Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
This paper discusses a combined and platform-independent solution to detect websites that fake their identity. The approach combines white-listing, black-listing and heuristic strategies to provide an optimal phishing detection ratio...
Since the number of digital images is growing explosively, content based image retrieval becomes an active research area to automatically index and retrieve images based on their semantic features and visual appearance. Content based...
The Internet is an excellent source of information and entertainment. Children reap numerous benefits using the Internet for educational purposes, playing games and communicating with people all over the world. But along with these...
This thesis presents a novel interface for collaborative Digital Forensics. The improvement in the process management and remote access apropos of the use of current Digital Forensic tools in the area of Digital Forensics is described in...
The Cryptographic Protocol Analysis Language Evaluation System (CPAL-ES) is a tool used to analyze protocols with formal methods. In this thesis, we exercise CPAL-ES against two security protocols, the Secure Protocol of Aziz & Diffie, ...
For decades, augmented reality has been used to allow a person to visualize an overlay of annotations, videos, and images on physical objects using a camera. Due to the high computational processing cost that is required to match an...
Memory system hierarchy has remained unchanged for many years, leading to a growing gap between main memory access times and a local disk's paging latencies. This trend has especially become a performance bottleneck for memory intensive...
While social media and the internet have become popular platforms in information dissemination amid the proliferation of using social media networks, they simultaneously lead to quick spreads of fake news and misinformation. Especially, ...
The rising cost of energy is becoming a concern beyond mobile computing platforms. Server-class computers cannot simply consume more power, since increased energy consumption translates into more heat dissipations, more cooling...
The primary contribution of this research is to define and evaluate a general multi-agent distributed architecture, in which software agents utilize fuzzy knowledge structures to support agent socialization, collaboration, and...
Aerial imagery of geographic regions in the form of Lidar and RGB images aids different tasks like survey, urban-planning, mapping, surveillance, navigation, localization and others. Most of the applications, in general, require accurate...
The purpose of computer simulation is to utilize a mathematical model to recreate a real world situation such that the behavior and interactions of the entities involved can more easily be understood. By varying initial conditions and...
As storage device performance increases, the lifespan of an I/O request becomes throttled more-so by data path traversal than physical disk access. Even though many computer performance analysis tools exist, a surprisingly small amount...
Many applications are featured with both text and location information, which leads to a novel type of search: spatial approximate string search (Sas). The Sas is gaining attention from the database community only recently. A large...
Recognizing and representing objects of certain categories become increasingly important due to the availability of high-resolution imaging technologies and the explosive amount of digital data. In particular, semantic segmentation of...
As the standard formalism and powerful abstraction of networked data, graphs have been used to model and interpret structured information from protein interaction and program dependence, to business coordination and Internet topology....
The winding number has proven to be a very simple and robust approach for inside-outside segmentation that can be applied both in the 2D and 3D realms for multiple purposes, including mesh cleaning, CAD design, 3D printing, among others....
Monte Carlo methods are often used to efficiently estimate partial differential equations. In this document, I will look at a few methods that have been developed into the backbone of the algorithm for estimating the electrostatic free...
With the popularity of microprocessors and scale-out system architectures, many large-scale high-performance computing (HPC) systems are built from a collection of compute servers, with an identical set of resources such as CPU, memory, ...
Developers often need additional knowledge to complete some programming tasks, and they oftenseek information online to solve the problem at hand. Fortunately, online resources contain a vast amount of information at the developers’...
Traditionally, if two files are considered identical, they are understood to be byte-by-byte equivalent. However, many files are semantically identical without being byte-to-byte identical. We assert that by using a contextual or...
As High-Performance Computing (HPC) applications with data security requirements are increasingly moving to execute in the public cloud, there is a demand that the cloud infrastructure for HPC should support privacy and integrity....
Behavior selection is a problem that AI development has faced for years, whether it be in video games or crowd-simulation software. While video game studios use methods like hierarchical task network (HTN) planners to control the...
Query rewriting (QR) is a critical component in dialogue systems for reducing frictions caused by systematic errors or user ambiguity. When there is an entity error, it imposes extra difficulty for a dialogue system to produce...
The dissertation research is focused on improving performance on genome wide nucleosome positioning. Nucleosome is the basic structural unit of DNA in eukaryotic cells. As nucleosomes limit the accessibility of the wrapped DNA to...
Discriminatory terminology has been identified as a potential contributing factor to low diversity in the software developer population. Terms including whitelist, slave, and dummy value have been commonplace in the technical vernacular...
The legacy storage data path is largely structured in black-box layers and has four major limitations: (1) functional redundancies across layers, (2) poor cross-layer coordination and data tracking, (3) presupposition of high-latency...
As the push for autonomous systems gains momentum, there has been a shift from automated to semi-autonomous systems, and current and future applications of artificial intelligence will revolve around the development of autonomous systems...
Hurricanes cause significant property loss every year. A substantial part of that loss is due to the trees destroyed by the wind, which in turn block the roads and produce a large amount of debris. The debris not only can cause damage to...
The amount of data stored on smart phones and other mobile devices has increased phenomenally over the last decade. As a result there has been a spike in the use of these devices for documenting different scenarios that are encountered...
The graph is a data structure that exists widely around us, including traditional fields like physics, biology, and cosmology, as well as emergent fields like social networks, software engineering, and financial trading platforms. The...
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.