mirage   mirage   mirage

Browsing School of Electrical Engineering and Computer Science by Title

DSpace/Manakin Repository

Browsing School of Electrical Engineering and Computer Science by Title

Sort by: Order: Results:

  • Singh, Harshman ([S.l. : s.n.], 2004)
    Timing attacks enable an attacker to extract secret information from a cryptosystem by observing timing differences with respect to different inputs given to an encryption or decryption algorithm. Werner Schindler has pr ...
  • Oregon State University. Dept. of Computer Science; Zhang, Eugene; Lin, Zhongzang; Yeh, Harry Hsiu-jen; Laramee, Robert S. (Corvallis, OR : Oregon State University, Dept. of Computer Science, 2007)
    Visualizing asymmetric tensors is an important task in understanding fluid dynamics. In this paper, we describe topological analysis and visualization techniques for asymmetric tensor fields on surfaces based on analyzin ...
  • Oregon State University. Dept. of Computer Science; Zhang, Eugene; Yeh, Harry Hsiu Jen; Lin, Zhongzang; Laramee, Robert S. (Corvallis, OR : Oregon State University, Dept. of Computer Science, 2007)
    Most existing flow visualization techniques focus on the analysis and visualization of the vector field that describes the flow. In this paper, we employ a rather different approach by performing tensor field analysis an ...
  • Chen, Guoning (2009-06-24)
    Analysis, visualization, and design of vector fields on surfaces have a wide variety of major applications in both scientific visualization and computer graphics. On the one hand, analysis and visualization of vector fie ...
  • Oregon State University. Dept. of Computer Science; Youn, Jong-Hoon; Bose, Bella (Corvallis, OR : Oregon State University, Dept. of Computer Science, 2002-04-17)
    In this paper, based on coding theory concepts, new time scheduling algorithms for multihop packet radio networks are described. Each mobile host is assigned a word from an appropriate constant weight code of length n, d ...
  • Kulesza, Todd (2009-12-02)
    The results of a machine learning from user behavior can be thought of as a program, and like all programs, it may need to be debugged. Providing ways for the user to debug it matters because without the ability to fix e ...
  • Oregon State University. Dept. of Computer Science; Stumpf, Simone; Rajaram, Vidya; Li, Lida; Burnett, Margaret, 1949-; Dietterich, Thomas Glen; Sullivan, Erin; Drummond, Russell; Herlocker, Jonathan Lee (Corvallis, OR : Oregon State University, Dept. of Computer Science, 2006-10-02)
    There has been little research into how end users might be able to communicate advice to machine learning systems. If this resource--the users themselves--could somehow work hand-in-hand with machine learning systems, th ...
  • Athreya, Balaji (2013-12-16)
    Software maintenance tasks often require finding information within existing code, which is time-consuming and difficult even for professional programmers. For example, programmers may need to know what code implements c ...
  • Jensen, Carlos; Sarkar, Chandan; Jensen, Christian; Potts, Colin (Symposium on Usable Privacy and Security (SOUPS 2007), 2007-07-18)
    In this paper we introduce the iWatch web crawler, a tool designed to catalogue and analyze online data practices and the use of privacy related indicators and technologies. Our goal in developing iWatch was to make poss ...
  • Dietterich, Thomas Glen; Ashenfelter, Adam J.; Bulatov, Yaroslav (2004)
    Conditional Random Fields (CRFs; Lafferty, McCallum, & Pereira, 2001) provide a flexible and powerful model for learning to assign labels to elements of sequences in such applications as part-of-speech tagging, text-to ...
  • Park, Sangmoon; Keszler, Douglas A.; Valencia, Melinda M.; Hoffman, Randy L.; Bender, Jeffrey P.; Wager, John F. (American Institute of Physics, 2002-01-10)
    p-type conducting films of α- BaCu₂S₂ have been deposited onto glass and KBr substrates, yielding a conductivity of 17 S/cm and a Hall mobility of 3.5 cm²/Vs. For a 430-nm-thick film, the optical transparency approaches ...
  • Oregon State University. Dept. of Computer Science; Zubek, Valentina Bayer; Dietterich, Thomas Glen (Corvallis, OR : Oregon State University, Dept. of Computer Science, 2004)
    A common heuristic for solving Partially Observable Markov Decision Problems POMDPs is to first solve the underlying Markov Decision Process MDP and then construct a POMDP policy by performing a fixed depth lookahead sea ...
  • Chen, C.-H.; Zhang, Y.; Jung, Y.; He, T.; Ceballos, J. L.; Temes, G. C. (IEEE - Institute of Electrical and Electronics Engineers, 2013-02-14)
    A new incremental ADC is proposed which extends the order of a conventional incremental ADC from N to (2N-1) by way of a two-step operation. For a given conversion time, the duration of each step can be optimized. For ...
  • Jacob, Michael E. (2009-06-17)
    In Radio Frequency Integrated Circuits (RFIC) or high frequency digital ICs, there is a demand to probe the internal nodes for testing. The ultra low capacitance RFIC probe presented in his work is a flexible tool for ...
  • Ayers, James S. (2010-05-05)
    In wireless sensor network applications, low-power operation of the wireless receiver is critical. To address this need an ultra-low power Binary Frequency Shift Keying (BFSK) receiver using the super-regenerative archit ...
  • Grigoreanu, Valentina I. (2010-01-07)
    End users' programs are fraught with errors, costing companies millions of dollars. One reason may be that researchers and tool designers have not yet focused on end-user debugging strategies. To investigate this possibi ...
  • Redfield, Stephen J. (2010-07-08)
    Recent developments in computing technology have generated a demand for more streamlined and effective test systems. By replacing traditional in-chassis wired interconnects with a broadcast wireless system, fault detecti ...
  • Oregon State University. Dept. of Computer Science; Erwig, Martin; Ren, Deling (Corvallis, OR : Oregon State University, Dept. of Computer Science, 2002-10)
    Many software maintenance problems are caused by using text editors to change programs. A more systematic and reliable way of performing program updates is to express changes with an update language. In particular, up ...
  • Chakchouk, Nessrine; Hamdaoui, Bechir (IEEE-Institute of Electrical and Electronics Engineers, 2012-11)
    This paper provides a cross-layer analysis of uplink performance in femtocell networks. It characterizes the uplink physical interference in femtocell networks and studies its impact on the delay and data loss rate of c ...
  • Kang, Ho Sung (2009-06-03)
    A Mobile Ad-hoc NETwork (MANET) is collection of wireless mobile nodes without a network infrastructure or centralized administration. Although MANETs can be used in many applications, such as mobile Internet, military ...

Search ScholarsArchive@OSU


Advanced Search

Browse

My Account

Statistics