mirage   mirage   mirage

Browsing School of Electrical Engineering and Computer Science by Title

DSpace/Manakin Repository

Browsing School of Electrical Engineering and Computer Science by Title

Sort by: Order: Results:

  • Gore, Ganesh P. (2006-07-26)
    Accurate scaled modeling and simulation are critical to advancing ocean wave linear generator buoys. A 100th scaled model of ocean wave generator buoy systems is analyzed by solving the Navier-Stokes equations. These eq ...
  • Proper, Scott (2009-12-17)
    Reinforcement learning in real-world domains suffers from three curses of dimensionality: explosions in state and action spaces, and high stochasticity or "outcome space" explosion. Multiagent domains are particularly s ...
  • Creelan, Tyler (2004-08-17)
    The WYSIWYT (What You See is What You Test) methodology applies formal analysis and testing techniques to the spreadsheet paradigm. So far the methodology has been applied to a research spreadsheet prototype, Forms/3. ...
  • Oregon State University. Dept. of Computer Science; Creelan, Tyler; Fisher, Marc Randall (Corvallis, OR : Oregon State University, Dept. of Computer Science, 2004-08-17)
    The WYSIWYT (What You See is What You Test) methodology applies formal analysis and testing techniques to the spreadsheet paradigm. So far the methodology has been applied to a research spreadsheet prototype, Forms/3. Ho ...
  • Wanalertlak, Weetit; Lee, Ben; Yu, Chansu; Kim, Myungchul; Park, Seung-Min; Kim, Won-Tae (Springer, 2013-12)
    Wireless LANs (WLANs) have been widely adopted and are more convenient as they are inter-connected as wireless campus networks and wireless mesh networks. However, time-sensitive multimedia applications, which have b ...
  • Cheung, S.-C. S.; Nguyen, Thinh (Springer, 2007-12-11)
    One of the most important problems facing any distributed application over a heterogeneous network is the protection of private sensitive information in local terminals. A subfield of cryptography called secure multipar ...
  • Karri, Nagendra ([S.l. : s.n.], 2006-01)
    This project aims to study the performance of Secure Sockets Layer (SSL) Protocol implemented in JAVA for web applications. Secure Sockets Layer protocol allows client/server applications to communicate in a way that is ...
  • Jayaraman, Karthik (2009-12-17)
    Modern wireless System-on-Chips (SoCs), such as mobile handsets, sensor networks, and mm-wave systems, integrate an entire RF system on a single CMOS chip. Such highly complex systems require significant on-chip digital ...
  • Bahniuk, Eileen Kei (2010-10-18)
    Powerline communication (PLC), is becoming a more commonplace method for data transmission, however it is still a very new medium for data transmission, and international standards for powerline communication are still ...
  • Venkatachalapathy, Savithri ([s.l. : s.n.], 2004)
    "A non-redundant number system has the digit set limited ranging from 0 to radix -1. While the Signed digit numbers have digit set consisting of more than radix r values. Hence it is also called redundant number system. ...
  • Lin, Che-Yun; Subbaraman, Harish; Hosseini, Amir; Wang, Alan X.; Zhu, Liang; Chen, Ray T. (American Institute of Physics, 2012-07-30)
    We demonstrate a four-channel on-chip true-time-delay module based on a photonic crystal waveguide array. Using the photonic crystal taper to minimize the coupling loss, the delay lines with 1-3 mm long photonic crystal ...
  • Oregon State University. Dept. of Computer Science; Djang, Rebecca W. (Rebecca Walpole); Burnett, Margaret, 1949- (Corvallis, OR : Oregon State University, Dept. of Computer Science, 1997-11)
    Although spreadsheets can be argued to be the most widely-used end-user programming languages today, they are very limited compared to other programming languages, supporting only a few built-in types and offering only p ...
  • Oregon State University. Dept. of Computer Science; Djang, Rebecca W. (Rebecca Walpole); Burnett, Margaret, 1949- (Corvallis, OR : Oregon State University, Dept. of Computer Science, 1998-03)
    Although spreadsheets can be argued to be the most widely-used visual programming languages (VPLs) today, most are very limited compared to other VPLs, supporting only p few built-in types and offering only primitive ...
  • Bhattacharji, Pranathi (2014-09-11)
    The primary objective of a grid is to maintain a balance between generation and load. If these quantities are not in balance with each other, severe damages such as voltage fluctuations, low power quality, power outages ...
  • Hanken, Christopher (2007-10-16)
    Efficient methods for simulating the substrate noise generated by complex synchronous and asynchronous digital logic circuits are presented. By simulating digital logic at the gate level, and precharacterizing the gates ...
  • Oberoi, Daman; Fern, Alan ([S.l. : s.n.], 2006-12-07)
    We develop a system for simulation-based optimization of defensive formations for American football. The first component of the system is an environment for simulating football plays with real physical interactions betwe ...
  • Liebert, John A. (2006-10-03)
    The amount of instruction level parallelism (ILP) that can be exploited depends greatly on the size of the instruction window and the number of in-flight instructions the processor can support. However, this requires a ...
  • Bai, Rui; Wang, Jingguang; Xia, Lingli; Zhang, Feng; Yang, Zongren; Hu, Weiwu; Chiang, Patrick (IEEE-Institute of Electrical and Electronics Engineers, 2011-12)
    Current multi-gigahertz ADC performance is limited by the sampling clock timing jitter. This paper describes the effects of clock transition time on the spurious-free dynamic range (SFDR) of a CMOS T/H circuit. A sign ...
  • Scaffidi, Christopher; Chambers, Christopher (Taylor & Francis, 2012)
    The Scratch environment exemplifies a tool+community approach to teaching elementary programming skills, as it includes a website where users can publish, discuss, and organize animations that are programs. To explore th ...
  • Payet, Nadia; Todorovic, Sinisa (Springer, 2013-08-01)
    Our goal is to detect boundaries of objects or surfaces occurring in an arbitrary image. We present a new approach that discovers boundaries by sequential labeling of a given set of image edges. A visited edge is labe ...

Search ScholarsArchive@OSU


Advanced Search

Browse

My Account

Statistics