Computer Engineering Dissertations

Computer Engineering Dissertations-86
Clicking on the author’s name will take you to a separate page containing dissertation abstracts, where available.UNC Libraries: Except where noted, all of the dissertations listed here are available from the libraries at UNC-Chapel Hill.

Tags: Problem Solving Method Of TeachingMake Essay Health WealthCitations Essay WritingEssay Parts Of SpeechReferencing In Essays FootnotesNative American Research Paper TopicsCredible Sources For Research PaperAids In Africa EssayA Border Passage EssaysSample Business Plan Template Word

(1998) “Volume Rendering Guided by Multiscale Medial Models” (Stephen M.

Pizer) Chen, Wei Chao (2002) “Light Field Mapping: Efficient Representation of Surface Light Fields” (Henry Fuchs) Cheng, Wei (2015) “Toward Robust Group-Wise e QTL Mapping Via Integrating Multi-Domain Heterogeneous Data” (Wei Wang) Chou, Chen-Rui (2013) “Regression Learning for 2D/3D Image Registration” (Stephen M.

This guide is designed to help you decide what kind of resources you need and to introduce you to the best tools and strategies for finding them.

Edgett PDF Cloud security requirements analysis and security policy development using a high-order object-oriented modeling technique, Kenneth Kofi Fletcher PDF Multi axis slicing for rapid prototyping, Divya Kanakanala PDF Content based image retrieval for bio-medical images, Vikas Nahar PDF 2-D path planning for direct laser deposition process, Swathi Routhu PDF Contribution-based priority assessment in a web-based intelligent argumentation network for collaborative software development, Maithili Satyavolu PDF An artificial life approach to evolutionary computation: from mobile cellular algorithms to artificial ecosystems, Shivakar Vulli PDF Intelligent computational argumentation for evaluating performance scores in multi-criteria decision making, Rubal Wanchoo PDF Minimize end-to-end delay through cross-layer optimization in multi-hop wireless sensor networks, Yibo Xu PDF Information flow properties for cyber-physical systems, Rav Akella PDF Exploring the use of a commercial game engine for the development of educational software, Hussain Alafaireet PDF Automated offspring sizing in evolutionary algorithms, André Chidi Nwamba PDF Image analysis techniques for vertebra anomaly detection in X-ray images, Mohammed Das PDF Cross-layer design through joint routing and link allocation in wireless sensor networks, Xuan Gong PDF A time series classifier, Christopher Mark Gore PDF An economic incentive based routing protocol incorporating quality of service for mobile peer-to-peer networks, Anil Jade Incorporation of evidences in an intelligent argumentation network for collaborative engineering design, Ekta Khudkhudia PDF Pr ESer D - Privacy ensured service discovery in mobile peer-to-peer environment, Santhosh Muthyapu PDF Co-optimization: a generalization of coevolution, Travis Service PDF Critical infrastructure protection and the Domain Name Service (DNS) system, Mark Edward Snyder PDF Co-evolutionary automated software correction: a proof of concept, Joshua Lee Wilkerson PDF A light-weight middleware framework for fault-tolerant and secure distributed applications, Ian Jacob Baird Symbolic time series analysis using hidden Markov models, Nikhil Bhardwaj Creation of XML view and propagation of updates to relational database, Janarthanan Eindhal PDF A quantitative study of gene identification techniques based on evolutionary rationales, Cyriac Kandoth ADA-REP: adaptive searching and replication of images in mobile hierarchical peer-to-peer networks, Kumar Abhinay Rathore Analysis of conflicts among non-functional requirements using integrated analysis of functional and non-functional requirements, Vishal Sadana Vulnerability analysis of PLC-based SCADA systems over ethernet using attack trees and commercial-off-the-shelf (COTS) tools, Simrit Pal Singh PDF An open framework for highly concurrent hardware-in-the-loop simulation, Ryan C.

(1972) “Toward A Programming Language for Writing and Checking Mathematical Discourses” (Donald F.

Stanat) Ahn, Ilsoo (1986) “Performance Modeling and Access Methods for Temporal Database Management Systems” (Richard T.Pizer) Bartel, Jacob (2015) “Predictions to Ease User’s Effort in Scalable Sharing (Prasun Dewan) Bastos, Rui (1999) “Superposition Rendering: Increased Realism for Interactive Walkthrough” (Frederick P. III (2004) “Physically-based Modeling Techniques for Interactive Digital Painting” (Ming Lin) Bellovin, Steven M.(1982) “Verifiably Correct Code Generation Using Predicate Transformers” (David L.Weiss) Burns, Eric (2007) “MACBETH: Management of Avatar Conflict By Employment of a Technique Hybrid” (Frederick P. William (1970) “Syntax-Semantics Systems As Structure Manipulation Systems: Phrase Structure Grammars and Generalized Finite Automata” (David B.Benson) Calandrino, John (2009) “On the Design and Implementation of a Cache-Aware Soft Real-Time Scheduler for Multicore Platforms” (James Anderson) Cannon, Robert L. Weiss) Cao, Tian (2016) “Coupled Dictionary Learning for Image Analysis” (Marc Niethammer) Carlson, Eric D.(1997) “Merging Real and Virtual Environments with Video See-Through Head-Mounted Displays” (Henry Fuchs) Bandyopadhyay, Deepak (2006) “A Geometric Framework for Robust Neighbor Analysis of Protein Structure and Function” (Jack Snoeyink) Banks, David C.(1993) “Interacting with Surfaces in Four Dimensions Using Computer Graphics” (Stephen M.(2002) “Multiscale Evaluation of 3D Shape Perception in Computer Graphics” (Christina Burbeck) Brown, Shawn (2015) “Case Studies on Optimizing Algorithms for GPU Architectures” (Jack Snoeyink) Brownlee, Jr., Edward H.(1975) “Lossiness in Tessellation Automata” (Stephen F.PDF Network-aware energy saving techniques in cloud data centers, Motassem Al-Tarazi PDF Situation-oriented requirements engineering, Nimanthi Atukorala PDF The construction and applications of callback control flow graphs for event-driven and framework-based mobile apps, Danilo Dominguez Perez PDF Witness generation in existential CTL model checking, Chuan Jiang PDF Nonparametric curve estimation and applications, Yu Liu PDF Taking the lab on the road and bringing the road to the lab: On using mixed-methods and virtual reality to study a location-based task, Kofi Whitney PDF Toward efficient online scheduling for large-scale distributed machine learning system, Menglu Yu PDF Medical image classification under class imbalance, Chuanhai Zhang PDF Automatic incident detection, Lakshay Ahuja PDF Enhancing users' experiences with mobile app stores: What do users see? Stull PDF The design and implementation of Candoia: A platform for building and sharing mining software repositories tools as apps, Nitin Mukesh Tiwari PDF Learning Markov Logic Network Structure by Template Constructing, Yingbei Tong PDF Computational modeling of impact and deformation, Feifei Wang PDF Execution and authentication of function queries, Guolei Yang PDF A situation-centric, knowledge-driven requirements elicitation approach, Jingwei Yang PDF Syntax errors identification from compiler error messages using ML techniques, Shubham K. Asiri PDF Disrupting diffusion: Critical nodes in network, Preeti Bhardwaj PDF Recognition of activities of daily living, Yunfei Feng PDF A data-driven situation-aware framework for predictive analysis in smart environments, Hoda Gholami PDF Effectiveness of classification approach in recovering pairwise causal relations from data., Kristima Guha Thakurta PDF A study of interpretability mechanisms for deep networks, Apurva Dilip Kokate PDF Large-scale study of substitutability in the presence of effects, Jackson Lowell Maddox PDF Towards efficient and accountable oblivious cloud storage, Qiumao Ma PDF Improved triangle counting in graph streams: Neighborhood multi-sampling, Kiana Mousavi Hanjani PDF High performance computing applications: Inter-process communication, workflow optimization, and deep learning for computational nuclear physics, Gianina Alina Negoita PDF Data augmentation for supervised learning with generative adversarial networks, Manaswi Podduturi PDF Graph compression using heuristic-based reordering, Pavithra Rajarathinam PDF Collective program analysis, Ganesha Upadhyaya PDF Graph Track: An unsupervised graph-based cross-device tracking framework, Tianchen Zhou PDF Improving testing performance by dynamic prioritization of tests based on method invocation orders, Sriram Balasubramanian PDF Computer detection of spatial visualization in a location-based task, Georgi Iliev Batinov PDF A User Configurable B-tree Implementation as a Utility, Sheng Bi PDF Devices for safety-critical molecular programmed systems, Samuel Jay Ellis PDF A testbed for multi-robot systems, Tianshuang Gao PDF Many-to-one private set intersection, Keji Hu PDF Parity-based Data Outsourcing: Extension, Implementation, and Evaluation, Zhenbi Hu PDF Computing change of invariants to support software evolution, Ashwin Kallingal Joshy PDF Triangle counting in graph streams: Power of multi-sampling, Neeraj Kavassery Parakkat PDF Exploiting implicit belief to resolve sparse usage problem in usage-based specification mining, Samantha Syeda Khairunnesa PDF Synthesizing species trees from gene trees using the parameterized and graph-theoretic approaches, Ju Cheol Moon PDF Verification of Well-formedness in Message-Passing Asynchronous Systems modeled as Communicating Finite-State Machines, Shiva Shankar Nalla PDF Negotiation Based Resource Allocation to Control Information Diffusion, Sai Sravanthi Nudurupati PDF Flattening methods for adaptive location-based software to user abilities, Thitivatr Patanasakpinyo PDF λir : A language with intensional receive, Swarn Priya PDF A hybrid approach for selecting and optimizing graph traversal strategy for analyzing big code, Ramanathan Ramu PDF Targeted Influence Maximization In Labeled Social Networks with Non-Target Constraints, Naresh Somisetty PDF Algorithmic randomness and analysis, Donald M.


Comments Computer Engineering Dissertations

The Latest from ©