ResearchWorks Archive

Browsing Computer science and engineering by Title

Browsing Computer science and engineering by Title

Sort by: Order: Results:

  • Pham, Paul (2014-02-24)
    Quantum computing is a new field which combines computer science and quantum physics. Its most famous result, Shor's factoring algorithm, would enable us to one day compromise the widely-used RSA cryptosystem if we are ...
  • Patel, Kayur Dushyant (2013-02-25)
    Data is driving the future of computation: analysis, visualization, and learning algorithms power systems that help us diagnose cancer, live sustainably, and understand the universe. Yet, the data explosion has outstripped ...
  • Segal, Richard B (1997)
    Machine learning is the inference of general patterns from data. Machine-learning algorithms search large spaces of potential hypotheses for the hypothesis that best fits the data. Since the search space for most induction ...
  • Enev, Miroslav
    The growth of smart devices and the Internet of Things (IoT) is driving data markets in which users exchange sensor streams for services. In most current data exchange models, service providers offer their functionality ...
  • KWON, YONGCHUL (2013-02-25)
    Science and business are generating data at an unprecedented scale and rate due to ever evolving technologies in computing and sensors. Analyzing big data has become a key skill driving business and science. The challenges ...
  • Beschastnikh, Ivan (2013-07-25)
    Billions of people rely on correct and efficient execution of large systems, such as the distributed systems that power Google and Facebook. Yet these systems are complex and challenging to build and understand. Logging ...
  • Liu, Agatha H (2002)
    We introduce CASTOR, an automatic, unsupervised system for protein motif discovery and classification. Given amino acid sequences for a group of proteins, CASTOR generates statistically significant motifs and constructs a ...
  • Soroush, Emad
    Scientists today are able to generate data at an unprecedented scale and rate. For example the Sloan Digital Sky Survey (SDSS) generates 200GB of data containing millions of objects on each night on its routine operation. ...
  • Lai, Kevin Kar Wai (2014-02-24)
    The availability of RGB-D (Kinect-like) cameras has led to an explosive growth of research on robot perception. RGB-D cameras provide high resolution (640 x 480) synchronized videos of both color (RGB) and depth (D) at 30 ...
  • Cary, Matthew, 1974- (2007)
    Mechanism design is a subfield of game theory and microeconomics focused on incentive engineering. A mechanism is a protocol, typically taking the form of an auction, that is explicitly designed so that rational but ...
  • Qin, Xiaohan, 1964- (1997)
    Two recent trends are affecting the design of medium-scale shared-memory multi-processors. The first is the use of nodes which themselves consist of clusters of processors. Clusters, already available as commodity parts, ...
  • Hartung, Carl (2012-09-13)
    Gathering information accurately and quickly is essential for enabling organizations working in low-resource settings to have timely and sustainable impact. Due to insufficient infrastructure, many organizations currently ...
  • Fader, Anthony
    For the past fifteen years, search engines like Google have been the dominant way of finding information online. However, search engines break down when presented with complex information needs expressed as natural language ...
  • Robison, Tyler (2013-07-23)
    In software systems, having features of openness means that some of the internal components of the system are made available for examination by users. Researchers have looked at different effects of open systems a great ...
  • Kimbrel, Tracy (1997)
    High-performance I/O systems depend on prefetching and caching to deliver good performance to applications. These two techniques have generally been considered in isolation, even though there are significant interactions ...
  • Czeskis, Alexei (2013-11-14)
    User authentication and authorization are two of the most critical aspects of computer security and privacy on the web. However, despite their importance, <italic>in practice</italic>, authentication and authorization are ...
  • Isdal, Tomas (2012-09-13)
    The core Internet protocols were not designed to protect the privacy of content or the identities of communicating users, thus making censorship and surveillance easy. The same problem persists at higher level protocols, ...
  • Lau, Tessa (2001)
    Programming by demonstration (PBD) enables users to construct programs to automate repetitive tasks without writing a line of code. The key idea in PBD is to generalize from the user's demonstration of the program on a ...
  • Kushal, Avanish
    Can we experience a scene virtually, such as the Colosseum in Rome, without ever having to visit it? Such an experience should replicate the feeling of being physically present, in terms of being able to visualize the scene ...
  • Schiller, Todd Wademan
    A program specification is a contract between a client and a program, which describes how the program can or will behave given input from the client. In practice, formal (machine-verified) specifications take more effort ...

Search ResearchWorks


Advanced Search

Browse

My Account