"‘Biometrics is at the forefront in our agenda for homeland security,’ declared Asa Hutchinson, the Department of Homeland Security's undersecretary for border and transportation security, at the 2004 Biometric Consortium Conference” [11].
Flashy retinal scanning and voice activated computers were once considered technologies for science fiction movies and novels. Nowadays,...
The Elliptic Curve Digital Signature Algorithm (ECDSA) is a public key cryptosystem used for creation and verification of digital signatures in electronic documents. In this thesis, we created a Java applet that provides the functionality of the ECDSA using all of the NIST elliptic curves over GF(p). This applet was...
This thesis describes the implementation of an interface for querying established correspondences between anatomical structures across species. I was the main developer of this query engine, called the Comparative Anatomy Information System. My work involved developing methods to query the knowledge base, perform the specified comparison, display the anatomical hierarchies...
The computer game industry continues to progress toward realistic-looking character motion. However, even in state-of-the-art games, the use of motion capture data in character animation may result in errors such as “foot slipping,” where the feet do not match up with the floor properly during translation. Various algorithms have been...
The high cost of manually producing background characters creates a demand for a
way to automatically generate plausible behaviors. These background extras need to
behave in a manner that is believable such that they do not distract the focus of the
audience from the primary action occurring in the scene....
DiskGrapher is a graphical visualization tool designed to help users better manage the
space on their hard drives. The main goal of DiskGrapher is to provide a different
visualization technique to display information, with the goal of providing a more intuitive
understanding of the directory structure of the disk than...
Factorization of integers is an important aspect of cryptography since it can be used as an
attack against some of the common cryptographic methods being used. There are
numerous methods in existence for factoring integers. Some of these are faster than
others for general numbers, while others work best on...
The push towards higher performing and more sensitive mixed signal circuitry has required the parallel development of increasingly more complex and sensitive test and calibration harnesses. Current off-chip methods of test and calibration may require higher pin counts or induce unwanted parasitic interference.
In this thesis, the design of a...
Regression testing is a common and necessary task carried out by software practitioners to validate the quality of evolving software systems. Unfortunately, regression testing is often an expensive, time-consuming process, particularly when applied to large software systems. Consequently, practitioners may wish to prioritize the test cases in their regression test...
A financial processor is the most important component of a credit union‘s IT infrastructure. A database storing member demographic information, account balances, and transaction history, it performs financial calculations, such as interest, dividends, and maturities. It also provides a user interface, allowing tellers and financial service representatives to manage accounts...