Now showing items 1101-1120 of 1175

    • Translating database queries to English for enhancing database education 

      Holton, William Jordan (Georgia Institute of Technology, 2015-12-04)
      The thesis of this research is that database queries can be translated to corresponding English descriptions for the use in applications in intelligent tutoring (in particular, problem generation and feedback generation) ...
    • Trust and reputation for formation and evolution of multi-robot teams 

      Pippin, Charles Everett (Georgia Institute of Technology, 2013-11-15)
      Agents in most types of societies use information about potential partners to determine whether to form mutually beneficial partnerships. We can say that when this information is used to decide to form a partnership that ...
    • Trusted data path protecting shared data in virtualized distributed systems 

      Kong, Jiantao (Georgia Institute of Technology, 2010-01-20)
      When sharing data across multiple sites, service applications should not be trusted automatically. Services that are suspected of faulty, erroneous, or malicious behaviors, or that run on systems that may be compromised, ...
    • Tuned and asynchronous stencil kernels for CPU/GPU systems 

      Venkatasubramanian, Sundaresan (Georgia Institute of Technology, 2009-05-18)
      We describe heterogeneous multi-CPU and multi-GPU implementations of Jacobi's iterative method for the 2-D Poisson equation on a structured grid, in both single- and double-precision. Properly tuned, our best implementation ...
    • Turing machine algorithms and studies in quasi-randomness 

      Kalyanasundaram, Subrahmanyam (Georgia Institute of Technology, 2011-11-09)
      Randomness is an invaluable resource in theoretical computer science. However, pure random bits are hard to obtain. Quasi-randomness is a tool that has been widely used in eliminating/reducing the randomness from randomized ...
    • Ubiquitous computing : extending access to mobile data 

      Pinkerton, Michael David (Georgia Institute of Technology, 1997)
    • Ubiquitous Self-Powered Ambient Light Sensing Surfaces 

      Zhang, Dingtian (Georgia Institute of Technology, 2021-05-01)
      Many human activities interfere with ambient light in a predictable and detectable way in that our activities implicitly or explicitly block the paths of ambient light in our environment. This dissertation explores sensing ...
    • Ultra-mobile computing: adapting network protocol and algorithms for smartphones and tablets 

      Sanadhya, Shruti (Georgia Institute of Technology, 2013-11-15)
      Smartphones and tablets have been growing in popularity. These ultra mobile devices bring in new challenges for efficient network operations because of their mobility, resource constraints and richness of features. There ...
    • Uncertainty Quantification in the context of 6D Pose Estimation 

      Boumerdassi, Maya (Georgia Institute of Technology, 2022-05-03)
      We use the work on Deep Evidential Regression that was initially developed in the context of simple regression in R, and extend it to work on higher dimensional groups and manifolds with a Lie algebra structure. We develop ...
    • Understanding a large-scale IPTV network via system logs 

      Qiu, Tongqing (Georgia Institute of Technology, 2011-07-08)
      Recently, there has been a global trend among the telecommunication industry on the rapid deployment of IPTV (Internet Protocol Television) infrastructure and services. While the industry rushes into the IPTV era, the ...
    • Understanding and circumventing censorship on Chinese social media 

      Hiruncharoenvate, Chaya (Georgia Institute of Technology, 2017-04-05)
      Chinese Internet users not only face the most technologically advanced filtering system in the world, the Great Firewall of China, but also are under the watchful eyes of the repressive government that controls every layer ...
    • Understanding and defending against internet infrastructures supporting cybecrime operations 

      Konte, Maria (Georgia Institute of Technology, 2015-11-16)
      Today's cybercriminals must carefully manage their network resources to evade detection and maintain profitable businesses. For example, a rogue online enterprise has to have multiple technical and business components ...
    • Understanding and protecting closed-source systems through dynamic analysis 

      Dolan-Gavitt, Brendan (Georgia Institute of Technology, 2014-08-22)
      In this dissertation, we focus on dynamic analyses that examine the data handled by programs and operating systems in order to divine the undocumented constraints and implementation details that determine their behavior ...
    • Understanding DNS-based criminal infrastructure for informing takedowns 

      Nadji, Yacin Ibrahim (Georgia Institute of Technology, 2015-08-18)
      Botnets are a pervasive threat to the Internet and its inhabitants. A botnet is a collection of infected machines that receive commands from the botmaster, a person, group or nation- state, to perform malicious actions. ...
    • Understanding Modern Techniques in Optimization: Frank-Wolfe, Nesterov's Momentum, and Polyak's Momentum 

      Wang, Jun-Kun (Georgia Institute of Technology, 2021-04-26)
      Optimization is essential in machine learning, statistics, and data science. Among the first-order optimization algorithms, the popular ones include the Frank-Wolfe method, Nesterov's accelerated methods, and Polyak's ...
    • Understanding social media credibility 

      Mitra, Tanushree (Georgia Institute of Technology, 2017-07-12)
      Today, social media provide the means by which billions of people experience news and events happening around the world. We hear about breaking news from people we “follow” on Twitter. We engage in discussions about unfolding ...
    • Understanding the motion of a human state in video classification 

      Castro, Daniel Alejandro (Georgia Institute of Technology, 2019-03-29)
      For the last 50 years we have studied the correspondence between human motion and the action or goal they are attempting to accomplish. Humans themselves subconsciously learn subtle cues about other individuals that gives ...
    • Understanding the social navigation user experience 

      Goecks, Jeremy (Georgia Institute of Technology, 2009-07-06)
      A social navigation system collects data from its users--its community--about what they are doing, their opinions, and their decisions, aggregates this data, and provides the aggregated data--community data--back to ...
    • Understanding user engagement in immersive and interactive stories 

      Dow, Steven P. (Georgia Institute of Technology, 2008-09-23)
      Popular science fiction often proffers the Holodeck vision for future immersive media: a seamless and transparent interface connecting users to a virtual world where they transform into a story character and influence ...
    • Understanding visual analysis processes from user interactions using visual analytics 

      Han, Yi (Georgia Institute of Technology, 2016-11-15)
      Understanding the visual analysis process taken by people when using a visualization application can help its designers improve the application. This goal is typically achieved by observing usage sessions. Unfortunately, ...