Follow


Master's Projects from 2010

PDF

Mobile Search Engine using Clustering and Query Expansion, Huy Nguyen

PDF

Parallel Programming Recipes, Thuy C. Nguyenphuc

PDF

Web-Based IDE for Interfacing View Controller, Tejasvi Palvai

PDF

Automatic Grading of Programming Assignments, Ashlesha Patil

PDF

APPROXIMATE DISASSEMBLY, Dhivyakrishnan Radhakrishnan

PDF

Geometrical Structure and Analysis of Association Rules, Sar Rajat

PDF

Scala Server Faces, Vikas Vittal Rao

PDF

Analysis of False Cache Line Sharing Effects on Multicore CPUs, Suntorn Sae-eung

PDF

One Social, Sowmya Sampath

PDF

Geometrical Structure and Analysis of Association Rule, Rajat Sar

PDF

Approximate Disassembly using Dynamic Programming, Abhishek Shah

PDF

Metamorphic Viruses with Built-In Buffer Overflow, Ronak Shah

PDF

Open Source Analysis of Biomedical Figures, David Shao

PDF

A MicroRNA TARGET PREDICTION ALGORITHM, Rupinder Singh

PDF

Improved Worm Simulator and Simulations, Arnold Suvatne

PDF

Computational miRNA Target Prediction in Animals, Leyan Tang

PDF

Document Builder, Thien Tran

PDF

EMail Data Mining: An Approach to Construct an Organization Position-wise Structure While Performing EMail Analysis, Bhargav Vadher

PDF

View Component of Web-based IDE to develop Web Applications in CakePHP, Swathi Vegesna

PDF

DETECTING UNDETECTABLE COMPUTER VIRUSES, Sujandharan Venkatachalam

PDF

Web-Based IDE to Create Model and Controller Components for MVC-based Web Applications on CakePHP, Sugiharto Widjaja

PDF

Automatic Execution Path Finding Tool, Fan Yang

PDF

IMPROVED SOFTWARE ACTIVATION USING MULTITHREADING, Jian Rui Zhang

Master's Projects from 2009

PDF

World Wide Web – Common Communication Language, Mohamed Ali

PDF

Visualization of Tree-Structured Data Through a Multi Touch User Interface, David Andrews

PDF

Online Circular Calendar, Praveen Athmanathan Panneerselvam

PDF

Intrusion Detection And Prevention System: CGI Attacks, Tejinder Aulakh

PDF

Intrusion detection and prevention system: CGI attacks., Tejinder Aulakh

PDF

Knowledge Engineering from Data Perspective: Granular Computing Approach, Rushin Barot

PDF

Heuristic Search Cryptanalysis of the Zodiac 340 Cipher, Pallavi Kanagalakatte Basavaraju

PDF

Video Conferencing Tool, Sapna Blesson

PDF

A Running Time Improvement for Two Thresholds Two Divisors Algorithm, BingChun Chang

PDF

Versatile Extensible Security System for Mobile Ad Hoc Networks, Jung Chang

PDF

Evaluations and Enhancements in 802.11n WLANs – Error-Sensitive Adaptive Frame Aggregation, Ken Chan

PDF

Randomized Greedy Hot-Potato Routing on the Multi-Dimensional Torus, Raymond Y. Chi

PDF

Common Emotion Modeling in Distinct Medium Analysis and Matching, Amy Cho

PDF

Software reverse engineering education, Teodoro Cipresso

PDF

Objective Measurement of Speech Quality in VoIP over Wireless LAN during Handoff, Nidhi Marwaha Gambhir

PDF

Triggering of Just-In-Time Compilation in the Java Virtual Machine, Rouhollah Gougol

PDF

Chinese Wall Security Policy, Varun Gupta

PDF

MSG: A Gap-Oriented Genetic Algorithm for Multiple Sequence Alignment, Philip Heller

PDF

Network traffic clustering and geographic visualization, Ali Hushyar

PDF

Analysis of Machine Learning Based Methods for Identifying MicroRNA Precursors, Steve Ikeoka

PDF

MRCRAIG: MapReduce and Ensemble Classifiers for Parallelizing Data Classification Problems, Glenn Jahnke

PDF

Event based propagation approach to constraint configuration problems, Rajhdeep Jandir

PDF

Automatic Video Classification, Don Jayakody

PDF

Is Four File Chess a Draw?, Michael Karbushev

PDF

Client-Side Page Element Web-Caching, Ramya Karri

PDF

Visualized Architecture Knowledge Management Collaboration Services, Ashish Kaul

PDF

Performance study of FMIPv6-based cross-layer WiMAX handover scheme for supporting VoIP service, Heejung Kim

PDF

Clustering Algorithm for Enhanced Bibliography Visualization, Sriram Krishnan

PDF

Wormulator: Simulator for Rapidly Spreading Malware, Jyotsna Krishnaswamy

PDF

Priority Based Power Management and Reduced Downtime in Data Centers, Barath Kuppuswamy

PDF

Hunting for Undetectable Metamorphic Viruses, Da Lin

PDF

Hunting for Undetectable Metamorphic Viruses, Da Lin

PDF

Removing the Digital Divide for Senior Web Users, Chiu Luk

PDF

An Automata Based Text Analysis System, Yue Lu

PDF

Enhancing spammer detection in online social networks with trust-based metrics., Alexander J. Murmann

PDF

Web based Recommender Systems and Rating Prediction, Tho Nguyen

PDF

Information Flow Model for Commercial Security, Jene Pan

PDF

Automated Artice Generation Using the Web, Gaurang Patel

PDF

Intrusion Alerts Analysis Using Attack Graphs and Clustering, Hardik Patel

PDF

Analysis of rxbot, Esha Patil

PDF

Total Recall for AJAX applications – Firefox extension, Smita Periyapatna

PDF

Hybrid Clustering with Application to Web Pages, Ameya Sabnis

PDF

Active Lecture: An Interactive Lecturing System, Himavanthara Sajja

PDF

Available Bandwidth Inference Based On Node-Centric Clusters, Seetharam Samptur

PDF

Improving Web Recommendations Using Web Usage Mining and Web Semantics, Neha Saxena

PDF

DNA Sequence Representation by Use of Statistical Finite Automata, Asmi Shah

PDF

Analysis of an OpenMP Program for Race Detection, Dhaval Shah

PDF

Expert Finding Using Social Networking, Parin Shah

PDF

Distributed Port Scanning Detection, Himanshu Singh

PDF

Improving Location Determination for non-GPS devices, Varun Sud

PDF

Priority Based Routing for Mobile Peer-To-Peer Communications, Swathi Venugopal

Master's Projects from 2008

PDF

Web Security Detection Tool, Abhishek Agashe

PDF

Personalized Web Content with Fuzzy System, Bassam Almogahed

PDF

Investigating the Effectiveness of Active Interaction Tools on Student Learning, Lurie Andrei

PDF

Personalized Shopping Agent for Semantic Web, Ramani Arunachalam

PDF

Expanding JavaScript's metaobject protocol, Tom Austin

PDF

Analysis of the Zodiac 340-cipher, Thá̆ng Đào

PDF

Towards an Undetectable Computer Virus, Priti Desai

PDF

A Comparative Xeon and CBE Performance Analysis, Randy Fort

PDF

Adaptive Software Transactional Memory: Dynamic Contention Management, Joel Frank

PDF

Adaptive software transactional memory : dynamic contention management, Joel Cameron Frank

PDF

Practical Detection of Metamorphic Computer Viruses, Sharmidha Govindaraj

PDF

SQL Injection analysis, Detection and Prevention, Jagdish Halde

PDF

JavaFX as a Domain-Specific Language in Scala / Groovy, Sadiya Hameed

PDF

Employee Performance Assessment in Quality Assurance, Rahul Jain

PDF

Intelligent query for real estate search, Mandeep Jandir

PDF

Intelligent Query for Real Estate Search, Mandeep Jandir

PDF

Authoring and Sharing of Programming Exercises, Somyajit Jena

PDF

The Prosody of Uncertainty for Spoken Dialogue Intelligent Tutoring Systems, Bevan Jones

PDF

Online Recommendation System, Ankit Khera

PDF

Cryptanalysis of the SIGABA cipher, Heather Ellie Kwong

PDF

DNA Fragment Assembly Algorithms: Toward a Solution for Long Repeats, Ching Li

PDF

Design & Evaluation of Path-based Reputation System for MANET Routing, Ji Li

PDF

Online visualization of bibliography Using Visualization Techniques, Bharath Kumar Manur Venkataramana

PDF

Trust-Networks in Recommender Systems, Kristen Mori

PDF

Peer-to-Peer Botnets: Analysis and Detection, Jeet Morparia

PDF

IPhone Securtity Analysis, Vaibhav Ranchhoddas Pandya