Now showing items 1-19 of 19

  • Age classification from facial images for detecting retinoblastoma. 

    Chiam, Tak Chien. (, 2012-11-29)
    Facial age estimation from images is a difficult problem, both because it is naturally difficult to tell the exact age of a person visually, and because of the variations in images, such as illumination, pose, and expression. ...
  • Analysis of transaction throughput in P2P environments. 

    Chokkalingam, Arun. (2006-05-28)
    In recent years P2P systems have gained tremendous popularity. Support of a transaction processing facility in P2P systems would provide databases at a low cost. Extending distributed database algorithms such as 2PC and ...
  • Clustering in high dimension and choosing cluster representatives for SimPoint. 

    Johnston, Joshua Benjamin. (2007-12-03)
    In computer architecture, researchers compare new processor designs by simulating them in software. Because simulation is slow, researchers simulate small parts of a workload to save time. The widely successful SimPoint ...
  • Designing incentives in P2P systems. 

    Berciu, Radu Mihai. (, 2013-09-24)
    The goal of this thesis is bringing closer together the game theoretic approach of creating incentives with the requirements and properties of P2P systems. Briefly, we detail the P2P system context that incentive mechanisms ...
  • Evolving a Disjunctive Predator Prey Swarm using PSO: Adapting Swarms with Swarms 

    Riyaz, Firasath (2006-02-15)
    Swarm Intelligence is the study of "the emergent collective intelligence of groups of simple agents." Recent research has explored the important applications in the field of business, telecommunications, robotics and ...
  • Faster k-means clustering. 

    Drake, Jonathan, 1989- (, 2013-09-24)
    The popular k-means algorithm is used to discover clusters in vector data automatically. We present three accelerated algorithms that compute exactly the same clusters much faster than the standard method. First, we redesign ...
  • Giving the users a hand : towards touchless hand gestures for the desktop. 

    Hari Haran, Alvin Jude. (, 2014-09-05)
    Touchless, mid-air, gesture-based interactions have recently moved out of laboratories and Hollywood movies and into the hands of users. There is little difference in the interaction style and techniques used today from ...
  • Hierarchical stability based model selection for clustering algorithms. 

    Yin, Bing, 1985- (2009-09-09)
    We present an algorithm called HS-means, which is able to learn the number of clusters in a mixture model based on the hierarchical analysis of clustering stability. Our method extends the concept of clustering stability ...
  • Image compression and recovery using compressive sampling and particle swarm optimization. 

    Van Ruitenbeek, Benjamin D. (2009-08-25)
    We present a novel method for sparse signal recovery using Particle Swarm Optimization and demonstrate an application in image compression. Images are compressed with compressive sampling, and then reconstructed with ...
  • Information storage capacity of genetic algorithm fitness maps. 

    Montañez, George D. (, 2011-09-14)
    To accurately measure the amount of information a genetic algorithm can generate, we must first measure the amount of information one can store, using a fitness map. The amount of information generated, minus the storage ...
  • Java bytecode compilation for high-performance, platform-independent logical inference. 

    Arte, Ashish. (2006-05-11)
    Automated reasoning systems are powerful computer programs capable of solving complex problems. They are characterized as computationally intensive having high performance requirements. Very few reasoning systems have ...
  • MultiKarma : a fully decentralized virtual multi-currency. 

    Allen, Jon D. (Jon Douglas) (, 2011-09-14)
    Participant-based technologies enable users to contribute resources to a shared pool that in the aggregate provides valuable services, such as social networks, massive multiplayer online games, file exchange, etc. Such ...
  • An OCL-based verification approach to analyzing static properties of a UML model. 

    Sun, Wuliang. (2010-06-23)
    There is a need for more rigorous analysis techniques that developers can use for verifying the critical properties in UML models. The UML-based Specification Environment (USE) tool supports verification of invariants, ...
  • Performance improvements to peer-to-peer file transfers using network coding. 

    Kelley, Aaron A. (, 2013-09-16)
    A common peer-to-peer approach to large data distribution is to divide the data into blocks. Peers will gather blocks from other peers in parallel. Problems with this approach are that each peer must know which blocks ...
  • PG-means: learning the number of clusters in data. 

    Feng, Yu. (2007-03-19)
    We present a novel algorithm called PG-means in this thesis. This algorithm is able to determine the number of clusters in a classical Gaussian mixture model automatically. PG-means uses efficient statistical hypothesis ...
  • Solving the F/A-18 mission computer virtual memory problem. 

    Sealey, Adam L. (2009-08-25)
    The F/A-18 has a mission computer that requires physical memory be mapped into a very limited amount of virtual memory space. As requirements for this aircraft have expanded, the mission computer must perform increasingly ...
  • Studies of active information in search. 

    Ewert, Winston. (2010)
    A search process is an attempt to locate a solution to a problem, such as an optimization problem, where the space is usually too large to exhaustively sample. In order to investigate this idea this work looks a three ...
  • Towards efficient and practical reliable bulk data transport for large receiver sets. 

    Cutchin, Andrew E. (2008-04-15)
    Many critical network applications require the transmission of bulk data to a large, heterogeneous, asynchronous receiver set. Standard unicast solutions exhibit poor scaling due to inefficient use of bandwidth over shared ...
  • "Two-way" obliviousness in general aspect-oriented modeling. 

    Roberts, Nathan V. (2008-10-01)
    A key problem in software development is producing systems that are maintainable even as the concerns at play evolve. Aspect-oriented programming (AOP) seeks to foster maintainability by isolating the specifications of ...