ResearchWorks Archive

Browsing Computer science and engineering by Title

Browsing Computer science and engineering by Title

Sort by: Order: Results:

  • Hartung, Carl (2012-09-13)
    Gathering information accurately and quickly is essential for enabling organizations working in low-resource settings to have timely and sustainable impact. Due to insufficient infrastructure, many organizations currently ...
  • Fader, Anthony
    For the past fifteen years, search engines like Google have been the dominant way of finding information online. However, search engines break down when presented with complex information needs expressed as natural language ...
  • Robison, Tyler (2013-07-23)
    In software systems, having features of openness means that some of the internal components of the system are made available for examination by users. Researchers have looked at different effects of open systems a great ...
  • Kimbrel, Tracy (1997)
    High-performance I/O systems depend on prefetching and caching to deliver good performance to applications. These two techniques have generally been considered in isolation, even though there are significant interactions ...
  • Czeskis, Alexei (2013-11-14)
    User authentication and authorization are two of the most critical aspects of computer security and privacy on the web. However, despite their importance, <italic>in practice</italic>, authentication and authorization are ...
  • Isdal, Tomas (2012-09-13)
    The core Internet protocols were not designed to protect the privacy of content or the identities of communicating users, thus making censorship and surveillance easy. The same problem persists at higher level protocols, ...
  • Lau, Tessa (2001)
    Programming by demonstration (PBD) enables users to construct programs to automate repetitive tasks without writing a line of code. The key idea in PBD is to generalize from the user's demonstration of the program on a ...
  • Kushal, Avanish
    Can we experience a scene virtually, such as the Colosseum in Rome, without ever having to visit it? Such an experience should replicate the feeling of being physically present, in terms of being able to visualize the scene ...
  • Schiller, Todd Wademan
    A program specification is a contract between a client and a program, which describes how the program can or will behave given input from the client. In practice, formal (machine-verified) specifications take more effort ...
  • Brisson, Erik, 1957- (1990)
    This work investigates data structures and algorithms for representing and manipulating d-dimensional geometric objects for arbitrary d $\le$ 1. These objects are often described by a set of basic building blocks, together ...
  • VanHilst, Michael, 1953- (1997)
    This thesis addresses the problem of changing requirements in software evolution. It presents a method of development and change based on roles, where a role, in object oriented development, is a part of an object that ...
  • Kolobov, Andrey (2013-07-25)
    The ability to plan in the presence of uncertainty about the effects of one's own actions and the events of the environment is a core skill of a truly intelligent agent. This type of sequential decision-making has been ...
  • Jha, Abhay (2012-09-13)
    The age of Big Data has brought with itself datasets which are not just big, but also much more complicated. These datasets are constructed from disparate, unreliable and noisy sources, many times in an ad-hoc way because ...
  • VanDeGrift, Tammy (2005)
    Today's abundance of personal electronic devices and the growth of communications networks gives rise to a new set of applications. One such application allows clients to access high-bandwidth streaming media at times of ...
  • Buhler, Jeremy (2001)
    The recent explosion in the availability of long contiguous genomic sequences, including the complete genomes of several organisms, poses substantial challenges for bioinformatics. In particular, algorithms must be developed ...
  • Koscher, Karl Alexander
    Today, our life is pervaded by computer systems embedded inside everyday products. These embedded systems are found in everything from cars to microwave ovens. These systems are becoming increasingly sophisticated and ...
  • Roesner, Franziska
    Today's computer users have the choice among an ever increasing variety of devices and platforms, including desktops, tablets, smartphones, and web browsers. In addition to these more traditional platforms, continuous ...
  • Hinshaw, Kevin P (2000)
    Current medical imaging technology makes it possible to gather remarkably detailed three-dimensional data about an individual's anatomy. In domains ranging from education to clinical medicine, a common desire is the ability ...
  • Halperin, Daniel Chaim (2013-02-25)
    Advances in the price, performance, and power consumption of Wi-Fi (IEEE 802.11) technology have led to the adoption of wireless functionality in diverse consumer electronics. These trends have enabled an exciting vision ...
  • Tullsen, Dean Michael (1996)
    This dissertation examines simultaneous multithreading, a technique permitting several independent threads to issue instructions to a superscalar processor's functional units in a single cycle. Simultaneous multithreading ...

Search ResearchWorks


Advanced Search

Browse

My Account