Computer Science Masters Theses

Computer Science Masters Theses

 

Follow


Theses from 2017

PDF

Cyber-physical security of a chemical plant, Prakash Rao Dunaka

PDF

Personalizing education with algorithmic course selection, Tyler Morrow

PDF

Decodable network coding in wireless network, Junwei Su

Theses from 2016

PDF

Automated design of boolean satisfiability solvers employing evolutionary computation, Alex Raymond Bertels

PDF

Care-Chair: Opportunistic health assessment with smart sensing on chair backrest, Rakesh Kumar

Theses from 2015

PDF

Dependability analysis and recovery support for smart grids, Isam Abdulmunem Alobaidi

PDF

Sensor authentication in collaborating sensor networks, Jake Uriah Bielefeldt

PDF

Argumentation based collaborative software architecture design and intelligent analysis of software architecture rationale, NagaPrashanth Chanda

PDF

Hyper-heuristics for the automated design of black-box search algorithms, Matthew Allen Martin

PDF

Design and implementation of a broker for cloud additive manufacturing services, Venkata Prashant Modekurthy

PDF

Cyber security research frameworks for coevolutionary network defense, George Daniel Rush

PDF

Energy disaggregation in NIALM using hidden Markov models, Anusha Sankara

Theses from 2014

PDF

Crime pattern detection using online social media, Raja Ashok Bolla

PDF

Energy efficient scheduling and allocation of tasks in sensor cloud, Rashmi Dalvi

PDF

A cloud brokerage architecture for efficient cloud service selection, Venkata Nagarjuna Dondapati

PDF

Access control delegation in the clouds, Pavani Gorantla

PDF

Evolving decision trees for the categorization of software, Jasenko Hosic

PDF

M-Grid : A distributed framework for multidimensional indexing and querying of location based big data, Shashank Kumar

PDF

Privacy preservation using spherical chord, Doyal Tapan Mukherjee

PDF

Top-K with diversity-M data retrieval in wireless sensor networks, Kiran Kumar Puram

PDF

On temporal and frequency responses of smartphone accelerometers for explosives detection, Srinivas Chakravarthi Thandu

PDF

Efficient data access in mobile cloud computing, Siva Naga Venkata Chaitanya Vemulapalli

PDF

An empirical study on symptoms of heavier internet usage among young adults, SaiPreethi Vishwanathan

Theses from 2013

PDF

Sybil detection in vehicular networks, Muhammad Ibrahim Almutaz

PDF

Argumentation placement recommendation and relevancy assessment in an intelligent argumentation system, Nian Liu

PDF

Security analysis of a cyber physical system : a car example, Jason Madden

PDF

Efficient integrity verification of replicated data in cloud, Raghul Mukundan

PDF

Search-based model summarization, Lokesh Krishna Ravichandran

PDF

Hybridizing and applying computational intelligence techniques, Jeffery Scott Shelburg

PDF

Secure design defects detection and correction, Wenquan Wang

Theses from 2012

PDF

Robust evolutionary algorithms, Brian Wesley Goldman

PDF

Semantic preserving text tepresentation and its applications in text clustering, Michael Howard

PDF

Vehicle path verification using wireless sensor networks, Gerry Wayne Howser

PDF

Distributed and collaborative watermarking in relational data, Prakash Kumar

Theses from 2011

PDF

A social network of service providers for trust and identity management in the Cloud, Makarand Bhonsle

PDF

Adaptive rule-based malware detection employing learning classifier systems, Jonathan Joseph Blount

PDF

A low-cost motion tracking system for virtual reality applications, Abhinav Chadda

PDF

Optimization of textual affect entity relation models, Ajith Cherukad Jose

PDF

MELOC - memory and location optimized caching for mobile Ad hoc networks, Lekshmi Manian Chidambaram

PDF

A framework for transparent depression classification in college settings via mining internet usage patterns, Raghavendra Kotikalapudi

PDF

An incentive based approach to detect selfish nodes in Mobile P2P network, Hemanth Meka

PDF

Location privacy policy management system, Arej Awodha Muhammed

PDF

Exploring join caching in programming codes to reduce runtime execution, Swetha Surapaneni

Theses from 2010

PDF

Event detection from click-through data via query clustering, Prabhu Kumar Angajala

PDF

Population control in evolutionary algorithms, Jason Edward Cook

PDF

Dynamic ant colony optimization for globally optimizing consumer preferences, Pavitra Dhruvanarayana

PDF

EtherAnnotate: a transparent malware analysis tool for integrating dynamic and static examination, Joshua Michael Eads

PDF

Representation and validation of domain and range restrictions in a relational database driven ontology maintenance system, Patrick Garrett. Edgett

PDF

Cloud security requirements analysis and security policy development using a high-order object-oriented modeling technique, Kenneth Kofi Fletcher

PDF

Multi axis slicing for rapid prototyping, Divya Kanakanala

PDF

Content based image retrieval for bio-medical images, Vikas Nahar

PDF

2-D path planning for direct laser deposition process, Swathi Routhu

PDF

Contribution-based priority assessment in a web-based intelligent argumentation network for collaborative software development, Maithili Satyavolu

PDF

An artificial life approach to evolutionary computation: from mobile cellular algorithms to artificial ecosystems, Shivakar Vulli

PDF

Intelligent computational argumentation for evaluating performance scores in multi-criteria decision making, Rubal Wanchoo

PDF

Minimize end-to-end delay through cross-layer optimization in multi-hop wireless sensor networks, Yibo Xu

Theses from 2009

PDF

Information flow properties for cyber-physical systems, Rav Akella

PDF

Exploring the use of a commercial game engine for the development of educational software, Hussain Alafaireet

PDF

Automated offspring sizing in evolutionary algorithms, André Chidi Nwamba

Theses from 2008

PDF

Image analysis techniques for vertebra anomaly detection in X-ray images, Mohammed Das

PDF

Cross-layer design through joint routing and link allocation in wireless sensor networks, Xuan Gong

PDF

A time series classifier, Christopher Mark Gore

PDF

An economic incentive based routing protocol incorporating quality of service for mobile peer-to-peer networks, Anil Jade

Incorporation of evidences in an intelligent argumentation network for collaborative engineering design, Ekta Khudkhudia

PDF

PrESerD - Privacy ensured service discovery in mobile peer-to-peer environment, Santhosh Muthyapu

PDF

Co-optimization: a generalization of coevolution, Travis Service

PDF

Critical infrastructure protection and the Domain Name Service (DNS) system, Mark Edward Snyder

PDF

Co-evolutionary automated software correction: a proof of concept, Joshua Lee Wilkerson

Theses from 2007

PDF

A light-weight middleware framework for fault-tolerant and secure distributed applications, Ian Jacob Baird

Symbolic time series analysis using hidden Markov models, Nikhil Bhardwaj

Creation of XML view and propagation of updates to relational database, Janarthanan Eindhal

PDF

A quantitative study of gene identification techniques based on evolutionary rationales, Cyriac Kandoth

ADA-REP: adaptive searching and replication of images in mobile hierarchical peer-to-peer networks, Kumar Abhinay Rathore

Analysis of conflicts among non-functional requirements using integrated analysis of functional and non-functional requirements, Vishal Sadana

Vulnerability analysis of PLC-based SCADA systems over ethernet using attack trees and commercial-off-the-shelf (COTS) tools, Simrit Pal Singh

PDF

An open framework for highly concurrent hardware-in-the-loop simulation, Ryan C. Underwood

PDF

Sensor network coverage and data aggregation problem: solutions toward the maximum lifetime, Li Yin

PDF

Management of an intelligent argumentation network for a web-based collaborative engineering design environment, Man Zheng

Theses from 2006

Model checking control communication of a FACTS device, David Cape

Mobile agent based collaborative computing, Anil Kumar Venkata Phanindhrar Kakarla

Designing, managing and evaluating a social network based Information City for innovation success, Prashanth Kannan

An automated method for rapid identification of putative gene family members in plants, Ajay Mane

Busy tone multiple access with explicit denial of request (BTMA-NTS): a multiple access control scheme for wireless networks, Yadi Ma

Identification of character non-independence in phylogenetic data using parallelized rule induction from coverings, Bhagyesh Babubhai Patel

Argumentation for conflict resolution in collaborative design environment, Samir Raorane

Process control systems security analysis utilizing reverse engineering, Jason R. Trent

The development of a functionality-centric approach to software early risk assessment, Jayson P. Vucovich

Theses from 2005

A game engine application to visualize transport and light transmission of obscurant clouds, Gaurav Arya

Intrusion detection using fuzzy logic and evolutionary algorithm techniques, Monu Bambroo

Instructing the software systems development capstone experience: balancing professional development, communication, and engineering, Matt Buechler

Re-engineering of a distributed object infrastructure for heterogeneous enterprise computation of continual queries, Ritesh Harankhedkar

Numerical and parametrical analysis of higher order material models, Ekaterina A. Holdener

A systematic framework for structured object-oriented security requirements analysis, Sojan Markose

Training simulations of enclosed hazardous chemical events, Abhishek Misra

Approximate query processing using multilayered database model and inference control, Muthukumar Narayanan

Collaborative solid modeling using Java3D, Yamini Lakshmi Natarajan

Bio-inspired approaches for critical infrastructure protection: application of clonal selection principle for intrusion detection and FACTS placement, Kasthurirangan Parthasarathy

A framework and graphical user interface (GUI) for moving object simulation, Aparna Jyothi Patsa

XRe_lChang_eSQL: a change detection system for unordered XML documents, Sathyanarayanan Sundaram

An experimental evaluation of two distributed algorithms for validation of E-ticket protocols in a mobile computing environment, Abhishek Tripathi