Browsing Computer Science Theses and Dissertations by Issue Date

Navigation

Display Options

Results

  • Brittell, Megen (University of Oregon, 2011-12)
    Graphics provide a rich display medium that facilitates identification of spatial patterns but are inaccessible to people who are blind or low vision. Audio provides an alternative medium through which to display information. ...
  • Yao, Xiangkui (University of Oregon, 2011-12)
    The design of successful assistive technologies requires careful personalization for individual users, as well as rapid, low cost cycles for product development and testing. My research brings two modern software engineering ...
  • Keith, Daniel (University of Oregon, 2012)
    Dynamic invariant detection is a software analysis technique that uses traces of function entry and exit from executing programs and infers partial specifications that characterize the observed behavior. The specifications ...
  • Stafford, John (University of Oregon, 2012)
    The Internet has become a core component of our lives and businesses. Its reliability and availability are of paramount importance. There are many types of malware that impact the availability of the Internet, including ...
  • Hulette, Geoffrey (University of Oregon, 2012)
    Programmers design, write, and understand programs with a high-level structure in mind. Existing programming languages are not very good at capturing this structure because they must include low-level implementation ...
  • Ehrenkranz, Toby (University of Oregon, 2012)
    The Internet has become an indispensable resource for today's society. It is at the center of the today's business, entertainment, and social world. However, the core of our identities on the Internet, the IP addresses ...
  • Chaimov, Nicholas (University of Oregon, 2012)
    Efficient large-scale scientific computing requires efficient code, yet optimizing code to render it efficient simultaneously renders the code less readable, less maintainable, less portable, and requires detailed knowledge ...
  • Liu, Haishan (University of Oregon, 2012)
    Data mining is the nontrivial extraction of implicit, previously unknown, and potentially useful information from data. It is widely acknowledged that the role of domain knowledge in the discovery process is essential. ...
  • Mood, Benjamin (University of Oregon, 2012)
    Secure function evaluation (SFE) on mobile devices, such as smartphones, allows for the creation of new privacy-preserving applications. Generating the circuits on smartphones which allow for executing customized functions, ...
  • Arab Yar Mohammadi, Mahshid (University of Oregon, 2012)
    My interest is in applying a domain model to help elicit personal requirements for the problem of community travel for people with cognitive impairments. The domain model I took advantage of is the ACT model, which is ...
  • Bates, Adam (University of Oregon, 2012)
    This paper presents co-resident watermarking, a traffic analysis attack for cloud environments that allows a malicious co-resident virtual machine to inject a watermark signature into the network flow of a target instance. ...
  • Rasti Ekbatani, Hassan (University of Oregon, 2013-07-11)
    During the past decade, the Internet has witnessed a dramatic increase in the popularity of Peer-to-Peer (P2P) applications. This has caused a significant growth in the volume of P2P traffic. This trend has been particularly ...
  • Burkhart, Joshua (University of Oregon, 2013-10-03)
    How to assess the quality of a genome assembly without the help of a reference sequence is an open question. Only a few techniques are currently used in the literature and each has obvious bias. An additional method, ...
  • Ozog, David (University of Oregon, 2013-10-03)
    While the message-passing paradigm, seen in programming models such as MPI and UPC, has provided a solution for efficiently programming on distributed memory computer systems, this approach is not a panacea for the needs ...
  • Clauson, Aran (University of Oregon, 2013-10-10)
    Compilation encompasses many steps. Parsing turns the input program into a more manageable syntax tree. Verification ensures that the program makes some semblance of sense. Finally, code generation transforms the internal ...
  • Memon, Ghulam (University of Oregon, 2014-06-17)
    The Internet has evolved into a medium centered around content: people watch videos on YouTube, share their pictures via Flickr, and use Facebook to keep in touch with their friends. Yet, the only globally deployed service ...
  • Burago, Igor (University of Oregon, 2014-09-29)
    Methods of compression-based text classification have proven their usefulness for various applications. However, in some classification problems, such as spam filtering, a classifier confronts one or many adversaries willing ...
  • Sood, Kanika (University of Oregon, 2014-09-29)
    Extracting functional dependencies from existing databases is a useful technique in relational theory, database design and data mining. Functional dependencies are a key property of relational schema design. A functional ...
  • Alur, Abhijit (University of Oregon, 2015-01-14)
    DNS (Domain Name System) names contain a wide variety of information, such as geographic location, speed of the interface, type of interface, etc. However, extracting this information is challenging since this information ...
  • Poliakoff, David (University of Oregon, 2015-08-18)
    Modern computational software is increasingly large in terms of lines of code, number of developers, intended longevity, and complexity of intended architectures. While tools exist to mitigate the problems this type of ...

Search Scholars' Bank


Advanced Search

Browse

My Account

Statistics