Now showing items 816-835 of 1175

    • Practical Systems For Strengthening And Weakening Binary Analysis Frameworks 

      Jung, Jinho (Georgia Institute of Technology, 2021-04-13)
      Binary analysis detects software vulnerability. Cutting-edge analysis techniques can quickly and automatically explore the internals of a program and report any discovered problems. Therefore, developers commonly use various ...
    • Practical water animation using physics and image based methods 

      Wang, Huamin (Georgia Institute of Technology, 2009-08-21)
      Generating natural phenomena in a virtual world has a number of practical applications. Thanks to the rich and complicated details in the real world, the goal of realistically and efficiently reproducing natural phenomena ...
    • A pre-scheduler and management model for a class of computer-user systems 

      Hoffman, John Marion (Georgia Institute of Technology, 1971-05)
    • Prediction of secondary structures for large RNA molecules 

      Mathuriya, Amrita (Georgia Institute of Technology, 2009-01-12)
      The prediction of correct secondary structures of large RNAs is one of the unsolved challenges of computational molecular biology. Among the major obstacles is the fact that accurate calculations scale as O(n⁴), so the ...
    • Predictive models for online human activities 

      Yang, Shuang-Hong (Georgia Institute of Technology, 2012-04-04)
      The availability and scale of user generated data in online systems raises tremendous challenges and opportunities to analytic study of human activities. Effective modeling of online human activities is not only fundamental ...
    • Preventing abuse of online communities 

      Irani, Danesh (Georgia Institute of Technology, 2012-07-02)
      Online communities are growing at a phenomenal rate and with the large number of users these communities contain, attackers are drawn to exploit these users. Denial of information (DoI) attacks and information leakage ...
    • Preventing exploits against memory corruption vulnerabilities 

      Song, Chengyu (Georgia Institute of Technology, 2016-08-02)
      The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts toward building secure software, software systems of even modest complexity still routinely have serious vulnerabilities. More ...
    • The primary logics of programming languages 

      Winner, Robert Ian (Georgia Institute of Technology, 1975-08)
    • Privacy and Proportionality 

      Iachello, Giovanni (Georgia Institute of Technology, 2006-04-03)
      Over the past several years, the press, trade publications and academic literature have reported with increasing frequency on the social concerns caused by ubiquitous computingInformation Technology (IT) embedded in ...
    • Privacy-aware big data systems and services in the Internet of Things era 

      Yigitoglu, Emre (Georgia Institute of Technology, 2018-04-16)
      The Internet of Things (IoT) has been considered the next industrial revolution. Connecting physical objects to the Internet and equipping massive sensor generated data with the powerful data analytics capabilities, the ...
    • Privacy-Preserving Data Collection and Sharing in Modern Mobile Internet Systems 

      Gursoy, Mehmet Emre (Georgia Institute of Technology, 2020-05-17)
      With the ubiquity and widespread use of mobile devices such as laptops, smartphones, smartwatches, and IoT devices, large volumes of user data are generated and recorded. While there is great value in collecting, analyzing ...
    • Probabilistic boolean logic, arithmetic and architectures 

      Chakrapani, Lakshmi Narasimhan (Georgia Institute of Technology, 2008-08-25)
      Parameter variations, noise susceptibility, and increasing energy dissipation of CMOS devices have been recognized as major challenges in circuit and micro-architecture design in the nanometer regime. Among ...
    • Probabilistic techniques for analyzing sampling algorithms and the dynamics of lattice models 

      Fahrbach, Matthew (Georgia Institute of Technology, 2019-11-11)
      Statistical mechanics bridges the fields of physics and probability theory, providing critical insights into both disciplines. Statistical physics models capture key features of macroscopic phenomena and consist of a set ...
    • Probabilistic topological maps 

      Ranganathan, Ananth (Georgia Institute of Technology, 2008-03-04)
      Topological maps are light-weight, graphical representations of environments that are scalable and amenable to symbolic manipulation. Thus, they are well- suited for basic robot navigation applications, and also provide ...
    • A Probabilistic-Based Framework for INFOSEC Alert Correlation 

      Qin, Xinzhou (Georgia Institute of Technology, 2005-07-15)
      Deploying a large number of information security (INFOSEC) systems can provide in-depth protection for systems and networks. However, the sheer number of security alerts output by security sensors can overwhelm security ...
    • Problem solving in open worlds: a case study in design 

      Hinrichs, Thomas Ryland (Georgia Institute of Technology, 1991)
    • Procedural Reduction Maps 

      Van Horn, R. Brooks, III (Georgia Institute of Technology, 2007-01-16)
      Procedural textures and image textures are commonplace in graphics today, finding uses in such places as animated movies and video games. Unlike image texture maps, procedural textures typically suffer from minification ...
    • Process-structure linkages with materials knowledge systems 

      Brough, David (Georgia Institute of Technology, 2016-09-09)
      The search for optimal manufacturing process routes that results in the combination of desired properties for any application is a highly dimensional optimization problem due to the hierarchical nature of material structure. ...
    • Program analysis to support quality assurance techniques for web applications 

      Halfond, William G. J. (Georgia Institute of Technology, 2010-01-20)
      As web applications occupy an increasingly important role in the day-to-day lives of millions of people, testing and analysis techniques that ensure that these applications function with a high level of quality are becoming ...
    • A programmatic interpretation of combinatory logics 

      Baralt-Torrijos, Jorge (Georgia Institute of Technology, 1973-08)