Search

Search Constraints

Start Over You searched for: Graduate Program Computer Science and Engineering (PHD) Remove constraint Graduate Program: Computer Science and Engineering (PHD) Committee Member Chitaranjan Das Remove constraint Committee Member: Chitaranjan Das

Search Results

1. Towards Designing Accurate Detection Methods for Emerging Cyber Threats

open_access
Open Access

3. Performance and Lifetime Management Strategies for High-density 3D NAND Flash Storage

open_access
Open Access

4. Exploring Security Challenges and Opportunities in Emerging Memory and Computing Technologies

open_access
Open Access

5. Information Retrieval From Images and Videos in Mobile Networks

open_access
Open Access

6. Evaluating the Attack Surface of Control Flow Integrity

open_access
Open Access

7. Security and privacy solutions for camera and camera based authentication

open_access
Open Access

8. Maximizing Resource Efficiency for Next Generation Cloud Platforms

open_access
Open Access

9. Automated Programming Frameworks for Analyzing Differential Privacy

open_access
Open Access

10. Analysis of Text to Identify, Represent and Group Distinct Propositions

open_access
Open Access

11. Service Management: Resource Allocation and Security

open_access
Open Access

12. An Agent Learning Dialogue Policies for Sensing, Perceiving and Learning through Multi-modal Communication

open_access
Open Access

13. Resource allocation for edge cloud and smart grid

open_access
Open Access

14. Explainable Predictive Modeling and Causal Effect Estimation from Complex Time-varying Data

open_access
Open Access

15. Data Reduction for Communication-efficient Machine Learning

open_access
Open Access

16. Automatic Summarization and Slide Generation for Scientific Papers

open_access
Open Access

17. FPT Aglorithms for NP-complete Graph Problems Parameterized by Treewidth and Tree-depth

open_access
Open Access

18. An Exploration into the Security Viability of RISC-V Systems and Supply Chain

open_access
Open Access

20. Design of a Vision Based Assistive System for Visually Impaired Persons

open_access
Open Access

21. Efficient Service Deployment on Public Cloud: A Cost, Performance, and Security Perspective

open_access
Open Access

22. Comprehensive Photographic Composition Assistance through Meaningful Exemplars

open_access
Open Access

23. DESIGN OF PROCESSING-IN-MEMORY ARCHITECTURES FOR DEEP LEARNING AND GRAPH APPLICATIONS

restricted_to_institution
Restricted (Penn State Only)

24. Optimizing Energy and Performance for Next-Generation Extended Reality Devices

restricted_to_institution
Restricted (Penn State Only)

25. Energy and Quality Aware Video Streaming on Mobile Devices

restricted_to_institution
Restricted (Penn State Only)

26. Planning and Guidance of Bronchoscopy for Comprehensive Lymph Node Staging

restricted
Restricted

27. Video Analytics with In-SSD Processing Approaches

restricted_to_institution
Restricted (Penn State Only)

28. Applications of Deep Learning on Temporal and Graph Data Mining

restricted_to_institution
Restricted (Penn State Only)

29. Compression Algorithms for de Bruijn Graphs and Uncovering Hidden Assembly Artifacts

open_access
Open Access

30. Efficient Deep Neural Networks Architectures for Video Analytics Systems

restricted_to_institution
Restricted (Penn State Only)

31. Machine Learning in Mobile Edge Computing: Enhancing Efficiency in Inference and Training

restricted_to_institution
Restricted (Penn State Only)

32. Optimizing Deep Learning for Memory and Compute : A joint Algorithm-Architecture Exploration

open_access
Open Access

33. Leveraging Heterogeneity in Designing Systems For Emerging Datacenter Applications

restricted_to_institution
Restricted (Penn State Only)

34. Dynamic Stability Monitoring of Complex Human Motion Sequences via Precision Computer Vision

open_access
Open Access

35. Design Trade-off for Cloud Storage

restricted_to_institution
Restricted (Penn State Only)

36. Machine Learning and Optimization Applications on Near-term Quantum Computers

open_access
Open Access

37. Adapting the Serverless Platform for Emerging Application Patterns

restricted_to_institution
Restricted (Penn State Only)

38. Violation Detection, Extra Information Release and Secure Implementation for Differentially Private Mechanisms

open_access
Open Access

39. Efficiently supporting and exploiting multiple concurrent views of data in the memory hierarchy

open_access
Open Access

40. Topology Inference in Modern Communication Networks

open_access
Open Access

41. Context-Aware Perception for Edge and Embedded Devices

restricted_to_institution
Restricted (Penn State Only)

42. Exploration of Machine Learning Based Acceleration Methodologies

open_access
Open Access

43. Deep learning on Mobile Devices with Neural Processing Units

restricted_to_institution
Restricted (Penn State Only)

44. Systems Optimizations for Learning and Processing on Large Scale Graphs

open_access
Open Access

45. Co-Architecting Brain-inspired Algorithms and Hardware for Performance and Energy Efficiency

open_access
Open Access

46. Modeling a Clinical Acoustic Information System Using Physics-Informed Machine Learning

open_access
Open Access

47. Optimizing Emerging Game Streaming Applications for Mobile Platforms

restricted_to_institution
Restricted (Penn State Only)

48. Resilient Cache Network Management: Algorithms, Analysis, Experiments

open_access
Open Access

49. Improving Performance and Energy Efficiency for Visual Computing on Resource-Constrained Devices

restricted_to_institution
Restricted (Penn State Only)

50. Distributed execution model for near-data accelerators

restricted_to_institution
Restricted (Penn State Only)

51. Finger Motion Analysis for Interactive Applications using Wearable and Wireless IoT devices

open_access
Open Access

52. Fundamental problems in graph learning: optimization, generalization, privacy, and model design

open_access
Open Access

53. Accelerating Data-intensive Bioinformatic Workloads

restricted_to_institution
Restricted (Penn State Only)

54. Architecture-Centric Bottleneck Analysis for Machine Learning and Deep Learning Applications

open_access
Open Access

55. Towards Secure and Performant Cyber-Physical Systems: Estimation, Optimization, and Control

open_access
Open Access

56. Line of sight sensors: Applications and related 1.5D terrain guarding problem variants

restricted_to_institution
Restricted (Penn State Only)

57. Optimizing Cloud Efficiency: A Performance and Cost Perspective

restricted_to_institution
Restricted (Penn State Only)

58. Practical Static Binary Analysis with Block Memory Model

open_access
Open Access

59. Automated and Semi-Automated Assessment of STEM Reasoning Questions

open_access
Open Access

60. Algorithms and models toward novel graph problems and applications

restricted_to_institution
Restricted (Penn State Only)