Search results
-
-
Title
-
CONFIGURATION OF APPLICATION PERMISSIONS WITH CONTEXTUAL ACCESS CONTROL
-
Author
-
Besmer, Andrew
-
Date Created
-
2013
-
Subjects--Topical
-
Information technology
-
Description
-
Users are burdened with the task of configuring access control policies on many different application platforms used by mobile devices and social network sites. Many of these platforms employ access control mechanisms to configure application perm...
-
-
Title
-
EXPLORATORY VISUALIZATION OF GRAPHS BASED ON COMMUNITY STRUCTURE
-
Author
-
Liu, Yujie
-
Date Created
-
2013
-
Subjects--Topical
-
Computer science, Information technology
-
Description
-
Communities, also called clusters or modules, are groups of nodes which probably share common properties and/or play similar roles within a graph. They widely exist in real networks such as biological, social, and information networks. Allowing us...
-
-
Title
-
OBJECT-DRIVEN AND TEMPORAL ACTION RULES MINING
-
Author
-
Hajja, Ayman
-
Date Created
-
2013
-
Subjects--Topical
-
Computer science, Public health, Information technology
-
Description
-
In this thesis, I present my complete research work in the field of action rules, more precisely object-driven and temporal action rules.The drive behind the introduction of object-driven and temporally based action rules is to bring forth an adap...
-
-
Title
-
PRICING STRATEGIES FOR ONLINE MULTIPLAYER GAMES
-
Author
-
Parker, Neal
-
Date Created
-
2013
-
Subjects--Topical
-
Information technology, Business
-
Description
-
This dissertation examines the different pricing strategies available to online multiplayer game publishers. We develop mathematical models of the pricing decision that the publisher engages in and conduct a numerical experiment to identify critic...
-
-
Title
-
SECURING THE DATA STORAGE AND PROCESSING IN CLOUD COMPUTING ENVIRONMENT
-
Author
-
Owens, Rodney
-
Date Created
-
2013
-
Subjects--Topical
-
Information technology
-
Description
-
Organizations increasingly utilize cloud computing architectures to reduce costs and energy consumption both in the data warehouse and on mobile devices by better utilizing the computing resources available. However, the security and privacy issue...
-
-
Title
-
SPECTRAL ANALYSIS OF RICH NETWORK TOPOLOGY IN SOCIAL NETWORKS
-
Author
-
Wu, Leting
-
Date Created
-
2013
-
Subjects--Topical
-
Information technology, Social sciences--Research
-
Description
-
Social networks have received much attention these days. Researchers have de- veloped different methods to study the structure and characteristics of the network topology. Our focus is on spectral analysis of the adjacency matrix of the underlying...
-
-
Title
-
Spectrum-based and Collaborative Network Topology Analysis and Visualization
-
Author
-
Hu, Xianlin
-
Date Created
-
2013
-
Subjects--Topical
-
Information technology
-
Description
-
Networks are of significant importance in many application domains, such as World WideWeb and social networks, which often embed rich topological information. Since network topology captures the organization of network nodes and links, studying ne...
-
-
Title
-
User Centric Policy Management
-
Author
-
Cheek, Gorrell
-
Date Created
-
2013
-
Subjects--Topical
-
Information technology
-
Description
-
Internet use, in general, and online social networking sites, in particular, are experiencing tremendous growth with hundreds of millions of active users. As a result, there is a tremendous amount of privacy information and content online. Protect...