Search
Now showing items 11-20 of 32
A Game Theoretic Framework For Communication Decisions In Multi Agent Systems
(Computer Science & Engineering, 2013-03-20)
Communication is the process of transferring information between multiple entities. We study the communication process between different entities that are modeled as multiple agents. To study the interactions between these ...
Selective Grouping Algorithm For Low Latency Anonymous Systems
(Computer Science & Engineering, 2013-03-20)
Low latency anonymous communications are prone to timing analysis attacks. It is a technique by which the adversary can de-anonymize the user by correlating packet timing patterns. A recent proposal to stop these attacks ...
From Phenotype To Genotype: A Structured Sparse Learning Framework For Imaging Genetics Studies
(Computer Science & Engineering, 2013-03-20)
Sparsity is one of the intrinsic properties of real-world data, thus sparse representation based learning models have been widely used to simplify data modeling and discover predictive patterns. By enforcing properly ...
An Experiment In Developing Small Mobile Phone Applications Comparing On-phone To Off-phone Development
(Computer Science & Engineering, 2013-03-20)
TouchDevelop represents a radically new mobile application development model, as TouchDevelop enables mobile application development on a mobile device. I.e., with TouchDevelop, the task of programming say a Windows Phone ...
Comparing Web Application Scanners For XSS Attacks
(Computer Science & Engineering, 2013-03-20)
As software industry is paying increasing attention to web application security, various testing tools with black box testing feature have been developed. To better evaluate their performance, researchers have made efforts ...
SubRosa 2 : An Experimental Evaluation Of Timing Analysis Attacks And Defenses In Anonymity Systems
(Computer Science & Engineering, 2013-03-20)
A circuit-based low-latency anonymous communication service such as Tor helps Internet users hide their IP addresses and thereby conceal their identities when communicating online. However, this kind of service is vulnerable ...
An Interpolation Based Approach For Pattern Recognition And Generation
(Computer Science & Engineering, 2013-07-22)
A large number of problems in computer vision and computer graphics can essentially be reduced to a pattern recognition problem. In this thesis, we explore a novel interpolation based framework to address some of the various ...
Learning Equivalent Input Channel Mappings And Generalized Features For Pattern Transfer
(Computer Science & Engineering, 2013-10-22)
In many real-world modeling applications, it is needed to detect the origin of the patterns of the input data in addition to find the patterns themselves. Having the input data generated by a systematically organized set ...
Detection Of Fingers With A Depth Based Hand-detector In Static Frames
(Computer Science & Engineering, 2013-10-23)
This thesis presents a method for a finger detection system. It is assumed that the user taps their fingers on a table, and that the camera is placed on the same table in front of their fingers. This setup is motivated by ...
Lilac: Architecture For Anonymous Light Weight Communication
(Computer Science & Engineering, 2013-10-23)
We present lilac; a circuit based low latency anonymous light weight instant messaging communication system. This browser based chat platform provides anonymity in context with unlinkability and unobservability for the ...