Search

Search Constraints

Start Over You searched for: Graduate Program Computer Science and Engineering Remove constraint Graduate Program: Computer Science and Engineering

Search Results

402. Pushing the power and performance envelope of Next-generation Handheld platforms

open_access
Open Access

403. New Techniques for Trustworthy Mobile Computing

open_access
Open Access

405. Irregular Graph Algorithms on Modern Multicore, Manycore, and Distributed Processing Systems

open_access
Open Access

406. Energy Optimization for Smartphones in Wireless Networks

open_access
Open Access

407. Semantic Modeling for Natural Language using Web Knowledge

open_access
Open Access

416. Efficient and Quality-Aware Data Access in Mobile Opportunistic Networks

open_access
Open Access

418. Impact of Quality of Information on Performance and Scalability of Wireless Networks

open_access
Open Access

419. Large-Scale Object Recognition for Embedded Wearable Platforms

open_access
Open Access

420. EXPLOITING AND ACCOMMODATING ASYMMETRIES IN MEMORY TO ENABLE EFFICIENT MULTI-CORE SYSTEMS

open_access
Open Access

421. DIGITAL/MIXED-SIGNAL CIRCUIT DESIGNS WITH STEEP SLOPE III-V TUNNEL TRANSISTORS

open_access
Open Access

422. PREDICTION AND ASSESSMENT OF AMBIENT ENERGY SIGNALS FOR ENERGY HARVESTING SYSTEMS

open_access
Open Access

424. Enforcing Execution Integrity for Software Systems

open_access
Open Access

425. Automatically Extracting Semantic Scholarly Entities from Academic Papers

open_access
Open Access

427. IMPROVING COST-EFFICACY IN PUBLIC CLOUDS: OPTIMAL CONTROL SUBJECT TO CLOUD-TENANT INTERACTIONS

open_access
Open Access

428. PROTECTING IAAS CLOUDS THROUGH CONTROL OF CLOUD SERVICES

open_access
Open Access

430. THIRD-PARTY LIBRARY SECURITY MANAGEMENT FOR MOBILE APPLICATIONS

open_access
Open Access

431. DATA DEPENDENT OPTIMIZATION VISION ARCHITECTURE

open_access
Open Access

432. Design and Exploration of Accelerator-rich Multi-core Systems

open_access
Open Access

433. Stochastic Resource Allocation Strategies With Uncertain Information In Sensor Networks

open_access
Open Access

434. Scalable graph and mesh algorithms on distributed-memory systems

open_access
Open Access

436. Optimal Cyber-Defense Strategies For Advanced Persistent Threats: A Game Theoretical Analysis

open_access
Open Access

439. Object Recognition Using Structured Feature Extraction With A Reconfigurable, Neurosynaptic Processor

open_access
Open Access

440. Semantic Structuring of Scientific Information in Scholarly Documents

open_access
Open Access

445. BATTERY STATE ESTIMATION AND ANOMALY DETECTION USING MACHINE LEARNING

open_access
Open Access

446. Knowledge Graph Creation from Structure Knowledge

open_access
Open Access

448. Enabling New Computation Paradigms with Emerging Technologies

open_access
Open Access

450. Testing Geometric Properties of Two-Dimensional Figures and Images

open_access
Open Access

452. An Exposure of Android Social Media Applications and the Data ISPs Can Collect

open_access
Open Access

458. HARDWARE SOFTWARE CO-DESIGN FOR OPTIMIZING MEMORY HIERARCHY IN MANY-CORE AND MULTI-SOCKET SYSTEMS

open_access
Open Access

463. SECURITY IN SOFTWARE DEFINED NETWORKING - AN ANALYSIS OF NEW ATTACK AND DEFENSE VECTORS

open_access
Open Access

464. Hardware-Aware Computation Reorganization for Memory Intensive Applications

open_access
Open Access

466. Characterizing the Limits and Defenses of Machine Learning in Adversarial Settings

open_access
Open Access

467. Self-powered Internet-of-Things Nonvolatile Processor and System Exploration and Optimization

open_access
Open Access

470. HIERARCHICAL SPARSE GRAPH COMPUTATIONS ON MULTICORE PLATFORMS

open_access
Open Access

473. Generation and Evaluation of Design Using Deep Neural Networks

open_access
Open Access

477. MODELING, MONITORING AND SCHEDULING TECHNIQUES FOR NETWORK RECOVERY FROM MASSIVE FAILURES

open_access
Open Access

478. Cloud Provider's Energy-Efficient Operation and Effective Pricing Design

open_access
Open Access

479. Regulating Programs’ Access To Privacy-Sensitive Sensors

open_access
Open Access

480. Quantum Reductions from Hard problems

open_access
Open Access

481. APPLICATIONS OF CLUSTERING ALGORITHMS TO ENTITY RESOLUTION AND HUMAN GENOME VARIATION

open_access
Open Access

482. ENERGY-EFFICIENT AND SECURE DESIGNS OF SPINTRONIC MEMORY: TECHNIQUES AND APPLICATIONS

open_access
Open Access

483. Design And Implementation Of A Cost-Effective Linearizable Geo-Distributed Key-Value Store Combining Replication And Erasure Coding

open_access
Open Access

485. An Experimental Analysis of Predictive Coding Based On Artificial Neural Networks for Image Decoding

open_access
Open Access

486. Energy-efficient Computation Offloading in Wireless Networks

open_access
Open Access

487. On a Computation Model for Human and Machine Symmetry Perception

open_access
Open Access

488. Scalable and Accurate Algorithms for Search in Genomic Big Data and Analysis of Genetic Variants

open_access
Open Access

489. Engineering high performance workflows for end-to-end acceleration of genomic applications

open_access
Open Access

490. Machine-Learning-Based Approaches for Learning Marketing Strategies

open_access
Open Access

492. Resource Management and Security in Distributed Computing Systems

open_access
Open Access

495. LOW POWER, SECURE AND ROBUST DESIGNS OF NON-VOLATILE MEMORIES

open_access
Open Access

496. EXTRACTING BETTER PERFORMANCE FROM THE PARALLELISM OFFERED BY SSDS

open_access
Open Access

497. SINGLING-OUT VS. BLENDING-IN: OUTLIER DETECTION AND DIFFERENTIAL PRIVACY IN DATA

open_access
Open Access

499. Temporal and Structural Machine Learning from Transportation Data

open_access
Open Access