Browsing College of Computing Theses and Dissertations by Title
Now showing items 432-451 of 1156
-
Facilitating American Sign Language learning for hearing parents of deaf children via mobile devices
(Georgia Institute of Technology, 2013-04-02)In the United States, between 90 and 95% of deaf children are born to hearing parents. In most circumstances, the birth of a deaf child is the first experience these parents have with American Sign Language (ASL) and the ... -
Facilitating communication for deaf individuals with mobile technologies
(Georgia Institute of Technology, 2010-03-31)Communication between deaf individuals and hearing individuals can be very difficult. For people who are born deaf, English is often a second language with the first language being American Sign Language (ASL). Very few ... -
Facilitating dynamic network control with software-defined networking
(Georgia Institute of Technology, 2015-07-20)This dissertation starts by realizing that network management is a very complex and error-prone task. The major causes are identified through interviews and systematic analysis of network config- uration data on two large ... -
Facilitating participation in adults with and without vision loss by supporting exhibit motivations through real-time descriptive mediation
(Georgia Institute of Technology, 2014-03-24)Design and evaluation of real-time descriptive mediation (RTDM) for live aquarium exhibits was proposed to support the participation of visitors with and without vision loss. RTDM was developed to address learning, ... -
Facilitating Reliable Autonomy with Human-Robot Interaction
(Georgia Institute of Technology, 2021-04-29)Autonomous robots are increasingly deployed to complex environments in which we cannot predict all possible failure cases a priori. Robustness to failures can be provided by humans enacting the roles of: (1) developers who ... -
Facilitating the authoring of multimedia social problem solving skills instructional modules
(Georgia Institute of Technology, 2012-04-02)Difficulties in social skills are generally considered defining characteristics of High-Functioning Autism (HFA). These difficulties interfere with the educational experiences and quality of life of individuals with HFA, ... -
Facilitating the provision of auxiliary support services for overlay networks
(Georgia Institute of Technology, 2013-06-27)Network virtualization and overlay networks have emerged as powerful tools for improving the flexibility of the Internet. Overlays are used to provide a wide range of useful services in today's networking environment, and ... -
Failure-driven learning as model-based self-redesign
(Georgia Institute of Technology, 1994) -
Fair and diverse data representation in machine learning
(Georgia Institute of Technology, 2020-05-17)The work contains two major lines of research: subset selection and multi-criteria dimensionality reduction with an application to fairness. Subset selection can be applied to a classical problem of optimal design in ... -
Fault localization through execution traces
(Georgia Institute of Technology, 2002) -
Fault propagation analysis of large-scale, networked embedded systems
(Georgia Institute of Technology, 2011-11-16)In safety-critical, networked embedded systems, it is important that the way in which a fault(s) in one component of the system can propagate throughout the system to other components is analyzed correctly. Many real-world ... -
Fault-tolerance on near-term quantum computers and subsystem quantum error correcting codes
(Georgia Institute of Technology, 2020-03-20)Large-scale fault-tolerant quantum computers are supposed to provide exponential speedup over many classical algorithms for solving realistic computationally intensive problems. Given that practical quantum computers are ... -
Faults and fault-tolerance in distributed computing systems : the election problem
(Georgia Institute of Technology, 1994) -
Feminist HCI for real: designing technology in support of a social movement
(Georgia Institute of Technology, 2012-08-20)How are technologies are designed and used tactically by activists? As the HCI community starts to contend with social inequalities, there has been debate about how HCI researchers should address approach this type of ... -
Few-shot learning for dermatological disease diagnosis
(Georgia Institute of Technology, 2019-04-30)In this thesis, we consider the problem of clinical image classification for the purpose of aiding doctors in dermatological disease diagnosis. Diagnosis of dermatological disease conditions from images poses two major ... -
Feynman-Kac Numerical Techniques for Stochastic Optimal Control
(Georgia Institute of Technology, 2021-08-25)Three significant advancements are proposed for improving numerical methods in the solution of forward-backward stochastic differential equations (FBSDEs) appearing in the Feynman-Kac representation of the value function ... -
Finding and remedying high-level security issues in binary code
(Georgia Institute of Technology, 2015-08-20)C++ and Microsoft's Component Object Model (COM) are examples of a high- level lan- guage and development framework that were built on top of the lower-level, primitive lan- guage, C. C was never designed to support concepts ... -
Finding Dense Regions of Rapidly Changing Graphs
(Georgia Institute of Technology, 2022-05-02)Many of today's massive and rapidly changing graphs contain internal structure---hierarchies of locally dense regions---and finding and tracking this structure is key to detecting emerging behavior, exposing internal activity, ... -
Finding race conditions in kernels: The symbolic way and the fuzzy way
(Georgia Institute of Technology, 2020-07-28)The scale and pervasiveness of concurrent software pose challenges for security researchers: race conditions are more prevalent than ever, and the growing software complexity keeps exacerbating the situation -- expanding ... -
Flexible access control for campus and enterprise networks
(Georgia Institute of Technology, 2010-04-07)We consider the problem of designing enterprise network security systems which are easy to manage, robust and flexible. This problem is challenging. Today, most approaches rely on host security, middleboxes, and complex ...