Now showing items 1-14 of 14

  • Evolving a Disjunctive Predator Prey Swarm using PSO: Adapting Swarms with Swarms 

    Riyaz, Firasath (2006-02-15)
    Swarm Intelligence is the study of "the emergent collective intelligence of groups of simple agents." Recent research has explored the important applications in the field of business, telecommunications, robotics and ...
  • Java bytecode compilation for high-performance, platform-independent logical inference. 

    Arte, Ashish. (2006-05-11)
    Automated reasoning systems are powerful computer programs capable of solving complex problems. They are characterized as computationally intensive having high performance requirements. Very few reasoning systems have ...
  • Analysis of transaction throughput in P2P environments. 

    Chokkalingam, Arun. (2006-05-28)
    In recent years P2P systems have gained tremendous popularity. Support of a transaction processing facility in P2P systems would provide databases at a low cost. Extending distributed database algorithms such as 2PC and ...
  • PG-means: learning the number of clusters in data. 

    Feng, Yu. (2007-03-19)
    We present a novel algorithm called PG-means in this thesis. This algorithm is able to determine the number of clusters in a classical Gaussian mixture model automatically. PG-means uses efficient statistical hypothesis ...
  • "Two-way" obliviousness in general aspect-oriented modeling. 

    Roberts, Nathan V. (2008-10-01)
    A key problem in software development is producing systems that are maintainable even as the concerns at play evolve. Aspect-oriented programming (AOP) seeks to foster maintainability by isolating the specifications of ...
  • Studies of active information in search. 

    Ewert, Winston. (2010)
    A search process is an attempt to locate a solution to a problem, such as an optimization problem, where the space is usually too large to exhaustively sample. In order to investigate this idea this work looks a three ...
  • An OCL-based verification approach to analyzing static properties of a UML model. 

    Sun, Wuliang. (2010-06-23)
    There is a need for more rigorous analysis techniques that developers can use for verifying the critical properties in UML models. The UML-based Specification Environment (USE) tool supports verification of invariants, ...
  • MultiKarma : a fully decentralized virtual multi-currency. 

    Allen, Jon D. (Jon Douglas) (, 2011-09-14)
    Participant-based technologies enable users to contribute resources to a shared pool that in the aggregate provides valuable services, such as social networks, massive multiplayer online games, file exchange, etc. Such ...
  • Information storage capacity of genetic algorithm fitness maps. 

    Montañez, George D. (, 2011-09-14)
    To accurately measure the amount of information a genetic algorithm can generate, we must first measure the amount of information one can store, using a fitness map. The amount of information generated, minus the storage ...
  • Age classification from facial images for detecting retinoblastoma. 

    Chiam, Tak Chien. (, 2012-11-29)
    Facial age estimation from images is a difficult problem, both because it is naturally difficult to tell the exact age of a person visually, and because of the variations in images, such as illumination, pose, and expression. ...
  • Performance improvements to peer-to-peer file transfers using network coding. 

    Kelley, Aaron A. (, 2013-09-16)
    A common peer-to-peer approach to large data distribution is to divide the data into blocks. Peers will gather blocks from other peers in parallel. Problems with this approach are that each peer must know which blocks ...
  • Designing incentives in P2P systems. 

    Berciu, Radu Mihai. (, 2013-09-24)
    The goal of this thesis is bringing closer together the game theoretic approach of creating incentives with the requirements and properties of P2P systems. Briefly, we detail the P2P system context that incentive mechanisms ...
  • Faster k-means clustering. 

    Drake, Jonathan, 1989- (, 2013-09-24)
    The popular k-means algorithm is used to discover clusters in vector data automatically. We present three accelerated algorithms that compute exactly the same clusters much faster than the standard method. First, we redesign ...
  • Giving the users a hand : towards touchless hand gestures for the desktop. 

    Hari Haran, Alvin Jude. (, 2014-09-05)
    Touchless, mid-air, gesture-based interactions have recently moved out of laboratories and Hollywood movies and into the hands of users. There is little difference in the interaction style and techniques used today from ...