Software is prone to contain bugs and vulnerabilities. To protect it, researchers normally
go to a lower layer, such as protecting the applications from the kernel or protecting the
operating systems from the hypervisor, ...
If a quantum computer with a sufficient number of qubits was ever built, it would easily break all current American federal standards in the area of public-key cryptography, including algorithms protecting the majority of ...
Cognitive radio is an emerging technology for sensing and opportunistic spectrum access in wireless communication networks. It allows a secondary user to detect under-utilized spectrum of a primary user and to dynamically ...
Advancement in digital technology has generated a massive amount of data. Large amount of information streaming in from various sources such as phones, tablets, computers and internet has made an immense need to provide a ...
Developing agent behaviors is often a tedious, time-consuming task consisting of repeated code, test, and debug cycles. Despite the difficulties, complex agent behaviors have been developed, but they required significant ...
Multivariate cryptosystems belong to the five most promising families of post-quantum
cryptography (PQC) schemes. Among them, the Unbalanced Oil and Vinegar (UOV) and
the Rainbow signature schemes have been extensively ...
Recovering deleted information from storage drives is a long-standing problem. Prior research has approached information recovery by developing file-carving techniques. However, two issues present significant challenges ...
The development of reliable, portable gas sensors that can detect harmful gases
in real-time with high sensitivity and selectivity, is very important for clean environment
and national security. In the last few decades, ...
The objective of this work is to create a control mechanism for smooth operation of powered wheelchairs through speech recognition and humming detection. Users of wheelchairs are estimated to be about 200 million people ...
In this dissertation, we explored the usage of computational interaction design methods in the construction of human-centered tools. Computational design interaction methods involve applying learning and optimization to ...
This dissertation presents a hybrid filtering method and a case-based reasoning
framework for enhancing the effectiveness of Web search. Web search may not reflect
user needs, intent, context, and preferences, because ...
This dissertation focuses on Hybrid Renewable Energy Systems (HRES). HRES typically comprises an elaborated energy grid that relies on multiple sources – most prevalent of which are renewable sources such as solar, wind, ...
Current cybersecurity risk models are inadequate for assessing next-generation technologies. Current models often use experience-based data to quantify the potential risks of new security technologies based on their ...
Coal Combustion Products (CCPs) also known as coal ash/residues are generated when coal is burnt to generate electricity or steam. CCPs include fly ash, bottom ash, flue gas desulfurization (FGD) materials (FGD solids, FGD ...
Shaders are useful in real time graphics and high performance computing applications
as they specify computation to be run in parallel on the GPU. In the community, these
shaders are often described in mathematical syntax ...
Computers store persistent information in a non-volatile storage device such as a hard drive. Users directly create and delete files on the hard drive, and users install and uninstall applications which indirectly creates ...
This dissertation investigates the construction of nonseparable multidimensional
wavelets using multidimensional filterbanks. The main contribution of the dissertation is
the derivation of the relations zeros of higher ...
Image analysis and editing is an important topic in Computer Graphics community. My research has centered around understanding the colorful appearance of physical and digital paintings and images. My work focuses on ...
This thesis describes the development of two different methods to produce an optimal
platform for immobilizing biological matter (cells and proteins). Firstly, transparent
indium tin oxide (ITO) microelectrodes were ...
The purpose of this research is to determine how post-decisional regret changes optimal treatment decisions for patients suffering from early-stage cancer. Regret studies in medicine have repeatedly demonstrated that a ...