Browsing Department of Computer Science and Engineering by Title
Now showing items 549-568 of 606
-
TAIL LATENCY PREDICTION FOR FORK-JOIN STRUCTURES
(2020-07-13)The workflows of the predominant user-facing datacenter services, including web searching and social networking, are underlaid by various Fork-Join structures. Due to the lack of understanding the performance of Fork-Join ... -
TaPIN: A Two-Factor User Authentication Scheme for Smartwatches through Secret Finger Tapping
(2020-05-11)Nowadays, smartwatches have become one of the most common wearable gadgets as they are small and portable. As more and more personal information is managed and processed inside smartwatches, it is important to have a secure ... -
Target Tracking With Lucas-kanade Optical Flow And Particle Filters Through Affine Transforms And Occlusion
(Computer Science & Engineering, 2011-03-03)This paper investigates a hybrid approach derived from Lucas-Kanade optical flow tracking and particle filters that is capable of tracking objects through occlusion and affine transformations. This approach is inspired ... -
Techniques for Spatio-temporal Analysis of Trajectory Data
(2016-09-09)The goal of this thesis is to develop novel techniques for the analysis of spatio-temporal trajectory data. Recent advances in tracking devices such as Global Positioning System (GPS) and mobile phones have resulted in an ... -
A Teleoperation Framework for Robots Utilizing Control Barrier Functions in Virtual Reality
(ACM, 2023-07)This paper describes a novel shared control teleoperation framework for mobile robots that utilizes Control Barrier Functions (CBFs) as filtering mechanism to prevent a human operator from making dangerous actions. The ... -
Temporal Potential Function Approach For Path Planning In Dynamic Environments
(Computer Science & Engineering, 2009-09-16)A Dynamic environment is one in which either the obstacles or the goal or both are in motion. In most of the current research, robots attempting to navigate in dynamic environments use reactive systems. Although reactive ... -
TESTING ARTIFICIAL INTELLIGENCE-BASED SOFTWARE SYSTEMS
(2021-08-13)Artificial Intelligence (AI)-based software systems are increasingly used in high-stake and safety-critical domains, including recidivism prediction, medical diagnosis, and autonomous driving. There is an urgent need to ... -
Testing Java Monitors By State Space Exploration
(Computer Science & Engineering, 2007-08-23)Java monitors are classes that are intended to be accessed by multiple threads at the same time. Detecting synchronization faults in Java Monitors is considerably more challenging than testing regular classes, due to the ... -
TEXT MINING ON TWITTER DATA TO EVALUATE SENTIMENT
(2018-12-06)Social media platforms have been a major part of our daily lives. But with the freedom of expression there is no way one can check whether the posts/tweets/expressions are classified on which polarity. Since Twitter is one ... -
Texture Measurement And Skid Number Prediction Using Laser Data Acquisition, Digital Signal Processing, And Neural Networks
(Computer Science & Engineering, 2008-08-08)Real-time estimation of the skid number of pavement is difficult. Traditional methods of volumetric measurement are cumbersome and time consuming. It is desired to enable prediction of the skid number of pavement using ... -
The Impact of Cues and User Interaction on the Memorability of System-assigned Random Passwords
(2016-05-02)Given the choice, users produce passwords reflecting common strategies and patterns that ease recall but offer uncertain and often weak security. Addressing this usability-security tension in user authentication remains ... -
The Impact of Toxic Replies on Twitter Conversations
(2019-12-11)Social media has become an empowering agent for individual voices and freedom of expression. Yet, it can also serve as a breeding ground for hate speech. According to a Pew Research Center study, 41% of Americans have been ... -
A Theoretical Framework For Design Space Exploration Of Manycore Processors
(Computer Science & Engineering, 2012-04-11)As design space and workload space in multicore era are continuously expanding, it is a challenge to identify optimal design points quickly during the early stage of multicore processor design or programming phase. To meet ... -
THINK2ACT: USING MULTIMODAL DATA TO ASSESS HUMAN COGNITIVE AND PHYSICAL PERFORMANCE
(2019-12-10)As computers become more advanced, affordable, and smaller in size, we start to use them in almost every aspect of our daily life. Nowadays, the use of computers is not just limited to accomplish work-related tasks. Instead, ... -
“Tie the Flags Together”: Migration, Nativism, and the Orange Order in the United States, 1840-1930
(2018-12-07)“Tie the Flags Together”: Migration, Nativism, and the Orange Order in the United States, 1840-1930 Cory Wells Throughout the nineteenth century, tens of thousands of Irish Protestants who migrated to the United States ... -
Tools For Program Understanding And Reverse-engineering Of Mobile Applications
(Computer Science & Engineering, 2015)Mobile software development is evolving rapidly. Software development includes computer programing, documenting, testing and bug fixing processes. These processes need a detail understanding of the application logic which ... -
Top K Query Processing In Distributed Database
(Computer Science & Engineering, 2007-09-19)Today's data is rarely stored in centralized location due to the enormous amount of information that needs to be stored and also to increase reliability, availability and performance of the system. Same data is stored in ... -
TOPOLOGICAL AND FEATURE BASED IDENTIFICATION OF HOLE BOUNDARIES IN POINT CLOUD DATA AND DIFFERENTIATION BETWEEN SURFACE AND PHYSICAL HOLES
(2018-12-13)With the advent of autonomous agents becoming prominent in everyday lives, the importance of processing the surroundings into understandable features becomes more and more important. 3D point clouds play a major role in ... -
Toward a deeper integration of low-fidelity sketches into mobile application development
(2023-05-18)Mobile application development often starts with creating low-fidelity sketches of user interfaces. Integrating these sketches into the software development process can reduce repetition, narrow the gap between user ... -
TOWARD AUTOMATED FACT MONITORING AND CHECKING
(2016-08-12)Public figures such as politicians make claims about "facts" all the time. Oftentimes there are false, exaggerated and misleading claims on important topics, due to careless mistakes and even deliberate manipulation of ...