Browsing by Department "Computer Science and Engineering"
Now showing items 41-60 of 705
-
(2019-11-19)The recent developments in machine learning have shown its applicability in numerous real-world applications. However, building an optimal machine learning pipeline requires considerable knowledge and experience in data ...
-
(2022-12-08)Deep neural networks (DNNs) are resource-intensive and call for efficient compression methods to reduce the resource cost. For a composite DNN with various modules, the optimal resource allocation among these modules remains ...
-
(2021-04-26)Recent research has shown Deep Neural Networks (DNNs) to be vulnerable to adversarial examples that induce desired misclassifications in the models. Such risks impede the application of machine learning in security-sensitive ...
-
(2022-07-25)Speech privacy is a lasting concern because of the many scenarios in which sensitive information is spoken out loud. Such scenarios can include discussion of business secrets, medical information, banking information, or ...
-
(2014-05-28)The persistent evolution of malware intrusion brings great challenges to current anti-malware industry. First, the traditional signature-based detection and prevention schemes produce outgrown signature databases for each ...
-
(2012-12-06)The current education systems in elementary schools are usually using traditional teaching methods such as paper and pencil or drawing on the board. The benefit of paper and pencil is their ease of use. Researchers have ...
-
(2014-12-15)Recent popular social services (e.g., Foursquare, Twitter, Instagram) are creating a comprehensive geo-social overlay of the planet through geo-located posts, images, and other user-generated content. These public, voluntarily ...
-
(2016-01-04)The goal of this work is to study the geographic propagation patterns of Twitters' hashtags. In order to analyze the hashtags' diffusion patterns, we look at the globe as a graph consists of a large grid of locations and ...
-
(2016-08-05)This dissertation presents a modeling framework for the intermediate data generated by external-memory sorting algorithms (e.g., merge sort, bucket sort, hash sort, replacement selection) that are well-known, yet without ...
-
(2014-06-05)Benefiting from innovatory techniques, two communication platforms (online social networking (OSN) platforms and smartphone platforms) have emerged and been widely used in the last few years. However, cybercriminals have ...
-
TnSeq is a genetic method used to evaluate the essentiality of genes in bacteria, such as Mycobacterium tuberculosis. It uses random insertions by the Himar1 transposon and high throughput sequencing to determine the most ...
-
(2018-09-12)Anomaly detection has become one of the most important research areas due to its wide range of use such as abnormal behavior detection in network traffic, disease detection in MRI images, and fraud detection in credit card ...
-
(2022-12-09)Anomaly detection, which aims to identify unusual or uncommon behaviors in data, has many real-world applications. While numerous machine learning algorithms have been developed for anomaly detection, we often still need ...
-
(2021-10-22)Identifying anomalies with complex patterns is different from the conventional anomaly detection problem. Firstly, for cross-modal anomaly detection problems, a large portion of data instances within a multi-modal context ...
-
(2016-04-22)Navigation is a fundamental task for mobile robots in applications such as exploration, surveillance, and search and rescue. The task involves solving the simultaneous localization and mapping (SLAM) problem, where a map ...
-
(2017-05-09)With advances in technology, future multicore systems scaled to 100s and 1000s of cores/accelerators are being touted as an effective solution for extracting huge performance gains using parallel programming paradigms. ...
-
(2021-05-03)There is no world without energy. Dependence on energy continues to dominate everything that we do. It is known that any failure in the production of energy can directly affect thousands of lives. Because of this, data is ...
-
(2019-10-18)Modern processors rely heavily on speculation to provide performance. Techniques such as branch prediction, caching, prefetching, memory dependence prediction etc. use features from recent program behavior to predict the ...
-
(2020-04-27)Motion planning is an important problem in robotics which addresses the question of how to transition an actor between states in an environment subject to obstacles, kinematic, and other constraints. Exact motion planning ...
-
(2020-11-16)Children with speech sound disorders typically improve pronunciation quality by undergoing speech therapy, which must be delivered frequently and with high intensity to be effective. As such, clinic sessions are supplemented ...