Search results
-
-
Title
-
Randomization based privacy preserving categorical data analysis
-
Author
-
Guo, Ling
-
Date Created
-
2010
-
Subjects--Topical
-
Information technology
-
Description
-
This dissertation investigates data utility and privacy of randomization-based models in privacy preserving data mining for categorical data. For the analysis of data utility in randomization model, we first investigate the accuracy analysis for a...
-
-
Title
-
PRICING STRATEGIES FOR ONLINE MULTIPLAYER GAMES
-
Author
-
Parker, Neal
-
Date Created
-
2013
-
Subjects--Topical
-
Information technology, Business
-
Description
-
This dissertation examines the different pricing strategies available to online multiplayer game publishers. We develop mathematical models of the pricing decision that the publisher engages in and conduct a numerical experiment to identify critic...
-
-
Title
-
Power, Influence Tactics, and Influence Processes in Virtual Teams
-
Author
-
Boughton, Marla
-
Date Created
-
2011
-
Subjects--Topical
-
Organizational behavior, Management, Information technology
-
Description
-
Current studies of power, influence tactics, and influence processes in virtual teams assume that these constructs operate in a similar manner as they do in the face-to-face (FtF) environment. However, the virtual context differs from the FtF envi...
-
-
Title
-
Parametric form making with modular units
-
Author
-
Lutes, Rachel
-
Date Created
-
2020
-
Subjects--Topical
-
Information technology, Architecture
-
Description
-
Modular units are a bedrock of modern construction. Finding ways to design new forms and be creative with modular units is a challenge for architects and designers. Parametric design allows designers to create a wide range of configurations, but t...
-
-
Title
-
Parametric BIM Automation
-
Author
-
Lakshmanan, Jashwanth
-
Date Created
-
2020
-
Subjects--Topical
-
Information technology, Architecture
-
Description
-
Like Vitruvius who was loosely termed as the first architect, always believed that every good design had to be based off of geometric patterns and set constraints. And Bill Mitchell’s - Logic Of Architecture has some good views on computational de...
-
-
Title
-
Discovering Zero-day Attacks By Leveraging Cyber Threat Intelligence
-
Author
-
Niakanlahiji, Amirreza
-
Date Created
-
2019
-
Subjects--Topical
-
Computer science, Information technology
-
Description
-
Cyber attacks cost companies and organizations billions of dollars each year. To alleviate this issue, security professionals and companies continuously attempt to discover new vulnerabilities, and also to share their cyber threat information abou...
-
-
Title
-
Development of a multi-layered botmaster based analysis framework
-
Author
-
Paxton, Napoleon
-
Date Created
-
2011
-
Subjects--Topical
-
Computer science, Information technology
-
Description
-
Botnets are networks of compromised machines called bots that come together to form the tool of choice for hackers in the exploitation and destruction of computer networks. Most malicious botnets have the ability to be rented out to a broad range ...
-
-
Title
-
CONFIGURATION OF APPLICATION PERMISSIONS WITH CONTEXTUAL ACCESS CONTROL
-
Author
-
Besmer, Andrew
-
Date Created
-
2013
-
Subjects--Topical
-
Information technology
-
Description
-
Users are burdened with the task of configuring access control policies on many different application platforms used by mobile devices and social network sites. Many of these platforms employ access control mechanisms to configure application perm...
-
-
Title
-
Communities of Purpose
-
Author
-
Stukes, Felesia
-
Date Created
-
2016
-
Subjects--Topical
-
Computer science, Information technology
-
Description
-
Communities of Purpose are commonly known to enact their purposes through social movements, grassroots efforts, semi-formal groups, and through organizations in the voluntary sector. They carry out charitable missions and goals and are often commi...
-
-
Title
-
Clustering and Recommendation Techniques for Access Control Policy Management
-
Author
-
Marouf, Said
-
Date Created
-
2012
-
Subjects--Topical
-
Information technology
-
Description
-
Managing access control policies can be a daunting process, given the frequent policy decisions that need to be made, and the potentially large number of policy rules involved. Policy management includes, but is not limited to: policy optimization...
-
-
Title
-
Assured Information Sharing for Ad-hoc Collaboration
-
Author
-
Jin, Jing
-
Date Created
-
2009
-
Subjects--Topical
-
Computer engineering, Information technology
-
Description
-
Collaborative information sharing tends to be highly dynamic and often ad hoc among organizations. The dynamic natures and sharing patterns in ad-hoc collaboration impose a need for a comprehensive and flexible approach to reflecting and coping wi...
-
-
Title
-
Autonomous Cyber Defense: Formal Models and Applications
-
Author
-
Dutta, Ashutosh
-
Date Created
-
2021
-
Subjects--Topical
-
Computer science, Information science, Information technology
-
Description
-
With technological advancements, cyber attacks are highly automated and organized with asymmetric advantages over defenders regarding cost and efforts.Attackers employ sophisticated and diversified approaches to achieve attack objectives while bei...
-
-
Title
-
Arny: An Interaction Model Based On Emotional Feedback For An AI_Based Co-creative Design System
-
Author
-
Abdellahi, Sarah
-
Date Created
-
2021
-
Subjects--Topical
-
Artificial intelligence, Information technology, Computer science
-
Description
-
Co-creative collaboration is a creative collaboration of two or more agents working together on a shared creative product. Effective co-creative collaboration is a combination of interactions and contributions of the task collaborators. In human-h...
-
-
Title
-
Advances in Modern Botnet Understanding and the Accurate Enumeration of Infected Hosts
-
Author
-
Nunnery, Christopher
-
Date Created
-
2011
-
Subjects--Topical
-
Information technology, Information science
-
Description
-
Botnets remain a potent threat due to evolving modern architectures, inadequate remediation methods, and inaccurate measurement techniques. In response, this research exposes the architectures and operations of two advanced botnets, techniques to ...
-
-
Title
-
IDENTIFYING SERENDIPITOUS DRUG USAGES FROM PATIENT-REPORTED MEDICATION OUTCOMES ON SOCIAL MEDIA
-
Author
-
Ru, Boshu
-
Date Created
-
2018
-
Subjects--Topical
-
Computer science, Information technology, Medical sciences
-
Description
-
Drug repositioning has prominent advantages of lower safety risk and development cost than developing new drugs. It has attracted broad interests from the biomedical community. In the past decades, computational approaches have examined biological...
-
-
Title
-
Fine-grained Video Classification for Rare Events
-
Author
-
Shan, Junjie
-
Date Created
-
2018
-
Subjects--Topical
-
Computer science, Information technology
-
Description
-
Video analysis plays an important role in the field of computer vision and finds its application in many areas. Fine-grained event classification is one of the most challenging problems in video analysis due to subtle difference between classes an...