Browsing Computer Science Theses and Dissertations by Title

Navigation

Display Options

Results

  • Stafford, John (University of Oregon, 2012)
    The Internet has become a core component of our lives and businesses. Its reliability and availability are of paramount importance. There are many types of malware that impact the availability of the Internet, including ...
  • Williams, Brian (University of Oregon, 2018-09-06)
    It is estimated that over half of bicycle crashes are not reported. There are various reasons for this, such as no property damage or physical injuries sustained. In order to improve the likelihood that bicycle riders ...
  • Feng, Yebo (University of Oregon, 2018-09-06)
    With the rapid development of online social networks (OSN), maintaining the security of social media ecosystems becomes dramatically important for public. Among all the security threats in OSN, malicious social bot is the ...
  • Hammoudeh, Zayd (University of Oregon, 2024-03-25)
    Data poisoning and backdoor attacks manipulate model predictions by inserting malicious instances into the training set. Most existing defenses against poisoning and backdoor attacks are empirical and easily evaded by an ...
  • Rezayidemne, Seyedsaed (University of Oregon, 2018-10-31)
    Word-of-mouth (WOM) communication is a well studied phenomenon in the literature and content propagation in Online Social Networks (OSNs) is one of the forms of WOM mechanism that have been prevalent in recent years specially ...
  • Brophy, Jonathan (University of Oregon, 2017-09-06)
    Unsolicited messages affects virtually every popular social media website, and spammers have become increasingly proficient at bypassing conventional filters, prompting a stronger effort to develop new methods. First, we ...
  • Knickerbocker, Paul, 1980- (University of Oregon, 2008-06)
    Phishing is a type of Internet fraud that uses deceptive websites to trick users into revealing sensitive information. Despite the availability of numerous tools designed to detect phishing, it remains a steadily growing ...
  • Sood, Kanika (University of Oregon, 2014-09-29)
    Extracting functional dependencies from existing databases is a useful technique in relational theory, database design and data mining. Functional dependencies are a key property of relational schema design. A functional ...
  • Meng, Kewen (University of Oregon, 2021-11-23)
    Application performance models are important for both software and hardware development. They can be used to understand and improve application performance, to determine what architectural features are important to a ...
  • Hairapetian, Shant (University of Oregon, 2022-02-18)
    Traditionally, programming languages based on lambda calculus such asHaskell and ML do not support functions with a number of arguments (or arity) greater than one. In these languages, currying emulates the passing of ...
  • Prottsman, Christie Lee Lili (University of Oregon, 2011-06)
    Though the first computer programmers were female, women currently make up only a quarter of the computing industry. This lack of diversity jeopardizes technical innovation, creativity and profitability. As demand for ...
  • Hu, Zhangxiang (University of Oregon, 2024-01-09)
    Decentralized systems are distributed systems that disperse computation tasks to multiple parties without relying on a trusted central authority. Since any party can be attacked and compromised by malicious adversaries, ...
  • Sisodia, Devkishen (University of Oregon, 2022-10-04)
    The number of Internet of Things (IoT) devices continues to grow every year. Unfortunately, with the rise of IoT devices, the Internet is also witnessing a rise in the number and scale of IoT-enabled distributed denial-of-service ...
  • Bates, Adam (University of Oregon, 2012)
    This paper presents co-resident watermarking, a traffic analysis attack for cloud environments that allows a malicious co-resident virtual machine to inject a watermark signature into the network flow of a target instance. ...
  • Li, Dan (University of Oregon, 2020-02-27)
    While online social networks (OSNs) provide application programming interfaces (APIs) to enable the development of OSN applications, some of these applications, unfortunately, can be malicious. They can be running on the ...
  • Riazi, Sara (University of Oregon, 2020-02-27)
    Big graphs such as social networks or the internet network, biological networks, knowledge graphs appear in many domains. However, processing these graphs rely on the accessibility of high-performance frameworks which are ...
  • Tan, Czander (University of Oregon, 2022-10-26)
    Standard Stackelberg Security Games (SSGs) assume attackers to be myopic players that select only a single target based on the defender's strategy. In this paper, we consider sequential SSGs, in which attackers launch ...
  • Belcher, Kristi (University of Oregon, 2020-09-24)
    Particle advection is a fundamental operation for a wide range of flow visualization algorithms. Particle advection execution times can vary based on many factors, including the number of particles, duration of advection, ...
  • Shvedov, Konstantin (University of Oregon, 2022-10-04)
    Developments in neural networks have led to advanced models requiring large amounts of training time and resources. To reduce the environmental impact and to decrease the training times of models, acceleration techniques ...
  • Gravelle, Brian (University of Oregon, 2022-10-04)
    In this dissertation, we demonstrate that it is possible to develop methods of empirical hardware-counter-based performance analysis for scientific applications running on diverse CPUs. Although counters have been used in ...

Search Scholars' Bank


Advanced Search

Browse

My Account

Statistics