Follow


Theses/Dissertations from 2019

PDF

Comparing brain-like representations learned by vanilla, residual, and recurrent CNN architectures, Cara E. Van Uden

Theses/Dissertations from 2018

PDF

Securing, Standardizing, and Simplifying Electronic Health Record Audit Logs Through Permissioned Blockchain Technology, Jessie Anderson

PDF

IPv6 Security Issues in Linux and FreeBSD Kernels: A 20-year Retrospective, Jack R. Cardwell

PDF

Thinking Inside the Box: Converting Encapsulated PostScript to Scalable Vector Graphics, Trevor L. Davis

PDF

Overlaying Virtual Scale Models on Real Environments Without the Use of Peripherals, George Hito

PDF

Robotic Laundry Folding, Evan Honnold

PDF

Balancing patient control and practical access policy for electronic health records via blockchain technology, Elena Horton

PDF

Co-Training of Audio and Video Representations from Self-Supervised Temporal Synchronization, Bruno Korbar

PDF

Full and Dense Cyclic Gray codes in Mixed Radices, Devina Kumar

PDF

Navigating Virtual Reality Using Only Your Gazes and Mind, Christopher J. Kymn

PDF

The Next Generation of EMPRESS: A Metadata Management System For Accelerated Scientific Discovery at Exascale, Margaret R. Lawson

PDF

DartDraw: The Design and Implementation of Global State Management, User Interaction Management, and Text in a React-Redux Drawing Application, Collin M. McKinney

PDF

PyMOL Plugin to Build Protein Structures Based on Natural TERM Overlaps, Noah T. Paravicini

PDF

Reflections on Building DartDraw: A React + Redux Vector-Based Graphics Editor, Elisabeth G. Pillsbury

Theses/Dissertations from 2017

PDF

Accuracy and Racial Biases of Recidivism Prediction Instruments, Julia J. Dressel

PDF

Dense Gray Codes in Mixed Radices, Jessica C. Fan

PDF

Using Computational Models to Understand ASD Facial Expression Recognition Patterns, Irene L. Feng

PDF

OpenCollab: A Blockchain Based Protocol to Incentivize Open Source Software Development, Yondon Fu

PDF

ShareABEL: Secure Sharing of mHealth Data through Cryptographically-Enforced Access Control, Emily Greene

PDF

Cryptographic transfer of sensor data from the Amulet to a smartphone, David B. Harmon

PDF

A HoloLens Application to Aid People who are Visually Impaired in Navigation Tasks, Jonathan L. Huang

PDF

NovenaNetwork: A Catholic Social Media iOS Application for Praying Novenas as a Community, Marissa Le Coz

PDF

Assemble.live: Designing for Schisms in Large Groups in Audio/Video Calls, Benjamin P. Packer

PDF

Scene classification from degraded images: comparing human and computer vision performance, Tim M. Tadros

PDF

Improving Elementary Math Learning Through iPad Games, Kaya M. Thomas

Theses/Dissertations from 2016

PDF

StressAware: App for Continuously Measuring and Monitoring Stress Levels in Real Time on the Amulet Wearable Device, George G. Boateng

PDF

Security and Privacy Analysis of Medical Wearables, Brian M. Chalif

PDF

Nutrition Buddy: Enabling Behavior Change Through Wearables, Recommendations, and Digital Avatars, Daniel J. Chen

PDF

Air Keyboard: Mid-Air Text Input Using Wearable EMG Sensors and a Predictive Text Model, Jacob A. Gaba

PDF

Reusing Ambient Light to Recognize Hand Gestures, Mahina-Diana A. Kaholokula

PDF

Integrating Bluetooth Low Energy Peripherals with the Amulet, Anna J. Knowles

PDF

Bae: Before Anyone Else; The Answer to Mobile Dating for the African Diaspora, Jordan S. Kunzika

PDF

Devising a Framework for Efficient and Accurate Matchmaking and Real-time Web Communication, Charles Li

PDF

All Your BASE Are Belong To You: Improved Browser Anonymity and Security on Android, Peter Saisi

PDF

Interactive Data Visualization of Christian Demographics, Allison C. Wang

PDF

Learning Device Usage in Context: A Continuous and Hierarchical Smartphone Authentication Scheme, Bingyue Wang

PDF

Bloon: Software and Hardware for Data Collection and Real-Time Analysis, Jacob Z. Weiss

PDF

Monarch: A Reimagined Browser for the Modern Web, Daniel R. Whitcomb

PDF

Automating 3D Wireless Measurements with Drones, Ethan Yu

Theses/Dissertations from 2015

PDF

Communication Complexity of Distributed Statistical Algorithms, James A. Brofos

PDF

WiPrint: 3D Printing Your Wireless Coverage, Justin Chan

PDF

How Realistic is Photorealistic?, Olivia B. Holmes

PDF

Cell Representations of the Configuration Space for Planning Optimal Paths, Ajay Kannan

PDF

Why Do Protein Structures Recur?, Rebecca G. Leong

PDF

Repcoin: A Market-Based Approach to Reputation, Stephen D. Malina

PDF

Two Algorithms for Finding Edge Colorings in Regular Bipartite Multigraphs, Patricia T. Neckowicz

PDF

Repcoin: The Only Reputation Market, Matthew Ritter

PDF

Course InSight: An Application of Natural Language Processing in a Course Browser, Chuanqi Sun

Theses/Dissertations from 2014

PDF

Constant RMR Transformation to Augment Reader-Writer Locks with Atomic Upgrade/Downgrade Support, Jake S. Leichtling

PDF

Chain Match: An Algorithm for Finding a Perfect Matching of a Regular Bipartite Multigraph, Stefanie L. Ostrowski

PDF

Shared Roots: Regularizing Deep Neural Networks through Multitask Learning, Piotr Teterwak

PDF

StyleCheck: An Automated Stylistic Analysis Tool, Alexander P. Welton

Theses/Dissertations from 2013

PDF

Ekho: A Tool for Recording and Emulating Energy Harvesting Conditions, Ryan H. Archer

PDF

An Algorithm for Computing Edge Colorings on Regular Bipartite Multigraphs, Andrew S. Hannigan

PDF

Polynomial and Query Complexity of Minterm-Cyclic Functions, Matthew J. Harding

PDF

Please Take My Survey: Compliance with smartphone-based EMA/ESM studies, Shloka R. Kini

PDF

Nimbus A Novel Multi-Device Operating System Shell, Sang Jin Lee

PDF

Grid Cryptographic Simulation: A Simulator to Evaluate the Scalability of the X.509 Standard in the Smart Grid, Tucker L. Ward

PDF

Mobile Applications: Games that Transform Education, Edward Y. Zhang

Theses/Dissertations from 2012

PDF

A Data Flow Tracker and Reference Monitor for WebKit and JavaScriptCore, Andrew Bloomgarden

PDF

Methods of Computing Deque Sortable Permutations Given Complete and Incomplete Information, Daniel J. Denton

PDF

Search for Trust: An Analysis and Comparison of CA System Alternatives and Enhancements, Alexandra C. Grant

PDF

Asymptotic Statistics of Nodal Domains of Quantum Chaotic Billiards in the Semiclassical Limit, Kyle T. Konrad

PDF

Sensor-based system for verifying blood-pressure measurement position, Emma N. Smithayer

Theses/Dissertations from 2011

PDF

Obstruction-free Snapshot, Obstruction-free Consensus, and Fetch-and-add Modulo k, Jack R. Bowman

PDF

A Solution to k-Exclusion with O(logk) RMR Complexity, Jonathan H. Choi

PDF

Reader-Writer Exclusion Supporting Upgrade and Downgrade with Reader-Priority, Michael I. Diamond

PDF

Static Analysis for Ruby in the Presence of Gradual Typing, Michael Edgar

PDF

Reader-Writer Exclusion Supporting Upgrade and Downgrade with Starvation Freedom, Matthew Elkherj

PDF

Effects of network trace sampling methods on privacy and utility metrics, Phillip A. Fazio

PDF

A Multilevel, Posture-based Model for Motor Control in Simulation and Robotic Applications, Divya A. Gunasekaran

PDF

802.15.4/ZigBee Analysis and Security: tools for practical exploration of the attack surface, Ricky A. Melgares

PDF

Exploiting the Hard-Working DWARF: Trojan and Exploit Techniques Without Native Executable Code, James M.H. Oakley

PDF

IEEE 802.15.4 Wireless Security: Self-Assessment Frameworks, Ryan Speers

PDF

Constant-RMR Abortable Reader-Priority Reader-Writer Algorithm, Nan Zheng

Theses/Dissertations from 2010

PDF

Virtual Container Attestation: Customized trusted containers for on-demand computing., Katelin A. Bailey

PDF

NeuroPhone: Brain-Mobile Phone Interface using a Wireless EEG Headset, Matthew K. Mukerjee

PDF

Creating Large Disturbances in the Power Grid: Methods of Attack After Cyber Infiltration, Loren D. Sands-Ramshaw

PDF

The Curious Timekeeper: Creative Thesis in Interactive Sculpture, Kate I. Schnippering

PDF

Block Sensitivity versus Sensitivity, Karn Seth

Theses/Dissertations from 2009

PDF

Hawk: 3D Gestured-Based Interactive Bird Flight Simulation, Thomas Yale Eastman

PDF

An Information Complexity Approach to the Inner Product Problem, William B. Henderson-Frost

PDF

Developing an Improved, Web-Based Classroom Response System with Web Services, Oleg B. Seletsky

PDF

Automated Tracking of Dividing Nuclei in Microscopy Videos of Living Cells, Evan L. Tice

PDF

The Effects of Introspection on Computer Security Policies, Stephanie A. Trudeau

Theses/Dissertations from 2008

PDF

Making RBAC Work in Dynamic, Fast-Changing Corporate Environments, Ruslan Y. Dimov

PDF

Linkability in Activity Inference Data Sets, Jeffrey Fielding

PDF

Key Management for Secure Power SCADA, Manya K. Sleeper

Theses/Dissertations from 2007

PDF

Closest and Farthest-Line Voronoi Diagrams in the Plane, Mark C. Henle

PDF

SCML: A Structural Representation for Chinese Characters, Daniel G. Peebles

PDF

A Security Assessment of Trusted Platform Modules, Evan R. Sparks

PDF

Lighting with Sketches, Alexander Wakefield Steinberg

Theses/Dissertations from 2006

PDF

Wait-Free and Obstruction-Free Snapshot, Khanh Do Ba

PDF

Limited Delegation (Without Sharing Secrets) in Web Applications, Nicholas J. Santos

Theses/Dissertations from 2005

PDF

Lower Bounds on the Communication Complexity of Shifting, Marco D. Adelfio

PDF

A toy rock climbing robot, Matthew P. Bell

PDF

Managing Access Control in Virtual Private Networks, Twum Djin

Theses/Dissertations from 2004

PDF

Mobile Agents Simulation with DaSSF, Nikita E. Dubrovsky

PDF

PPL: a Packet Processing Language, Eric G. Krupski

PDF

Access Control in a Distributed Decentralized Network: An XML Approach to Network Security using XACML and SAML, Paul J. Mazzuca