mirage   mirage   mirage

Browsing School of Electrical Engineering and Computer Science by Title

DSpace/Manakin Repository

Browsing School of Electrical Engineering and Computer Science by Title

Sort by: Order: Results:

  • Campbell, John L.; Rustad, Lindsey E.; Porter, John H.; Taylor, Jeffrey R.; Dereszynski, Ethan W.; Shanley, James B.; Gries, Corinna; Henshaw, Donald L.; Martin, Mary E.; Sheldon, wade M.; Boose, Emery R. (American Institute of Biological Sciences, 2013-07)
    Sensor networks are revolutionizing environmental monitoring by producing massive quantities of data that are being made publically available in near real time. These data streams pose a challenge for ecologists because ...
  • Hu, Zhangxiang (2015-06-03)
    Secure multi-party computation (MPC) is a conceptual framework in cryptography. It allows distrusting parties engage in a protocol to perform a computational task while still maintain some secure properties. Most existin ...
  • Kulkarni, Janhavi (2015-06-09)
    Synchrophasor technology has gained great momentum with the widely adopted concept of smart grids in power systems at transmission and generation level. This has led to an improved state estimation of a power system with ...
  • Baek, Seungjin (2010-09-20)
    Pulsed ultra-wideband (UWB) radio uses extremely short pulses to transmit information. Such pulses provide very fine timing information, which has led to technological advances in high-precision localization. This thesi ...
  • Farnsworth, Andrew; Sheldon, Daniel; Geevarghese, Jeffrey; Irvine, Jed; Van Doren, Benjamin; Webb, Kevin; Dietterich, Thomas G.; Kelling, Steve (Association for the Advancement of Artificial Intelligence (AAAI), 2014)
    Bird migration occurs at the largest of global scales, but monitoring such movements can be challenging. In the US there is an operational network of weather radars providing freely accessible data for monitoring meteoro ...
  • Li, Li ([S.l. : s.n.], 2005-05-23)
    Current database systems apply access control mostly on tables and columns. However, many applications require access control on individual rows in database tables. Therefore, we have implemented a row-based access con ...
  • Oregon State University. Dept. of Computer Science; Stumpf, Simone; Burnett, Margaret, 1949-; Dietterich, Thomas Glen; Johnsrude, Kevin; Herlocker, Jonathan Lee (Corvallis, OR : Oregon State University, Dept. of Computer Science, 2005)
    This paper presents qualitative results from interviews with knowledge workers about their recovery strategies after interruptions. Special focus is given to when these strategies fail due to the nature of the interrupti ...
  • Moore, Christopher (Chistopher Emory) (2009-12-17)
    We took the back-propagation algorithms of Werbos for recurrent and feed-forward neural networks and implemented them on machines with graphics processing units (GPU). The parallelism of these units gave our implementati ...
  • Viswanathan, Vignesh (2011-08-21)
    Beaversource provides both code-hosting tools and social networking in one place. Students and faculty at Oregon State University have been using Beaversource to host their projects, both for classwork and research. Seve ...
  • Liu, Tian (2010-07-19)
    3D object recognition is a very difficult and important problem in computer vision, arising in a wide range of applications. Typically in 3D object recognition, interest points are extracted from images and then matched. ...
  • Yalamanchi, Hema Jyothi ([S.l. : s.n.], 2007-03-30)
    Efficient routing of information packets in dynamically changing communication networks requires routing policies that adapt to changes in load levels, traffic patterns and network topologies. Reinforcement Learning (RL) ...
  • Mall, Shikhar (2013-10-18)
    A five year study of file-system metadata shows that the number of files increases by 200% and only a select few file-types contribute for over 35% of the files that exist on a file-system. It is difficult to point out a ...
  • Moissinac, Béatrice (2013-11-22)
    Auctions are used to solve resource allocation problem between many agents and many items in real-world settings. Unfortunately, in most cases, it is possible for selfish agents to manipulate the system for their own int ...
  • Kim, Kyoung-Youm; Wang, Alan (Optical Society of America, 2014-12-01)
    We show that the value of the total angular momentum (AM) carried by a surface mode can be interpreted as representing the transverse position of the center or balance point of the power flow through the mode. Especia ...
  • Natarajan, Sriraam; Tadepalli, Prasad; Fern, Alan (Springer, 2012-08)
    Building intelligent assistants has been a long-cherished goal of AI, and many were built and fine-tuned to specific application domains. In recent work, a domain-independent decision-theoretic model of assistance was pr ...
  • Keir, P. D.; Le, H.; Thuemler, R. L.; Hitt, J. C.; Wager, J. F. (American Institute of Physics, 1996-10-14)
    Anomalous charge-voltage (Q-V) characteristics are observed for several types of alternating-current thin-film electroluminescent (ACTFEL) devices. These Q-V curves are anomalous because conduction charge flows in these ...
  • Cheng, Daxin (1998-02-19)
    Remote Event Listener(REL) is designed to glue remote events and remote lis- teners dynamically, and dispatch remote events e ciently and transparently for distributed object-oriented systems. Components can be indepen ...
  • Lewis, Timothy M. (Timothy Michael) (2014-03-18)
    The potential for electric energy generation from ocean waves is substantial and much research is being conducted on the conversion process as a renewable, grid-connected, power source. Some of the same attributes that ...
  • Xu, Keying (2015-08-03)
    The problem of supporting more advanced selective undo operations has received a lot of attention. However, selective undo is generally missing in commonly used editors. Moreover, partial selective undo, the ability of ...
  • Duong-Ba, Thuan Hong (2014-05-16)
    We studied the problem of resource allocation in large scale distributed applications such as Online Social Networks (OSN) and Cloud Computing. In such settings, resource allocation schemes need to efficient as well as a ...

Search ScholarsArchive@OSU


Advanced Search

Browse

My Account

Statistics