# Browse Dissertations and Theses - Computer Science by Title

• (2018-07-16)
Curious questioning or the ability to inquire about surrounding environment or additional context, is an important step towards building agents which go beyond learning from a static knowledge base. The ability to request ...

application/pdf

PDF (5MB)
• (2017-07-14)
Privacy-preserving statistical databases are designed to provide information about a population while preventing end-users from learning about an individual. Meanwhile, scholars have shown that a sophisticated adversary ...

application/pdf

PDF (2MB)
• (1996)
We present scientific visualization techniques where our goal is to strike a better balance between the qualitative information provided by images and the quantitative measures often sought by scientists. Our particular ...

application/pdf

PDF (6MB)
• (2013-05-24)
Groups are becoming increasingly geographically distributed and consequently, computer mediated group conversations are also becoming increasingly distributed. There has been much research that has focused on visualizations ...

application/pdf

PDF (2MB)
• (2013-08-22)
Communication disorders occur across all age groups of people and often show first signs of appearing in children. These can range from problems in comprehension of speech to expression of speech to the point that it ...

application/pdf

PDF (494kB)
• (1993)
The hexagonal grid consists of vertical columns, and positive and negative diagonal tracks with slopes +30$\sp\circ$ and $-$30$\sp\circ$, respectively. The goal of this thesis research has been to investigate the potential ...

application/pdf

PDF (9MB)
• (2014-05-30)
Nowadays mobile platform is becoming more and more influential due to the increasing smartphone usage in people’s daily life. Conflicting ideas always exist when making a group decision because everyone has his/her own ...

application/pdf

PDF (2MB)
• (2015-01-21)
Graphs are powerful vehicles to represent data objects that are interconnecting or interacting with each other. We explore random walks on various kinds of graph to address different searching and mining scenarios. This ...

application/pdf

PDF (3MB)
• (1978)

application/pdf

PDF (2MB)
• (1990)
The traditional approach for solving large dynamical systems is time consuming. Waveform method, an iterative technique for solving systems of differential equations, can be used to reduce the processing time. Waveform ...

application/pdf

PDF (4MB)
• (1999)
Finally, we show how to adapt recent advances in statistically-unbiased least-squares methods to our image-based rendering approach. The point-based PIV involves equations with bilinear or higher-order data dependencies ...

application/pdf

PDF (7MB)
• (2018-12-13)
We explore methods of weakly supervised learning from referring expression. Unlike traditional fully supervised semantic segmentation of object recognition tasks, in which a a small set of discrete class bases is provided, ...

application/pdf

PDF (5MB)
• (2019-04-22)
Deep neural networks are gaining increasing popularity for the classic text classification task, due to their strong expressive power and less requirement for feature engineering. Despite such attractiveness, neural text ...

application/pdf

PDF (1MB)
• (2019-12-03)
As multi-core processors and networked systems become the norm, concurrent programming has been widely adopted in industry. Practitioners have used concurrent programming models to build many complex and large-scale systems ...

application/pdf

PDF (965kB)
• (2013-05-24)
During the spring of 2011 pressure was asserted by the department on the enrollment in CS424 Real-Time Systems due to its low enrollment. The result of that pressure was a curriculum update, removal of the CS431 Embedded ...

application/pdf

PDF (3MB)
• (2019-07-12)
Wireless signals are everywhere around us, and they have truly revolutionized the world by all standards. When one thinks of this revolution, one envisions the advances in wireless communication—TV broadcasts, FM radios, ...

application/pdf

PDF (13MB)
• (2001)
The thesis provides experimental results for a few sample programs: three multicast protocols, a messenger carrying remote exception-handling code, a worldwide migrating agent, and a buffering messenger. (Abstract shortened ...

application/pdf

PDF (7MB)
• (1997)
A cycle-stealing DMA I/O task is allowed to proceed only when the CPU does not need the system bus. As a result, the execution time of a cycle-stealing DMA I/O task is affected by a set of CPU tasks which execute concurrently ...

application/pdf

PDF (4MB)
• (2010-05-19)
There are two venues for many-core machines to gain higher performance: increasing the number of processors and number of vector units in one SIMD processor. A truly scalable algorithm should take advantage for both ...

application/pdf

PDF (275kB)
• (2017-07-14)
Instructors are increasingly using algorithmic tools for team formation, yet little is known about how these tools are applied or how students and instructors perceive their use. We studied a representative team formation ...

application/pdf

PDF (495kB)