Search

Search Constraints

Start Over You searched for: Graduate Program Computer Science and Engineering Remove constraint Graduate Program: Computer Science and Engineering Degree MS Remove constraint Degree: MS

Search Results

2. Characterizations of Vulnerabilities and Countermeasures in Advanced Metering Infrastructure Collectors

open_access
Open Access

4. Side Channel Attack for Keystroke Logging

open_access
Open Access

5. PFFTC: An Improved Fast Fourier Transform for the IBM Cell Broadband Engine

open_access
Open Access

6. BDI Plan Update In Dynamic Environments

open_access
Open Access

10. Comprehensive Spatial Query Containment Framework for Minimizing Redundancy

open_access
Open Access

11. Redundant Array of Inexpensive Links (RAIL) Technique for Network Routing Survivability

open_access
Open Access

12. Port Authority: Integrity Verification Through Connection Management

open_access
Open Access

14. TEMPORAL IDENTIFICATION OF USAGE PATTERNS AND OUTLIERS IN WEB SEARCHING USING TENSOR ANALYSIS

open_access
Open Access

19. ASYNCHRONOUS ATTESTATION SCHEME FOR PRESERVING THE INTEGRITY OF LONG-TERM DIGITAL ARCHIVES

open_access
Open Access

23. PERSONALIZED AND EFFICIENT TOP-K SPATIAL OBJECT RECOMMENDATION IN LOCATION BASED SOCIAL NETWORKS

open_access
Open Access

32. ANALYSIS OF TWO-DIMENSIONAL MEDIAN FILTER HARDWARE IMPLEMENTATIONS FOR REAL-TIME VIDEO DENOISING

open_access
Open Access

36. Implementation of an efficient wireless routing protocol based on small end-to-end sequence numbers.

open_access
Open Access

44. ANGEL: A HYBRID CONTENT-BASED FILTERING TOOL FOR PROTECTING TEENS’ SAFETY IN ONLINE SOCIAL NETWORK

open_access
Open Access

45. A LANGUAGE-BASED SOFTWARE FRAMEWORK FOR MISSION PLANNING IN AUTONOMOUS MOBILE ROBOTS

open_access
Open Access

49. Lower Bounds for Local Monotonicity Reconstruction from Transitive Closure Spanners

open_access
Open Access

50. Acknowledgments in Scientific Documents: Extraction, Storage, Search, and Social Network

open_access
Open Access

53. DEVELOPING A JAVA BINARY OBJECT TECHNIQUE FOR TRANSFERRING HIGH VOLUMES OF DATA IN DATA CENTERS

open_access
Open Access

54. AN INFORMATION-TECHNOLOGY-PEOPLE INVESTIGATION OF INFORMATION PRIVACY- THE CASE OF CHILDREN’S ONLINE PRIVACY

open_access
Open Access

55. Electronic Design Automation Challenges in Three Dimensional Integrated Chips (3D ICs)

open_access
Open Access

59. SOCIAL NETWORK ANALYSIS AND SIMULATION OF THE DEVELOPMENT OF ADVERSARIAL NETWORKS

open_access
Open Access

63. PERFORMANCE ANALYSIS AND VISUALIZATION FOR HIGH PERFORMANCE PARALLEL I/O

open_access
Open Access

65. PROTOCOLS FOR SECURE COMMUNICATION AND TRAITOR TRACING IN ADVANCED METERING INFRASTRUCTURE

open_access
Open Access

76. Compromise-Resilient Anti-Jamming Communication in Wireless Sensor Networks

open_access
Open Access

78. DETECTING OFFENSIVE LANGUAGE IN SOCIAL MEDIAS FOR PROTECTION OF ADOLESCENT ONLINE SAFETY

open_access
Open Access

81. Detecting Policy Violators in Online Social Community an Extended Bayesian Belief Network Approach

open_access
Open Access

82. parallel boundary element solutions of block circulant linear systems for acoustic radiation problems with rotationally symmetric boundary surfaces

open_access
Open Access

89. A Game Theoretic Approach to Multi-agent Systems in Highly Dynamic, Information-sparse, Role Assignment Scenarios

open_access
Open Access