ResearchWorks Archive

Browsing Computer science and engineering by Title

Browsing Computer science and engineering by Title

Sort by: Order: Results:

  • Soroush, Emad
    Scientists today are able to generate data at an unprecedented scale and rate. For example the Sloan Digital Sky Survey (SDSS) generates 200GB of data containing millions of objects on each night on its routine operation. ...
  • Lai, Kevin Kar Wai (2014-02-24)
    The availability of RGB-D (Kinect-like) cameras has led to an explosive growth of research on robot perception. RGB-D cameras provide high resolution (640 x 480) synchronized videos of both color (RGB) and depth (D) at 30 ...
  • Cary, Matthew, 1974- (2007)
    Mechanism design is a subfield of game theory and microeconomics focused on incentive engineering. A mechanism is a protocol, typically taking the form of an auction, that is explicitly designed so that rational but ...
  • Qin, Xiaohan, 1964- (1997)
    Two recent trends are affecting the design of medium-scale shared-memory multi-processors. The first is the use of nodes which themselves consist of clusters of processors. Clusters, already available as commodity parts, ...
  • Hartung, Carl (2012-09-13)
    Gathering information accurately and quickly is essential for enabling organizations working in low-resource settings to have timely and sustainable impact. Due to insufficient infrastructure, many organizations currently ...
  • Fader, Anthony
    For the past fifteen years, search engines like Google have been the dominant way of finding information online. However, search engines break down when presented with complex information needs expressed as natural language ...
  • Robison, Tyler (2013-07-23)
    In software systems, having features of openness means that some of the internal components of the system are made available for examination by users. Researchers have looked at different effects of open systems a great ...
  • Kimbrel, Tracy (1997)
    High-performance I/O systems depend on prefetching and caching to deliver good performance to applications. These two techniques have generally been considered in isolation, even though there are significant interactions ...
  • Shan, Qi
    Reconstructing 3D scenes from online photo collections has attracted a tremendous amount of interest from both academia and industry. The progress in the past decade has been exceptional, in terms of scale and reconstruction ...
  • Czeskis, Alexei (2013-11-14)
    User authentication and authorization are two of the most critical aspects of computer security and privacy on the web. However, despite their importance, <italic>in practice</italic>, authentication and authorization are ...
  • Isdal, Tomas (2012-09-13)
    The core Internet protocols were not designed to protect the privacy of content or the identities of communicating users, thus making censorship and surveillance easy. The same problem persists at higher level protocols, ...
  • Lau, Tessa (2001)
    Programming by demonstration (PBD) enables users to construct programs to automate repetitive tasks without writing a line of code. The key idea in PBD is to generalize from the user's demonstration of the program on a ...
  • Kushal, Avanish
    Can we experience a scene virtually, such as the Colosseum in Rome, without ever having to visit it? Such an experience should replicate the feeling of being physically present, in terms of being able to visualize the scene ...
  • Schiller, Todd Wademan
    A program specification is a contract between a client and a program, which describes how the program can or will behave given input from the client. In practice, formal (machine-verified) specifications take more effort ...
  • Brisson, Erik, 1957- (1990)
    This work investigates data structures and algorithms for representing and manipulating d-dimensional geometric objects for arbitrary d $\le$ 1. These objects are often described by a set of basic building blocks, together ...
  • VanHilst, Michael, 1953- (1997)
    This thesis addresses the problem of changing requirements in software evolution. It presents a method of development and change based on roles, where a role, in object oriented development, is a part of an object that ...
  • Kolobov, Andrey (2013-07-25)
    The ability to plan in the presence of uncertainty about the effects of one's own actions and the events of the environment is a core skill of a truly intelligent agent. This type of sequential decision-making has been ...
  • Jha, Abhay (2012-09-13)
    The age of Big Data has brought with itself datasets which are not just big, but also much more complicated. These datasets are constructed from disparate, unreliable and noisy sources, many times in an ad-hoc way because ...
  • VanDeGrift, Tammy (2005)
    Today's abundance of personal electronic devices and the growth of communications networks gives rise to a new set of applications. One such application allows clients to access high-bandwidth streaming media at times of ...
  • Buhler, Jeremy (2001)
    The recent explosion in the availability of long contiguous genomic sequences, including the complete genomes of several organisms, poses substantial challenges for bioinformatics. In particular, algorithms must be developed ...

Search ResearchWorks


Advanced Search

Browse

My Account