Browsing Computer Science Theses and Dissertations by Title

Navigation

Display Options

Results

  • Hammoudeh, Zayd (University of Oregon, 2024-03-25)
    Data poisoning and backdoor attacks manipulate model predictions by inserting malicious instances into the training set. Most existing defenses against poisoning and backdoor attacks are empirical and easily evaded by an ...
  • Rezayidemne, Seyedsaed (University of Oregon, 2018-10-31)
    Word-of-mouth (WOM) communication is a well studied phenomenon in the literature and content propagation in Online Social Networks (OSNs) is one of the forms of WOM mechanism that have been prevalent in recent years specially ...
  • Brophy, Jonathan (University of Oregon, 2017-09-06)
    Unsolicited messages affects virtually every popular social media website, and spammers have become increasingly proficient at bypassing conventional filters, prompting a stronger effort to develop new methods. First, we ...
  • Knickerbocker, Paul, 1980- (University of Oregon, 2008-06)
    Phishing is a type of Internet fraud that uses deceptive websites to trick users into revealing sensitive information. Despite the availability of numerous tools designed to detect phishing, it remains a steadily growing ...
  • Sood, Kanika (University of Oregon, 2014-09-29)
    Extracting functional dependencies from existing databases is a useful technique in relational theory, database design and data mining. Functional dependencies are a key property of relational schema design. A functional ...
  • Meng, Kewen (University of Oregon, 2021-11-23)
    Application performance models are important for both software and hardware development. They can be used to understand and improve application performance, to determine what architectural features are important to a ...
  • Hairapetian, Shant (University of Oregon, 2022-02-18)
    Traditionally, programming languages based on lambda calculus such asHaskell and ML do not support functions with a number of arguments (or arity) greater than one. In these languages, currying emulates the passing of ...
  • Prottsman, Christie Lee Lili (University of Oregon, 2011-06)
    Though the first computer programmers were female, women currently make up only a quarter of the computing industry. This lack of diversity jeopardizes technical innovation, creativity and profitability. As demand for ...
  • Hu, Zhangxiang (University of Oregon, 2024-01-09)
    Decentralized systems are distributed systems that disperse computation tasks to multiple parties without relying on a trusted central authority. Since any party can be attacked and compromised by malicious adversaries, ...
  • Sisodia, Devkishen (University of Oregon, 2022-10-04)
    The number of Internet of Things (IoT) devices continues to grow every year. Unfortunately, with the rise of IoT devices, the Internet is also witnessing a rise in the number and scale of IoT-enabled distributed denial-of-service ...
  • Bates, Adam (University of Oregon, 2012)
    This paper presents co-resident watermarking, a traffic analysis attack for cloud environments that allows a malicious co-resident virtual machine to inject a watermark signature into the network flow of a target instance. ...
  • Li, Dan (University of Oregon, 2020-02-27)
    While online social networks (OSNs) provide application programming interfaces (APIs) to enable the development of OSN applications, some of these applications, unfortunately, can be malicious. They can be running on the ...
  • Riazi, Sara (University of Oregon, 2020-02-27)
    Big graphs such as social networks or the internet network, biological networks, knowledge graphs appear in many domains. However, processing these graphs rely on the accessibility of high-performance frameworks which are ...
  • Tan, Czander (University of Oregon, 2022-10-26)
    Standard Stackelberg Security Games (SSGs) assume attackers to be myopic players that select only a single target based on the defender's strategy. In this paper, we consider sequential SSGs, in which attackers launch ...
  • Belcher, Kristi (University of Oregon, 2020-09-24)
    Particle advection is a fundamental operation for a wide range of flow visualization algorithms. Particle advection execution times can vary based on many factors, including the number of particles, duration of advection, ...
  • Shvedov, Konstantin (University of Oregon, 2022-10-04)
    Developments in neural networks have led to advanced models requiring large amounts of training time and resources. To reduce the environmental impact and to decrease the training times of models, acceleration techniques ...
  • Gravelle, Brian (University of Oregon, 2022-10-04)
    In this dissertation, we demonstrate that it is possible to develop methods of empirical hardware-counter-based performance analysis for scientific applications running on diverse CPUs. Although counters have been used in ...
  • Bleile, Ryan (University of Oregon, 2021-04-29)
    Since near the very beginning of electronic computing, Monte Carlo particle transport has been a fundamental approach for solving computational physics problems. Due to the high computational demands and inherently parallel ...
  • Ehrenkranz, Toby (University of Oregon, 2012)
    The Internet has become an indispensable resource for today's society. It is at the center of the today's business, entertainment, and social world. However, the core of our identities on the Internet, the IP addresses ...
  • Hanson-Smith, Victor, 1981- (University of Oregon, 2011-12)
    The evolutionary history of protein families can be difficult to study because necessary ancestral molecules are often unavailable for direct observation. As an alternative, the field of computational phylogenetics has ...

Search Scholars' Bank


Advanced Search

Browse

My Account

Statistics