Computer Science Masters Theses
Theses from 2024
Enabling Smart Healthcare Applications Through Visible Light Communication Networks, Jack Manhardt
Time series anomaly detection using generative adversarial networks, Shyam Sundar Saravanan
Learn from the Past: using Peer Data to Improve Course Recommendations in Personalized Education, Colton Walker
Theses from 2023
Dynamic Discounted Satisficing Based Driver Decision Prediction in Sequential Taxi Requests, Sree Pooja Akula
MAT: Genetic Algorithms Based Multi-Objective Adversarial Attack on Multi-Task Deep Neural Networks, Nikola Andric
Computer Vision in Adverse Conditions: Small Objects, Low-Resoltuion Images, and Edge Deployment, Raja Sunkara
Theses from 2022
Maximising social welfare in selfish multi-modal routing using strategic information design for quantal response travelers, Sainath Sanga
Man-in-the-Middle Attacks on MQTT based IoT networks, Henry C. Wong
Theses from 2021
Biochemical assay invariant attestation for the security of cyber-physical digital microfluidic biochips, Fredrick Eugene Love II
Theses from 2020
On predicting stopping time of human sequential decision-making using discounted satisficing heuristic, Mounica Devaguptapu
Theses from 2019
Advanced techniques for improving canonical genetic programming, Adam Tyler Harter
Evolved parameterized selection for evolutionary algorithms, Samuel Nathan Richter
Design and implementation of applications over delay tolerant networks for disaster and battlefield environment, Karthikeyan Sachidanandam
Theses from 2018
Mixed-criticality real-time task scheduling with graceful degradation, Samsil Arefin
CARD: Concealed and remote discovery of IoT devices in victims' home networks, Sammie Lee Bush
Multiple security domain non deducibility in the FREEDM smart grid infrastructure, Manish Jaisinghani
Reputation and credit based incentive mechanism for data-centric message delivery in delay tolerant networks, Himanshu Jethawa
Solidification rate detection through solid-liquid interface tracking, Wei Luo
Cloud transactions and caching for improved performance in clouds and DTNs, Dileep Mardham
Cyber-physical security of an electric microgrid, Prashanth Palaniswamy
An approach for formal analysis of the security of a water treatment testbed, Sai Sidharth Patlolla
Analyzing large scale trajectory data to identify users with similar behavior, Tyler Clark Percy
A network tomography approach for traffic monitoring in smart cities, Ruoxi Zhang
Improved CRPD analysis and a secure scheduler against information leakage in real-time systems, Ying Zhang
Theses from 2017
Cyber-physical security of a chemical plant, Prakash Rao Dunaka
UFace: Your universal password no one can see, Nicholas Steven Hilbert
Multi stage recovery from large scale failure in interdependent networks, Maria Angelin John Bosco
Multiple security domain model of a vehicle in an automated vehicle system, Uday Ganesh Kanteti
Personalizing education with algorithmic course selection, Tyler Morrow
Decodable network coding in wireless network, Junwei Su
Multiple security domain nondeducibility air traffic surveillance systems, Anusha Thudimilla
Theses from 2016
Automated design of boolean satisfiability solvers employing evolutionary computation, Alex Raymond Bertels
Care-Chair: Opportunistic health assessment with smart sensing on chair backrest, Rakesh Kumar
Theses from 2015
Dependability analysis and recovery support for smart grids, Isam Abdulmunem Alobaidi
Sensor authentication in collaborating sensor networks, Jake Uriah Bielefeldt
Argumentation based collaborative software architecture design and intelligent analysis of software architecture rationale, NagaPrashanth Chanda
A Gaussian mixture model for automated vesicle fusion detection and classification, Haohan Li
Hyper-heuristics for the automated design of black-box search algorithms, Matthew Allen Martin
Aerial vehicle trajectory design for spatio-temporal task satisfaction and aggregation based on utility metric, Amarender Reddy Mekala
Design and implementation of a broker for cloud additive manufacturing services, Venkata Prashant Modekurthy
Cyber security research frameworks for coevolutionary network defense, George Daniel Rush
Energy disaggregation in NIALM using hidden Markov models, Anusha Sankara
Theses from 2014
Crime pattern detection using online social media, Raja Ashok Bolla
Energy efficient scheduling and allocation of tasks in sensor cloud, Rashmi Dalvi
A cloud brokerage architecture for efficient cloud service selection, Venkata Nagarjuna Dondapati
Access control delegation in the clouds, Pavani Gorantla
Evolving decision trees for the categorization of software, Jasenko Hosic
M-Grid : A distributed framework for multidimensional indexing and querying of location based big data, Shashank Kumar
Privacy preservation using spherical chord, Doyal Tapan Mukherjee
Top-K with diversity-M data retrieval in wireless sensor networks, Kiran Kumar Puram
On temporal and frequency responses of smartphone accelerometers for explosives detection, Srinivas Chakravarthi Thandu
Efficient data access in mobile cloud computing, Siva Naga Venkata Chaitanya Vemulapalli
An empirical study on symptoms of heavier internet usage among young adults, SaiPreethi Vishwanathan
Theses from 2013
Sybil detection in vehicular networks, Muhammad Ibrahim Almutaz
Security analysis of a cyber physical system : a car example, Jason Madden
Efficient integrity verification of replicated data in cloud, Raghul Mukundan
Search-based model summarization, Lokesh Krishna Ravichandran
Hybridizing and applying computational intelligence techniques, Jeffery Scott Shelburg
Secure design defects detection and correction, Wenquan Wang
Theses from 2012
Robust evolutionary algorithms, Brian Wesley Goldman
Semantic preserving text tepresentation and its applications in text clustering, Michael Howard
Vehicle path verification using wireless sensor networks, Gerry W. Howser
Distributed and collaborative watermarking in relational data, Prakash Kumar
Theses from 2011
A social network of service providers for trust and identity management in the Cloud, Makarand Bhonsle
Adaptive rule-based malware detection employing learning classifier systems, Jonathan Joseph Blount
A low-cost motion tracking system for virtual reality applications, Abhinav Chadda
Optimization of textual affect entity relation models, Ajith Cherukad Jose
MELOC - memory and location optimized caching for mobile Ad hoc networks, Lekshmi Manian Chidambaram
A framework for transparent depression classification in college settings via mining internet usage patterns, Raghavendra Kotikalapudi
An incentive based approach to detect selfish nodes in Mobile P2P network, Hemanth Meka
Location privacy policy management system, Arej Awodha Muhammed
Exploring join caching in programming codes to reduce runtime execution, Swetha Surapaneni
Theses from 2010
Event detection from click-through data via query clustering, Prabhu Kumar Angajala
Population control in evolutionary algorithms, Jason Edward Cook
Dynamic ant colony optimization for globally optimizing consumer preferences, Pavitra Dhruvanarayana
EtherAnnotate: a transparent malware analysis tool for integrating dynamic and static examination, Joshua Michael Eads
Representation and validation of domain and range restrictions in a relational database driven ontology maintenance system, Patrick Garrett. Edgett
Cloud security requirements analysis and security policy development using a high-order object-oriented modeling technique, Kenneth Kofi Fletcher
Multi axis slicing for rapid prototyping, Divya Kanakanala
Content based image retrieval for bio-medical images, Vikas Nahar
2-D path planning for direct laser deposition process, Swathi Routhu
Contribution-based priority assessment in a web-based intelligent argumentation network for collaborative software development, Maithili Satyavolu
An artificial life approach to evolutionary computation: from mobile cellular algorithms to artificial ecosystems, Shivakar Vulli
Intelligent computational argumentation for evaluating performance scores in multi-criteria decision making, Rubal Wanchoo
Minimize end-to-end delay through cross-layer optimization in multi-hop wireless sensor networks, Yibo Xu
Theses from 2009
Information flow properties for cyber-physical systems, Rav Akella
Exploring the use of a commercial game engine for the development of educational software, Hussain Alafaireet
Automated offspring sizing in evolutionary algorithms, André Chidi Nwamba
Theses from 2008
Image analysis techniques for vertebra anomaly detection in X-ray images, Mohammed Das
Cross-layer design through joint routing and link allocation in wireless sensor networks, Xuan Gong
A time series classifier, Christopher Mark Gore
Incorporation of evidences in an intelligent argumentation network for collaborative engineering design, Ekta Khudkhudia
PrESerD - Privacy ensured service discovery in mobile peer-to-peer environment, Santhosh Muthyapu
Co-optimization: a generalization of coevolution, Travis Service
Critical infrastructure protection and the Domain Name Service (DNS) system, Mark Edward Snyder
Co-evolutionary automated software correction: a proof of concept, Joshua Lee Wilkerson
Theses from 2007
A light-weight middleware framework for fault-tolerant and secure distributed applications, Ian Jacob Baird