• Login
    Search 
    •   SMARTech Home
    • College of Computing (CoC)
    • College of Computing Theses and Dissertations
    • Search
    •   SMARTech Home
    • College of Computing (CoC)
    • College of Computing Theses and Dissertations
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-10 of 28

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    Evolutionary Markov chains, potential games and optimization under the lens of dynamical systems 

    Panageas, Ioannis (Georgia Institute of Technology, 2016-07-22)
    The aim of this thesis is the analysis of complex systems that appear in different research fields such as evolution, optimization and game theory, i.e., we focus on systems that describe the evolution of species, an ...
    Thumbnail

    Semantic representation learning for discourse processing 

    Ji, Yangfeng (Georgia Institute of Technology, 2016-07-21)
    Discourse processing is to identify coherent relations, such as contrast and causal relation, from well-organized texts. The outcomes from discourse processing can benefit both research and applications in natural language ...
    Thumbnail

    OS support for heterogeneous memory 

    Kannan, Sudarsun (Georgia Institute of Technology, 2016-07-29)
    To address the 'memory wall' problem of future systems, vendors are creating heterogeneous memory structures, supplementing DRAM with on-chip stacked 3D-RAM and high capacity non-volatile memory (NVM). Each of these ...
    Thumbnail

    Preventing exploits against memory corruption vulnerabilities 

    Song, Chengyu (Georgia Institute of Technology, 2016-08-02)
    The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts toward building secure software, software systems of even modest complexity still routinely have serious vulnerabilities. More ...
    Thumbnail

    Grasp selection strategies for robot manipulation using a superquadric-based object representation 

    Huaman, Ana Consuelo (Georgia Institute of Technology, 2016-07-29)
    This thesis presents work on the implementation of a robotic system targeted to perform a set of basic manipulation tasks instructed by a human user. The core motivation on the development of this system was in enabling ...
    Thumbnail

    Simulations of binary black holes in scalar field cosmologies 

    Tallaksen, Katharine Christina (Georgia Institute of Technology, 2016-08-01)
    Numerical relativity allows us to solve Einstein's equations and study astrophysical phenomena we may not be able to observe directly, such as the very early universe. In this work, we examine the effect of scalar field ...
    Thumbnail

    Protecting computer systems through eliminating or analyzing vulnerabilities 

    Lee, Byoungyoung (Georgia Institute of Technology, 2016-08-01)
    There have been tremendous efforts to build fully secure computer systems, but it is not an easy goal. Making a simple mistake introduces a vulnerability, which can critically endanger a whole system's security. This ...
    Thumbnail

    Frame, rods and beads of the edge computing abacus 

    Bhardwaj, Ketan (Georgia Institute of Technology, 2016-11-15)
    Emerging applications enabled by powerful end-user devices and 5G technologies, pose demands for reduced access latencies to web services and dramatic increase in the back-haul network capacity. In response, edge computing---the ...
    Thumbnail

    Enhancing manageability of execution and data for GPGPU computing 

    Goswami, Anshuman (Georgia Institute of Technology, 2016-12-13)
    GPGPUs are useful for many types of compute-intensive workloads from scientific simulations to cloud-focused applications like machine learning and graph analytics. However, unlike CPUs they do not allow for software-controlled ...
    Thumbnail

    Augmenting accountability, security and fraud detection in health data sharing systems 

    Ahmed, Musheer (Georgia Institute of Technology, 2016-04-12)
    The U.S. government has introduced federal incentive programs to accelerate the adoption of meaningful use of electronic health records. These electronic records are expected to improve healthcare quality, reduce costs, ...
    • 1
    • 2
    • 3

    Browse

    All of SMARTechCommunities & CollectionsDatesAuthorsTitlesSubjectsTypesThis CollectionDatesAuthorsTitlesSubjectsTypes

    My SMARTech

    Login

    Discover

    AuthorAhmed, Musheer (1)Bhardwaj, Ketan (1)Brough, David (1)Dayal, Jai (1)Du, Nan (1)Ehrlich, Steven Jeremy (1)Goswami, Anshuman (1)Han, Yi (1)Hossain, Mohammad Moazzem (1)Hu, Liting (1)... View MoreSubjectBig data (2)GPU (2)Healthcare (2)Machine learning (2)Multi-tenancy (2)Security (2)ACID (1)Android app streaming (1)App slices (1)Artificial intelligence (1)... View MoreDate Issued
    2016 (28)
    Has File(s)Yes (28)
    facebook instagram twitter youtube
    • My Account
    • Contact us
    • Directory
    • Campus Map
    • Support/Give
    • Library Accessibility
      • About SMARTech
      • SMARTech Terms of Use
    Georgia Tech Library266 4th Street NW, Atlanta, GA 30332
    404.894.4500
    • Emergency Information
    • Legal and Privacy Information
    • Human Trafficking Notice
    • Accessibility
    • Accountability
    • Accreditation
    • Employment
    © 2020 Georgia Institute of Technology