Browsing College of Computing Theses and Dissertations by Title
Now showing items 837-856 of 1071
-
Seamless mobility in ubiquitous computing environments
(Georgia Institute of Technology, 2008-07-09)Nominally, one can expect any user of modern technology to at least carry a handheld device of the class of an iPAQ (perhaps in the form of a cellphone). The availability of technology in the environment (home, office, ... -
Search-based collision-free motion planning for robotic sculpting
(Georgia Institute of Technology, 2020-07-28)In this work, I explore the task of robot sculpting. I propose a search-based planning algorithm to solve the problem of sculpting by material removal with a multi-axis manipulator. I generate collision free trajectories ... -
Secure and high-performance big-data systems in the cloud
(Georgia Institute of Technology, 2014-05-16)Cloud computing and big data technology continue to revolutionize how computing and data analysis are delivered today and in the future. To store and process the fast-changing big data, various scalable systems (e.g. ... -
Secure database modeling and design
(Georgia Institute of Technology, 1999-05) -
Secure Management of Networked Storage Services: Models and Techniques
(Georgia Institute of Technology, 2007-05-03)With continued advances in computing, the amount of digital data continues to grow at an astounding rate. This has strained enterprise infrastructures and triggered development of service oriented architectures. In recent ... -
Secure Store : A Secure Distributed Storage Service
(Georgia Institute of Technology, 2004-08-12)As computers become pervasive in environments that include the home and community, new applications are emerging that will create and manipulate sensitive and private information. These applications span systems ranging ... -
Securing Intel SGX against side-channel attacks via load-time synthesis
(Georgia Institute of Technology, 2019-11-12)In response to the growing need for securing user data in the cloud, recent Intel processors have supported a new feature, Intel Software Guard Extensions (SGX). SGX allows a program to execute in isolation from the rest ... -
Securing software systems by preventing information leaks
(Georgia Institute of Technology, 2017-07-31)Foundational software systems such as operating systems and web servers are implemented in unsafe programming languages for efficiency, and system designers often prioritize performance over security. Hence, these systems ... -
Security and protection architectures for large-scale content distribution
(Georgia Institute of Technology, 2002-12) -
Security Architecture and Protocols for Overlay Network Services
(Georgia Institute of Technology, 2007-05-16)Conventional wisdom suggests that in order to build a secure system, security must be an integral component in the system design. However, cost considerations drive most system designers to channel their efforts on the ... -
Segmental discriminative analysis for American Sign Language recognition and verification
(Georgia Institute of Technology, 2010-04-06)This dissertation presents segmental discriminative analysis techniques for American Sign Language (ASL) recognition and verification. ASL recognition is a sequence classification problem. One of the most successful ... -
Self-improvment through self-understanding : model-based reflection for agent adaptation
(Georgia Institute of Technology, 2001) -
Semantic mapping for service robots: building and using maps for mobile manipulators in semi-structured environments
(Georgia Institute of Technology, 2015-04-08)Although much progress has been made in the field of robotic mapping, many challenges remain including: efficient semantic segmentation using RGB-D sensors, map representations that include complex features (structures and ... -
Semantic representation learning for discourse processing
(Georgia Institute of Technology, 2016-07-21)Discourse processing is to identify coherent relations, such as contrast and causal relation, from well-organized texts. The outcomes from discourse processing can benefit both research and applications in natural language ... -
Semantic view re-creation for the secure monitoring of virtual machines
(Georgia Institute of Technology, 2012-06-28)The insecurity of modern-day software has created the need for security monitoring applications. Two serious deficiencies are commonly found in these applications. First, the absence of isolation from the system being ... -
Semi-automatic fault localization
(Georgia Institute of Technology, 2008-01-17)One of the most expensive and time-consuming components of the debugging process is locating the errors or faults. To locate faults, developers must identify statements involved in failures and select suspicious ... -
Separation and Analysis of Multichannel Signals
(Georgia Institute of Technology, 2007-10-09)Music recordings contain the mixed contribution of multiple overlapping instruments. In order to better understand the music, it would be beneficial to understand each instrument independently. This thesis focuses on ... -
Set-Based User Interaction
(Georgia Institute of Technology, 2005-07-13)This work demonstrates specific ways that the design of computer user interfaces can influence how individuals structure the problem solving process. In particular, an observational study of expert users of an image ... -
Shared resource management for efficient heterogeneous computing
(Georgia Institute of Technology, 2013-08-01)The demand for heterogeneous computing, because of its performance and energy efficiency, has made on-chip heterogeneous chip multi-processors (HCMP) become the mainstream computing platform, as the recent trend shows in ... -
Shared state management for time-sensitive distributed applications
(Georgia Institute of Technology, 2001)