Now showing items 1-20 of 55

    • A Hybrid Approach for Ontology-based Information Extraction 

      Gutierrez, Fernando (University of Oregon, 2016-02-23)
      Information extraction (IE) is the process of automatically transforming written natural language (i.e., text) into structured information, such as a knowledge base. However, because natural language is inherently ambiguous, ...
    • An "active vision" computational model of visual search for human-computer interaction 

      Halverson, Timothy E., 1971- (University of Oregon, 2008-12)
      Visual search is an important part of human-computer interaction (HCI). The visual search processes that people use have a substantial effect on the time expended and likelihood of finding the information they seek. This ...
    • Algorithm capability and applications in artificial intelligence 

      Ray, Katrina (University of Oregon, 2008-12)
      Many algorithms are known to work well in practice on a variety of different problem instances. Reusing existing algorithms for problems besides the one that they were designed to solve is often quite valuable. This is ...
    • An Algorithm for Clipping Polygons of Large Geographical Data 

      Alghamdi, Areej (University of Oregon, 2017-09-27)
      We present an algorithm for overlaying polygonal data with regular grids and calculating the percentage overlap for each cell in the regular grid.  Our algorithm is able to support self-intersecting polygons, meaning that ...
    • Automated Attacks on Compression-Based Classifiers 

      Burago, Igor (University of Oregon, 2014-09-29)
      Methods of compression-based text classification have proven their usefulness for various applications. However, in some classification problems, such as spam filtering, a classifier confronts one or many adversaries willing ...
    • Automated methods to infer ancient homology and synteny 

      Catchen, Julian M., 1978- (University of Oregon, 2009-06)
      Establishing homologous (evolutionary) relationships among a set of genes allows us to hypothesize about their histories: how are they related, how have they changed over time, and are those changes the source of novel ...
    • Behavior-based Worm Detection 

      Stafford, John (University of Oregon, 2012)
      The Internet has become a core component of our lives and businesses. Its reliability and availability are of paramount importance. There are many types of malware that impact the availability of the Internet, including ...
    • Collective Classification of Social Network Spam 

      Brophy, Jonathan (University of Oregon, 2017-09-06)
      Unsolicited messages affects virtually every popular social media website, and spammers have become increasingly proficient at bypassing conventional filters, prompting a stronger effort to develop new methods. First, we ...
    • Combating Phishing Through Zero-Knowledge Authentication 

      Knickerbocker, Paul, 1980- (University of Oregon, 2008-06)
      Phishing is a type of Internet fraud that uses deceptive websites to trick users into revealing sensitive information. Despite the availability of numerous tools designed to detect phishing, it remains a steadily growing ...
    • Comparison of Functional Dependency Extraction Methods and an Application of Depth First Search 

      Sood, Kanika (University of Oregon, 2014-09-29)
      Extracting functional dependencies from existing databases is a useful technique in relational theory, database design and data mining. Functional dependencies are a key property of relational schema design. A functional ...
    • Computational Thinking and Women in Computer Science 

      Prottsman, Christie Lee Lili (University of Oregon, 2011-06)
      Though the first computer programmers were female, women currently make up only a quarter of the computing industry. This lack of diversity jeopardizes technical innovation, creativity and profitability. As demand for ...
    • Detecting Compute Cloud Co-residency with Network Flow Watermarking Techniques 

      Bates, Adam (University of Oregon, 2012)
      This paper presents co-resident watermarking, a traffic analysis attack for cloud environments that allows a malicious co-resident virtual machine to inject a watermark signature into the network flow of a target instance. ...
    • Ensuring a Valid Source and Destination for Internet Traffic 

      Ehrenkranz, Toby (University of Oregon, 2012)
      The Internet has become an indispensable resource for today's society. It is at the center of the today's business, entertainment, and social world. However, the core of our identities on the Internet, the IP addresses ...
    • Error and Uncertainty in Computational Phylogenetics 

      Hanson-Smith, Victor, 1981- (University of Oregon, 2011-12)
      The evolutionary history of protein families can be difficult to study because necessary ancestral molecules are often unavailable for direct observation. As an alternative, the field of computational phylogenetics has ...
    • Examining the Complexity of Popular Websites 

      Tian, Ran (University of Oregon, 2015-08-18)
      A significant fraction of today's Internet traffic is associated with popular web sites such as YouTube, Netflix or Facebook. In recent years, major Internet websites have become more complex as they incorporate a larger ...
    • Extending Dynamic Invariant Detection with Explicit Abstraction 

      Keith, Daniel (University of Oregon, 2012)
      Dynamic invariant detection is a software analysis technique that uses traces of function entry and exit from executing programs and infers partial specifications that characterize the observed behavior. The specifications ...
    • Extending dynamic scripting 

      Ludwig, Jeremy R. (University of Oregon, 2008-12)
      The dynamic scripting reinforcement learning algorithm can be extended to improve the speed, effectiveness, and accessibility of learning in modern computer games without sacrificing computational efficiency. This dissertation ...
    • Force plus graphics is not equal to vision plus haptics : towards usable haptic environments 

      Kirkpatrick, Arthur Edward (University of Oregon, 2000)
      Haptic environments are user interfaces incorporating a haptic display device, most commonly a point force device such as the PHANToM. Lederman and Klatzky's Exploratory Procedures work casts doubt on the usability of such ...
    • Formal Modeling Can Improve Smart Transportation Algorithm Development 

      Wathugala, Wathugala Gamage Dulan Manujinda (University of Oregon, 2017-06)
      Ensuring algorithms work accurately is crucial, especially when they drive safety critical systems like self-driving cars. We formally model a published distributed algorithm for autonomous vehicles to collaborate and ...
    • A Framework for Automated Generation of Specialized Function Variants 

      Chaimov, Nicholas (University of Oregon, 2012)
      Efficient large-scale scientific computing requires efficient code, yet optimizing code to render it efficient simultaneously renders the code less readable, less maintainable, less portable, and requires detailed knowledge ...