Browsing College of Computing Theses and Dissertations by Title
Now showing items 767-786 of 1071
-
Q-Fabric: System Support for Continuous Online Quality Management
(Georgia Institute of Technology, 2004-04-12)The explosive growth in networked systems and applications and the increase in device capabilities (as evidenced by the availability of inexpensive multimedia devices) enable novel complex distributed applications, including ... -
Quadric-of-revolution (quador) beams and their applications to lattice structures
(Georgia Institute of Technology, 2020-07-22)Additive Manufacturing (AM) or 3D printing presents the potential to fabricate parts with novel mechanical properties by allowing control over the internal microstructure of these parts. Lattices used for designing these ... -
Quality-consciousness in Large-scale Content Distribution in the Internet
(Georgia Institute of Technology, 2004-07-23)Content distribution is the primary function of the Internet today. Technologies like multicast and peer-to-peer networks hold the potential to serve content to large populations in a scalable manner. While ... -
RADAR: compiler and architecture supported intrusion prevention, detection, analysis and recovery
(Georgia Institute of Technology, 2006-08-25)In this dissertation, we propose RADAR - compileR and micro-Architecture supported intrusion prevention, Detection, Analysis and Recovery. RADAR is an infrastructure to help prevent, detect and even recover from attacks ... -
A re-usable code generator for prime 50-series computers
(Georgia Institute of Technology, 1981) -
Real time detection of traffic signs on mobile device
(Georgia Institute of Technology, 2019-12-09)In this work we propose a new approach to the object detection problem using Deep Neural Network, in the context of traffic sign detection. Our approach simplifies the detection head complexity by making the requirement ... -
Real-time content aware resizing of video
(Georgia Institute of Technology, 2008-11-19)In this thesis, we propose a new method for content-aware resizing of videos in real- time. Our approach consists of two steps. First, we compute a set of non-salient pixels in linear time which, when being removed or ... -
Real-time correction of operating system command language errors
(Georgia Institute of Technology, 1981) -
Real-time distributed simulation analysis : an application of temporal database and simulation systems research
(Georgia Institute of Technology, 2002-05) -
Real-time multipushdown and multicounter automata networks and hierarchies
(Georgia Institute of Technology, 1975) -
Realizable paths and the NL vs L problem
(Georgia Institute of Technology, 2011-08-29)A celebrated theorem of Savitch [Savitch'70] states that NSPACE(S) is contained in DSPACE(S²). In particular, Savitch gave a deterministic algorithm to solve ST-Connectivity (an NL-complete problem) using O({log}²{n}) ... -
Reasoning about programs in statistically modeled first-order environments
(Georgia Institute of Technology, 2020-12-01)The objects of study in this dissertation are programs and algorithms that reason about programs using their syntactic structure. Such algorithms, referred to as program verification algorithms in the literature, are ... -
Recognition and isomorphism algorithms for circular permutation graphs
(Georgia Institute of Technology, 1983) -
Reconciling data privacy and utility in the era of big data
(Georgia Institute of Technology, 2019-04-08)The widespread use of internet-connected mobile devices, internet of things(IoT) and cloud computing has enabled a large scale collection of personal data, including user profiles, daily activities, locations, photos and ... -
Reconfigurable multiprocessor operating system kernel for high performance computing
(Georgia Institute of Technology, 1994-12) -
Recursive descent optimization of structured loops
(Georgia Institute of Technology, 1984) -
Recursively constructed graph families : membership and linear algorithms
(Georgia Institute of Technology, 1988) -
Redesign of distributed relational databases
(Georgia Institute of Technology, 1992-12) -
Reinforcing the weakest link in cyber security: securing systems and software against attacks targeting unwary users
(Georgia Institute of Technology, 2013-06-27)Unwary computer users are often blamed as the weakest link on the security chain, for unknowingly facilitating incoming cyber attacks and jeopardizing the efforts to secure systems and networks. However, in my opinion, ... -
Relaxing coherence for modern learning applications
(Georgia Institute of Technology, 2017-01-05)The main objective of this research is to efficiently execute learning (model training) of modern machine learning (ML) applications. The recent explosion in data has led to the emergence of data-intensive ML applications ...