Search

Search Constraints

Start Over You searched for: Graduate Program Computer Science and Engineering Remove constraint Graduate Program: Computer Science and Engineering Year 2008 Remove constraint Year: 2008

Search Results

1. Side Channel Attack for Keystroke Logging

open_access
Open Access

2. Mobility Prediction Based Intelligent Algorithms for Mobile Ad Hoc Networks

open_access
Open Access

6. TEMPORAL IDENTIFICATION OF USAGE PATTERNS AND OUTLIERS IN WEB SEARCHING USING TENSOR ANALYSIS

open_access
Open Access

7. Design of High-Performance, Energy-Efficient, and Reliable Network-on-Chip (NoC) Architectures

open_access
Open Access

10. Image Analysis and Retrieval by Spatial Models and Information Integration

open_access
Open Access

12. DEEP SUBMICRON (DSM) DESIGN AUTOMATION TECHNIQUES TO MITIGATE PROCESS VARIATIONS

open_access
Open Access

14. A SECURITY FRAMEWORK FOR MOBILE AD HOC NETWORKS

open_access
Open Access

16. Algorithms for classification and prediction of protein structure and function

open_access
Open Access

18. Implementation of an efficient wireless routing protocol based on small end-to-end sequence numbers.

open_access
Open Access

20. CO-ADAPTING SCIENTIFIC APPLICATIONS AND ARCHITECTURES TOWARD ENERGY-EFFICIENT HIGH PERFORMANCE COMPUTING

open_access
Open Access

21. Assessing Security of Mobile telecommunication networks

open_access
Open Access

26. FUSION AND REGISTRATION OF 3D MEDICAL IMAGE DATA AND ENDOSCOPIC VIDEO

open_access
Open Access

27. ANGEL: A HYBRID CONTENT-BASED FILTERING TOOL FOR PROTECTING TEENS’ SAFETY IN ONLINE SOCIAL NETWORK

open_access
Open Access

33. DEVELOPING A JAVA BINARY OBJECT TECHNIQUE FOR TRANSFERRING HIGH VOLUMES OF DATA IN DATA CENTERS

open_access
Open Access

34. AN INFORMATION-TECHNOLOGY-PEOPLE INVESTIGATION OF INFORMATION PRIVACY- THE CASE OF CHILDREN’S ONLINE PRIVACY

open_access
Open Access

35. Secure Systems Development Using Security-Typed Languages

open_access
Open Access

36. Characterizing the Impact if Rigidity on the Security of Cellular Telecommunications Networks

open_access
Open Access

37. Electronic Design Automation Challenges in Three Dimensional Integrated Chips (3D ICs)

open_access
Open Access

38. Designing New Crawling and Indexing Techniques for Web Search Engines

open_access
Open Access

41. Software Based Techniques for Robust Computing on Chip Multiprocessors

open_access
Open Access

44. Software-Based Disk Power Management for Scientific Applications

open_access
Open Access

49. INTEGRATED SERVICE MODEL IN HETEROGENEOUS WIRELESS NETWORKS

open_access
Open Access