Computer Science Dissertations

 

Follow


Dissertations from 2022

PDF

Representation learning on heterogeneous spatiotemporal networks, Dakshak Keerthi Chandra

PDF

SECURE AND EFFICIENT INFORMATION MANAGEMENT IN DELAY(DISRUPTION) TOLERANT NETWORK, Shudip Datta

PDF

Social media analytics with applications in disaster management and COVID-19 events, Md Yasin Kabir

PDF

Secured information dissemination and misbehavior detection in VANETs, Ayan Roy

PDF

Persistent Stealthy Attacks and their Detection in Large Distributed Cyber-Physical Systems, Simon Bech Thougaard

Dissertations from 2021

PDF

Data and resource management in wireless networks via data compression, GPS-free dissemination, and learning, Xiaofei Cao

PDF

Secure data sharing in cloud and IoT by leveraging attribute-based encryption and blockchain, MD Azharul Islam

PDF

Security against data falsification attacks in smart city applications, Venkata Praveen Kumar Madhavarapu

PDF

Robustness against attacks and uncertainties in smart cyber-physical systems, Prithwiraj Roy

Dissertations from 2020

PDF

Novel approaches for constructing persistent Delaunay triangulations by applying different equations and different methods, Esraa Habeeb Khaleel Al-Juhaishi

PDF

Attention mechanism in deep neural networks for computer vision tasks, Haohan Li

PDF

Towards efficacy and efficiency in sparse delay tolerant networks, Douglas John McGeehan

PDF

Cyber physical security of avionic systems, Anusha Thudimilla

PDF

Secure blockchains for cyber-physical systems, Matthew Edward Wagner

Dissertations from 2019

PDF

Predictive analysis of real-time strategy games using graph mining, Isam Abdulmunem Alobaidi

PDF

Structure and topology of transcriptional regulatory networks and their applications in bio-inspired networking, Satyaki Roy

PDF

Privacy preservation in social media environments using big data, Katrina Ward

Dissertations from 2018

PDF

Mining and analysis of real-world graphs, Armita Abedijaberi

PDF

Detecting cells and analyzing their behaviors in microscopy images using deep neural networks, Yunxiang Mao

PDF

Security risk assessment in cloud computing domains, Amartya Sen

Dissertations from 2017

PDF

Efficient algorithms for analyzing large scale network dynamics: Centrality, community and predictability, Sima Das

PDF

Fusion of non-visual and visual sensors for human tracking, Wenchao Jiang

PDF

Data analytics methods for attack detection and localization in wireless networks, Yi Ling

Dissertations from 2016

PDF

Models of leader elections and their applications, Stephen Curtis Jackson

PDF

Detecting, segmenting and tracking bio-medical objects, Mingzhong Li

PDF

Mechanisms for improving information quality in smartphone crowdsensing systems, Francesco Restuccia

PDF

Algorithms leveraging smartphone sensing for analyzing explosion events, Srinivas Chakravarthi Thandu

Dissertations from 2015

PDF

Information fusion architectures for security and resource management in cyber physical systems, Brijesh Kashyap Chejerla

PDF

Privacy-preserving query processing over encrypted data in cloud, Yousef M. Elmehdwi

PDF

VRCC-3D+: Qualitative spatial and temporal reasoning in 3 dimensions, Nathan Eloe

PDF

Quantification of information flow in cyber physical systems, Li Feng

PDF

Methods and algorithms for service selection and recommendation (preference and aggregation based), Kenneth Kofi Fletcher

PDF

Enabling near-term prediction of status for intelligent transportation systems: Management techniques for data on mobile objects, Lasanthi Nilmini Heendaliya

PDF

Privacy-preserving power usage control in smart grids, Huchun

PDF

Efficient cryptographic primitives: Secure comparison, binary decomposition and proxy re-encryption, Feng Li

PDF

Distributed state verification in the smart grid using physical attestation, Thomas Patrick Roth

Dissertations from 2014

PDF

Privacy and trustworthiness management in moving object environments, Sashi Gurung

PDF

Multiple security domain nondeducibility in cyber-physical systems, Gerry W. Howser

PDF

Energy efficient security and privacy management in sensor clouds, Vimal Kumar

PDF

Energy aware and privacy preserving protocols for ad hoc networks with applications to disaster management, Mayank Raj

PDF

Foundations of coverage algorithms in autonomic mobile sensor networks, Mark Edward Snyder

PDF

Energy efficient and latency aware adaptive compression in wireless sensor networks, Thomas Mark Daniel Szalapski

PDF

Proactive search: Using outcome-based dynamic nearest-neighbor recommendation algorithms to improve search engine efficacy, Christopher Shaun Wagner

PDF

Cross-layer schemes for performance optimization in wireless networks, Quanmin Ye

Dissertations from 2013

PDF

Verification of information flow security in cyber-physical systems, Rav Akella

PDF

Polarization and opinion analysis in an online argumentation system for collaborative decision support, Ravi Santosh Arvapally

PDF

Social-context based routing and security in delay tolerant networks, Roy A. Cabaniss

PDF

Location based services in wireless ad hoc networks, Neelanjana Dutta

PDF

Exploring run-time reduction in programming codes via query optimization and caching, Venkata Krishna Suhas Nerella

PDF

Privacy-preserving friend recommendations in online social networks, Bharath Kumar Samanthula

Dissertations from 2012

PDF

Evolutionary computing driven search based software testing and correction, Joshua Lee Wilkerson

Dissertations from 2011

PDF

CEEME: compensating events based execution monitoring enforcement for Cyber-Physical Systems, Thoshitha T. Gamage

PDF

Cross-layer design for network performance optimization in wireless networks, Xuan Gong

Dissertations from 2010

PDF

Deadlock detection and dihomotopic reduction via progress shell decomposition, David Andrew Cape

PDF

Computational methods for the discovery and analysis of genes and other functional DNA sequences, Cyriac Kandoth

PDF

Protein secondary structure prediction using BLAST and relaxed threshold rule induction from coverings, Leong Lee

PDF

Structure and content semantic similarity detection of eXtensible markup language documents using keys, Waraporn Viyanon

Dissertations from 2008

PDF

Energy efficient clustering and secure data aggregation in wireless sensor networks, Julia Albath

The art of parameterless evolutionary algorithms, Ekaterina A. Holdener

Lattice matching for detecting distributed intrusions, Sule Simsek

PDF

Business-oriented Software Process Improvement based on CMM and CMMI using QFD, Yan Sun

Dissertations from 2007

The stored non-domination level multi-objective evolutionary algorithm, Matt D. Johnson

Problems and solutions for handling attacks in sensor networks, Jian Yin

Dissertations from 2006

Energy efficient key management protocols to secure sensor networks, Biswajit Panja

Dissertations from 2005

Moving object detection and tracking for event-based video analysis, Filiz Bunyak

Dissertations from 2004

Computational intelligence and the traveling salesman, Samuel A. Mulder

A generalization based hybrid algorithm for clustering semi-structured data, Ming-Yi Shih

Dissertations from 2002

Improving high-dimensional indexing for content-based image retrieval, Jui-Che Teng

Dissertations from 1999

An intelligent software design argumentation methodology for capturing and analyzing design rationale from multiple perspectives, Scott L. Sigman

Dissertations from 1997

GALS: genetic algorithms plus local search to solve the satisfiability problem, Nicole Anne Nemer-Preece

Dissertations from 1996

Efficient parallel algorithms on reconfigurable mesh architectures, Hsi-Chieh Lee

Parallel fast multipole algorithms for N-Body simulations, Jui-Lin Lu

An automated modular approach to the segmentation and inspection of printed circuit boards, Madhav Moganti

Run time security evaluation for distributed applications, Cristina Serban

A declarative approach to understanding program behavior through program visualization, Aggie Yee-Chun Sun

Dissertations from 1994

A Connectionist approach to database mining in the computation of group job classifications and task clusters from occupational survey data, Ruth Sue Dare

The Formal description of resource deadlock in distributed systems, Pei-Yu Li

Using temporal subsumption to generate efficient error-detecting distributed algorithms, Martina Schollmeyer

Providing assurance for responsive computing systems, Su-Mei Grace Tsai

Dissertations from 1993

PDF

Genetic algorithms with 3-parent crossover, L. Vincent Edmondson

PDF

The design, analysis, and implementation of parallel simulated annealing and parallel genetic algorithms for the composite graph coloring problem, Brent S. Elmer

PDF

The interpolating random spline cryptosystem and the chaotic-map public-key cryptosystem, Fengi Hwu

PDF

The difficulty of approximating the chromatic number for random composite graphs, Jeffrey W. Jenness

PDF

Fault-tolerant ring embeddings in hypercubes -- A reconfigurable approach, Jun-Lin Liu

PDF

Considerations for rapidly converging genetic algorithms designed for application to problems with expensive evaluation functions, Richard Patrick Rankin

Dissertations from 1992

The software operational requirements specification: a rule-based expert system approach, Ming-Yen Chi

PDF

Relaxing synchronization in distributed simulated annealing, Chul-Eui Hong

Fault tolerance in concurrent systems through formal methods, Hanan Lutfiyya

PDF

Constrained completion: Theory, implementation, and results, Daniel Patrick Murphy

An inferencing language system for automated graphic reasoning, Paul Scarponcini

The management of replicated data, Hsueh-Chi Shih

Dissertations from 1990

PDF

Robot pedagogics: The adaptation, analysis, and computer control of a model manipulator, Edward T. Hammerand

In search of the optimal adaptive load sharing policy for distributed systems, Yuh-Jong Hu

PDF

HIGHLAND: A graph-based parallel processing environment for heterogeneous local area networks, Douglas E. Meyer

PDF

Algorithms and probabilistic bounds for the chromatic number of random composite graphs, Jack L. Oakes

Dissertations from 1989

PDF

Graph coloring algorithms on random graphs, Shi-Jen Lin

PDF

The directed Steiner problem on graphs: A simulated annealing approach, Lawrence Joseph Osborne

Dissertations from 1988

PDF

Complete sets of reductions modulo A class of equational theories which generate infinite congruence classes, Timothy B. Baird

PDF

An integrated programming environment for pseudo-code development, IPE-PC, Nurcan Coskun

PDF

The role of term symmetry in E-unification and E-completion, Blayne E. Mayfield