Theses/Dissertations from 2017
Improving Elementary Math Learning Through iPad Games, Kaya M. Thomas
Theses/Dissertations from 2016
StressAware: App for Continuously Measuring and Monitoring Stress Levels in Real Time on the Amulet Wearable Device, George G. Boateng
Security and Privacy Analysis of Medical Wearables, Brian M. Chalif
Nutrition Buddy: Enabling Behavior Change Through Wearables, Recommendations, and Digital Avatars, Daniel J. Chen
Air Keyboard: Mid-Air Text Input Using Wearable EMG Sensors and a Predictive Text Model, Jacob A. Gaba
Reusing Ambient Light to Recognize Hand Gestures, Mahina-Diana A. Kaholokula
Integrating Bluetooth Low Energy Peripherals with the Amulet, Anna J. Knowles
Bae: Before Anyone Else; The Answer to Mobile Dating for the African Diaspora, Jordan S. Kunzika
Devising a Framework for Efficient and Accurate Matchmaking and Real-time Web Communication, Charles Li
All Your BASE Are Belong To You: Improved Browser Anonymity and Security on Android, Peter Saisi
Interactive Data Visualization of Christian Demographics, Allison C. Wang
Learning Device Usage in Context: A Continuous and Hierarchical Smartphone Authentication Scheme, Bingyue Wang
Bloon: Software and Hardware for Data Collection and Real-Time Analysis, Jacob Z. Weiss
Monarch: A Reimagined Browser for the Modern Web, Daniel R. Whitcomb
Automating 3D Wireless Measurements with Drones, Ethan Yu
Theses/Dissertations from 2015
Communication Complexity of Distributed Statistical Algorithms, James A. Brofos
WiPrint: 3D Printing Your Wireless Coverage, Justin Chan
How Realistic is Photorealistic?, Olivia B. Holmes
Cell Representations of the Configuration Space for Planning Optimal Paths, Ajay Kannan
Why Do Protein Structures Recur?, Rebecca G. Leong
Repcoin: A Market-Based Approach to Reputation, Stephen D. Malina
Two Algorithms for Finding Edge Colorings in Regular Bipartite Multigraphs, Patricia T. Neckowicz
Repcoin: The Only Reputation Market, Matthew Ritter
Course InSight: An Application of Natural Language Processing in a Course Browser, Chuanqi Sun
Theses/Dissertations from 2014
Constant RMR Transformation to Augment Reader-Writer Locks with Atomic Upgrade/Downgrade Support, Jake S. Leichtling
Chain Match: An Algorithm for Finding a Perfect Matching of a Regular Bipartite Multigraph, Stefanie L. Ostrowski
Shared Roots: Regularizing Deep Neural Networks through Multitask Learning, Piotr Teterwak
StyleCheck: An Automated Stylistic Analysis Tool, Alexander P. Welton
Theses/Dissertations from 2013
Ekho: A Tool for Recording and Emulating Energy Harvesting Conditions, Ryan H. Archer
An Algorithm for Computing Edge Colorings on Regular Bipartite Multigraphs, Andrew S. Hannigan
Polynomial and Query Complexity of Minterm-Cyclic Functions, Matthew J. Harding
Please Take My Survey: Compliance with smartphone-based EMA/ESM studies, Shloka R. Kini
Nimbus A Novel Multi-Device Operating System Shell, Sang Jin Lee
Grid Cryptographic Simulation: A Simulator to Evaluate the Scalability of the X.509 Standard in the Smart Grid, Tucker L. Ward
Mobile Applications: Games that Transform Education, Edward Y. Zhang
Theses/Dissertations from 2012
A Data Flow Tracker and Reference Monitor for WebKit and JavaScriptCore, Andrew Bloomgarden
Methods of Computing Deque Sortable Permutations Given Complete and Incomplete Information, Daniel J. Denton
Search for Trust: An Analysis and Comparison of CA System Alternatives and Enhancements, Alexandra C. Grant
Asymptotic Statistics of Nodal Domains of Quantum Chaotic Billiards in the Semiclassical Limit, Kyle T. Konrad
Sensor-based system for verifying blood-pressure measurement position, Emma N. Smithayer
Theses/Dissertations from 2011
Obstruction-free Snapshot, Obstruction-free Consensus, and Fetch-and-add Modulo k, Jack R. Bowman
A Solution to k-Exclusion with O(logk) RMR Complexity, Jonathan H. Choi
Reader-Writer Exclusion Supporting Upgrade and Downgrade with Reader-Priority, Michael I. Diamond
Static Analysis for Ruby in the Presence of Gradual Typing, Michael Edgar
Reader-Writer Exclusion Supporting Upgrade and Downgrade with Starvation Freedom, Matthew Elkherj
Effects of network trace sampling methods on privacy and utility metrics, Phillip A. Fazio
A Multilevel, Posture-based Model for Motor Control in Simulation and Robotic Applications, Divya A. Gunasekaran
802.15.4/ZigBee Analysis and Security: tools for practical exploration of the attack surface, Ricky A. Melgares
Exploiting the Hard-Working DWARF: Trojan and Exploit Techniques Without Native Executable Code, James M.H. Oakley
IEEE 802.15.4 Wireless Security: Self-Assessment Frameworks, Ryan Speers
Constant-RMR Abortable Reader-Priority Reader-Writer Algorithm, Nan Zheng
Theses/Dissertations from 2010
Virtual Container Attestation: Customized trusted containers for on-demand computing., Katelin A. Bailey
NeuroPhone: Brain-Mobile Phone Interface using a Wireless EEG Headset, Matthew K. Mukerjee
Creating Large Disturbances in the Power Grid: Methods of Attack After Cyber Infiltration, Loren D. Sands-Ramshaw
The Curious Timekeeper: Creative Thesis in Interactive Sculpture, Kate I. Schnippering
Block Sensitivity versus Sensitivity, Karn Seth
Theses/Dissertations from 2009
Hawk: 3D Gestured-Based Interactive Bird Flight Simulation, Thomas Yale Eastman
An Information Complexity Approach to the Inner Product Problem, William B. Henderson-Frost
Developing an Improved, Web-Based Classroom Response System with Web Services, Oleg B. Seletsky
Automated Tracking of Dividing Nuclei in Microscopy Videos of Living Cells, Evan L. Tice
The Effects of Introspection on Computer Security Policies, Stephanie A. Trudeau
Theses/Dissertations from 2008
Making RBAC Work in Dynamic, Fast-Changing Corporate Environments, Ruslan Y. Dimov
Linkability in Activity Inference Data Sets, Jeffrey Fielding
Key Management for Secure Power SCADA, Manya K. Sleeper
Theses/Dissertations from 2007
Closest and Farthest-Line Voronoi Diagrams in the Plane, Mark C. Henle
SCML: A Structural Representation for Chinese Characters, Daniel G. Peebles
A Security Assessment of Trusted Platform Modules, Evan R. Sparks
Lighting with Sketches, Alexander Wakefield Steinberg
Theses/Dissertations from 2006
Wait-Free and Obstruction-Free Snapshot, Khanh Do Ba
Limited Delegation (Without Sharing Secrets) in Web Applications, Nicholas J. Santos
Theses/Dissertations from 2005
Lower Bounds on the Communication Complexity of Shifting, Marco D. Adelfio
A toy rock climbing robot, Matthew P. Bell
Managing Access Control in Virtual Private Networks, Twum Djin
Theses/Dissertations from 2004
Mobile Agents Simulation with DaSSF, Nikita E. Dubrovsky
PPL: a Packet Processing Language, Eric G. Krupski
Access Control in a Distributed Decentralized Network: An XML Approach to Network Security using XACML and SAML, Paul J. Mazzuca
Simulating mobile ad hoc networks: a quantitative evaluation of common MANET simulation models, Calvin Newport
Enhancing Expressiveness of Speech through Animated Avatars for Instant Messaging and Mobile Phones, Joseph E. Pechter
Synchronizing Keyframe Facial Animation to Multiple Text-to-Speech Engines and Natural Voice with Fast Response Time, William H. Pechter
Testing the Greenpass Wireless Security System, Kimberly S. Powell
Efficient Wait-Free Implementation of Atomic Multi-Word Buffer, Rachel B. Ringel
Scheduling Pipelined, Multi-Threaded Programs in Linux, Brunn W. Roysden
A Secure Network Node Approach to the Policy Decision Point in Distributed Access Control, Geoffrey H. Stowe
Theses/Dissertations from 2003
Power Conservation in the Network Stack of Wireless Sensors, Michael De Rosa
Enhancing Asynchronous Parallel Computing, Elizabeth Anne Hamon
Persistence and Prevalence in the Mobility of Dartmouth Wireless Network Users, Clara Lee
802.11b Wireless Network Visualization and Radiowave Propagation Modeling, Chris Lentz
Billiards Adviser as a Search in a Continuous Domain with Significant Uncertainty, Thomas Mueller
Trusted S/MIME Gateways, Mindy J. Pereira
An Evaluation of the Impact of Models for Radio Propagation on the Simulation of 802.11b Wireless Networks, Evan W. Richardson
Discovery, Visualization and Analysis of Gene Regulatory Sequence Elements in Genomes, Daniel F. Simola
An Active Learning Approach to Efficiently Ranking Retrieval Engines, Lisa A. Torrey
Using Low Level Linear Memory Management for Type-Preserving Mark-Sweep Garbage Collector, Edward Wei
Theses/Dissertations from 2002
The Future of Cryptography Under Quantum Computers, Marco A. Barreno
Analysis of Protein Sequences Using Time Frequency and Kolmogorov-Smirnov Methods, Kobby Essien
Information-theoretic Bounds on the Training and Testing Error of Boosting, Sebastien M. Lahaie
Role Definition Language (RDL): A Language to Describe Context-Aware Roles, Christopher P. Masone
Performance and Interoperability In Solar, A Abram White
Theses/Dissertations from 2001
Optimizing the Dimensional Method for Performing Multidimensional, Multiprocessor, Out-of-Core FFTs, Jeremy T. Fineman
An Armored Data Vault, Alex Iliev