Follow

Theses/Dissertations from 2010

PDF

Evidence Fusion using D-S Theory: utilizing a progressively evolving reliability factor in wireless networks, Aqila Dissanayake

PDF

Resource Characteristic Based Optimization for Grid Scheduling, Peng Du

PDF

Coarse-grain time sharing with advantageous overhead minimization for parallel job scheduling, Bryan Esbaugh

PDF

Surprise: An Alternative Qualitative Uncertainty Model, Zina Ibrahim

PDF

An Efficient Scheme for Non-bifurcated Traffic Grooming in WDM Networks, Syed Jabbar

PDF

Efficient Probabilistic Inference Algorithms for Cooperative Multiagent Systems, Hongxuan Jin

PDF

Mining of uncertain Web log sequences with access history probabilities, Olalekan Habeeb Kadri

PDF

Retrieval of Spatially Similar Images using Quadtree-based Indexing, Naimul Khan

PDF

Towards A Quasi High Level Compiler Comparative and Attributive Model for OpenMP Programs, Mohammed F. Mokbel

PDF

Disjoint Inter-Camera Tracking in the Context of Video-Surveillance, Trevor Montcalm

PDF

Towards Comparative Web Content Mining using Object Oriented Model, Titas Mutsuddy

PDF

Heuristics for Cultural Algorithm Knowledge Driven Search in Dynamic Social Systems, Viranthi Peiris

PDF

An Optimal Score Fusion Strategy For a Multimodal Biometric Authentication System for Mobile Device, Md. Saifur Rahim

PDF

Finding 3-edge-connected components in parallel, Yuan Ru

PDF

Four Mode Based Dialogue Management with Modified POMDP Model, Sabiha Sathulla

PDF

Mobile robot localization failure recovery, Sepideh Seifzadeh

PDF

Analysis and Design of Speech-Recognition Grammars, Yue Shi

PDF

Collective cluster-based map merging in multi robot SLAM, Ahmad Soleimani

PDF

Microarray time-series data clustering via gene expression profile alignment, K M Numanul Hoque Subhani

PDF

Sensitivity in Service Design for the Development of SOA Based Systems, Mohit Sud

PDF

Delta bloom filter compression using stochastic learning-based weak estimation, Priyanka Trivedi

PDF

Curve reconstruction: Experimental comparison and certification, Chong Wang

PDF

Path Protection in Translucent WDM Optical Networks, Dou Wang

PDF

Crawling Deep Web using a GA-based set covering algorithm, Shaohua Wang

PDF

Two improved methods for mobile robot localization, Yuefeng Wang

PDF

3D Reconstruction Using a Stereo Vision System with Simplified Inter-Camera Geometry, Zhuo Wang

PDF

How dependencies affect the capability of several feature selection approaches to extract important variables, Qin Yang

PDF

Power law in XML schema metrics, Yanyin Zhang

Theses/Dissertations from 2009

PDF

Spatio-Temporal Context in Agent-Based Meeting Scheduling, Hijaz Al-Ani

PDF

Extending Scojo-PECT by migration based on system-level checkpointing, Peiyu Cai

PDF

Grid-job scheduling with reservations and preemption, Xiaorong Cao

PDF

WebVoice: Speech Access to Traditional Web Content for Blind Users, Shahriar Chandon

PDF

Bring Consciousness to Mobile Robot Being Localized, Jingxi Chen

PDF

Resource Allocation in Survivable WDM Networks Under a Sliding Scheduled Traffic Model, Ying Chen

PDF

Testing in context: Efficiency and executability, Lihua Duan

PDF

Enabling reliable and power efficient real-time multimedia delivery over wireless sensor networks, Tarik El-Amsy

PDF

A Communication Choreography for Discrete Step MultiAgent Social Simulations, Muhammad Naushin Hasan

PDF

Backfilling with fairness and slack for parallel job scheduling, Wei Jin

PDF

Performance analysis of multimodal biometric systems – An automated statistical approach, Gaurav Kumar

PDF

Discovering the size of a deep web data source by coverage, Jie Liang

PDF

Improved web page traverse using genetic algorithm, Man Li

PDF

Aspect-Oriented Programming for Test Control, Siyuan Liu

PDF

A Distributed Algorithm for Finding Separation Pairs in a Computer Network, Katayoon Moazzami

PDF

Heuristic assignment of CPDs for probabilistic inference in junction trees, Mirza Tania Nasreen

PDF

NeuDetect: A neural network data mining system for wireless network intrusion detection, Md. Zillur Rahman

PDF

PathAB: A New Method to Estimate End-to-End Available Bandwidth of Network Path, Debashis Roy

PDF

Mining very long sequences with PLWAPLong algorithms, Kashif Saeed

PDF

Object Segmentation Using Active Contours: A Level Set Approach, Farnaz Shariat

PDF

Using Cultural Coevolution for Learning in General Game Playing, Shiven Sharma

PDF

Extending Scojo-PECT by migration based on application level checkpointing, Jiaying Shi

PDF

Bayesian Optimization Algorithm for Non-unique Oligonucleotide Probe Selection, Laleh Soltan Ghoraie

PDF

Design of Three-Tiered Sensor Networks with a Mobile Data Collector under Energy and Buffer Constraints, Da (Leah) Teng

PDF

Integrated placement and routing of relay nodes for fault-tolerant hierarchical sensor networks, Yufei Xu

PDF

Adaptive foreground segmentation using fuzzy approach, Huajing Yao

PDF

Optimal channel assignment and power control in wireless cellular networks, Xin Yu

PDF

G-LOMARC-TS: Lookahead group matchmaking for time/space sharing on multi-core parallel machines, Xijie Zeng

Theses/Dissertations from 2008

PDF

Control of constraint weights for an autonomous camera, Md. Shafiul Alam

PDF

Applications of CSP solving in computer games (camera control), Mohammed Liakat Ali

PDF

Application centric load balancing for distributed systems using genetic algorithm scheduling, Sheng Bai

A sensor-based online clustering approach for wireless intrusion detection, Ositadimma Maxwell Ejelike

Link

Group-based optimization for parallel job scheduling in clusters via heuristic search, Arun Kumar Kanavallil

PDF

Minimal siRNA set cover heuristic for gene family knockdown, Xiaoguang Li

PDF

An evaluation between Bloom Filter join and PERF join in Distributed Query Processing, Ming Pei

Link

Intervention in the social population space of Cultural Algorithm, Shamual F Rahaman

A new scheme for fault tolerant traffic grooming in WDM optical networks, Quazi R Rahman

PDF

WiFi Miner: An online apriori and sensor based wireless network Intrusion Detection System, S S Ahmedur Rahman

PDF

Self-adjusting multi-granularity locking protocol for object-oriented databases, Deepa Saha

PDF

An Improved Approach For Multi-Robot Localization, Huaicheng Su

PDF

Non-Unique oligonucleotide probe selection heuristics, Lili Wang

PDF

AdamRTP: Adaptive multi-flow real-time multimedia transport protocol for Wireless Sensor Networks, Aniss Zakaria

Theses/Dissertations from 2007

Link

Memory-constrained pathfinding algorithms for partially-known environments, Denton Cockburn

PDF

Curve reconstruction based on the relative neighbourhood graph., Augustus Kumar Das

PDF

On the implementation and refinement of outerplanar graph algorithms., Tao Deng

Link

A statistical approach towards performance analysis of multimodal biometrics systems, Wei Gan

Link

Path propagation : a probabilistic inference algorithm for large and complex Bayesian networks, Liu He

PDF

Use of regular topology in logical topology design., Chun-Hsien Vic Ho

PDF

A statistic approach of multi-factor sensitivity analysis for service-oriented software systems., Chunjiao Ji

Link

Investigation of Downey model for speedup prediction, Lin Lan

PDF

Complete and equivalent query rewriting using views., Minghao Li

PDF

Empirical study of Gene Ontology based Microarray clustering., Tianbing Lin

PDF

Improved I/O-efficient algorithms for solving graph connectivity, biconnectivity problems., Shan Li

PDF

A study of three-edge connectivity algorithms - Refinement and implementation, Nima Norouzi

Link

Generating synchronizable test sequences with overlaps, Bahman Radjabalipour

PDF

A web service based architecture for authorization of unknown entities in a Grid environment., Jordan Rivington

PDF

An efficient parallel algorithm for haplotype inference based on rule based approach and consensus methods., Qamar Saeed

PDF

Enhanced traverse of Web pages., Yan Wang

Link

An adaptive approach for QoS-aware Web service composition, Zhiyang Wang

Link

Improving the lifetime of two-tiered sensor networks using genetic algorithm, Md. Shamsul Wazed

PDF

Implementing IPsec using the Five-layer security framework and FPGAs., James Wiebe

PDF

Neural network-based shape retrieval using fuzzy clustering and moment-based representations., Nan Xing

PDF

Downloading data from textual deep Web using clustering., Xiaolei Yuan

PDF

Dynamic backtracking for general CSPs., Kan Yu

Link

Implementation of a Web Service Synthesis system based on query rewriting (Web Service Specification, Signature, Query rewriting, Query planning, Service plan), Chang Zhou

PDF

The extensible runtime infrastructure for particle simulations with data-space management and adaptive resource allocation., Yu Zou

Theses/Dissertations from 2006

Link

Feature-based tracking of multiple people for intelligent video surveillance., Mohammad Ahsan. Ali

Link

Optimization strategies for two-tiered sensor networks., Ataul. Bari

Link

On some geometric optimization problems., Samidh. Chatterjee

PDF

SensorWebIDS: A sensor with misuse and anomaly based data mining technique for web intrusion detection., Jingyu Dong

Link

Using Web services choreography to support an extensible and flexible system development process., M. H. Emami Khansari

Link

Enhanced QoS for real-time multimedia delivery over the wireless link using RFID technology., Mythili. Enugula