Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
The task of protecting software integrity can be approached with a two-part strategy that addresses threats to the static integrity of memory contents and the dynamic integrity of software memory interactions. Although their resultant...
Shape represents a complex and rich source of biological information that is fundamentally linked to underlying mechanisms and functions. Many fields of biology employ mathematical tools for the statistical analysis of shape variation....
Network of unmanned vehicles, are poised to be the next giant leap of technology. Such systems are already being used by the defense and law enforcement agencies. The US DoD and some very large private corporations are spending large...
Supercomputers play an essential role in performing computationally intensive tasks in various scientific fields. As supercomputers move toward the next milestone in computing power, exascale computing, interconnection networks become a...
Low-rank matrix approximation is extremely useful in the analysis of data that arises in scientific computing, engineering applications, and data science. However, as data sizes grow, traditional low-rank matrix approximation methods, ...
There has been a great deal of research devoted to computer vision related assistive technologies. Unfortunately, this area of research has not produced many usable solutions. The long cane and the guard dog are still far more useful...
Every day, computer software becomes more important for the functioning of the world. The expectation causes increasing code size and complex logic. These factors unavoidably lead to more and more vulnerabilities, many of which can be...
Vector-borne diseases account for more than 17% of infectious diseases, causing more than 1 million deaths annually from malaria, dengue fever, yellow fever, etc. Diseases once thought to be controlled, have experienced a resurgence. For...
Modern science and technology have witnessed in the past decade a proliferation of complex data that can be naturally modeled and interpreted as graphs. In real-world networked applications, the underlying graphs oftentimes exhibit...
The number and type of digital devices are increasing tremendously in today's world. However, as the code size soars, the hidden vulnerabilities become a major threat to user security and privacy. Vulnerability mitigation, detection, and...
In this dissertation, I explore different types of applications in the area of applied machine learning, time series analysis, and prediction. Time series forecasting is a fundamental task in machine learning and data mining. It is an...
The demand for high performance wireless networks and systems have become increasingly high over the last decade. This dissertation addresses three systems that were designed to improving the efficiency, reliability and security of...
Software tools designed for disk analysis play a critical role today in digital forensics investigations. However, these digital forensics tools are often difficult to use, usually task specific, and generally require professionally...
The current Internet architecture reveals its chronic limitations against the new paradigms of networking. The advancement of technology has changed the network use from communication to content distribution. Unfortunately, the IP-based...
DAGDA exposes some of the hidden operations that the hardware uses when performing loads and stores to the compiler to save energy and increase performance. We decouple the micro-operations for loads and stores into two operations: the...
We propose the use of randomized (scrambled) quasirandom sequences for the purpose of providing practical error estimates for quasi-Monte Carlo (QMC) applications. One popular quasirandom sequence among practitioners is the Halton...
While social media and the internet have become popular platforms in information dissemination amid the proliferation of using social media networks, they simultaneously lead to quick spreads of fake news and misinformation. Especially, ...
As the standard formalism and powerful abstraction of networked data, graphs have been used to model and interpret structured information from protein interaction and program dependence, to business coordination and Internet topology....
The winding number has proven to be a very simple and robust approach for inside-outside segmentation that can be applied both in the 2D and 3D realms for multiple purposes, including mesh cleaning, CAD design, 3D printing, among others....
Monte Carlo methods are often used to efficiently estimate partial differential equations. In this document, I will look at a few methods that have been developed into the backbone of the algorithm for estimating the electrostatic free...
Developers often need additional knowledge to complete some programming tasks, and they oftenseek information online to solve the problem at hand. Fortunately, online resources contain a vast amount of information at the developers’...
The amount of data stored on smart phones and other mobile devices has increased phenomenally over the last decade. As a result there has been a spike in the use of these devices for documenting different scenarios that are encountered...
The graph is a data structure that exists widely around us, including traditional fields like physics, biology, and cosmology, as well as emergent fields like social networks, software engineering, and financial trading platforms. The...
As the push for autonomous systems gains momentum, there has been a shift from automated to semi-autonomous systems, and current and future applications of artificial intelligence will revolve around the development of autonomous systems...
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.