Master's Projects from 2009
Video Conferencing Tool, Sapna Blesson
A Running Time Improvement for Two Thresholds Two Divisors Algorithm, BingChun Chang
Versatile Extensible Security System for Mobile Ad Hoc Networks, Jung Chang
Evaluations and Enhancements in 802.11n WLANs – Error-Sensitive Adaptive Frame Aggregation, Ken Chan
Randomized Greedy Hot-Potato Routing on the Multi-Dimensional Torus, Raymond Y. Chi
Common Emotion Modeling in Distinct Medium Analysis and Matching, Amy Cho
Software reverse engineering education, Teodoro Cipresso
Objective Measurement of Speech Quality in VoIP over Wireless LAN during Handoff, Nidhi Marwaha Gambhir
Triggering of Just-In-Time Compilation in the Java Virtual Machine, Rouhollah Gougol
Chinese Wall Security Policy, Varun Gupta
MSG: A Gap-Oriented Genetic Algorithm for Multiple Sequence Alignment, Philip Heller
Network traffic clustering and geographic visualization, Ali Hushyar
Analysis of Machine Learning Based Methods for Identifying MicroRNA Precursors, Steve Ikeoka
MRCRAIG: MapReduce and Ensemble Classifiers for Parallelizing Data Classification Problems, Glenn Jahnke
Event based propagation approach to constraint configuration problems, Rajhdeep Jandir
Automatic Video Classification, Don Jayakody
Is Four File Chess a Draw?, Michael Karbushev
Client-Side Page Element Web-Caching, Ramya Karri
Visualized Architecture Knowledge Management Collaboration Services, Ashish Kaul
Performance study of FMIPv6-based cross-layer WiMAX handover scheme for supporting VoIP service, Heejung Kim
Clustering Algorithm for Enhanced Bibliography Visualization, Sriram Krishnan
Wormulator: Simulator for Rapidly Spreading Malware, Jyotsna Krishnaswamy
Priority Based Power Management and Reduced Downtime in Data Centers, Barath Kuppuswamy
Hunting for Undetectable Metamorphic Viruses, Da Lin
Hunting for Undetectable Metamorphic Viruses, Da Lin
Removing the Digital Divide for Senior Web Users, Chiu Luk
An Automata Based Text Analysis System, Yue Lu
Enhancing spammer detection in online social networks with trust-based metrics., Alexander J. Murmann
Web based Recommender Systems and Rating Prediction, Tho Nguyen
Information Flow Model for Commercial Security, Jene Pan
Automated Artice Generation Using the Web, Gaurang Patel
Intrusion Alerts Analysis Using Attack Graphs and Clustering, Hardik Patel
Analysis of rxbot, Esha Patil
Total Recall for AJAX applications – Firefox extension, Smita Periyapatna
Hybrid Clustering with Application to Web Pages, Ameya Sabnis
Active Lecture: An Interactive Lecturing System, Himavanthara Sajja
Available Bandwidth Inference Based On Node-Centric Clusters, Seetharam Samptur
Improving Web Recommendations Using Web Usage Mining and Web Semantics, Neha Saxena
DNA Sequence Representation by Use of Statistical Finite Automata, Asmi Shah
Analysis of an OpenMP Program for Race Detection, Dhaval Shah
Expert Finding Using Social Networking, Parin Shah
Distributed Port Scanning Detection, Himanshu Singh
Improving Location Determination for non-GPS devices, Varun Sud
Priority Based Routing for Mobile Peer-To-Peer Communications, Swathi Venugopal
Master's Projects from 2008
Web Security Detection Tool, Abhishek Agashe
Personalized Web Content with Fuzzy System, Bassam Almogahed
Investigating the Effectiveness of Active Interaction Tools on Student Learning, Lurie Andrei
Personalized Shopping Agent for Semantic Web, Ramani Arunachalam
Expanding JavaScript's metaobject protocol, Tom Austin
Analysis of the Zodiac 340-cipher, Thá̆ng Đào
Towards an Undetectable Computer Virus, Priti Desai
A Comparative Xeon and CBE Performance Analysis, Randy Fort
Adaptive Software Transactional Memory: Dynamic Contention Management, Joel Frank
Adaptive software transactional memory : dynamic contention management, Joel Cameron Frank
Practical Detection of Metamorphic Computer Viruses, Sharmidha Govindaraj
SQL Injection analysis, Detection and Prevention, Jagdish Halde
JavaFX as a Domain-Specific Language in Scala / Groovy, Sadiya Hameed
Employee Performance Assessment in Quality Assurance, Rahul Jain
Intelligent query for real estate search, Mandeep Jandir
Intelligent Query for Real Estate Search, Mandeep Jandir
Authoring and Sharing of Programming Exercises, Somyajit Jena
The Prosody of Uncertainty for Spoken Dialogue Intelligent Tutoring Systems, Bevan Jones
Online Recommendation System, Ankit Khera
Cryptanalysis of the SIGABA cipher, Heather Ellie Kwong
DNA Fragment Assembly Algorithms: Toward a Solution for Long Repeats, Ching Li
Design & Evaluation of Path-based Reputation System for MANET Routing, Ji Li
Online visualization of bibliography Using Visualization Techniques, Bharath Kumar Manur Venkataramana
Trust-Networks in Recommender Systems, Kristen Mori
Peer-to-Peer Botnets: Analysis and Detection, Jeet Morparia
IPhone Securtity Analysis, Vaibhav Ranchhoddas Pandya
Botnets and Distributed Denial of Service Attacks, Anilkumar Panicker
Accelerometer based motion gestures for Mobile Devices, Neel Parikh
Exact and Approximation Algorithms for Computing Reversal Distances in Genome Rearrangement, Euna Park
A Seeded Genetic Algorithm for RNA Secondary Structural Prediction with Pseudoknots, Ryan Pham
Motif Discovery in Biological Sequences, Medha Pradhan
Bibliography Data Mining and Data Visualization, Deepthi Pullannagari
Applications of genetic algorithms in bioinformatics, Amie Judith Radenbaugh
Efficient Resource Management Mechanism for 802.16 Wireless Networks Based on Weighted Fair Queuing, Kiran Rangula
Firefox Extension to Add Contacts, Events, and View Addresses, Vijay Rao
Algorithm to Obtain Total Order from Partial Orders for Social Networks, Chandrika Satyavolu
Study of TCP Issues over Wireless and Implementation of iSCSI over Wireless for Storage Area Networks, Rahul Sharma
A framework for active learning, Sean Sharma
Online Collaborative Time Management System using Artificial Intelligence, Anand Sivaramakrishnan
Semantic Categorization Of Online Video, Supraja Swarna
Providing VCR Functionality in VOD Servers, Ngyat Tsui
Visualization Web Portal on the Grid, Sandhya Turaga
Code Obfuscation and Virus Detection, Ashwini Venkatesan
Heuristic Health Resource Referral (H2R2) Engine, Duy Vo
Fuzzy Content Mining for Targeted Advertisement, Yezhou Wang
Multi-Dimensional Partitioning in BUC for Data Cubes, Kenneth Yeung
Fuzzy Range Query in XML, Dexiong Zhang
An automata based authorship identification system, Shangxuan Zhang
Master's Projects from 2007
Cryptanalysis of SIGABA, Wing Chan
Emotional and Domain Concept Enhancements to Alicebot, Alvin Cho
Mobile Multimedia Streaming Library, Bao Ho
Blog Analysis with Fuzzy TFIDF, Chi-Shu Ho
Clustering Blog Information, Mayank Prakash Jaiswal
Case Studies in Proof Checking, Robert Kam
Operon Prediction with Bayesian Classifiers, Natalia Khuri
Pairwise Alignment of Metamorphic Computer Viruses, Scott McGhee