Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
As High-Performance Computing (HPC) applications with data security requirements are increasingly moving to execute in the public cloud, there is a demand that the cloud infrastructure for HPC should support privacy and integrity....
Behavior selection is a problem that AI development has faced for years, whether it be in video games or crowd-simulation software. While video game studios use methods like hierarchical task network (HTN) planners to control the...
Query rewriting (QR) is a critical component in dialogue systems for reducing frictions caused by systematic errors or user ambiguity. When there is an entity error, it imposes extra difficulty for a dialogue system to produce...
The dissertation research is focused on improving performance on genome wide nucleosome positioning. Nucleosome is the basic structural unit of DNA in eukaryotic cells. As nucleosomes limit the accessibility of the wrapped DNA to...
With the maturity of mobile technologies, voice biometrics is becoming increasingly popular as a promising alternative to traditional passwords for user authentication on smartphones. Moreover, with the popularity of voice user interface...
With globalization and the 4th industrial revolution, the world has become emerged in technology. A smartphone is now capable of holding an entire identity of a person within. It is easy to interpret human behavior using the behavioral...
Tomographic reconstruction is a method for obtaining a three dimensional image of a specimen with a series of two dimensional projection images of the specimen taken from different tilt or projection angles. There are mainly two factors...
Discriminatory terminology has been identified as a potential contributing factor to low diversity in the software developer population. Terms including whitelist, slave, and dummy value have been commonplace in the technical vernacular...
The legacy storage data path is largely structured in black-box layers and has four major limitations: (1) functional redundancies across layers, (2) poor cross-layer coordination and data tracking, (3) presupposition of high-latency...
Hurricane risk assessment is an important research topic: accurate estimation of the potential loss helps guide mitigation efforts to decrease the loss in the future. In the past decade, researchers working on the loss analysis tried to...
The amount of data stored on smart phones and other mobile devices has increased phenomenally over the last decade. As a result there has been a spike in the use of these devices for documenting different scenarios that are encountered...
Computational thinking is increasingly recognized as an important skill set to learn for people living in the 21st century, and the middle school years comprise a critical stage to introduce children to computational thinking. Video game...
Chan-Vese is a level set method that simultaneously evolves a level set surface and fits locally constant intensity models for the interior and exterior regions to minimize a Mumford-Shah integral. However, the length-based contour...
The graph is a data structure that exists widely around us, including traditional fields like physics, biology, and cosmology, as well as emergent fields like social networks, software engineering, and financial trading platforms. The...
This study is a preliminary exploration of adoption of generative adversarial network (GAN)-derived avatar healthcare providers (HCPs). To our knowledge, GAN-derived avatars as de facto HCPs have not been investigated in relation to user...
Behavioral economics has become a significant perspective in the evaluation of human judgment and decision-making. In the limited research literature of cognitive biases in online health information seeking (OHIS) behavior, researchers...
This phenomenological study investigates the narratives of six Black women faculty to ascertain how their experiences contributed to their retention and persistence in Computing. This study, which incorporates Anti-Deficit Achievement...
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.