Now showing items 21-31 of 31

    • Jablonski, Karl Adam (Texas A&M University, 2013-02-22)
      Currently, some methods for implementing facial animation systems are based on a direct subphonemic mapping of speech acoustics onto orofacial motion. Although these systems provide all of the necessary components for the ...
    • Thadhlani, Ajaykumar A (Texas A&M University, 2001)
      With increasing operating speed and shrinking technology, timing defects in integrated circuits are becoming increasingly important. The well established stuck-at-fault model is not sufficient because it is a static fault ...
    • Beaudoin, Jacob Michael (Texas A&M University, 2013-02-22)
      In this paper we describe a method for simulating motion of realistically complex plants interactively. We use a precomputation stage to generate the plant structure, along with a set of simulation levels of detail. The ...
    • Thoppae, Mothi M (Texas A&M University, 2002)
      The technique of predicting branch directions before execution is defined as branch prediction. Conditional branches pose a hazard to the instruction flow since the instruction that executes after the branch is not known. ...
    • Vanfickell, Jason Michael (Texas A&M University, 2013-02-22)
      Proper testing of manufactured digital circuits is critical to ensuring the number of defective parts is minimized. Automated test pattern generation tools are created in order to produce test patterns that can be applied ...
    • Koh, T Pinn Ronnie (Texas A&M University, 1999)
      This research is a study of multilevel logic optimization based on a functional approach using ordered binary decision diagrams (OBDD). Compatibility relationships between internal nodes in a circuit are used in conjunction ...
    • El-Haj Mahmoud, Samer Ahmad (Texas A&M University, 2002)
      System log files are valuable assets in detecting security violations and malicious attacks as well as in holding users responsible for their actions. However, the huge size of these logs makes it impractical for system ...
    • Doddapaneni, Krishnamohan (Texas A&M University, 2001)
      This thesis presents the design of Multiprotocol Label Switching Virtual Private Networks(MPLS VPN). MPLS VPNs are true peer models, which perform traffic separation at Layer 3, through the implementation of separate IP ...
    • Sandhu, Bharatinder Singh (Texas A&M University, 2013-02-22)
      Visualization is the process of mapping numerical values onto perceptual dimensions. Visualization is a way to show results in a manner that is intuitive to humans. Pictures and animations presented properly can be easier ...
    • Roy, Siddhartha (Texas A&M University, 2001)
      Effective and efficient requirements negotiation, a key factor in the success of large software projects, is difficult when combining input from geographically distributed experts and reaching consensus from different ...
    • Ramanathan, Anu (Texas A&M University, 2002)
      The increasing popularity of web-based applications has led to several critical services being provided over the Internet. This has made it imperative to monitor the network traffic so as to prevent malicious attackers ...