• Login
    Search 
    •   SMARTech Home
    • College of Computing (CoC)
    • College of Computing Theses and Dissertations
    • Search
    •   SMARTech Home
    • College of Computing (CoC)
    • College of Computing Theses and Dissertations
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-10 of 43

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    Construction and adaptation of AI behaviors in computer games 

    Mehta, Manish (Georgia Institute of Technology, 2011-08-19)
    Computer games are an increasingly popular application for Artificial Intelligence (AI) research, and conversely AI is an increasingly popular selling point for commercial digital games. AI for non playing characters (NPC) ...
    Thumbnail

    Robust and secure monitoring and attribution of malicious behaviors 

    Srivastava, Abhinav (Georgia Institute of Technology, 2011-07-08)
    Worldwide computer systems continue to execute malicious software that degrades the systemsâ performance and consumes network capacity by generating high volumes of unwanted traffic. Network-based detectors can effectively ...
    Thumbnail

    Enabling and supporting the debugging of software failures 

    Clause, James Alexander (Georgia Institute of Technology, 2011-03-21)
    This dissertation evaluates the following thesis statement: Program analysis techniques can enable and support the debugging of failures in widely-used applications by (1) capturing, replaying, and, as much as possible, ...
    Thumbnail

    Turing machine algorithms and studies in quasi-randomness 

    Kalyanasundaram, Subrahmanyam (Georgia Institute of Technology, 2011-11-09)
    Randomness is an invaluable resource in theoretical computer science. However, pure random bits are hard to obtain. Quasi-randomness is a tool that has been widely used in eliminating/reducing the randomness from randomized ...
    Thumbnail

    Mitigating spam using network-level features 

    Ramachandran, Anirudh Vadakkedath (Georgia Institute of Technology, 2011-08-04)
    Spam is an increasing menace in email: 90% of email is spam, and over 90% of spam is sent by botnets---networks of compromised computers under the control of miscreants. In this dissertation, we introduce email spam ...
    Thumbnail

    Scaling solutions to Markov Decision Problems 

    Zang, Peng (Georgia Institute of Technology, 2011-11-14)
    The Markov Decision Problem (MDP) is a widely applied mathematical model useful for describing a wide array of real world decision problems ranging from navigation to scheduling to robotics. Existing methods for solving ...
    Thumbnail

    Nonnegative matrix and tensor factorizations, least squares problems, and applications 

    Kim, Jingu (Georgia Institute of Technology, 2011-11-14)
    Nonnegative matrix factorization (NMF) is a useful dimension reduction method that has been investigated and applied in various areas. NMF is considered for high-dimensional data in which each element has a nonnegative ...
    Thumbnail

    Fault propagation analysis of large-scale, networked embedded systems 

    Pattnaik, Aliva (Georgia Institute of Technology, 2011-11-16)
    In safety-critical, networked embedded systems, it is important that the way in which a fault(s) in one component of the system can propagate throughout the system to other components is analyzed correctly. Many real-world ...
    Thumbnail

    Realizable paths and the NL vs L problem 

    Prasad, Kintali Shiva (Georgia Institute of Technology, 2011-08-29)
    A celebrated theorem of Savitch [Savitch'70] states that NSPACE(S) is contained in DSPACE(S²). In particular, Savitch gave a deterministic algorithm to solve ST-Connectivity (an NL-complete problem) using O({log}²{n}) ...
    Thumbnail

    Understanding a large-scale IPTV network via system logs 

    Qiu, Tongqing (Georgia Institute of Technology, 2011-07-08)
    Recently, there has been a global trend among the telecommunication industry on the rapid deployment of IPTV (Internet Protocol Television) infrastructure and services. While the industry rushes into the IPTV era, the ...
    • 1
    • 2
    • 3
    • 4
    • . . .
    • 5

    Browse

    All of SMARTechCommunities & CollectionsDatesAuthorsTitlesSubjectsTypesThis CollectionDatesAuthorsTitlesSubjectsTypes

    My SMARTech

    Login

    Discover

    AuthorMehendale, Hrushikesh Sanjay (2)Abbasi, Mohammad Hasan (1)Balasubramaniyan, Vijay A. (1)Browne, Daniel C. (1)Chetty, Marshini (1)Clause, James Alexander (1)Cledat, Romain (1)Dillon, Joshua V. (1)Doudalis, Ioannis (1)Gardner, Christina M. (1)... View MoreSubjectComputer science (10)Algorithms (9)Computer architecture (4)Machine learning (4)Robotics (4)Robots (4)Artificial intelligence (3)Virtualization (3)Ad hoc networks (Computer networks) (2)Ad hoc routing (2)... View MoreDate Issued
    2011 (43)
    Has File(s)Yes (43)
    facebook instagram twitter youtube
    • My Account
    • Contact us
    • Directory
    • Campus Map
    • Support/Give
    • Library Accessibility
      • About SMARTech
      • SMARTech Terms of Use
    Georgia Tech Library266 4th Street NW, Atlanta, GA 30332
    404.894.4500
    • Emergency Information
    • Legal and Privacy Information
    • Human Trafficking Notice
    • Accessibility
    • Accountability
    • Accreditation
    • Employment
    © 2020 Georgia Institute of Technology