Browsing Computer Science Theses and Dissertations by Title

Navigation

Display Options

Results

  • Halverson, Timothy E., 1971- (University of Oregon, 2008-12)
    Visual search is an important part of human-computer interaction (HCI). The visual search processes that people use have a substantial effect on the time expended and likelihood of finding the information they seek. This ...
  • Lu, Qiuhao (University of Oregon, 2024-01-09)
    Pre-trained Language Models (PLMs) have shown remarkable success in general-domain text tasks, but their application in the clinical domain is constrained by specialized language, terminology, and a lack of in-depth ...
  • Ray, Katrina (University of Oregon, 2008-12)
    Many algorithms are known to work well in practice on a variety of different problem instances. Reusing existing algorithms for problems besides the one that they were designed to solve is often quite valuable. This is ...
  • Casita, Roscoe (University of Oregon, 2018-04-10)
    This paper introduces the hypergraph transversal problem along with thefollowing iterative solutions: naive, branch and bound, and dynamic exponentialtime (NC-D). Odometers are introduced along with the functions that ...
  • Blaha, Kenneth D. (University of Oregon, 1989-09-06)
    Bases, subgroup towers and strong generating sets (SGSs) have played a key role in the development of algorithms for permutation groups. We analyze the computational complexity of several problems involving bases and ...
  • Alghamdi, Areej (University of Oregon, 2017-09-27)
    We present an algorithm for overlaying polygonal data with regular grids and calculating the percentage overlap for each cell in the regular grid.  Our algorithm is able to support self-intersecting polygons, meaning that ...
  • Ndemeye, Bosco (University of Oregon, 2020-12-08)
    Scientific algorithms have been built on top of linear algebra subprograms, historically implemented in languages such as C/C++ or Fortran, to optimize their performance, sometimes at the cost of their conciseness. Recent ...
  • McLaughlin, Joseph (University of Oregon, 2021-09-13)
    Sensor networks that collect indoor environmental (IEQ) data are frequently used to drive building systems and to inform research and building standards.The research that connects the trends in IEQ data with human factors ...
  • Burago, Igor (University of Oregon, 2014-09-29)
    Methods of compression-based text classification have proven their usefulness for various applications. However, in some classification problems, such as spam filtering, a classifier confronts one or many adversaries willing ...
  • Catchen, Julian M., 1978- (University of Oregon, 2009-06)
    Establishing homologous (evolutionary) relationships among a set of genes allows us to hypothesize about their histories: how are they related, how have they changed over time, and are those changes the source of novel ...
  • Marsaglia, Nicole (University of Oregon, 2022-05-10)
    Trends in high-performance computing increasingly require visualization to be carried out using in situ processing. This processing most often occurs without a human in the loop, meaning that the in situ software must be ...
  • Stafford, John (University of Oregon, 2012)
    The Internet has become a core component of our lives and businesses. Its reliability and availability are of paramount importance. There are many types of malware that impact the availability of the Internet, including ...
  • Williams, Brian (University of Oregon, 2018-09-06)
    It is estimated that over half of bicycle crashes are not reported. There are various reasons for this, such as no property damage or physical injuries sustained. In order to improve the likelihood that bicycle riders ...
  • Feng, Yebo (University of Oregon, 2018-09-06)
    With the rapid development of online social networks (OSN), maintaining the security of social media ecosystems becomes dramatically important for public. Among all the security threats in OSN, malicious social bot is the ...
  • Hammoudeh, Zayd (University of Oregon, 2024-03-25)
    Data poisoning and backdoor attacks manipulate model predictions by inserting malicious instances into the training set. Most existing defenses against poisoning and backdoor attacks are empirical and easily evaded by an ...
  • Rezayidemne, Seyedsaed (University of Oregon, 2018-10-31)
    Word-of-mouth (WOM) communication is a well studied phenomenon in the literature and content propagation in Online Social Networks (OSNs) is one of the forms of WOM mechanism that have been prevalent in recent years specially ...
  • Brophy, Jonathan (University of Oregon, 2017-09-06)
    Unsolicited messages affects virtually every popular social media website, and spammers have become increasingly proficient at bypassing conventional filters, prompting a stronger effort to develop new methods. First, we ...
  • Knickerbocker, Paul, 1980- (University of Oregon, 2008-06)
    Phishing is a type of Internet fraud that uses deceptive websites to trick users into revealing sensitive information. Despite the availability of numerous tools designed to detect phishing, it remains a steadily growing ...
  • Sood, Kanika (University of Oregon, 2014-09-29)
    Extracting functional dependencies from existing databases is a useful technique in relational theory, database design and data mining. Functional dependencies are a key property of relational schema design. A functional ...
  • Meng, Kewen (University of Oregon, 2021-11-23)
    Application performance models are important for both software and hardware development. They can be used to understand and improve application performance, to determine what architectural features are important to a ...

Search Scholars' Bank


Advanced Search

Browse

My Account

Statistics