Follow


Theses/Dissertations from 2017

PDF

Improving Elementary Math Learning Through iPad Games, Kaya M. Thomas

Theses/Dissertations from 2016

PDF

StressAware: App for Continuously Measuring and Monitoring Stress Levels in Real Time on the Amulet Wearable Device, George G. Boateng

PDF

Security and Privacy Analysis of Medical Wearables, Brian M. Chalif

PDF

Nutrition Buddy: Enabling Behavior Change Through Wearables, Recommendations, and Digital Avatars, Daniel J. Chen

PDF

Air Keyboard: Mid-Air Text Input Using Wearable EMG Sensors and a Predictive Text Model, Jacob A. Gaba

PDF

Reusing Ambient Light to Recognize Hand Gestures, Mahina-Diana A. Kaholokula

PDF

Integrating Bluetooth Low Energy Peripherals with the Amulet, Anna J. Knowles

PDF

Bae: Before Anyone Else; The Answer to Mobile Dating for the African Diaspora, Jordan S. Kunzika

PDF

Devising a Framework for Efficient and Accurate Matchmaking and Real-time Web Communication, Charles Li

PDF

All Your BASE Are Belong To You: Improved Browser Anonymity and Security on Android, Peter Saisi

PDF

Interactive Data Visualization of Christian Demographics, Allison C. Wang

PDF

Learning Device Usage in Context: A Continuous and Hierarchical Smartphone Authentication Scheme, Bingyue Wang

PDF

Bloon: Software and Hardware for Data Collection and Real-Time Analysis, Jacob Z. Weiss

PDF

Monarch: A Reimagined Browser for the Modern Web, Daniel R. Whitcomb

PDF

Automating 3D Wireless Measurements with Drones, Ethan Yu

Theses/Dissertations from 2015

PDF

Communication Complexity of Distributed Statistical Algorithms, James A. Brofos

PDF

WiPrint: 3D Printing Your Wireless Coverage, Justin Chan

PDF

How Realistic is Photorealistic?, Olivia B. Holmes

PDF

Cell Representations of the Configuration Space for Planning Optimal Paths, Ajay Kannan

PDF

Why Do Protein Structures Recur?, Rebecca G. Leong

PDF

Repcoin: A Market-Based Approach to Reputation, Stephen D. Malina

PDF

Two Algorithms for Finding Edge Colorings in Regular Bipartite Multigraphs, Patricia T. Neckowicz

PDF

Repcoin: The Only Reputation Market, Matthew Ritter

PDF

Course InSight: An Application of Natural Language Processing in a Course Browser, Chuanqi Sun

Theses/Dissertations from 2014

PDF

Constant RMR Transformation to Augment Reader-Writer Locks with Atomic Upgrade/Downgrade Support, Jake S. Leichtling

PDF

Chain Match: An Algorithm for Finding a Perfect Matching of a Regular Bipartite Multigraph, Stefanie L. Ostrowski

PDF

Shared Roots: Regularizing Deep Neural Networks through Multitask Learning, Piotr Teterwak

PDF

StyleCheck: An Automated Stylistic Analysis Tool, Alexander P. Welton

Theses/Dissertations from 2013

PDF

Ekho: A Tool for Recording and Emulating Energy Harvesting Conditions, Ryan H. Archer

PDF

An Algorithm for Computing Edge Colorings on Regular Bipartite Multigraphs, Andrew S. Hannigan

PDF

Polynomial and Query Complexity of Minterm-Cyclic Functions, Matthew J. Harding

PDF

Please Take My Survey: Compliance with smartphone-based EMA/ESM studies, Shloka R. Kini

PDF

Nimbus A Novel Multi-Device Operating System Shell, Sang Jin Lee

PDF

Grid Cryptographic Simulation: A Simulator to Evaluate the Scalability of the X.509 Standard in the Smart Grid, Tucker L. Ward

PDF

Mobile Applications: Games that Transform Education, Edward Y. Zhang

Theses/Dissertations from 2012

PDF

A Data Flow Tracker and Reference Monitor for WebKit and JavaScriptCore, Andrew Bloomgarden

PDF

Methods of Computing Deque Sortable Permutations Given Complete and Incomplete Information, Daniel J. Denton

PDF

Search for Trust: An Analysis and Comparison of CA System Alternatives and Enhancements, Alexandra C. Grant

PDF

Asymptotic Statistics of Nodal Domains of Quantum Chaotic Billiards in the Semiclassical Limit, Kyle T. Konrad

PDF

Sensor-based system for verifying blood-pressure measurement position, Emma N. Smithayer

Theses/Dissertations from 2011

PDF

Obstruction-free Snapshot, Obstruction-free Consensus, and Fetch-and-add Modulo k, Jack R. Bowman

PDF

A Solution to k-Exclusion with O(logk) RMR Complexity, Jonathan H. Choi

PDF

Reader-Writer Exclusion Supporting Upgrade and Downgrade with Reader-Priority, Michael I. Diamond

PDF

Static Analysis for Ruby in the Presence of Gradual Typing, Michael Edgar

PDF

Reader-Writer Exclusion Supporting Upgrade and Downgrade with Starvation Freedom, Matthew Elkherj

PDF

Effects of network trace sampling methods on privacy and utility metrics, Phillip A. Fazio

PDF

A Multilevel, Posture-based Model for Motor Control in Simulation and Robotic Applications, Divya A. Gunasekaran

PDF

802.15.4/ZigBee Analysis and Security: tools for practical exploration of the attack surface, Ricky A. Melgares

PDF

Exploiting the Hard-Working DWARF: Trojan and Exploit Techniques Without Native Executable Code, James M.H. Oakley

PDF

IEEE 802.15.4 Wireless Security: Self-Assessment Frameworks, Ryan Speers

PDF

Constant-RMR Abortable Reader-Priority Reader-Writer Algorithm, Nan Zheng

Theses/Dissertations from 2010

PDF

Virtual Container Attestation: Customized trusted containers for on-demand computing., Katelin A. Bailey

PDF

NeuroPhone: Brain-Mobile Phone Interface using a Wireless EEG Headset, Matthew K. Mukerjee

PDF

Creating Large Disturbances in the Power Grid: Methods of Attack After Cyber Infiltration, Loren D. Sands-Ramshaw

PDF

The Curious Timekeeper: Creative Thesis in Interactive Sculpture, Kate I. Schnippering

PDF

Block Sensitivity versus Sensitivity, Karn Seth

Theses/Dissertations from 2009

PDF

Hawk: 3D Gestured-Based Interactive Bird Flight Simulation, Thomas Yale Eastman

PDF

An Information Complexity Approach to the Inner Product Problem, William B. Henderson-Frost

PDF

Developing an Improved, Web-Based Classroom Response System with Web Services, Oleg B. Seletsky

PDF

Automated Tracking of Dividing Nuclei in Microscopy Videos of Living Cells, Evan L. Tice

PDF

The Effects of Introspection on Computer Security Policies, Stephanie A. Trudeau

Theses/Dissertations from 2008

PDF

Making RBAC Work in Dynamic, Fast-Changing Corporate Environments, Ruslan Y. Dimov

PDF

Linkability in Activity Inference Data Sets, Jeffrey Fielding

PDF

Key Management for Secure Power SCADA, Manya K. Sleeper

Theses/Dissertations from 2007

PDF

Closest and Farthest-Line Voronoi Diagrams in the Plane, Mark C. Henle

PDF

SCML: A Structural Representation for Chinese Characters, Daniel G. Peebles

PDF

A Security Assessment of Trusted Platform Modules, Evan R. Sparks

PDF

Lighting with Sketches, Alexander Wakefield Steinberg

Theses/Dissertations from 2006

PDF

Wait-Free and Obstruction-Free Snapshot, Khanh Do Ba

PDF

Limited Delegation (Without Sharing Secrets) in Web Applications, Nicholas J. Santos

Theses/Dissertations from 2005

PDF

Lower Bounds on the Communication Complexity of Shifting, Marco D. Adelfio

PDF

A toy rock climbing robot, Matthew P. Bell

PDF

Managing Access Control in Virtual Private Networks, Twum Djin

Theses/Dissertations from 2004

PDF

Mobile Agents Simulation with DaSSF, Nikita E. Dubrovsky

PDF

PPL: a Packet Processing Language, Eric G. Krupski

PDF

Access Control in a Distributed Decentralized Network: An XML Approach to Network Security using XACML and SAML, Paul J. Mazzuca

PDF

Simulating mobile ad hoc networks: a quantitative evaluation of common MANET simulation models, Calvin Newport

PDF

Enhancing Expressiveness of Speech through Animated Avatars for Instant Messaging and Mobile Phones, Joseph E. Pechter

PDF

Synchronizing Keyframe Facial Animation to Multiple Text-to-Speech Engines and Natural Voice with Fast Response Time, William H. Pechter

PDF

Testing the Greenpass Wireless Security System, Kimberly S. Powell

PDF

Efficient Wait-Free Implementation of Atomic Multi-Word Buffer, Rachel B. Ringel

PDF

Scheduling Pipelined, Multi-Threaded Programs in Linux, Brunn W. Roysden

PDF

A Secure Network Node Approach to the Policy Decision Point in Distributed Access Control, Geoffrey H. Stowe

Theses/Dissertations from 2003

PDF

Power Conservation in the Network Stack of Wireless Sensors, Michael De Rosa

PDF

Enhancing Asynchronous Parallel Computing, Elizabeth Anne Hamon

PDF

Persistence and Prevalence in the Mobility of Dartmouth Wireless Network Users, Clara Lee

PDF

802.11b Wireless Network Visualization and Radiowave Propagation Modeling, Chris Lentz

PDF

Billiards Adviser as a Search in a Continuous Domain with Significant Uncertainty, Thomas Mueller

PDF

Trusted S/MIME Gateways, Mindy J. Pereira

PDF

An Evaluation of the Impact of Models for Radio Propagation on the Simulation of 802.11b Wireless Networks, Evan W. Richardson

PDF

Discovery, Visualization and Analysis of Gene Regulatory Sequence Elements in Genomes, Daniel F. Simola

PDF

An Active Learning Approach to Efficiently Ranking Retrieval Engines, Lisa A. Torrey

PDF

Using Low Level Linear Memory Management for Type-Preserving Mark-Sweep Garbage Collector, Edward Wei

Theses/Dissertations from 2002

PDF

The Future of Cryptography Under Quantum Computers, Marco A. Barreno

PDF

Analysis of Protein Sequences Using Time Frequency and Kolmogorov-Smirnov Methods, Kobby Essien

PDF

Information-theoretic Bounds on the Training and Testing Error of Boosting, Sebastien M. Lahaie

PDF

Role Definition Language (RDL): A Language to Describe Context-Aware Roles, Christopher P. Masone

PDF

Performance and Interoperability In Solar, A Abram White

Theses/Dissertations from 2001

PDF

Optimizing the Dimensional Method for Performing Multidimensional, Multiprocessor, Out-of-Core FFTs, Jeremy T. Fineman

PDF

An Armored Data Vault, Alex Iliev