Search
Now showing items 11-20 of 207
Demographics of Adware and Spyware
(2008-09-09)
The World Wide Web is the most popular use of the Internet. Information can be accessed from this network of web pages. Unknown to users, web pages can access their personal information and, sometimes, also provide information ...
A Quantitative Study of Musical Instrument Digital Interface (MIDI) Over Internet Protocol (IP) Protocols
(2008-09-09)
The research, which is discussed in this dissertation, consists of the development and testing of a suite of ten Transmission Control Protocol (TCP) and reliable Real Time Protocol (RTP) MIDI over IP (MOIP) protocols, and ...
The Activity Metric for Low Resource, On-line Character Recognition
(2008-09-09)
This work presents an algorithm for on-line character recognition that is fast, portable, and consumes very little memory for code or data. The algorithm is alphabet-independent, and does not require training beyond ...
Energy Aware Task Scheduling on Heterogeneous Systems
(2009-02-23)
We consider the problem of scheduling directed a-cyclic task graphs (DAG) on heterogeneous distributed processor systems with the twin objectives of minimizing finish time and energy consumption. Previous scheduling ...
Improving Geographic Routing with Neighbor Sectoring
(2009-02-23)
An ad hoc network consists of many mobile devices which forms a network automatically. Among many ad hoc network routing algorithms, geographic routing algorithm is known as an efficient and scalable routing protocol. The ...
User Experience Design and Experimental Evaluation of Extensible and Dynamic Viewers for Data Structures
(2009-02-23)
Many techniques for the visualization of data structures and algorithms have been proposed and shown to be pedagogically effective. Yet, they are not widely adopted because they lack suitable methods for automatically ...
Academic Virtual Advisor
(2009-02-23)
With the increasing aptitude of artificial intelligence and expert systems, new and
innovative uses are being discovered. The objective of this research was to examine the use
of an expert system to solve the problem of ...
PineHill: A Novel Approach to Computer Aided Language Learning
(2009-02-23)
Teaching language involves understanding the way people perceive words and utilizing methods of instruction that they can easily comprehend. Computer assisted instruction is of great benefit and more interesting to learners ...
An Indoor Wireless LAN Location Determination System
(2009-02-23)
As pervasive computing becomes more popular, the need for context-aware applica-tions increases. The context of an application refers to the information that is part of its operating environment, in which the physical ...
Enhancing Host Based Intrusion Detection Systems with Danger Theory of Artificial Immune Systems
(2009-02-23)
Rather than discriminating activity by belonging to self or non-self, danger theory extends its discrimination to be between non-self but harmless and self but harmful. The danger theory states that the system does not ...