Search results
-
-
Title
-
'Practice' for Enhancing the Performance of a Deep Reinforcement Learning Agent
-
Author
-
Kancharla, Venkata Sai Santosh Ravi Teja
-
Date Created
-
2019
-
Subjects--Topical
-
Artificial intelligence
-
Description
-
Deep reinforcement learning has demonstrated its capability to solve a diverse array of challenging problems, which were not able to solve previously. It has been able to achieve human-level performance in Atari 2600 games and it has shown great p...
-
-
Title
-
A Beginning-to-End System for Efficiently Gathering Tracking Data on Multiple Targets
-
Author
-
Rice, Lance
-
Date Created
-
2016
-
Subjects--Topical
-
Computer science
-
Description
-
Multi-object tracking in video has the potential for broad applicability, from analyzing division-of-labor within biological networks such as insects, to surveillance and traffic monitoring. Despite any potential the field of multiple object track...
-
-
Title
-
A Holistic Approach to Securing Memory Error Vulnerabilities in IoT Firmware
-
Author
-
Obaidat, Islam
-
Date Created
-
2023
-
Subjects--Topical
-
Computer science
-
Description
-
A staggering number of Internet-of-Things (IoT) devices harbor intrinsic security vulnerabilities within their firmware. Memory errors especially predominate as a potent category among these vulnerabilities. Memory errors not only permit remote at...
-
-
Title
-
A Survey of Network Modeling
-
Author
-
Wells, Unique
-
Date Created
-
2018
-
Subjects--Topical
-
Computer science
-
Description
-
Network modeling is a set of techniques for extracting various patterns of interestfrom graphs. They can be used in many real-life analytic fields, such as sales andmarketing, journal reports, government and law enforcement, social networking site...
-
-
Title
-
A framework for the use of wearables to enable study of stress
-
Author
-
Kanchinadam, Teja Simha
-
Date Created
-
2016
-
Subjects--Topical
-
Computer science
-
Description
-
Stress is a common condition that has major health impacts. Even though short-term stress helps people to react to danger immediately, chronic stress has larger health impacts such as early aging, post-traumatic stress disorder, and depression. In...
-
-
Title
-
AI Based Realistic Multi-Hop Wireless Simulation
-
Author
-
pothuneedi, tagore
-
Date Created
-
2021
-
Subjects--Topical
-
Computer science
-
Description
-
Wireless multi-hop networks and software-defined networking (SDN) are emerging technologies in wireless communications for deploying cost-efficient programmable network backbones. However, the physical testbeds do not provide scalable environments...
-
-
Title
-
AUTOMATIC UNIT TESTING TO DETECT SECURITY VULNERABILITIES IN WEB APPLICATIONS
-
Author
-
Mohammadi, Mahmoud
-
Date Created
-
2018
-
Subjects--Topical
-
Computer science
-
Description
-
Web applications consume data from different inputs. Some of these inputs originate from untrusted sources, such as user inputs which will be rendered in browsers or browser-based applications such as mobile apps. Many applications with these func...
-
-
Title
-
Active Cyber Defense Planning and Orchestration
-
Author
-
Islam, Md Mazharul
-
Date Created
-
2021
-
Subjects--Topical
-
Computer science
-
Description
-
The overwhelming number of recent data breaches reported that hundreds of terabytes of highly sensitive information, including national, financial, and personal, have been stolen from different organizations, indicating a clear asymmetric disadvan...
-
-
Title
-
An Approach Towards an Autonomic Computing Prototype Reference Architecture
-
Author
-
Williams, Trevon
-
Date Created
-
2019
-
Subjects--Topical
-
Computer science, Information technology, System theory
-
Description
-
Autonomic Computing is a grand challenge that strives to create self-regulating environments. The end goal, is to create an environment that can self-optimize, self-protect, self-heal and self-configure based on built-in, formulated, and generated...
-
-
Title
-
Anomaly Detection for Manufacturing Applications Using Convolutional Autoencoders
-
Author
-
Zouar, Nourelislam
-
Date Created
-
2021
-
Subjects--Topical
-
Computer science
-
Description
-
ABSTRACTNOURELISLAM ZOUAR. ANOMALY DETECTION FOR MANUFACTURING APPLICATIONS USING CONVOLUTIONAL AUTOENCODERS. (Under the direction of DR. MIN SHIN) Anomaly Detection in manufacturing environments is increasingly gaining popularity among companies ...
-
-
Title
-
Art Authentication in an Untagged Art Database
-
Author
-
Dobbs, Bryan
-
Date Created
-
2022
-
Subjects--Topical
-
Computer science, Art--Historiography, Mathematics
-
Description
-
The identification of the artist of a painting is also known as art authentication, and the answer to this question is manifest through art gallery exhibition and is reinforced through financial transactions. Art authentication has visual influenc...
-
-
Title
-
Autonomous Cyber Defense: Formal Models and Applications
-
Author
-
Dutta, Ashutosh
-
Date Created
-
2021
-
Subjects--Topical
-
Computer science, Information science, Information technology
-
Description
-
With technological advancements, cyber attacks are highly automated and organized with asymmetric advantages over defenders regarding cost and efforts.Attackers employ sophisticated and diversified approaches to achieve attack objectives while bei...