Computer Science ETDs

Computer Science ETDs

 

For information about submitting your thesis or dissertation, or its availability here, please see the Overview of Thesis & Dissertation Policies and Procedures or contact the Office of Graduate Studies.

Follow


Theses/Dissertations from 2012

PDF

Energy consumption in networks on chip : efficiency and scaling, George Bezerra

PDF

Methods for speculatively bootstrapping better intrusion detection system performance, Sunny Fugate

PDF

Energy conserving privacy enhancing algorithms for resource-constrained devices, Michael Groat

PDF

Multivalent Random Walkers:A computational model of superdiffusive transport at the nanoscale, Mark Joseph Olah

PDF

Applications of Voronoi partitions in particle therapy, Daniel Riofrio

PDF

Privacy-preserving techniques for computer and network forensics, Bilal Shebaro

PDF

Fault-tolerant wireless sensor networks using evolutionary games, Ricardo Villalon

Theses/Dissertations from 2011

PDF

Fine-grained reasoning about the security and usability trade-off in modern security tools, Mohammed I. Al-Saleh

PDF

Keeping checkpoint/restart viable for exascale systems, Kurt Ferreira

PDF

Improving peer review with ACORN : Ant Colony Optimization algorithm for Reviewer's Network, Mark Flynn

PDF

Efficiently bootstrapping extreme scale software systems, Joshua Goehner

PDF

Practical, scalable algorithms for Byzantine agreement, Olumuyiwa Oluwasanmi

PDF

Parallel network protocol stacks using replication, Charles Donour Sizemore

Theses/Dissertations from 2010

PDF

Artificial Conversations for Chatter Bots Using Knowledge Representation, Learning, and Pragmatics, Chayan Chakrabarti

PDF

Dynamic photon painting, Zhe Chen

PDF

Molecular simulations of dendritic molecules : a study of PAMAM and phenyl-acetylene dendrimers, Mark Fleharty

PDF

A protocol reconfiguration and optimization system for MPI, Manjunath Gorentla Venkata

PDF

Collective belief models for representing consensus and divergence in communities of Bayesian decision-makers, Kshanti Greene

PDF

Simulating the evolution of recruitment behavior in foraging Ants, Kenneth Letendre

PDF

Security in network games, Rustagi Navin

PDF

Automating Program Verification and Repair Using Invariant Analysis and Test Input Generation, Thanh V. Nguyen

PDF

Efficient algorithms for phylogenetic post-analysis, Nicholas Pattengale

PDF

Three algorithms for causal learning, Roshan Ram Rammohan

PDF

Algorithms for self-healing networks, Amitabh Trehan

PDF

Markov random field modeling of the spatial distribution of proteins on cell membranes, Jun Zhang

Theses/Dissertations from 2009

PDF

Using ant colony optimization for routing in microprocesors, Tamanna Arora

PDF

Reconfigurable middleware architectures for large scale sensor networks, Sean M. Brennan

PDF

Term rewriting with built-in numbers and collection data structures, Stephan Falke

PDF

Distributed Internet security and measurement, Josh Karlin

PDF

Improving the performance of parallel scientific applications using cache injection, Edgar Leon Borja

PDF

Programmer feedback and dynamic analysis to enable optimization in Java applications: the D.U.P.O. framework, David Mohr

PDF

Learning condition-specific networks, Sushmita Roy

PDF

Supervised manifold distance segmentation, Guany Wang

Theses/Dissertations from 2008

PDF

A hierarchical group model for programming sensor networks, James Horey

Theses/Dissertations from 2007

PDF

Anomaly detection for HTTP intrusion detection : algorithm comparisons and the effect of generalization on accuracy, Kenneth Ingham III

Theses/Dissertations from 1974

PDF

The Design Of Algorithms For Implementation By Cellular Arrays., Robert Gordon Babb