Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 12 |
Descriptor
Computer Science | 12 |
Computer System Design | 12 |
Information Technology | 8 |
Computer Security | 5 |
Computer Software | 5 |
Programming | 5 |
Internet | 3 |
Classification | 2 |
Coding | 2 |
Computer Interfaces | 2 |
Computer Mediated… | 2 |
More ▼ |
Source
ProQuest LLC | 12 |
Author
Publication Type
Dissertations/Theses -… | 12 |
Education Level
Higher Education | 3 |
Adult Education | 2 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Loh, Matthew – ProQuest LLC, 2013
The scalability of CMOS technology has driven computation into a diverse range of applications across the power consumption, performance and size spectra. Communication is a necessary adjunct to computation, and whether this is to push data from node-to-node in a high-performance computing cluster or from the receiver of wireless link to a neural…
Descriptors: Power Technology, Scaling, Computer Science, Computation
Deng, Houtao – ProQuest LLC, 2011
This dissertation transforms a set of system complexity reduction problems to feature selection problems. Three systems are considered: classification based on association rules, network structure learning, and time series classification. Furthermore, two variable importance measures are proposed to reduce the feature selection bias in tree…
Descriptors: Classification, Mathematics, Programming, Artificial Intelligence
Nunnery, Christopher Edward – ProQuest LLC, 2011
Botnets remain a potent threat due to evolving modern architectures, inadequate remediation methods, and inaccurate measurement techniques. In response, this research exposes the architectures and operations of two advanced botnets, techniques to enumerate infected hosts, and pursues the scientific refinement of infected-host enumeration data by…
Descriptors: Measurement Techniques, Computer Science, Computer Security, Information Technology
Pacharintanakul, Peera – ProQuest LLC, 2010
As the Internet moves towards a three-layer architecture consisting of overlay networks on top of the IP network layer on top of WDM-based physical networks, incorporating the interaction between and among network layers is crucial for efficient and effective implementation of survivability. This dissertation has four major foci as follows:…
Descriptors: Computer System Design, Internet, Efficiency, Computer Security
Shaw, Bilal A. – ProQuest LLC, 2010
Quantum error-correcting codes have been the cornerstone of research in quantum information science (QIS) for more than a decade. Without their conception, quantum computers would be a footnote in the history of science. When researchers embraced the idea that we live in a world where the effects of a noisy environment cannot completely be…
Descriptors: Information Science, Programming, Information Theory, Computer Science
Golden, Elspeth – ProQuest LLC, 2010
In spite of the goodwill and best efforts of software engineers and usability professionals, systems continue to be built and released with glaring usability flaws that are costly and difficult to fix after the system has been built. Although user interface (UI) designers, be they usability or design experts, communicate usability requirements to…
Descriptors: Computer Software, Computer Interfaces, Computer System Design, Usability
Watters, Shana Kay – ProQuest LLC, 2010
For over 30 years, reference resolution, the process of determining what a noun phrase including a pronoun refers to in written and spoken language, has been an important and on-going area of research. Most existing pronominal reference resolution algorithms and systems are designed to use syntactic information and surface features (e.g. number…
Descriptors: Semantics, Verbs, Nouns, Computer Science
Grier, Christopher L. – ProQuest LLC, 2009
Web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems using browser-based attacks. Efforts that retrofit existing browsers have had limited success since modern browsers are not designed to withstand attack. To enable more secure web browsing, we design and implement new web browsers from the ground…
Descriptors: Expertise, Metric System, Internet, Web Browsers
Mowafi, Yaser Abdallah – ProQuest LLC, 2009
Existing research on context and context awareness has broadly focused on the technical aspects of context acquisition and interpretation of users' surroundings, also called physical or sensor-based context. Such an approach has lacked from reconciling the perception of real-world context exhibited by humans, also known as user context, and…
Descriptors: Decision Support Systems, Computer System Design, Computer Mediated Communication, Data
Goecks, Jeremy – ProQuest LLC, 2009
A social navigation system collects data from its users--its community--about what they are doing, their opinions, and their decisions, aggregates this data, and provides the aggregated data--community data--back to individuals so that they can use it to guide behavior and decisions. Social navigation systems empower users with the ability to…
Descriptors: Navigation (Information Systems), Social Networks, Computer System Design, Usability
Poole, Erika Shehan – ProQuest LLC, 2010
Visions of future computing in residential settings often come with assumptions of seamless, well-functioning, properly configured devices and network connectivity. In the near term, however, processes of setup, maintenance, and troubleshooting are fraught with difficulties; householders regularly report these tasks as confusing, frustrating, and…
Descriptors: Futures (of Society), Influence of Technology, Science and Society, Computers
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis