mirage   mirage   mirage

Browsing MS non-thesis Research Papers (EECS) by Title

DSpace/Manakin Repository

Browsing MS non-thesis Research Papers (EECS) by Title

Sort by: Order: Results:

  • Rajasekaran, Pallavi (2008-05-08)
    Finding an efficient way of distributing content in Peer-to-Peer (P2P) networks has become important with the growing popularity of media streaming applications. Video multicast applications rely on the efficiency of con ...
  • Subramanium, Mahesh ([S.l. : s.n.], 2012-04-05)
    This project explores a security framework, called the Persona Concept, aimed at giving the user greater control over their private data in cyberspace, in particular, their electronic credentials. The background for the ...
  • Kalyan, Arvind (2008-12-30)
    Motivation for cloud computing applications are listed. A Cloud Computing framework – MapReduce – is implemented. A document indexing application is built as an example MapReduce application on this framework. Focus is ...
  • Li, Li ([S.l. : s.n.], 2005-05-23)
    Current database systems apply access control mostly on tables and columns. However, many applications require access control on individual rows in database tables. Therefore, we have implemented a row-based access con ...
  • Viswanathan, Vignesh (2011-08-21)
    Beaversource provides both code-hosting tools and social networking in one place. Students and faculty at Oregon State University have been using Beaversource to host their projects, both for classwork and research. Seve ...
  • Yalamanchi, Hema Jyothi ([S.l. : s.n.], 2007-03-30)
    Efficient routing of information packets in dynamically changing communication networks requires routing policies that adapt to changes in load levels, traffic patterns and network topologies. Reinforcement Learning (RL) ...
  • Mall, Shikhar (2013-10-18)
    A five year study of file-system metadata shows that the number of files increases by 200% and only a select few file-types contribute for over 35% of the files that exist on a file-system. It is difficult to point out a ...
  • Cheng, Daxin (1998-02-19)
    Remote Event Listener(REL) is designed to glue remote events and remote lis- teners dynamically, and dispatch remote events e ciently and transparently for distributed object-oriented systems. Components can be indepen ...
  • Karri, Nagendra ([S.l. : s.n.], 2006-01)
    This project aims to study the performance of Secure Sockets Layer (SSL) Protocol implemented in JAVA for web applications. Secure Sockets Layer protocol allows client/server applications to communicate in a way that is ...
  • Venkatachalapathy, Savithri ([s.l. : s.n.], 2004)
    "A non-redundant number system has the digit set limited ranging from 0 to radix -1. While the Signed digit numbers have digit set consisting of more than radix r values. Hence it is also called redundant number system. ...
  • Oberoi, Daman; Fern, Alan ([S.l. : s.n.], 2006-12-07)
    We develop a system for simulation-based optimization of defensive formations for American football. The first component of the system is an environment for simulating football plays with real physical interactions betwe ...
  • Louie, Michael Y.K. (2009-12-11)
    Solar photovoltaic is considered one among many new alternatives to satisfy our demand for energy. Solar Cells have undergone changes in the last 50 years or so since its invention in 1954. Solar power is beginning to ...
  • Youn, Jong-Hoon; Bose, Bella ([S.l. : s.n.], 2001-08-13)
    A binary code of length n is called a balanced code if each codeword contains exactly ⌊n/2⌋ (or ⌈n/2⌉) ones and ⌈n/2⌉ (or ⌊n/2⌋) zeros. In this paper, we give two improved methods for encoding and decoding the balanced c ...
  • Vega, Dan P. ([S.l. : s.n.], 2005-06-03)
    Spatial Supervised Learning seeks to learn how to assign a label to each pixel in a spatial grid such as the pixels of remote-sensed images. The standard approach is to treat each grid cell separately and to use only t ...
  • Gunadi, Haris (2006-06)
  • Guruprasad, Arvind ([S.l. : s.n.], 2004-03)
    Statistics and Metrics Generator (SMG), is a software tool that gathers, stores and reports performance and execution metrics for a web-based software installation process. The purpose of this project was to develop a ...
  • Saireddy, Balaji (2008-12-15)
    Network coding is a transmission paradigm that is known to achieve better network throughput in certain multicast topologies; however, the practicality of network coding has been questioned due to its high computational ...
  • Hanamoto, Shusaku (2006-01-05)
    Controlling a virtual character with a pen input device is difficult. Pen input devices require freeform gestures and users are not confined to particular mapping of a key or a button that is exactly repeatable. This i ...
  • Rose, Robert (2004-03-08)
    This paper discusses two main trends in the development of virtual machine systems: full system virtualization, where an entire hardware architecture is replicated virtually, and paravirtualization, where an operating ...
  • Singh, Harshman ([S.l. : s.n.], 2004)
    Timing attacks enable an attacker to extract secret information from a cryptosystem by observing timing differences with respect to different inputs given to an encryption or decryption algorithm. Werner Schindler has pr ...

Search ScholarsArchive@OSU


Advanced Search

Browse

My Account

Statistics