Follow

Master's Projects from 2009

PDF

Analysis of Machine Learning Based Methods for Identifying MicroRNA Precursors, Steve Ikeoka

PDF

MRCRAIG: MapReduce and Ensemble Classifiers for Parallelizing Data Classification Problems, Glenn Jahnke

PDF

Event based propagation approach to constraint configuration problems, Rajhdeep Jandir

PDF

Automatic Video Classification, Don Jayakody

PDF

Is Four File Chess a Draw?, Michael Karbushev

PDF

Client-Side Page Element Web-Caching, Ramya Karri

PDF

Visualized Architecture Knowledge Management Collaboration Services, Ashish Kaul

PDF

Performance study of FMIPv6-based cross-layer WiMAX handover scheme for supporting VoIP service, Heejung Kim

PDF

Clustering Algorithm for Enhanced Bibliography Visualization, Sriram Krishnan

PDF

Wormulator: Simulator for Rapidly Spreading Malware, Jyotsna Krishnaswamy

PDF

Priority Based Power Management and Reduced Downtime in Data Centers, Barath Kuppuswamy

PDF

Hunting for Undetectable Metamorphic Viruses, Da Lin

PDF

Hunting for Undetectable Metamorphic Viruses, Da Lin

PDF

Removing the Digital Divide for Senior Web Users, Chiu Luk

PDF

An Automata Based Text Analysis System, Yue Lu

PDF

Enhancing spammer detection in online social networks with trust-based metrics., Alexander J. Murmann

PDF

Web based Recommender Systems and Rating Prediction, Tho Nguyen

PDF

Information Flow Model for Commercial Security, Jene Pan

PDF

Automated Artice Generation Using the Web, Gaurang Patel

PDF

Intrusion Alerts Analysis Using Attack Graphs and Clustering, Hardik Patel

PDF

Analysis of rxbot, Esha Patil

PDF

Total Recall for AJAX applications – Firefox extension, Smita Periyapatna

PDF

Hybrid Clustering with Application to Web Pages, Ameya Sabnis

PDF

Active Lecture: An Interactive Lecturing System, Himavanthara Sajja

PDF

Available Bandwidth Inference Based On Node-Centric Clusters, Seetharam Samptur

PDF

Improving Web Recommendations Using Web Usage Mining and Web Semantics, Neha Saxena

PDF

DNA Sequence Representation by Use of Statistical Finite Automata, Asmi Shah

PDF

Analysis of an OpenMP Program for Race Detection, Dhaval Shah

PDF

Expert Finding Using Social Networking, Parin Shah

PDF

Distributed Port Scanning Detection, Himanshu Singh

PDF

Improving Location Determination for non-GPS devices, Varun Sud

PDF

Priority Based Routing for Mobile Peer-To-Peer Communications, Swathi Venugopal

Master's Projects from 2008

PDF

Web Security Detection Tool, Abhishek Agashe

PDF

Personalized Web Content with Fuzzy System, Bassam Almogahed

PDF

Investigating the Effectiveness of Active Interaction Tools on Student Learning, Lurie Andrei

PDF

Personalized Shopping Agent for Semantic Web, Ramani Arunachalam

PDF

Expanding JavaScript's metaobject protocol, Tom Austin

PDF

Analysis of the Zodiac 340-cipher, Thá̆ng Đào

PDF

Towards an Undetectable Computer Virus, Priti Desai

PDF

A Comparative Xeon and CBE Performance Analysis, Randy Fort

PDF

Adaptive Software Transactional Memory: Dynamic Contention Management, Joel Frank

PDF

Adaptive software transactional memory : dynamic contention management, Joel Cameron Frank

PDF

Practical Detection of Metamorphic Computer Viruses, Sharmidha Govindaraj

PDF

SQL Injection analysis, Detection and Prevention, Jagdish Halde

PDF

JavaFX as a Domain-Specific Language in Scala / Groovy, Sadiya Hameed

PDF

Employee Performance Assessment in Quality Assurance, Rahul Jain

PDF

Intelligent query for real estate search, Mandeep Jandir

PDF

Intelligent Query for Real Estate Search, Mandeep Jandir

PDF

Authoring and Sharing of Programming Exercises, Somyajit Jena

PDF

The Prosody of Uncertainty for Spoken Dialogue Intelligent Tutoring Systems, Bevan Jones

PDF

Online Recommendation System, Ankit Khera

PDF

Cryptanalysis of the SIGABA cipher, Heather Ellie Kwong

PDF

DNA Fragment Assembly Algorithms: Toward a Solution for Long Repeats, Ching Li

PDF

Design & Evaluation of Path-based Reputation System for MANET Routing, Ji Li

PDF

Online visualization of bibliography Using Visualization Techniques, Bharath Kumar Manur Venkataramana

PDF

Trust-Networks in Recommender Systems, Kristen Mori

PDF

Peer-to-Peer Botnets: Analysis and Detection, Jeet Morparia

PDF

IPhone Securtity Analysis, Vaibhav Ranchhoddas Pandya

PDF

Botnets and Distributed Denial of Service Attacks, Anilkumar Panicker

PDF

Accelerometer based motion gestures for Mobile Devices, Neel Parikh

PDF

Exact and Approximation Algorithms for Computing Reversal Distances in Genome Rearrangement, Euna Park

PDF

A Seeded Genetic Algorithm for RNA Secondary Structural Prediction with Pseudoknots, Ryan Pham

PDF

Motif Discovery in Biological Sequences, Medha Pradhan

PDF

Bibliography Data Mining and Data Visualization, Deepthi Pullannagari

PDF

Applications of genetic algorithms in bioinformatics, Amie Judith Radenbaugh

PDF

Efficient Resource Management Mechanism for 802.16 Wireless Networks Based on Weighted Fair Queuing, Kiran Rangula

PDF

Firefox Extension to Add Contacts, Events, and View Addresses, Vijay Rao

PDF

Algorithm to Obtain Total Order from Partial Orders for Social Networks, Chandrika Satyavolu

PDF

Study of TCP Issues over Wireless and Implementation of iSCSI over Wireless for Storage Area Networks, Rahul Sharma

PDF

A framework for active learning, Sean Sharma

PDF

Online Collaborative Time Management System using Artificial Intelligence, Anand Sivaramakrishnan

PDF

Semantic Categorization Of Online Video, Supraja Swarna

PDF

Providing VCR Functionality in VOD Servers, Ngyat Tsui

PDF

Visualization Web Portal on the Grid, Sandhya Turaga

PDF

Code Obfuscation and Virus Detection, Ashwini Venkatesan

PDF

Heuristic Health Resource Referral (H2R2) Engine, Duy Vo

PDF

Fuzzy Content Mining for Targeted Advertisement, Yezhou Wang

PDF

Multi-Dimensional Partitioning in BUC for Data Cubes, Kenneth Yeung

PDF

Fuzzy Range Query in XML, Dexiong Zhang

PDF

An automata based authorship identification system, Shangxuan Zhang

Master's Projects from 2007

PDF

Cryptanalysis of SIGABA, Wing Chan

PDF

Emotional and Domain Concept Enhancements to Alicebot, Alvin Cho

PDF

Mobile Multimedia Streaming Library, Bao Ho

PDF

Blog Analysis with Fuzzy TFIDF, Chi-Shu Ho

PDF

Clustering Blog Information, Mayank Prakash Jaiswal

PDF

Case Studies in Proof Checking, Robert Kam

PDF

Operon Prediction with Bayesian Classifiers, Natalia Khuri

PDF

Pairwise Alignment of Metamorphic Computer Viruses, Scott McGhee

PDF

A Hierarchical Trusted Third-Party System for Secure Peer-to-Peer Transactions, Khoi Nguyen

PDF

Validation and Verification of Aircraft Control Software for Control Improvement, Thien-Anh Pham

PDF

Securing Wireless Networks from ARP Cache Poisoning, Roney Philip

PDF

A Multiple-Copy Scheme for Multi-Channel Stop-and-Wait HARQ, Yucheng Shih

PDF

Prediction of Alternative Splice Sites in Human Genes, Douglas Simmons

PDF

Concept Analysis in Web Documents, Rajesh Singh

PDF

A Differential Power Analysis Resistant Randomized Algorithm using Multiple AES Ciphers, Richard Tran

Master's Projects from 2006

PDF

Implementing Built-in Properties for the Java Programming Language, Alexandre Alves

PDF

Visualization of Secondary RNA Structure Prediction Algorithms, Brandon Hunter

PDF

A Meaningful MD5 Hash Collision Attack, Narayana D. Kashyap

PDF

Geometry-based Detection of Flash Worms, Sang Soo Kim

PDF

Enhancing TCP Performance In Wired-Cum-Wireless Networks, Shruthi B. Krishnan