1 - 25 of 14
Number of results to display per page
AuthorTitleSubjectDatePublication Type
1 Wong, Roy Y.Moran's I Spacial auto-correlation and anomaly detection utilizing PCA and high dimensional feature vectorsComputer science2017thesis
2 Brown, HunterUsing geometric primitives to unify perception and action for object-based manipulationRobotics; Artificial intelligence; Computer science2018thesis
3 Singhal, ShwetaTraining a restricted boltzmann machine using spatial Markov random field priors on weightsComputer science2017thesis
4 Balasubramanian, AbhiramTowards a Fast NVMe Layer for a Decomposed KernelComputer science2017thesis
5 Kunz, JoshuaXNET: capability enabled cloud access control systemComputer science2017thesis
6 Robison, Braden DevinHybrid scheduling for graph-based algorithm decomposition in high-performance computing environmentsComputer Engineering; Computer science2014thesis
7 Kesavan, AnirajMaking large transfers fast for in-memory databases in modern networksComputer science2017thesis
8 Melville, JosephStructural damage detection using dictionary learningElectrical engineering; Mechanical engineering; Computer science2017thesis
9 Ward, Stephen J.Deformation embedding for point-based elastoplastic simulationComputer science; Elastoplastic materials2012-08thesis
10 Subramanyam, Naveen DasaEfficient switching between WiFi and cellular networks for robust internet connectivityCellular; Internet; Networks; Smartphone; Wifi; Computer science2014-08thesis
11 Raj, MukundEffect of animated self-avatar in virtual environmentsAvatars; Virtual environment; Behavioral psychology; Computer science2013-08thesis
12 Maheshwari, ManasEnhancing reliability in device-free localizationDevice free localization; Localization; Security; Sensor networks; Tracking; Computer science2011-08thesis
13 Seth, ManavEmergency service in WI-FI networks without access point association911; Emergency service; Networks; Wi-Fi; Emergency reporting systems; Computer science2011-08thesis
14 Clark, Michael R.Enhancing covert communications with colluding receiversCommunications; Covert; Computer science2010thesis
1 - 25 of 14