Theses and Dissertations-Computer Science
Browse by
Recent Submissions
-
Social Network Analysis At Scale: Graph-based Analysis of Twitter Trends and Communities
(2020-11)Twitter's influence on society and communication has motivated research work in the past decade. A large percentage of existing research focuses on specific Twitter datasets bound by time, location, topic, hashtag, and the ... -
A Parallel Implementation of A Greedy TSP Algorithm
(2020-11)The Traveling Salesman Problem has often been used as an exploration ground for building heuristics to calculate the shortest path of a complete graph that traverse every vertex exactly once. This has a number of important ... -
Parallel Implementation of a Minimum Spanning Tree Algorithm
(2020-12)Building a Minimum Spanning Tree (MST) of a weighted undirected graph is an important step in various applications, including circuit design, and it is desirable to build the MST quickly. However, current well-known ... -
Parallelizing Path Exploration and Optimizing Constraint Solving for Efficient Symbolic Execution
(2020-10)Symbolic execution executes programs with symbolic inputs and systematically analyzes program behaviors by exploring all feasible paths. For each path it explores, it builds a path condition, and checks the path's ...
-
A View on Components of Software and Application Programming in Distributed Environments
(1992-08)We describe a view of application design in the modem programming environment in which reusability of software, network transparent display, and processing, vertically and horizontally, play an important role. We provide ...
-
Performance comparison of four token rings in simulated distributed computing environment
(2003-12)The concept of self-stabilization was first proposed by Dijkstra. A self-stabilization token ring can make guarantee for a system to recover to a legal state in finite time, regardless of what illegal state the system ...
-
Soft Quality of Service via TCP congestion signal delegation on aggregated flows
(2008-05)No abstract prepared. -
Dynamic key management for secure routing in LCRMRMG
(2003-12)Ad hoc mobile network (MANET) is characterized by its lack of fixed physical and administrative infrastructures (routers, server and stable communication links). As such MANET presents unparallel challenges in security. ...
-
Medical documentation automation for psychotherapists practicing in geriatric long-term care residential facilities
(2001-12)No abstract prepared. -
Optimizing OpenGL Based Software Systems through Reverse Engineering
(2007-12)Dynamic execution traces of the OpenGL application programming interface (API) were gathered to identify the functionalities provided by OpenGL. The traces were gathered from the open source implementation of the OpenGL ... -
-
The Discrete Leaky Integrate-and-fire Neuron Model Applied to Visual Tracking and Pattern Recognition
(2004-12)The Discrete Leaky Integrate-and-Fire (DLIF) neuron uses a simple discrete LIF neuron model that is capable of diverse spatio-temporal behavior. We explore the behavior of the DLIF when driven by periodic (coherent) and ... -
Movement Strategies for Intrusion Detection in Incomplete Sensor Networks
(2006-05)Incomplete sensor networks are an area of wireless communications with broad application. The intention of this document is twofold. One goal of this research is to establish a relationship between the method by which a ... -
-
Synchronization of Remote Databases
(2003-12)Most modem systems work in networked environments. Data used by these programs is distributed and stored on heterogeneous systems, in multiple databases. Synchronizing this data across multiple systems or providing an ... -
Out-of-Core Graph Coloring Algorithm
(2020-08)Out-of-core algorithms can process data sets that are too large to fit entirely into the computer’s main memory. This thesis develops an out-of-core algorithm for graph coloring. It dynamically partitions the graph into ... -
An Intersection of Codes of Ethics in Computer Science and the Law: A Preliminary View
(2002-05)No abstract prepared. -
Using the Fault Index Selection Process for Large Software Systems to Guide and Improve Code Inspection Effectiveness
(2005-08)Software inspections are one of the most powerful error detection techniques in software development. Traditionally, experienced software inspectors read the source code line-by-line, report the errors as they find them, ... -
Input Evaluation of an Eye-Gaze-Guided Interface: Kalman Filter vs Velocity Threshold Eye Movement Identification
(2009-12)This thesis evaluates the input performance capabilities of Velocity Threshold (IVT) and Kalman Filter (I-KF) eye movement detection models when employed for eyegaze-guided interface control. I-VT is a common eye movement ...