Search
Now showing items 1-10 of 10
Learning Partially Observable Markov Decision Processes Using Abstract Actions
(Computer Science & Engineering, 2014-03-10)
Transfer learning and Abstraction are among the new and most interesting research topics in AI and address the use of learned knowledge to improve learning performance in subsequent tasks. While there has been significant ...
Graphical Event-Directed Scenario Behavioral Specifications for the Scenario-Based Engineering Process (SEP) Using A Domain Specific Software Architecture (ASSA) Philosophy
(Computer Science, 2014-06-17)
This thesis extends scenarios of a system into real-time event digraphs. A scenario is an event trace resulting from a particular thread of system execution. An event digraph is an event network. Multiple external stimuli ...
Linking Entity Profiles
(Computer Science & Engineering, 2014-09-17)
Entity linking allows one to have collections of data from multiple sources as a global dataset and then query those data. Entity linking allows us to do knowledge discovery on this global dataset which might result in the ...
Modeling An Intelligent Intruder In A Region Monitored By A Wireless Sensor Network
(Computer Science & Engineering, 2014-03-12)
Monitoring to detect unauthorized border crossing is very important for protecting national security. To accomplish this by continuous physical monitoring by border patrol agents is impractical. Networks of low-cost wireless ...
Improving Tor Performance By Modifying Path Selection
(Computer Science & Engineering, 2014-12)
Tor is a popular volunteer-based overlay network that provides anonymity andprivacy for Internet users. Using the Onion Proxy (OP) client, users connect to anetwork of Onion Routers (ORs) and send their traffic through an ...
Graph Embedding Discriminative Unsupervised Dimensionality Reduction
(Computer Science & Engineering, 2014-12)
In this thesis, a novel graph embedding unsupervised dimensionality reduction method was proposed. Simultaneously, we assigned the adaptive and optimal neighbors on the basis of the projected local distances, thus we ...
A Method To Evade Keyword Based Censorship
(Computer Science & Engineering, 2014-12)
Many countries block the content of web pages which are deemed against the morals, religious rules or policies set by government or organization. Countries like China block the post which is against their government interest. ...
Estimation Myopia: Tinkering With Perception In Software Estimation And Placebo Estimation In Edw
(Computer Science & Engineering, 2014-12)
The goal of this study is to explore an effective way to provide timely and accurate size estimates for software and for an enterprise data warehouse (EDW). Several research papers attempt to adapt function point (FP) ...
A Cloud Based Automated Anomaly Detection Framework
(Computer Science & Engineering, 2014-12)
A machine-to-machine (M2M) communications network hosts millions of heterogeneous devices such as for vehicle tracking, medical services, and home automation and security services. These devices exchange thousands of ...
A Hmm-based Prediction Model For Spatio-temporal Trajectories
(Computer Science & Engineering, 2014-12)
Spatio-temporal trajectories are time series data that represent movement of an object over the time. Hidden Markov Models (HMM), a variant of Markov Models (MM), were first applied at a large scale to speech recognition ...