Now showing items 1-20 of 94

    • A blockchain-inspired design for a modern academic system 

      Murali, Alaap
      When reminded of blockchains, the public’s attention tends to turn to finance because of the recent growth of Bitcoin and its impact on the economy; however, these cryptographic data structures also have value in several ...
    • A Factor Graph Approach To Constrained Optimization 

      Jimenez Rodriguez, Ivan Dario Dario
      Several problems in robotics can be solved using constrained optimization. For example, solutions in areas like control and planning frequently use it. Meanwhile, the Georgia Tech Smoothing and Mapping (GTSAM) toolbox ...
    • A Fast and Simple Approach to Merge Sorting using AVX-512 

      Watkins, James Alexander
      Merging and Sorting algorithms are the backbone of many modern computer applica- tions. As such, efficient implementations are desired. New architectural advancements in CPUs allow for ever-present algorithmic improvements. ...
    • A Mechanism of Visual Concept Learning via Neuronal Random Projection 

      Koplik, Peter Sebastian
      We explore the effectiveness of the random projection method, a biologically plausible, computationally efficient,and data-independentmethodofdimensionalityreductionindistinctionbetweencategoriesofvisualstimuli. We observe ...
    • A Review of Human Robot Proxemics 

      Armas, Osvaldo A.
      Robots are increasingly becoming ubiquitous, but are currently limited in their social capabilities. For robots to become ubiquitous in social environments they need to have an understanding of proxemics. Proxemics is a ...
    • A Two Mice Framework for Navigation and Shape Manipulation in 3D Graphics 

      Zheng, Congyao
      The increasing influences of interaction technologies like Augmented Reality(AR) and Virtual Reality(VR) has brought about about the high demand of 3D shape design and bi-manual user input devices with more degree-of-freedom ...
    • Accurately and Efficiently Estimating Dynamic Point-to-Point Shortest Path 

      Tripathy, Alok
      Point-to-point shortest path (PPSP), or s-t connectivity, is a variant of the shortest path problem found in graph theory. In this problem, we are given a graph and pairs of vertices over time, and the output is the shortest ...
    • AirTouch: Mobile Gesture Interaction with Wearable Tactile Displays 

      Li, BoHao (Georgia Institute of Technology, 2011-05-09)
      AirTouch is a wrist-based gesture interface that enables mobile gesture interaction under limited visual attention settings. Since the original Gesture Watch lacked non- visual feedback, visual attention was required. ...
    • An Evaluation of GUI and Kinesthetic Teaching Methods for Constrained-Keyframe Skills 

      Kurenkov, Andrey (Georgia Institute of Technology, 2015-08-18)
      Keyframe-based Learning from Demonstration has been shown to be an effective method for allowing end-users to teach robots skills. I propose a method for using multiple keyframe demonstrations to learn skills as sequences ...
    • An Evaluation of the Value of Lip and Jaw Motion in Virtual Reality Avatars 

      Sun, Ruixuan
      Virtual reality (VR) is known as a simulated 3D immersive technology. Currently, the emphasis has been mainly placed on tracking the upper face, like eye tracking and eyebrow imitation, where the lower face containing the ...
    • Analysis of the errors caused by the fragmentation of the Android ecosystem: an empirical study 

      Prammer, Martin A.
      Software testing and debugging has always been a pervasive problem for software developers. Mobile applications are highly important to our lives and ensuring their correctness is challenging problem. Android is a popular ...
    • Analysis of the execution time of a program and the leakage of sensitive information 

      Patel, Ami
      In the information security field of computer science, the questions of whether a program is safe or unsafe depends heavily on the inputs in which the program may leak sensitive information to an attacker who can observe ...
    • Automated Forensics Analysis Final Report 

      Harper, Grace
      RAIN [2] is a system which has the ability to record and replay system call events at the process level as well as perform dynamic information flow tracking (DIFT) on-demand during replay. This project’s goal is to utilize ...
    • Automated Penetration Testing for PHP Web Applications 

      Zhu, Zixiang
      Penetration Testing emerged in the mid-1960s as an approach to exploit vulnerabilities of possible attacks of a software application by nefarious users. Traditional penetration testing is done manually, which is not only ...
    • Blending Fuzzing and Symbolic Execution for Malware Analysis 

      Amiri, Addison O.
      Malware infections have grown at least five-fold in the past five years. With an increase in IoT devices that are lacking built-in security, this problem is likely to only continue growing. Malware analysis, meanwhile, is ...
    • Cellular baseband security 

      Davis, Andrew (Georgia Institute of Technology, 2012-05-07)
      Memory corruption vulnerabilities have been exploited by attackers to com- promise systems for years. Traditional computing systems have had years of defenses developed for them such as ASLR and DEP. However, these ...
    • Character Eyes: Seeing Language through Character-Level Taggers 

      Marone, Marc
      Character-level models have been used extensively in recent years in NLP tasks as both supplements and replacements for closed-vocabulary token-level word representations. In one popular architecture, character-level RNNs, ...
    • A Conjunctive Middleware Adaptation of Active and Passive RFID Techonologies 

      Rowswell, Brent (Georgia Institute of Technology, 2010-05-11)
      RFID technology has been split into two branches. Active RFID and passive RFID behave in very different manners, yet the theory behind them is practically the same. If the two branches were able to be merged into use under ...
    • A conjunctive middleware adaptation of active and passive RFID techonologies 

      Rowswell, Brent (Georgia Institute of Technology, 2011-05-11)
      RFID technology has been split into two branches. Active RFID and passive RFID behave in very different manners, yet the theory behind them is practically the same. If the two branches were able to be merged into use ...
    • Continuous Input for Gesture Detection from Wrist-Worn Wearables 

      Lal, Anmol
      Smartwatches have been readily available in markets for more than 5 years. However, smartwatches today continue to use input modalities such as touch screens, which are suitable for smartphones, but provide problems when ...