Theses/Dissertations from 2019
Comparing brain-like representations learned by vanilla, residual, and recurrent CNN architectures, Cara E. Van Uden
Theses/Dissertations from 2018
Securing, Standardizing, and Simplifying Electronic Health Record Audit Logs Through Permissioned Blockchain Technology, Jessie Anderson
IPv6 Security Issues in Linux and FreeBSD Kernels: A 20-year Retrospective, Jack R. Cardwell
Thinking Inside the Box: Converting Encapsulated PostScript to Scalable Vector Graphics, Trevor L. Davis
Overlaying Virtual Scale Models on Real Environments Without the Use of Peripherals, George Hito
Robotic Laundry Folding, Evan Honnold
Balancing patient control and practical access policy for electronic health records via blockchain technology, Elena Horton
Co-Training of Audio and Video Representations from Self-Supervised Temporal Synchronization, Bruno Korbar
Full and Dense Cyclic Gray codes in Mixed Radices, Devina Kumar
Navigating Virtual Reality Using Only Your Gazes and Mind, Christopher J. Kymn
The Next Generation of EMPRESS: A Metadata Management System For Accelerated Scientific Discovery at Exascale, Margaret R. Lawson
DartDraw: The Design and Implementation of Global State Management, User Interaction Management, and Text in a React-Redux Drawing Application, Collin M. McKinney
PyMOL Plugin to Build Protein Structures Based on Natural TERM Overlaps, Noah T. Paravicini
Reflections on Building DartDraw: A React + Redux Vector-Based Graphics Editor, Elisabeth G. Pillsbury
Theses/Dissertations from 2017
Accuracy and Racial Biases of Recidivism Prediction Instruments, Julia J. Dressel
Dense Gray Codes in Mixed Radices, Jessica C. Fan
Using Computational Models to Understand ASD Facial Expression Recognition Patterns, Irene L. Feng
OpenCollab: A Blockchain Based Protocol to Incentivize Open Source Software Development, Yondon Fu
ShareABEL: Secure Sharing of mHealth Data through Cryptographically-Enforced Access Control, Emily Greene
Cryptographic transfer of sensor data from the Amulet to a smartphone, David B. Harmon
A HoloLens Application to Aid People who are Visually Impaired in Navigation Tasks, Jonathan L. Huang
NovenaNetwork: A Catholic Social Media iOS Application for Praying Novenas as a Community, Marissa Le Coz
Assemble.live: Designing for Schisms in Large Groups in Audio/Video Calls, Benjamin P. Packer
Scene classification from degraded images: comparing human and computer vision performance, Tim M. Tadros
Improving Elementary Math Learning Through iPad Games, Kaya M. Thomas
Theses/Dissertations from 2016
StressAware: App for Continuously Measuring and Monitoring Stress Levels in Real Time on the Amulet Wearable Device, George G. Boateng
Security and Privacy Analysis of Medical Wearables, Brian M. Chalif
Nutrition Buddy: Enabling Behavior Change Through Wearables, Recommendations, and Digital Avatars, Daniel J. Chen
Air Keyboard: Mid-Air Text Input Using Wearable EMG Sensors and a Predictive Text Model, Jacob A. Gaba
Reusing Ambient Light to Recognize Hand Gestures, Mahina-Diana A. Kaholokula
Integrating Bluetooth Low Energy Peripherals with the Amulet, Anna J. Knowles
Bae: Before Anyone Else; The Answer to Mobile Dating for the African Diaspora, Jordan S. Kunzika
Devising a Framework for Efficient and Accurate Matchmaking and Real-time Web Communication, Charles Li
All Your BASE Are Belong To You: Improved Browser Anonymity and Security on Android, Peter Saisi
Interactive Data Visualization of Christian Demographics, Allison C. Wang
Learning Device Usage in Context: A Continuous and Hierarchical Smartphone Authentication Scheme, Bingyue Wang
Bloon: Software and Hardware for Data Collection and Real-Time Analysis, Jacob Z. Weiss
Monarch: A Reimagined Browser for the Modern Web, Daniel R. Whitcomb
Automating 3D Wireless Measurements with Drones, Ethan Yu
Theses/Dissertations from 2015
Communication Complexity of Distributed Statistical Algorithms, James A. Brofos
WiPrint: 3D Printing Your Wireless Coverage, Justin Chan
How Realistic is Photorealistic?, Olivia B. Holmes
Cell Representations of the Configuration Space for Planning Optimal Paths, Ajay Kannan
Why Do Protein Structures Recur?, Rebecca G. Leong
Repcoin: A Market-Based Approach to Reputation, Stephen D. Malina
Two Algorithms for Finding Edge Colorings in Regular Bipartite Multigraphs, Patricia T. Neckowicz
Repcoin: The Only Reputation Market, Matthew Ritter
Course InSight: An Application of Natural Language Processing in a Course Browser, Chuanqi Sun
Theses/Dissertations from 2014
Constant RMR Transformation to Augment Reader-Writer Locks with Atomic Upgrade/Downgrade Support, Jake S. Leichtling
Chain Match: An Algorithm for Finding a Perfect Matching of a Regular Bipartite Multigraph, Stefanie L. Ostrowski
Shared Roots: Regularizing Deep Neural Networks through Multitask Learning, Piotr Teterwak
StyleCheck: An Automated Stylistic Analysis Tool, Alexander P. Welton
Theses/Dissertations from 2013
Ekho: A Tool for Recording and Emulating Energy Harvesting Conditions, Ryan H. Archer
An Algorithm for Computing Edge Colorings on Regular Bipartite Multigraphs, Andrew S. Hannigan
Polynomial and Query Complexity of Minterm-Cyclic Functions, Matthew J. Harding
Please Take My Survey: Compliance with smartphone-based EMA/ESM studies, Shloka R. Kini
Nimbus A Novel Multi-Device Operating System Shell, Sang Jin Lee
Grid Cryptographic Simulation: A Simulator to Evaluate the Scalability of the X.509 Standard in the Smart Grid, Tucker L. Ward
Mobile Applications: Games that Transform Education, Edward Y. Zhang
Theses/Dissertations from 2012
A Data Flow Tracker and Reference Monitor for WebKit and JavaScriptCore, Andrew Bloomgarden
Methods of Computing Deque Sortable Permutations Given Complete and Incomplete Information, Daniel J. Denton
Search for Trust: An Analysis and Comparison of CA System Alternatives and Enhancements, Alexandra C. Grant
Asymptotic Statistics of Nodal Domains of Quantum Chaotic Billiards in the Semiclassical Limit, Kyle T. Konrad
Sensor-based system for verifying blood-pressure measurement position, Emma N. Smithayer
Theses/Dissertations from 2011
Obstruction-free Snapshot, Obstruction-free Consensus, and Fetch-and-add Modulo k, Jack R. Bowman
A Solution to k-Exclusion with O(logk) RMR Complexity, Jonathan H. Choi
Reader-Writer Exclusion Supporting Upgrade and Downgrade with Reader-Priority, Michael I. Diamond
Static Analysis for Ruby in the Presence of Gradual Typing, Michael Edgar
Reader-Writer Exclusion Supporting Upgrade and Downgrade with Starvation Freedom, Matthew Elkherj
Effects of network trace sampling methods on privacy and utility metrics, Phillip A. Fazio
A Multilevel, Posture-based Model for Motor Control in Simulation and Robotic Applications, Divya A. Gunasekaran
802.15.4/ZigBee Analysis and Security: tools for practical exploration of the attack surface, Ricky A. Melgares
Exploiting the Hard-Working DWARF: Trojan and Exploit Techniques Without Native Executable Code, James M.H. Oakley
IEEE 802.15.4 Wireless Security: Self-Assessment Frameworks, Ryan Speers
Constant-RMR Abortable Reader-Priority Reader-Writer Algorithm, Nan Zheng
Theses/Dissertations from 2010
Virtual Container Attestation: Customized trusted containers for on-demand computing., Katelin A. Bailey
NeuroPhone: Brain-Mobile Phone Interface using a Wireless EEG Headset, Matthew K. Mukerjee
Creating Large Disturbances in the Power Grid: Methods of Attack After Cyber Infiltration, Loren D. Sands-Ramshaw
The Curious Timekeeper: Creative Thesis in Interactive Sculpture, Kate I. Schnippering
Block Sensitivity versus Sensitivity, Karn Seth
Theses/Dissertations from 2009
Hawk: 3D Gestured-Based Interactive Bird Flight Simulation, Thomas Yale Eastman
An Information Complexity Approach to the Inner Product Problem, William B. Henderson-Frost
Developing an Improved, Web-Based Classroom Response System with Web Services, Oleg B. Seletsky
Automated Tracking of Dividing Nuclei in Microscopy Videos of Living Cells, Evan L. Tice
The Effects of Introspection on Computer Security Policies, Stephanie A. Trudeau
Theses/Dissertations from 2008
Making RBAC Work in Dynamic, Fast-Changing Corporate Environments, Ruslan Y. Dimov
Linkability in Activity Inference Data Sets, Jeffrey Fielding
Key Management for Secure Power SCADA, Manya K. Sleeper
Theses/Dissertations from 2007
Closest and Farthest-Line Voronoi Diagrams in the Plane, Mark C. Henle
SCML: A Structural Representation for Chinese Characters, Daniel G. Peebles
A Security Assessment of Trusted Platform Modules, Evan R. Sparks
Lighting with Sketches, Alexander Wakefield Steinberg
Theses/Dissertations from 2006
Wait-Free and Obstruction-Free Snapshot, Khanh Do Ba
Limited Delegation (Without Sharing Secrets) in Web Applications, Nicholas J. Santos
Theses/Dissertations from 2005
Lower Bounds on the Communication Complexity of Shifting, Marco D. Adelfio
A toy rock climbing robot, Matthew P. Bell
Managing Access Control in Virtual Private Networks, Twum Djin
Theses/Dissertations from 2004
Mobile Agents Simulation with DaSSF, Nikita E. Dubrovsky
PPL: a Packet Processing Language, Eric G. Krupski
Access Control in a Distributed Decentralized Network: An XML Approach to Network Security using XACML and SAML, Paul J. Mazzuca