DSpace Repository

Browsing by Title

Browsing by Title

Sort by: Order: Results:

  • Chin W N (1992-11-01)
    Abstract not available.
  • HUYNH, Bach Khoa; JU, Lei; ROYCHOUDHURY, Abhik (2010-10-28)
    Caches are widely used in modern computer systems to bridge the increasing gap between processor speed and memory access time. On the other hand, the presence of caches, especially data caches, complicates the static worst ...
  • Baohua GU; Feifang HU; Huan LIU (2000-06-01)
    Large data sets are becoming obstacles for efficient data mining. Sampling, as a well-established technique in statistics, is desired to play its role in overcoming the obstacles. Statistical community has provided plenty ...
  • Chattopadhyay, Sudipta; Roychoudhury, Abhik (2011-05-20)
    Abstractâ Hard real time systems require absolute guarantees in their execution times. Subsequently, worst case execution time (WCET) has increasingly become an important problem. However, performance enhancing features ...
  • JU, Lei; ROYCHOUDHURY, Abhik; CHAKRABORTY, Samarjit (2007-10-23)
    Message Sequence Charts (MSCs) are widely used for describing interaction scenarios between the components of a distributed system. Consequently, worst-case response time estimation and schedulability analysis of MSC-based ...
  • Aravind Srinivasan (1997-11-01)
    Abstract not available.
  • LE, Thuy Ngoc; BAO, Zhifeng; LING, Tok Wang (2014-06-24)
    XML keyword search has attracted a lot of interests with typical search based on lowest common ancestor (LCA). However, in this paper, we show that meaningful answers can be found beyond LCA and should be independent from ...
  • FRANKLIN, Johanna N. Y.; STEPHAN, Frank (2008-03-04)
    In this paper, we give several characterizations of Schnorr trivial sets, including a new lowness notion for Schnorr triviality based on truth-table reducibility. These characterizations enable us to see not only that some ...
  • Sandeep KUMAR (2003-10-01)
    In this paper we examine the issues related to securely connecting an ad hoc network to the Internet. We propose a solution that uses a gateway to connect the ad hoc network to the Internet. This gateway serves as an address ...
  • Sandeep KUMAR (2004-08-01)
    In this paper we motivate the need for adapting applications to security changes in their environment of operation. By first creating simple services and protocols that are adaptable, we can compose them to build more ...
  • NGUYEN, Manh-Dung; DONG, Naipeng; ROYCHOUDHURY, Abhik (2017-01-25)
    Security is a big concern in widely adopting security critical systems, such as Unmanned Aerial Vehicles (UAV). To ensure security of a system, the rst step is to identify the required security properties as well as the ...
  • Qi HE; Tok Wang LING (2004-09-01)
    In this paper, we adopt a semantic rich model, Object-Relationship-Attribute model for Semi-Structured data (or ORASS) to represent XML schemas. A challenge in XML schema integration comes from the hierarchical structure ...
  • Dong Jing SONG; Jing SUN; Hai WANG (2002-03-01)
    The diversity of various formal specification techniques and the need for their effective combinations requires an extensible and integrated supporting environment. The Web provides infrastructure for such an environment ...
  • LEE, Wee Sun; ZHANG, Xinhua; TEH, Yee Whye (2006-03-14)
    We propose a framework for semi-supervised learning in reproducing kernel Hilbert spaces using local invariances that explicitly characterize the behavior of the target function around both labeled and unlabeled data ...
  • SONG, Yi; KARRAS, Panagiotis; XIAO, Qian; BRESSAN, Stephane (2012-03-30)
    The publication of social network data presents opportunities for data mining and analytics for strategic public, commercial and academic applications. Yet the publication of social network data entails a privacy threat ...
  • H Zhang; Sam Y Sung (1993-09-01)
    Abstract not available.
  • Gary Tan; Teo Y M (1993-08-01)
    Abstract not available.
  • WANG, Xiaoli; DING, Xiaofeng; TUNG, Anthony K.H.; YING, Shanshan; JIN, Hai (2010-06-29)
    Graphs are popular models for representing complex structured data and similarity search for graphs has become a fundamental research problem. Many techniques have been proposed to support similarity search on graphs based ...
  • LO, David; KHOO, Siau-Cheng (2006-08-31)
    Improper management of software evolution, compounded by imprecise, and changing requirements and short time to market requirement, commonly leads to a lack of up-to-date specification. This can result in software that is ...
  • QI, Dawei; YI, Jooyong; ROYCHOUDHURY, Abhik (2012-03-30)
    Incorrect program changes including regression bugs, incorrect bugfixes, incorrect feature updates are pervasive in software. These incorrect program changes affect software quality and are difficult to detect/correct. In ...

Search DSpace

Browse

My Account