Computer Science Dissertations
Dissertations from 2024
Secure and Privacy-Preserving Federated Learning with Rapid Convergence in Leo Satellite Networks, Mohamed Elmahallawy
Adversarial Transferability and Generalization in Robust Deep Learning, Tao Wu
Dissertations from 2022
Representation learning on heterogeneous spatiotemporal networks, Dakshak Keerthi Chandra
SECURE AND EFFICIENT INFORMATION MANAGEMENT IN DELAY(DISRUPTION) TOLERANT NETWORK, Shudip Datta
Social media analytics with applications in disaster management and COVID-19 events, Md Yasin Kabir
Secured information dissemination and misbehavior detection in VANETs, Ayan Roy
Persistent Stealthy Attacks and their Detection in Large Distributed Cyber-Physical Systems, Simon Bech Thougaard
Dissertations from 2021
Data and resource management in wireless networks via data compression, GPS-free dissemination, and learning, Xiaofei Cao
Secure data sharing in cloud and IoT by leveraging attribute-based encryption and blockchain, MD Azharul Islam
Security against data falsification attacks in smart city applications, Venkata Praveen Kumar Madhavarapu
Robustness against attacks and uncertainties in smart cyber-physical systems, Prithwiraj Roy
Dissertations from 2020
Novel approaches for constructing persistent Delaunay triangulations by applying different equations and different methods, Esraa Habeeb Khaleel Al-Juhaishi
Attention mechanism in deep neural networks for computer vision tasks, Haohan Li
Towards efficacy and efficiency in sparse delay tolerant networks, Douglas John McGeehan
Cyber physical security of avionic systems, Anusha Thudimilla
Secure blockchains for cyber-physical systems, Matthew Edward Wagner
Dissertations from 2019
Predictive analysis of real-time strategy games using graph mining, Isam Abdulmunem Alobaidi
Structure and topology of transcriptional regulatory networks and their applications in bio-inspired networking, Satyaki Roy
Privacy preservation in social media environments using big data, Katrina Ward
Dissertations from 2018
Mining and analysis of real-world graphs, Armita Abedijaberi
Detecting cells and analyzing their behaviors in microscopy images using deep neural networks, Yunxiang Mao
Security risk assessment in cloud computing domains, Amartya Sen
Dissertations from 2017
Fusion of non-visual and visual sensors for human tracking, Wenchao Jiang
Data analytics methods for attack detection and localization in wireless networks, Yi Ling
Dissertations from 2016
Models of leader elections and their applications, Stephen Curtis Jackson
Detecting, segmenting and tracking bio-medical objects, Mingzhong Li
Mechanisms for improving information quality in smartphone crowdsensing systems, Francesco Restuccia
Algorithms leveraging smartphone sensing for analyzing explosion events, Srinivas Chakravarthi Thandu
Dissertations from 2015
Information fusion architectures for security and resource management in cyber physical systems, Brijesh Kashyap Chejerla
Privacy-preserving query processing over encrypted data in cloud, Yousef M. Elmehdwi
VRCC-3D+: Qualitative spatial and temporal reasoning in 3 dimensions, Nathan Eloe
Quantification of information flow in cyber physical systems, Li Feng
Methods and algorithms for service selection and recommendation (preference and aggregation based), Kenneth Kofi Fletcher
Enabling near-term prediction of status for intelligent transportation systems: Management techniques for data on mobile objects, Lasanthi Nilmini Heendaliya
Privacy-preserving power usage control in smart grids, Huchun
Efficient cryptographic primitives: Secure comparison, binary decomposition and proxy re-encryption, Feng Li
Distributed state verification in the smart grid using physical attestation, Thomas Patrick Roth
Dissertations from 2014
Privacy and trustworthiness management in moving object environments, Sashi Gurung
Multiple security domain nondeducibility in cyber-physical systems, Gerry W. Howser
Energy efficient security and privacy management in sensor clouds, Vimal Kumar
Energy aware and privacy preserving protocols for ad hoc networks with applications to disaster management, Mayank Raj
Foundations of coverage algorithms in autonomic mobile sensor networks, Mark Edward Snyder
Energy efficient and latency aware adaptive compression in wireless sensor networks, Thomas Mark Daniel Szalapski
Proactive search: Using outcome-based dynamic nearest-neighbor recommendation algorithms to improve search engine efficacy, Christopher Shaun Wagner
Cross-layer schemes for performance optimization in wireless networks, Quanmin Ye
Dissertations from 2013
Verification of information flow security in cyber-physical systems, Rav Akella
Polarization and opinion analysis in an online argumentation system for collaborative decision support, Ravi Santosh Arvapally
Social-context based routing and security in delay tolerant networks, Roy A. Cabaniss
Location based services in wireless ad hoc networks, Neelanjana Dutta
Exploring run-time reduction in programming codes via query optimization and caching, Venkata Krishna Suhas Nerella
Privacy-preserving friend recommendations in online social networks, Bharath Kumar Samanthula
Dissertations from 2012
Evolutionary computing driven search based software testing and correction, Joshua Lee Wilkerson
Dissertations from 2011
CEEME: compensating events based execution monitoring enforcement for Cyber-Physical Systems, Thoshitha T. Gamage
Cross-layer design for network performance optimization in wireless networks, Xuan Gong
Dissertations from 2010
Deadlock detection and dihomotopic reduction via progress shell decomposition, David Andrew Cape
Computational methods for the discovery and analysis of genes and other functional DNA sequences, Cyriac Kandoth
Structure and content semantic similarity detection of eXtensible markup language documents using keys, Waraporn Viyanon
Dissertations from 2008
Energy efficient clustering and secure data aggregation in wireless sensor networks, Julia Albath
The art of parameterless evolutionary algorithms, Ekaterina A. Holdener
Lattice matching for detecting distributed intrusions, Sule Simsek
Business-oriented Software Process Improvement based on CMM and CMMI using QFD, Yan Sun
Dissertations from 2007
The stored non-domination level multi-objective evolutionary algorithm, Matt D. Johnson
Problems and solutions for handling attacks in sensor networks, Jian Yin
Dissertations from 2006
Energy efficient key management protocols to secure sensor networks, Biswajit Panja
Dissertations from 2005
Moving object detection and tracking for event-based video analysis, Filiz Bunyak
Dissertations from 2004
Computational intelligence and the traveling salesman, Samuel A. Mulder
A generalization based hybrid algorithm for clustering semi-structured data, Ming-Yi Shih
Dissertations from 2002
Improving high-dimensional indexing for content-based image retrieval, Jui-Che Teng
Dissertations from 1999
An intelligent software design argumentation methodology for capturing and analyzing design rationale from multiple perspectives, Scott L. Sigman
Dissertations from 1997
GALS: genetic algorithms plus local search to solve the satisfiability problem, Nicole Anne Nemer-Preece
Dissertations from 1996
Efficient parallel algorithms on reconfigurable mesh architectures, Hsi-Chieh Lee
Parallel fast multipole algorithms for N-Body simulations, Jui-Lin Lu
An automated modular approach to the segmentation and inspection of printed circuit boards, Madhav Moganti
Run time security evaluation for distributed applications, Cristina Serban
A declarative approach to understanding program behavior through program visualization, Aggie Yee-Chun Sun
Dissertations from 1994
The Formal description of resource deadlock in distributed systems, Pei-Yu Li
Using temporal subsumption to generate efficient error-detecting distributed algorithms, Martina Schollmeyer
Providing assurance for responsive computing systems, Su-Mei Grace Tsai
Dissertations from 1993
Genetic algorithms with 3-parent crossover, L. Vincent Edmondson
The interpolating random spline cryptosystem and the chaotic-map public-key cryptosystem, Fengi Hwu
The difficulty of approximating the chromatic number for random composite graphs, Jeffrey W. Jenness
Fault-tolerant ring embeddings in hypercubes -- A reconfigurable approach, Jun-Lin Liu
Considerations for rapidly converging genetic algorithms designed for application to problems with expensive evaluation functions, Richard Patrick Rankin
Dissertations from 1992
The software operational requirements specification: a rule-based expert system approach, Ming-Yen Chi
Relaxing synchronization in distributed simulated annealing, Chul-Eui Hong
Fault tolerance in concurrent systems through formal methods, Hanan Lutfiyya
Constrained completion: Theory, implementation, and results, Daniel Patrick Murphy
An inferencing language system for automated graphic reasoning, Paul Scarponcini
The management of replicated data, Hsueh-Chi Shih
Dissertations from 1990
Robot pedagogics: The adaptation, analysis, and computer control of a model manipulator, Edward T. Hammerand
In search of the optimal adaptive load sharing policy for distributed systems, Yuh-Jong Hu
HIGHLAND: A graph-based parallel processing environment for heterogeneous local area networks, Douglas E. Meyer
Algorithms and probabilistic bounds for the chromatic number of random composite graphs, Jack L. Oakes
Dissertations from 1989
Graph coloring algorithms on random graphs, Shi-Jen Lin
The directed Steiner problem on graphs: A simulated annealing approach, Lawrence Joseph Osborne
Dissertations from 1988
Complete sets of reductions modulo A class of equational theories which generate infinite congruence classes, Timothy B. Baird