mirage   mirage   mirage

Browsing MS non-thesis Research Papers (EECS) by Title

DSpace/Manakin Repository

Browsing MS non-thesis Research Papers (EECS) by Title

Sort by: Order: Results:

  • Ambravaneswaran, Mahesh (2000-06)
  • Lin, Wei; Fern, Alan; Fern, Xiaoli (2009-01-20)
    Motivated by a real-world problem, we study a novel setting for budgeted optimization where the goal is to optimize an unknown function f(x) given a budget. In our setting, it is not practical to request samples of f(x) ...
  • Chhajed, Darshana ([S.l. : s.n.], 2007-05-24)
    The increasing need to share and synchronize personal information, such as schedules, tasks and events, amongst users has lead to the development of inter-personal information management software like ChandlerTM. Chandle ...
  • Lou, Qi (2013-11-26)
    Novelty detection plays an important role in machine learning and signal processing. This project studies novelty detection in a new setting where the data object is represented as a bag of instances and associated wit ...
  • Justice, Timothy P. (1993-03-12)
    Although standard tools have been used for lexical and syntactic analysis since the late 1970's, no standard tools exist for the remaining parts of a compiler. Part of the reason for this de ciency is due to the di cul ...
  • Tammineni, Tez Deepthi; Raich, Raviv (2011-04-04)
    Dimensionality reduction (DR) is an efficient approach to reduce the size of data by capturing the informative intrinsic features and discarding the noise. DR methods can be grouped through a variety of categories, e.g ...
  • Hunt, David (2006-08)
    We designed a concise way to store and manipulate GIS coverage data in a geospatial database. Our geospatial database is implemented with PostgreSQL and PostGIS. PostgreSQL is an object-relational database, and PostGIS ...
  • Wu, Zhi (2007-03-14)
    This project describes a web-based information management system which has been widely used by staff members and students at OSU. Without this system, it was very hard for the staff members to manage a variety of fees; ...
  • Rajasekaran, Pallavi (2008-05-08)
    Finding an efficient way of distributing content in Peer-to-Peer (P2P) networks has become important with the growing popularity of media streaming applications. Video multicast applications rely on the efficiency of con ...
  • Subramanium, Mahesh ([S.l. : s.n.], 2012-04-05)
    This project explores a security framework, called the Persona Concept, aimed at giving the user greater control over their private data in cyberspace, in particular, their electronic credentials. The background for the ...
  • Kalyan, Arvind (2008-12-30)
    Motivation for cloud computing applications are listed. A Cloud Computing framework – MapReduce – is implemented. A document indexing application is built as an example MapReduce application on this framework. Focus is ...
  • Li, Li ([S.l. : s.n.], 2005-05-23)
    Current database systems apply access control mostly on tables and columns. However, many applications require access control on individual rows in database tables. Therefore, we have implemented a row-based access con ...
  • Viswanathan, Vignesh (2011-08-21)
    Beaversource provides both code-hosting tools and social networking in one place. Students and faculty at Oregon State University have been using Beaversource to host their projects, both for classwork and research. Seve ...
  • Yalamanchi, Hema Jyothi ([S.l. : s.n.], 2007-03-30)
    Efficient routing of information packets in dynamically changing communication networks requires routing policies that adapt to changes in load levels, traffic patterns and network topologies. Reinforcement Learning (RL) ...
  • Mall, Shikhar (2013-10-18)
    A five year study of file-system metadata shows that the number of files increases by 200% and only a select few file-types contribute for over 35% of the files that exist on a file-system. It is difficult to point out a ...
  • Cheng, Daxin (1998-02-19)
    Remote Event Listener(REL) is designed to glue remote events and remote lis- teners dynamically, and dispatch remote events e ciently and transparently for distributed object-oriented systems. Components can be indepen ...
  • Karri, Nagendra ([S.l. : s.n.], 2006-01)
    This project aims to study the performance of Secure Sockets Layer (SSL) Protocol implemented in JAVA for web applications. Secure Sockets Layer protocol allows client/server applications to communicate in a way that is ...
  • Venkatachalapathy, Savithri ([s.l. : s.n.], 2004)
    "A non-redundant number system has the digit set limited ranging from 0 to radix -1. While the Signed digit numbers have digit set consisting of more than radix r values. Hence it is also called redundant number system. ...
  • Oberoi, Daman; Fern, Alan ([S.l. : s.n.], 2006-12-07)
    We develop a system for simulation-based optimization of defensive formations for American football. The first component of the system is an environment for simulating football plays with real physical interactions betwe ...
  • Louie, Michael Y.K. (2009-12-11)
    Solar photovoltaic is considered one among many new alternatives to satisfy our demand for energy. Solar Cells have undergone changes in the last 50 years or so since its invention in 1954. Solar power is beginning to ...

Search ScholarsArchive@OSU


Advanced Search

Browse

My Account

Statistics