|
|
Author | Title | Subject | Date | Publication Type |
1 |
|
Lewis, Thomas James | A GPU-based maximal independent set aggregation strategy: algorithms, comparisons, and applications withing algebraic multigrid | GPU; maximal independent set; multigrid | 2014-08 | thesis |
2 |
|
Machanavajhala, Swetha | Accent classification: learning a distrance metric over phonetic strings | Accent classification; Distance metric learning; Kernels; Machine learning; Speech recognition; Swetha Machanavajhala | 2013-12 | thesis |
3 |
|
Venkataraju, Kannan Umadevi | Automatic markup of neural cell membranes using boosted decision stumps | Decision making -- Data processing; Neural circuitry; Cell membranes | 2010 | thesis |
4 |
|
Montazerolzohour, Mohammad | Blue noise virtual point lights for global illumination | Computer Graphics; Global Illumination; Rendering; VPL | 2017 | thesis |
5 |
|
Joseph, Jithu | Cenet-- capability enabled networking: towards least-privileged networking | Access control in SDN; Capability based access control; Network access control; Network security; Security; Software defined networks | 2015 | thesis |
6 |
|
Stuart, David Alexander | Coarse tetrahedral meshing for interactive simulation | Animation; Meshing; Physics | 2013-05 | thesis |
7 |
|
Yadav, Nitin | Community-affinity: measuring strength of memberships of nodes in network communities | community-affinity; community-detection; graph clustering; graphs; network science | 2015 | thesis |
8 |
|
Simonic, Klemen | Concept aware co-occurrence and its applications | Concept co-occurrence; Isa relations; Query undertstanding; Short text understanding; Term co-occurrence | 2015-08 | thesis |
9 |
|
Jadhav, Shreeraj | Consistent representation of two-dimensional flow | Data analysis; Discrete methods; Vector fields; Two-dimensional flow | 2012-08 | thesis |
10 |
|
Redman, Simon | Critical reroute: A practical approach to network flow prioritization using segment routing | | 2019 | thesis |
11 |
|
Rudy, Gabe | CUDA-CHiLL: a programming language interface for GPGPU optimizations and code generation | CUDA-CHiLL; Programming language interface; GPGPU; Code generation; Programming languages (Electronic computers) ; Graphics processing units ; Application program interfaces (Computer software) | | thesis |
12 |
|
Ward, Stephen J. | Deformation embedding for point-based elastoplastic simulation | Computer science; Elastoplastic materials | 2012-08 | thesis |
13 |
|
Shanmugam, Praveen kumar | Deidtect - distributed elastic intrusion detection architecture | Cloud; Distributed Networking; Networking; Orchestration; SDN | 2016 | thesis |
14 |
|
Johnson, David Michael | Design and implementation of a mobile wireless sensor network testbed | Network simulation; Mobile Emulab | 2010-04-15 | thesis |
15 |
|
Nayak, Prashanth | Detecting and mitigating malware in virtual appliances | Detection; Expert systems; Malware; Mitigation; Virtual appliance; Virtual machine introspection | 2014-12 | thesis |
16 |
|
Gupta, Shobhit | Detecting and tracking human motion in variance-based radio tomography imaging | Blob Detection; OpenCV; Radio sensors; SVM | 2013-05 | thesis |
17 |
|
Fahimfar, Zahra | Detecting potential lensed galaxies behind foreground Galaxy targets using machine learning techniques | | 2018 | thesis |
18 |
|
Saha, Aakanksha | Detecting secrets in source code: using machine learning to reduce false positives | | 2019 | thesis |
19 |
|
Pagariya, Rohit | Direct equivalence testing of embedded software | Compiler testing; Embedded software; Equivalence testing; Verification | 2011-08 | thesis |
20 |
|
Raj, Mukund | Effect of animated self-avatar in virtual environments | Avatars; Virtual environment; Behavioral psychology; Computer science | 2013-08 | thesis |
21 |
|
Subramanyam, Naveen Dasa | Efficient switching between WiFi and cellular networks for robust internet connectivity | Cellular; Internet; Networks; Smartphone; Wifi; Computer science | 2014-08 | thesis |
22 |
|
Seth, Manav | Emergency service in WI-FI networks without access point association | 911; Emergency service; Networks; Wi-Fi; Emergency reporting systems; Computer science | 2011-08 | thesis |
23 |
|
Clark, Michael R. | Enhancing covert communications with colluding receivers | Communications; Covert; Computer science | 2010 | thesis |
24 |
|
Maheshwari, Manas | Enhancing reliability in device-free localization | Device free localization; Localization; Security; Sensor networks; Tracking; Computer science | 2011-08 | thesis |
25 |
|
Pokkunuri, Rama Krishna Sandeep | Exploiting example structure in multiple instance learning | Cutting plane optimization; Machine learning; Multiple instance learning; Structured prediction | 2011-05 | thesis |