Dissertations

 

Expressive Power, Safety and Cloud Implementation of Attribute and Relationship Based Access Control Models

Tahmina Ahmed

November 2017

 

System Call Anomaly Detection in Mutli-Threaded Programs

Marcus Pendleton

November 2017

 

Performance and Accuracy Analysis of Programs Using Approximation Techniques

Riad Akram

November 2017

 

Anomaly-Based Debugging of Correctness and Performance Issues in Multithreaded Programs

Mohammad Alam

November 2017

 

Detecting Memory Model Bugs in Multi-Core and Many-Core Systems

Islam Mohammad Majharul

October 2017

 

Time Sensitive VM Provisioning for Resource-Constrained Clouds

Rehana Begam

July 2017

 

Applying Semantic Analysis for the Alignment of Natural Language Privacy Policies with Application Code

Rocky Slavin

July 2017

 

Time Sensitive VM Provisioning for Resource-Constrained Clouds

Prosunjit Biswas

April 2017

 

Approximating Application Performances in Data Centers and Simulated Machines

Mohammad S Islam

August 2017

 

Novel Algorithms and Metrics for Functional Discoveries From Networked Biological Data

Lu Liu

May 2017

 

A Holistic Approach Using Honey Communities for Cyber Event Detection and Protection in Communities and Large Distributed Organizations

James Rutherford

April 2017

 

Developing Tools and Algorithms in Digital Geometry

Iffat Chowdhury

July 2016

 

Understanding of Geometric Visibility in Polygons

Qing Wang

July 2016

 

Obfuscated Malware Detection and Classification

Moustafa Saleh

April 2016

 

Video Representation for Fine-Grained Action Recognition

Yang Zhou

April 2016

 

Authorization Federation in Multi-Tenant Multi-Cloud IaaS

Navid Pustchi

April 2016

 

Machine Learning Approaches Toward Genome-Wide CIS-Regulatory Element Discovery and Transcription Factor Binding Sites Modeling

Zhen Gao

August 2015

 

Towards Understanding and Improving Gait Rehabilitation in Virtual Environments Using Latency for Mobility Impaired Persons

Gayani Samaraweera

November 2015

 

An Elastic Mixed-Criticality Scheduling Framework for Cyber-Physical Systems

Hang Su

August 2015

 

Securing Multimedia Communication in Traditional and Emerging Architectures

Ali Tekeoglu

July 2015

 

Content-Based EEG Data Retrieval and Annotation for Time-Locked and Continuous EEG Data

Kyung Min Su

November 2015

 

Attribute-assisted Learning for Web Image Applications

Junjie Cai

September 2015

 

Algorithms for Map Construction and Comparison

Mahmuda Ahmed

July 2015

 

Machine Learning and Graph Theoretical Approaches Toward Precise Disease Classification, Prognosis and Treatment

Md. Jamiul Jahid

June 2015

 

The Relentless Execution Model for Task-uncoordinated Parallel Computation in Distributed Memory Environments

Lucas Wilson

May 2015

 

Hyper-Sequence-Graph Mining

Xinran Yu

April 2015

 

Constraints for Attribute Based Access Control with Application in Cloud IaaS

Khalid Zaman Bijon

April 2015

 

Task Allocation and Path Planning in Wireless Sensor and Robot Networks

Andrew Wichmann

April 2015

 

Understanding and Improving Motivation for Rehabilitation in Virtual Environments for Mobility Impaired Persons

Rongkai Guo

August 2014

 

Build and Reconstruction on Transcriptional Regulatory Network and Network-Based Disease Prediction

Chengwei Lei

July 2014

 

Multi-Tenant Access Control for Cloud Services

Bo Tang

July 2014

 

Provenance-Based Access Control Models

Dang Nguyen

July 2014

 

Hierarchical Distributed Loop Self-Scheduling Schemes on Cluster and Cloud Systems

Lijie Zhang

April 2014

 

Verifiable Delegated Computation on Outsourced Data

Qingji Zheng

April 2014

 

Attribute Based Access Control Models and Implementation for Cloud Infrastructure as a Service

Xin Jin

April 2014

 

Detecting and Characterizing Malicious Websites

Li Xu

April 2014

 

Access Control for Online Social Networks Using Relationship Type Patterns

Yuan Cheng

April 2014

 

Hierarchical Distributed Loop Self-Scheduling Schemes on Cluster and Cloud Systems

Yiming Han

April 2014

 

A Statistical Framework for Analyzing Cyber Attacks

Zhenxin Zhan

April 2014

 

Consensus Reasoning for Intelligent Web Searches

Steven O'Hara

February 2014

 

A Framework for Composing Security-Typed Languages

Andreas Gampe

December 2013

 

Algorithms and Harness Results for Measuring Similarity Using Fréchet Distance Variants

Jessica (Jonathan) Sherette

December 2013

 

Formally Ensuring the Permissibility of Obligations in Security and Privacy Policies

Omar Chowdhury

December 2013

 

Mobile Assisted Security Framework for Wireless Sensor Networks

Baris Tas

December 2013

 

Energy-Efficient Fault Tolerance in Multiprocessor Real-Time Systems

Yifeng Guo

November 2013

 

Crosscutting Software Artifacts for Access Control

Mark Robinson

May 2013

 

Energy-Efficient Secure and Anonymous Communication Protocol for Wireless Sensor Networks

Pengjun Pan

May 2013

 

Improving Performance and Predictability of Storage Arrays

Nihat Altiparmak

April 2013

 

Robust Image Representation for Classification and Retrieval

Xia Li

April 2013

 

Image Understanding From Web Media Resource

Jie Xiao

April 2013

 

Scalable Detection of Community Cyber Incidents Utilizing Distributed and Anonymous Security Information Sharing

Keith Harrison

December 2012

 

Privacy-Preserving Data Mining Through Data Publishing and Knowledge Model Sharing

Hongwei Tian

December 2012

 

A Formal Framework For Analyzing Sequence Diagram

Hui Shen

December 2012

 

Botnets Analysis and Detection Methods Based On Network Behavior

Areej Al-Bataineh

November 2012

 

Privacy Preservation in Social Graphs

Lijie Zhang
April 2012

 

Intelligent Cache Management Techniques For Reducing Memory System Waste
Samira Khan
March 2012

 

Acceleration of Scientific Applications on Reconfigurable Computing Systems

Yi-Gang Tai

July 2011

 

Practical User Obligation Systems That Affect and Depend on Authorizations
Murillo Pontual
November 2011

 

Data-Driven Transforms for Exploration, Visualization and Classification of High-Dimensional Data
Dragana Veljkovic Perez
December 2010

 

Protecting Cryptographic Keys and Functions from Malware Attacks
Timothy Parker
December 2010

 

Parallelism and Error Reduction in a High Performance Environment
Anthony M. Castaldo
December 2010

 

Scheduling for Energy and Reliability Management on Multiprocessor Real-Time Systems

Xuan Qi

November 2010

 

Sidekick: Integrating Knowledge and User Belief to Enable Biological Discovery
Mark S. Doderer
August 2010

 

Obstacle-Avoiding Similarity Metrics and Shortest Path Problems

Atlas F. Cook IV
December 2009

 

Security Policy Analysis in A Trust Management Environment
Mark G. Reith
August 2009

 

Defending Against Malicious Nodes in closed Manets Through Packet Authentication and A Hybrid Trust Management System
Rehan Akbani
August 2009

 

A Sublexical Unit Based Hash Model Approach for Spam Detection
Like Zhang
August 2009

 

Protecting Critical Secrets on Commodity Hardware and Operating Systems

Timothy Paul Parker

April 2009

 

Statistical Learning for Multimedia Information Retrieval and Their Applications

Yijuan Lu
August 2008

 

New High Performance Computational Strategies for Inverse Problems with Application to Analytical Ultracentrifugation
Emre Brookes
May 2008

 

An in Silico Approach to Discover Transcriptional Regulatory Elements
Amitava Karmaker
May 2008

 

Integrated Prevention and Detection of Byzantine Attacks in Mobile Ad hoc Networks

Su (Kevin) Xu

January 2008

 

Game Theory Based Job Allocation/Load Balancing in Distributed Systems with Applications to Grid Computing
Satish Penmatsa
December 2007

 

Generalized Discriminant Analysis in Content-based Image Retrieval
Jie Yu
May 2007

 

Identification of Putative Functional Elements in Regulation of Gene Expression
Kihoon Yoon
May 2007

 

Advancing Data Dependence Analysis in Practice
Konstantinos Kyriakopoulos
May 2007

 

Java Memory Compression
Mayumi Kato
May 2007

 

The Automatic Generation and Testing of Signal Recognition Algorithms
Kenneth Holladay
May 2007

 

Financial Time Series Prediction and Evaluation By Genetic Programming with Trigonometric Functions and High-Order Statistics
Roy Schwaerzel
December 2006

 

Techniques to Mitigate Traffic Overload and Protocol Inefficiencies in Moble Ad Hoc Networks
Saman Amendra DeSilva
December 2004

 

Load Balancing in Distributed Systems: A Game Theoretic Approach
Daniel Grosu
May 2004

 

Design and Analysis of Adaptive Routing and Transport Protocols in Mobile Ad Hoc Networks
Thomas David Dyer
December 2002

 

Protocols For Mobile Ad Hoc Networking
Robert Castaneda
August 2000

 

Cooperative Web Caching: A Viability Study and Design Analysis
Sandra G. Dykes
August 2000