Search results
-
-
Title
-
Reasoning about recognizability in security protocols
-
Author
-
Li, Zhiwei
-
Date Created
-
2012
-
Subjects--Topical
-
Computer science
-
Description
-
Although verifying a message has long been recognized as an important concept, which has been used explicitly or implicitly in security protocol analysis, there is no consensus on its exact meaning. Such a lack of formal treatment of the concept m...
-
-
Title
-
Randomization based privacy preserving categorical data analysis
-
Author
-
Guo, Ling
-
Date Created
-
2010
-
Subjects--Topical
-
Information technology
-
Description
-
This dissertation investigates data utility and privacy of randomization-based models in privacy preserving data mining for categorical data. For the analysis of data utility in randomization model, we first investigate the accuracy analysis for a...
-
-
Title
-
PRICING STRATEGIES FOR ONLINE MULTIPLAYER GAMES
-
Author
-
Parker, Neal
-
Date Created
-
2013
-
Subjects--Topical
-
Information technology, Business
-
Description
-
This dissertation examines the different pricing strategies available to online multiplayer game publishers. We develop mathematical models of the pricing decision that the publisher engages in and conduct a numerical experiment to identify critic...
-
-
Title
-
Privacy and Spectral Analysis of Social Network Randomization
-
Author
-
Ying, Xiaowei
-
Date Created
-
2011
-
Subjects--Topical
-
Computer science
-
Description
-
Social networks are of significant importance in various application domains. Understanding the general properties of real social networks has gained much attention due to the proliferation of networked data. Many applications of networks such as ...
-
-
Title
-
Probe-Based Visual Analysis of Geospatial Simulations
-
Author
-
Butkiewicz, Thomas
-
Date Created
-
2010
-
Subjects--Topical
-
Computer science
-
Description
-
This work documents the design, development, refinement, and evaluation of probes as an interaction technique for expanding both the usefulness and usability of geospatial visualizations, specifically those of simulations. Existing applications th...
-
-
Title
-
Personalized Indexing of Music by Emotions
-
Author
-
Mostafavi, Amanda
-
Date Created
-
2014
-
Subjects--Topical
-
Computer science
-
Description
-
How a person interprets music and what prompts a person to feel certain emotions are two very subjective things. This dissertation presents a method where a system can learn and track a user's listening habits with the purpose of recommending song...
-
-
Title
-
Development of a multi-layered botmaster based analysis framework
-
Author
-
Paxton, Napoleon
-
Date Created
-
2011
-
Subjects--Topical
-
Computer science, Information technology
-
Description
-
Botnets are networks of compromised machines called bots that come together to form the tool of choice for hackers in the exploitation and destruction of computer networks. Most malicious botnets have the ability to be rented out to a broad range ...
-
-
Title
-
Constraint-based Generation of Database States for Testing Database Applications
-
Author
-
Pan, Kai
-
Date Created
-
2012
-
Subjects--Topical
-
Computer science
-
Description
-
Testing is essential for quality assurance of database applications.To test the quality of database applications, it usually requirestest inputs consisting of both program input values andcorresponding database states. However, producing these tes...
-
-
Title
-
CONFIGURATION OF APPLICATION PERMISSIONS WITH CONTEXTUAL ACCESS CONTROL
-
Author
-
Besmer, Andrew
-
Date Created
-
2013
-
Subjects--Topical
-
Information technology
-
Description
-
Users are burdened with the task of configuring access control policies on many different application platforms used by mobile devices and social network sites. Many of these platforms employ access control mechanisms to configure application perm...
-
-
Title
-
Clustering and Recommendation Techniques for Access Control Policy Management
-
Author
-
Marouf, Said
-
Date Created
-
2012
-
Subjects--Topical
-
Information technology
-
Description
-
Managing access control policies can be a daunting process, given the frequent policy decisions that need to be made, and the potentially large number of policy rules involved. Policy management includes, but is not limited to: policy optimization...
-
-
Title
-
Automated formal analytics for smart grid security and resiliency
-
Author
-
Rahman, Mohammad
-
Date Created
-
2015
-
Subjects--Topical
-
Computer science, Sports administration
-
Description
-
Smart grid is the modernization of the legacy electric power system in which cyber computing and communications are integrated with the physical world of power systems. A smart grid provides efficient and cost-effective management of the grid by a...
-
-
Title
-
Assured Information Sharing for Ad-hoc Collaboration
-
Author
-
Jin, Jing
-
Date Created
-
2009
-
Subjects--Topical
-
Computer engineering, Information technology
-
Description
-
Collaborative information sharing tends to be highly dynamic and often ad hoc among organizations. The dynamic natures and sharing patterns in ad-hoc collaboration impose a need for a comprehensive and flexible approach to reflecting and coping wi...
-
-
Title
-
Automated Meta-Actions Discovery for Personalized Medical Treatments
-
Author
-
Touati, Hakim
-
Date Created
-
2014
-
Subjects--Topical
-
Computer science, Health services administration
-
Description
-
Healthcare, among other domains, provides an attractive ground of work for knowledge discovery researchers. There exist several branches of health informatics and health data-mining from which we find actionable knowledge discovery is underserved....
-
-
Title
-
AUTOMATIC GENERATION OF INTELLIGENT TUTORING CAPABILITIES VIA EDUCATIONAL DATA MINING
-
Author
-
Stamper, John
-
Date Created
-
2010
-
Subjects--Topical
-
Computer science, Information science, Educational technology
-
Description
-
Intelligent Tutoring Systems (ITSs) that adapt to an individual student's needs have shown significant improvement in achievement over non-adaptive instruction. This improvement occurs due to the individualized instruction and feedback that an ITS...
-
-
Title
-
Abstract visualization of large-scale time-varying data
-
Author
-
Yu, Li
-
Date Created
-
2012
-
Subjects--Topical
-
Computer science, Computer engineering
-
Description
-
The explosion of large-scale time-varying datasets has created critical challenges for scientists to study and digest. One core problem for visualization is to develop effective approaches that can be used to study various data features and tempor...