Theses/Dissertations from 2010
Towards Comparative Web Content Mining using Object Oriented Model, Titas Mutsuddy
Heuristics for Cultural Algorithm Knowledge Driven Search in Dynamic Social Systems, Viranthi Peiris
An Optimal Score Fusion Strategy For a Multimodal Biometric Authentication System for Mobile Device, Md. Saifur Rahim
Finding 3-edge-connected components in parallel, Yuan Ru
Four Mode Based Dialogue Management with Modified POMDP Model, Sabiha Sathulla
Mobile robot localization failure recovery, Sepideh Seifzadeh
Analysis and Design of Speech-Recognition Grammars, Yue Shi
Collective cluster-based map merging in multi robot SLAM, Ahmad Soleimani
Microarray time-series data clustering via gene expression profile alignment, K M Numanul Hoque Subhani
Sensitivity in Service Design for the Development of SOA Based Systems, Mohit Sud
Delta bloom filter compression using stochastic learning-based weak estimation, Priyanka Trivedi
Curve reconstruction: Experimental comparison and certification, Chong Wang
Path Protection in Translucent WDM Optical Networks, Dou Wang
Crawling Deep Web using a GA-based set covering algorithm, Shaohua Wang
Two improved methods for mobile robot localization, Yuefeng Wang
3D Reconstruction Using a Stereo Vision System with Simplified Inter-Camera Geometry, Zhuo Wang
Power law in XML schema metrics, Yanyin Zhang
Theses/Dissertations from 2009
Spatio-Temporal Context in Agent-Based Meeting Scheduling, Hijaz Al-Ani
Extending Scojo-PECT by migration based on system-level checkpointing, Peiyu Cai
Grid-job scheduling with reservations and preemption, Xiaorong Cao
WebVoice: Speech Access to Traditional Web Content for Blind Users, Shahriar Chandon
Bring Consciousness to Mobile Robot Being Localized, Jingxi Chen
Resource Allocation in Survivable WDM Networks Under a Sliding Scheduled Traffic Model, Ying Chen
Testing in context: Efficiency and executability, Lihua Duan
Enabling reliable and power efficient real-time multimedia delivery over wireless sensor networks, Tarik El-Amsy
A Communication Choreography for Discrete Step MultiAgent Social Simulations, Muhammad Naushin Hasan
Backfilling with fairness and slack for parallel job scheduling, Wei Jin
Performance analysis of multimodal biometric systems – An automated statistical approach, Gaurav Kumar
Discovering the size of a deep web data source by coverage, Jie Liang
Improved web page traverse using genetic algorithm, Man Li
Aspect-Oriented Programming for Test Control, Siyuan Liu
A Distributed Algorithm for Finding Separation Pairs in a Computer Network, Katayoon Moazzami
Heuristic assignment of CPDs for probabilistic inference in junction trees, Mirza Tania Nasreen
NeuDetect: A neural network data mining system for wireless network intrusion detection, Md. Zillur Rahman
PathAB: A New Method to Estimate End-to-End Available Bandwidth of Network Path, Debashis Roy
Mining very long sequences with PLWAPLong algorithms, Kashif Saeed
Object Segmentation Using Active Contours: A Level Set Approach, Farnaz Shariat
Using Cultural Coevolution for Learning in General Game Playing, Shiven Sharma
Extending Scojo-PECT by migration based on application level checkpointing, Jiaying Shi
Bayesian Optimization Algorithm for Non-unique Oligonucleotide Probe Selection, Laleh Soltan Ghoraie
Design of Three-Tiered Sensor Networks with a Mobile Data Collector under Energy and Buffer Constraints, Da (Leah) Teng
Integrated placement and routing of relay nodes for fault-tolerant hierarchical sensor networks, Yufei Xu
Adaptive foreground segmentation using fuzzy approach, Huajing Yao
Optimal channel assignment and power control in wireless cellular networks, Xin Yu
G-LOMARC-TS: Lookahead group matchmaking for time/space sharing on multi-core parallel machines, Xijie Zeng
Theses/Dissertations from 2008
Control of constraint weights for an autonomous camera, Md. Shafiul Alam
Applications of CSP solving in computer games (camera control), Mohammed Liakat Ali
Application centric load balancing for distributed systems using genetic algorithm scheduling, Sheng Bai
A sensor-based online clustering approach for wireless intrusion detection, Ositadimma Maxwell Ejelike
Group-based optimization for parallel job scheduling in clusters via heuristic search, Arun Kumar Kanavallil
Minimal siRNA set cover heuristic for gene family knockdown, Xiaoguang Li
An evaluation between Bloom Filter join and PERF join in Distributed Query Processing, Ming Pei
Intervention in the social population space of Cultural Algorithm, Shamual F. Rahaman
A new scheme for fault tolerant traffic grooming in WDM optical networks, Quazi R Rahman
WiFi Miner: An online apriori and sensor based wireless network Intrusion Detection System, S S Ahmedur Rahman
Self-adjusting multi-granularity locking protocol for object-oriented databases, Deepa Saha
An Improved Approach For Multi-Robot Localization, Huaicheng Su
Non-Unique oligonucleotide probe selection heuristics, Lili Wang
AdamRTP: Adaptive multi-flow real-time multimedia transport protocol for Wireless Sensor Networks, Aniss Zakaria
Theses/Dissertations from 2007
Memory-constrained pathfinding algorithms for partially-known environments, Denton Cockburn
Curve reconstruction based on the relative neighbourhood graph., Augustus Kumar Das
On the implementation and refinement of outerplanar graph algorithms., Tao Deng
A statistical approach towards performance analysis of multimodal biometrics systems, Wei Gan
Path propagation : a probabilistic inference algorithm for large and complex Bayesian networks, Liu He
Use of regular topology in logical topology design., Chun-Hsien Vic Ho
A statistic approach of multi-factor sensitivity analysis for service-oriented software systems., Chunjiao Ji
Investigation of Downey model for speedup prediction, Lin Lan
Complete and equivalent query rewriting using views., Minghao Li
Empirical study of Gene Ontology based Microarray clustering., Tianbing Lin
Improved I/O-efficient algorithms for solving graph connectivity, biconnectivity problems., Shan Li
A study of three-edge connectivity algorithms - Refinement and implementation, Nima Norouzi
Generating synchronizable test sequences with overlaps, Bahman Radjabalipour
A web service based architecture for authorization of unknown entities in a Grid environment., Jordan Rivington
An efficient parallel algorithm for haplotype inference based on rule based approach and consensus methods., Qamar Saeed
Enhanced traverse of Web pages., Yan Wang
An adaptive approach for QoS-aware Web service composition, Zhiyang Wang
Improving the lifetime of two-tiered sensor networks using genetic algorithm, Md. Shamsul Wazed
Implementing IPsec using the Five-layer security framework and FPGAs., James Wiebe
Neural network-based shape retrieval using fuzzy clustering and moment-based representations., Nan Xing
Downloading data from textual deep Web using clustering., Xiaolei Yuan
Dynamic backtracking for general CSPs., Kan Yu
Theses/Dissertations from 2006
Feature-based tracking of multiple people for intelligent video surveillance., Mohammad Ahsan Ali
Optimization strategies for two-tiered sensor networks., Ataul Bari
On some geometric optimization problems., Samidh Chatterjee
SensorWebIDS: A sensor with misuse and anomaly based data mining technique for web intrusion detection., Jingyu Dong
Using Web services choreography to support an extensible and flexible system development process, M. H. Emami Khansari
Enhanced QoS for real-time multimedia delivery over the wireless link using RFID technology., Mythili Enugula
Integrated hybrid channel assignment and distributed power control in wireless mobile networks using evolution strategy., Tahira Farid
ATOP-grid for unified multidimensional adaptation of grid applications., Garima Gupta
Efficient combinator parsing for natural-language., Rahmatullah Hafiz
Automatic translation of formal data specifications to voice data-input applications., Fadi Hanna
Background modeling for intelligent video surveillance system., Simeon Immanuel Kiran Indupalli
A semantic partition based text mining model for document classification., Catherine Inibhunu
Rational hierarchical planning and coordination in multi-agent systems., Dong Liang
Cleaning Web pages for effective Web content mining., Jing Li
XML Schema subtyping., Yun Li
Using X+V to construct a non-proprietary speech browser for a public-domain SpeechWeb, Xiaoli Ma