Browsing PhD Dissertations - DO NOT EDIT by Issue Date
Now showing items 1-20 of 247
-
Automating Inhabitant Interactions In Home And Workplace Environments Through Data-driven Generation Of Hierarchical Partially-observable Markov Decision Processes
(Computer Science & Engineering, 2007-08-23)Markov models provide a useful representation of system behavioral actions and state observations, but they do not scale well. Utilizing a hierarchy and abstraction through hierarchical hidden Markov models (HHMMs) improves ... -
Game Theoretical Models And Algorithms For Rate Control In Video Compression
(Computer Science & Engineering, 2007-08-23)This thesis investigates game theory based rate control algorithms for optimizing the bit allocation in video compression. The first algorithm utilizes the cooperative bargaining game in a MB level rate control algorithm ... -
Power And Distortion Optimized Video Coding For Pervasive Computing Applications
(Computer Science & Engineering, 2007-08-23)This dissertation investigates video encoding schemes for pervasive computing applications that must ensure low power consumption in addition to high compression efficiency. The contribution of the dissertation is the ... -
A Framework For Supporting Quality Of Service Requirements In A Data Stream Management System
(Computer Science & Engineering, 2007-08-23)Currently, a large class of data-intensive applications, in which data are presented in the form of continuous data streams rather than static relations, has been widely recognized in the database community. Not only is ... -
Efficient Multi-view Video Coding Scheme Based On Dynamic Video Object Segmentation
(Computer Science & Engineering, 2007-08-23)Multi-view video, which simultaneously acquires multiple video sequences from multiple viewpoints or view directions, is poised to become the next generation video technology. Exploiting redundancy is the hallmark of ... -
A Graph-based Approach For Modeling And Indexing Video Data
(Computer Science & Engineering, 2007-08-23)With the advances in electronic imaging, storage, networking and computing, the amount of digital video has grown tremendously. The proliferation of video data has led to significant amount of research on techniques and ... -
Generalization And Enforcement Of Role-based Access Control Using A Novel Event-based Approach
(Computer Science & Engineering, 2007-08-23)Protecting information against unauthorized access is a key issue in information system security. Advanced access control models and mechanisms have now become necessary for applications and systems due to emerging acts, ... -
WiLDCAT: An Integrated Stealth Environment For Dynamic Malware Analysis
(Computer Science & Engineering, 2007-08-23)Malware -- a term that refers to viruses, trojans, worms, spyware or any form of malicious code -- is widespread today. Given the devastating effects that malware have on the computing world, detecting and countering malware ... -
Complementing Current Active Queue Management Schemes With RECHOKe And Receiver-window Modification (RWM)
(Computer Science & Engineering, 2007-08-23)Explicit Congestion Notification (ECN) and Active Queue Management (AQM) schemes have been proposed for present-day TCP/IP networks to better manage network congestion. ECN enabled AQMs were shown to have a promising ... -
Probabilistic Localization Of Mobile Ad Hoc Networks
(Computer Science & Engineering, 2007-08-23)The mobile ad hoc network localization problem deals with estimating the physical location of the nodes that do not have a direct way (e.g., GPS) to determine their own locations. Being an enabling technology that is ... -
Supervised Learning From Embedded Subgraphs
(Computer Science & Engineering, 2007-08-23)We develop a machine learning algorithm which learns rules for classification from training examples in a graph representation. However, unlike most other such algorithms which use one graph for each example, ours allows ... -
Efficient And Adaptive Schemes For Consistent Information Sharing In Wireless Mobile And Peer-to-peer Networks
(Computer Science & Engineering, 2007-08-23)With the tremendous growth of applications in wireless mobile and Peer-to-Peer (P2P) networks, significant research efforts have been made to improve the quality of sevice. Caching and replicating frequently used data ... -
A Novel Game Theoretic Framework For Security In Wireless Sensor Networks
(Computer Science & Engineering, 2007-08-23)Due to severe resource limitations and often lack of centralized infrastructure, providing security in wireless sensor networks is a great challenge. Misbehavior due to malicious or faulty nodes can significantly degrade ... -
Automatic Content Analysis Of Endoscopy Video (Endoscopic Multimedia Information System)
(Computer Science & Engineering, 2007-08-23)Advances in video technology are being incorporated into today's healthcare practice. For example, various types of endoscopes are used for colonoscopy, upper gastrointestinal endoscopy, enteroscopy, bronchoscopy, cystoscopy, ... -
Utility Based Resource Aware Framework For Information Caching And Sharing In Mobile And Distributed Systems
(Computer Science & Engineering, 2007-08-23)Along with the technology advancements in mobile and wireless networks, ubiquitous information service is becoming a reality in which users can access the information anytime anywhere. However, the user mobility, network ... -
Inference Of Node And Edge Replacement Graph Grammars
(Computer Science & Engineering, 2007-08-23)In this dissertation we study the inference of node and edge replacement graph grammars. The approach is based on previous research in frequent isomorphic subgraphs discovery. We extend the search for frequent subgraphs ... -
Learning State And Action Space Hierarchies For Reinforcement Learning Using Action-Dependent Partitioning
(Computer Science & Engineering, 2007-08-23)Autonomous systems are often dicult to program. Reinforcement learning (RL) is an attractive alternative, as it allows the agent to learn behavior on the basis of sparse, delayed reward signals provided only when the ... -
Information Theoretic, Probabilistic And Maximum Partial Substructure Algorithms For Discovering Graph-based Anomalies
(Computer Science & Engineering, 2007-08-23)The ability to mine data represented as a graph has become important in several domains for detecting various structural patterns. One important area of data mining is anomaly detection, particularly for fraud. However, ... -
A Framework For Improving The Performance Of Application Servers In Next Generation Networks (NGNs)
(Computer Science & Engineering, 2007-09-17)Next generation networks (NGNs) such as IP Multimedia Subsystem (IMS) are completely built on the Internet Protocol (IP) suite. This has made IP the de facto standard for data networking, voice over IP (VoIP), and media ... -
An Integrated Framework For Enhancing User Experience For Different Data Services In Multi-rate Wireless Systems
(Computer Science & Engineering, 2007-09-17)Technological advances in multi\--rate wireless systems have made wireless data services an intrinsic part of human life. An abundance of wireless devices, both in the wireless enabled home multimedia systems as well as ...