Now showing items 95-114 of 136

    • Parallel prefetching and caching 

      Kimbrel, Tracy (1997)
      High-performance I/O systems depend on prefetching and caching to deliver good performance to applications. These two techniques have generally been considered in isolation, even though there are significant interactions ...
    • Photo-Realistic Scene Modeling and Visualization using Online Photo Collections 

      Shan, Qi
      Reconstructing 3D scenes from online photo collections has attracted a tremendous amount of interest from both academia and industry. The progress in the past decade has been exceptional, in terms of scale and reconstruction ...
    • Pixel-Based Reverse Engineering of Graphical Interfaces 

      Dixon, Morgan Emory
      User interface software is often large, complex, rigid, and difficult to implement. In fact, most of the development time and effort in a typical application is dedicated to the user interface. Not only do interfaces require ...
    • Practical, Usable, and Secure Authentication and Authorization on the Web 

      Czeskis, Alexei (2013-11-14)
      User authentication and authorization are two of the most critical aspects of computer security and privacy on the web. However, despite their importance, <italic>in practice</italic>, authentication and authorization are ...
    • Privacy and Performance in Social Overlay Networks 

      Isdal, Tomas (2012-09-13)
      The core Internet protocols were not designed to protect the privacy of content or the identities of communicating users, thus making censorship and surveillance easy. The same problem persists at higher level protocols, ...
    • Program Synthesis Without Full Specifications for Novel Applications 

      Perelman, Daniel Adam
      Program synthesis is a family of techniques that generate programs from a description of what the program should do but not how it should do it. By designing a program synthesis algorithm together with the user interaction ...
    • Programming by demonstration: a machine learning approach 

      Lau, Tessa (2001)
      Programming by demonstration (PBD) enables users to construct programs to automate repetitive tasks without writing a line of code. The key idea in PBD is to generalize from the user's demonstration of the program on a ...
    • Quantum Computation and Isomorphism Testing 

      Rosenbaum, David Jeffrey
      In this thesis, we study quantum computation and algorithms for isomorphism problems. Some of the problems that we cover are fundamentally quantum and therefore require quantum techniques. For other problems, classical ...
    • Query Processing for Massively Parallel Systems 

      Koutris, Paraschos
      The need to analyze and understand big data has changed the landscape of data management over the last years. To process the large amounts of data available to users in both industry and science, many modern data management ...
    • Reconstruction and Visualization of Architectural Scenes 

      Kushal, Avanish
      Can we experience a scene virtually, such as the Colosseum in Rome, without ever having to visit it? Such an experience should replicate the feeling of being physically present, in terms of being able to visualize the scene ...
    • Reducing the Usability Barrier to Specification and Verification 

      Schiller, Todd Wademan
      A program specification is a contract between a client and a program, which describes how the program can or will behave given input from the client. In practice, formal (machine-verified) specifications take more effort ...
    • Relation Extraction: from Ontological Smoothing to Temporal Correspondence 

      Zhang, Congle
      Relation extraction, the task of extracting facts from natural language text and creating machine readable knowledge, is a great dream of artificial intelligence. Today, most approaches to relation extraction are based on ...
    • Representation of d-dimensional geometric objects 

      Brisson, Erik, 1957- (1990)
      This work investigates data structures and algorithms for representing and manipulating d-dimensional geometric objects for arbitrary d $\le$ 1. These objects are often described by a set of basic building blocks, together ...
    • Role oriented programming for software evolution 

      VanHilst, Michael, 1953- (1997)
      This thesis addresses the problem of changing requirements in software evolution. It presents a method of development and change based on roles, where a role, in object oriented development, is a part of an object that ...
    • Scalable Methods and Expressive Models for Planning Under Uncertainty 

      Kolobov, Andrey (2013-07-25)
      The ability to plan in the presence of uncertainty about the effects of one's own actions and the events of the environment is a core skill of a truly intelligent agent. This type of sequential decision-making has been ...
    • Scalable Query Evaluation over Complex Probabilistic Databases 

      Jha, Abhay (2012-09-13)
      The age of Big Data has brought with itself datasets which are not just big, but also much more complicated. These datasets are constructed from disparate, unreliable and noisy sources, many times in an ad-hoc way because ...
    • Scheduling protocols for media-on-demand systems 

      VanDeGrift, Tammy (2005)
      Today's abundance of personal electronic devices and the growth of communications networks gives rise to a new set of applications. One such application allows clients to access high-bandwidth streaming media at times of ...
    • Search algorithms for biosequences using random projection 

      Buhler, Jeremy (2001)
      The recent explosion in the availability of long contiguous genomic sequences, including the complete genomes of several organisms, poses substantial challenges for bioinformatics. In particular, algorithms must be developed ...
    • Securing Embedded Systems: Analyses of Modern Automotive Systems and Enabling Near-Real Time Dynamic Analysis 

      Koscher, Karl Alexander
      Today, our life is pervaded by computer systems embedded inside everyday products. These embedded systems are found in everything from cars to microwave ovens. These systems are becoming increasingly sophisticated and ...
    • Security and Privacy for Untrusted Applications in Modern and Emerging Client Platforms 

      Roesner, Franziska
      Today's computer users have the choice among an ever increasing variety of devices and platforms, including desktops, tablets, smartphones, and web browsers. In addition to these more traditional platforms, continuous ...