Computer Science Masters Theses

 

Follow


Theses from 2024

PDF

Enabling Smart Healthcare Applications Through Visible Light Communication Networks, Jack Manhardt

PDF

Time series anomaly detection using generative adversarial networks, Shyam Sundar Saravanan

PDF

Learn from the Past: using Peer Data to Improve Course Recommendations in Personalized Education, Colton Walker

Theses from 2023

PDF

Dynamic Discounted Satisficing Based Driver Decision Prediction in Sequential Taxi Requests, Sree Pooja Akula

PDF

MAT: Genetic Algorithms Based Multi-Objective Adversarial Attack on Multi-Task Deep Neural Networks, Nikola Andric

PDF

Computer Vision in Adverse Conditions: Small Objects, Low-Resoltuion Images, and Edge Deployment, Raja Sunkara

Theses from 2022

PDF

Maximising social welfare in selfish multi-modal routing using strategic information design for quantal response travelers, Sainath Sanga

PDF

Man-in-the-Middle Attacks on MQTT based IoT networks, Henry C. Wong

Theses from 2021

PDF

Biochemical assay invariant attestation for the security of cyber-physical digital microfluidic biochips, Fredrick Eugene Love II

Theses from 2020

PDF

On predicting stopping time of human sequential decision-making using discounted satisficing heuristic, Mounica Devaguptapu

Theses from 2019

PDF

Advanced techniques for improving canonical genetic programming, Adam Tyler Harter

PDF

Evolved parameterized selection for evolutionary algorithms, Samuel Nathan Richter

PDF

Design and implementation of applications over delay tolerant networks for disaster and battlefield environment, Karthikeyan Sachidanandam

Theses from 2018

PDF

Mixed-criticality real-time task scheduling with graceful degradation, Samsil Arefin

PDF

CARD: Concealed and remote discovery of IoT devices in victims' home networks, Sammie Lee Bush

PDF

Multiple security domain non deducibility in the FREEDM smart grid infrastructure, Manish Jaisinghani

PDF

Reputation and credit based incentive mechanism for data-centric message delivery in delay tolerant networks, Himanshu Jethawa

PDF

Solidification rate detection through solid-liquid interface tracking, Wei Luo

PDF

Cloud transactions and caching for improved performance in clouds and DTNs, Dileep Mardham

PDF

Cyber-physical security of an electric microgrid, Prashanth Palaniswamy

PDF

An approach for formal analysis of the security of a water treatment testbed, Sai Sidharth Patlolla

PDF

Analyzing large scale trajectory data to identify users with similar behavior, Tyler Clark Percy

PDF

Precise energy efficient scheduling of mixed-criticality tasks & sustainable mixed-criticality scheduling, Sai Sruti

PDF

A network tomography approach for traffic monitoring in smart cities, Ruoxi Zhang

PDF

Improved CRPD analysis and a secure scheduler against information leakage in real-time systems, Ying Zhang

Theses from 2017

PDF

Cyber-physical security of a chemical plant, Prakash Rao Dunaka

PDF

UFace: Your universal password no one can see, Nicholas Steven Hilbert

PDF

Multi stage recovery from large scale failure in interdependent networks, Maria Angelin John Bosco

PDF

Multiple security domain model of a vehicle in an automated vehicle system, Uday Ganesh Kanteti

PDF

Personalizing education with algorithmic course selection, Tyler Morrow

PDF

Decodable network coding in wireless network, Junwei Su

PDF

Multiple security domain nondeducibility air traffic surveillance systems, Anusha Thudimilla

Theses from 2016

PDF

Automated design of boolean satisfiability solvers employing evolutionary computation, Alex Raymond Bertels

PDF

Care-Chair: Opportunistic health assessment with smart sensing on chair backrest, Rakesh Kumar

Theses from 2015

PDF

Dependability analysis and recovery support for smart grids, Isam Abdulmunem Alobaidi

PDF

Sensor authentication in collaborating sensor networks, Jake Uriah Bielefeldt

PDF

Argumentation based collaborative software architecture design and intelligent analysis of software architecture rationale, NagaPrashanth Chanda

PDF

A Gaussian mixture model for automated vesicle fusion detection and classification, Haohan Li

PDF

Hyper-heuristics for the automated design of black-box search algorithms, Matthew Allen Martin

PDF

Aerial vehicle trajectory design for spatio-temporal task satisfaction and aggregation based on utility metric, Amarender Reddy Mekala

PDF

Design and implementation of a broker for cloud additive manufacturing services, Venkata Prashant Modekurthy

PDF

Cyber security research frameworks for coevolutionary network defense, George Daniel Rush

PDF

Energy disaggregation in NIALM using hidden Markov models, Anusha Sankara

Theses from 2014

PDF

Crime pattern detection using online social media, Raja Ashok Bolla

PDF

Energy efficient scheduling and allocation of tasks in sensor cloud, Rashmi Dalvi

PDF

A cloud brokerage architecture for efficient cloud service selection, Venkata Nagarjuna Dondapati

PDF

Access control delegation in the clouds, Pavani Gorantla

PDF

Evolving decision trees for the categorization of software, Jasenko Hosic

PDF

M-Grid : A distributed framework for multidimensional indexing and querying of location based big data, Shashank Kumar

PDF

Privacy preservation using spherical chord, Doyal Tapan Mukherjee

PDF

Top-K with diversity-M data retrieval in wireless sensor networks, Kiran Kumar Puram

PDF

On temporal and frequency responses of smartphone accelerometers for explosives detection, Srinivas Chakravarthi Thandu

PDF

Efficient data access in mobile cloud computing, Siva Naga Venkata Chaitanya Vemulapalli

PDF

An empirical study on symptoms of heavier internet usage among young adults, SaiPreethi Vishwanathan

Theses from 2013

PDF

Sybil detection in vehicular networks, Muhammad Ibrahim Almutaz

PDF

Argumentation placement recommendation and relevancy assessment in an intelligent argumentation system, Nian Liu

PDF

Security analysis of a cyber physical system : a car example, Jason Madden

PDF

Efficient integrity verification of replicated data in cloud, Raghul Mukundan

PDF

Search-based model summarization, Lokesh Krishna Ravichandran

PDF

Hybridizing and applying computational intelligence techniques, Jeffery Scott Shelburg

PDF

Secure design defects detection and correction, Wenquan Wang

Theses from 2012

PDF

Robust evolutionary algorithms, Brian Wesley Goldman

PDF

Semantic preserving text tepresentation and its applications in text clustering, Michael Howard

PDF

Vehicle path verification using wireless sensor networks, Gerry W. Howser

PDF

Distributed and collaborative watermarking in relational data, Prakash Kumar

Theses from 2011

PDF

A social network of service providers for trust and identity management in the Cloud, Makarand Bhonsle

PDF

Adaptive rule-based malware detection employing learning classifier systems, Jonathan Joseph Blount

PDF

A low-cost motion tracking system for virtual reality applications, Abhinav Chadda

PDF

Optimization of textual affect entity relation models, Ajith Cherukad Jose

PDF

MELOC - memory and location optimized caching for mobile Ad hoc networks, Lekshmi Manian Chidambaram

PDF

A framework for transparent depression classification in college settings via mining internet usage patterns, Raghavendra Kotikalapudi

PDF

An incentive based approach to detect selfish nodes in Mobile P2P network, Hemanth Meka

PDF

Location privacy policy management system, Arej Awodha Muhammed

PDF

Exploring join caching in programming codes to reduce runtime execution, Swetha Surapaneni

Theses from 2010

PDF

Event detection from click-through data via query clustering, Prabhu Kumar Angajala

PDF

Population control in evolutionary algorithms, Jason Edward Cook

PDF

Dynamic ant colony optimization for globally optimizing consumer preferences, Pavitra Dhruvanarayana

PDF

EtherAnnotate: a transparent malware analysis tool for integrating dynamic and static examination, Joshua Michael Eads

PDF

Representation and validation of domain and range restrictions in a relational database driven ontology maintenance system, Patrick Garrett. Edgett

PDF

Cloud security requirements analysis and security policy development using a high-order object-oriented modeling technique, Kenneth Kofi Fletcher

PDF

Multi axis slicing for rapid prototyping, Divya Kanakanala

PDF

Content based image retrieval for bio-medical images, Vikas Nahar

PDF

2-D path planning for direct laser deposition process, Swathi Routhu

PDF

Contribution-based priority assessment in a web-based intelligent argumentation network for collaborative software development, Maithili Satyavolu

PDF

An artificial life approach to evolutionary computation: from mobile cellular algorithms to artificial ecosystems, Shivakar Vulli

PDF

Intelligent computational argumentation for evaluating performance scores in multi-criteria decision making, Rubal Wanchoo

PDF

Minimize end-to-end delay through cross-layer optimization in multi-hop wireless sensor networks, Yibo Xu

Theses from 2009

PDF

Information flow properties for cyber-physical systems, Rav Akella

PDF

Exploring the use of a commercial game engine for the development of educational software, Hussain Alafaireet

PDF

Automated offspring sizing in evolutionary algorithms, André Chidi Nwamba

Theses from 2008

PDF

Image analysis techniques for vertebra anomaly detection in X-ray images, Mohammed Das

PDF

Cross-layer design through joint routing and link allocation in wireless sensor networks, Xuan Gong

PDF

A time series classifier, Christopher Mark Gore

PDF

An economic incentive based routing protocol incorporating quality of service for mobile peer-to-peer networks, Anil Jade

PDF

Incorporation of evidences in an intelligent argumentation network for collaborative engineering design, Ekta Khudkhudia

PDF

PrESerD - Privacy ensured service discovery in mobile peer-to-peer environment, Santhosh Muthyapu

PDF

Co-optimization: a generalization of coevolution, Travis Service

PDF

Critical infrastructure protection and the Domain Name Service (DNS) system, Mark Edward Snyder

PDF

Co-evolutionary automated software correction: a proof of concept, Joshua Lee Wilkerson

Theses from 2007

PDF

A light-weight middleware framework for fault-tolerant and secure distributed applications, Ian Jacob Baird