-02-09] Term rewriting with built-in numbers and collection data structures 

    Falke, Stephan
    Term rewrite systems have been extensively used in order to model computer programs for the purpose of formal verification. This is in particular true if the termination behavior of computer programs is investigated, and ...
  • [2009-07-09] Improving the performance of parallel scientific applications using cache injection 

    Leon Borja, Edgar
    Cache injection is a viable technique to improve the performance of data-intensive parallel applications. This dissertation characterizes cache injection of incoming network data in terms of parallel application performance. ...
  • [2009-07-08] Distributed Internet security and measurement 

    Karlin, Josh
    The Internet has developed into an important economic, military, academic, and social resource. It is a complex network, comprised of tens of thousands of independently operated networks, called Autonomous Systems (ASes). ...
  • [2009-01-29] A hierarchical group model for programming sensor networks 

    Horey, James
    A hierarchical group model that decouples computation from hardware can characterize and aid in the construction of sensor network software with minimal overhead. Future sensor network applications will move beyond static, ...

View more