Now showing items 1-20 of 300

    • Delay-based packet scheduling for High Speed Downlink Packet Access 

      Husain, Samreen Riaz (2007-08-29)
      High Speed Downlink Packet Access (HSDPA) is a cellular system that was standardized by the 3rd Generation Partnership Project (3GPP). HSDPA can support data rates of up to 14.4 Mbps through the use of a shared channel. ...
    • A defense framework for flooding-based DDoS attacks 

      You, Yonghua (2007-08-29)
      Distributed denial of service (DDoS) attacks are widely regarded as a major threat to the Internet. A flooding-based DDoS attack is a very common way to attack a victim machine by sending a large number of malicious traffic. ...
    • DNIDS: A dependable network intrusion detection system using the CSI-KNN algorithm 

      Kuang, Liwei (2007-09-14)
      The dependability of an Intrusion Detection System (IDS) relies on two factors: ability to detect intrusions and survivability in hostile environments. Machine learning-based anomaly detection approaches are gaining ...
    • Type-Safe Computation With Heterogeneous Data 

      Huang, Freeman Yufei (2007-09-14)
      Computation with large-scale heterogeneous data typically requires universal traversal to search for all occurrences of a substructure that matches a possibly complex search pattern, whose context may be different in ...
    • A Multi-Advisor Evaluation Module for the Accurate Prediction of Alpha Helix Pairs 

      Sedfawi, Steve Joseph (2007-09-17)
      Accurate 3D protein structure prediction is one of the most challenging problems facing bioinformaticians today. This thesis develops and examines an evaluation module for ranking predicted super-secondary structures – ...
    • A Study of the Performance of Tool-Mounted Displays for Surgical Guidance 

      Kassil, Kevin D. (2007-09-25)
      In computer-assisted surgery, a computer display provides 3D guidance of tools during surgery. However, current guidance displays have a number of drawbacks. This thesis considers the advantages of a prototype guidance ...
    • SQL Query Disassembler: An Approach to Managing the Execution of Large SQL Queries 

      Meng, Yabin (2007-09-25)
      In this thesis, we present an approach to managing the execution of large queries that involves the decomposition of large queries into an equivalent set of smaller queries and then scheduling the smaller queries so that ...
    • Counter-Surveillance in an Algorithmic World 

      Dutrisac, James George (2007-09-26)
      Surveillance is the act of collecting, analysing, and acting upon information about specific objects, data, or individuals. Recent advances have allowed for the automation of a large part of this process. Of particular ...
    • Relational Views of XML for the Semantic Web 

      Atre, Shruti (2007-10-01)
      The Semantic Web is the future of the Internet. It is the extension to the Internet in which information will be given well-defined meaning, enabling not only humans but also machines to find, share and combine information ...
    • The Attentive Hearing Aid: visual selection of auditory sources 

      Hart, Jamie Lauren (2007-10-01)
      We present the Attentive Hearing Aid, a system that uses eye input to amplify the audio of tagged sound sources in the environment. A multidisciplinary project, we use the latest technology to take advantage of the social ...
    • Parameter analysis for robotic assessment of impairments in reaching due to stroke 

      Abu-Zeid, Amr (2007-10-05)
      Stroke is a condition that arises from partial or complete blockage of blood flow to parts of the brain. Upper limb impairments (sensorimotor deficits) usually occur as a result of stroke. Assessment and diagnosis of the ...
    • Using Cluster Analysis, Cluster Validation, and Consensus Clustering to Identify Subtypes 

      Shen, Jess Jiangsheng (2007-11-26)
      Pervasive Developmental Disorders (PDDs) are neurodevelopmental disorders characterized by impairments in social interaction, communication and behaviour [Str04]. Given the diversity and varying severity of PDDs, diagnostic ...
    • Modelling Deception Detection in Text 

      Gupta, Smita (2007-11-29)
      As organizations and government agencies work diligently to detect financial irregularities, malfeasance, fraud and criminal activities through intercepted communication, there is an increasing interest in devising an ...
    • Towards a framework for intuitive programming of cellular automata 

      Torbey, Sami (2007-12-05)
      The ability to obtain complex global behaviour from simple local rules makes cellular automata an interesting platform for massively parallel computation. However, manually designing a cellular automaton to perform a given ...
    • Explicating a Biological Basis for Chronic Fatigue Syndrome 

      Abou-Gouda, Samar A. (2007-12-18)
      In the absence of clinical markers for Chronic Fatigue Syndrome (CFS), research to find a biological basis for it is still open. Many data-mining techniques have been widely employed to analyze biomedical data describing ...
    • Functionality based refactoring : improving source code comprehension 

      Beiko, Jeffrey Lee (2008-01-02)
      Software maintenance is the lifecycle activity that consumes the greatest amount of resources. Maintenance is a difficult task because of the size of software systems. Much of the time spent on maintenance is spent trying ...
    • A performance study of uplink scheduling algorithms in point to multipoint WiMAX networks 

      Dhrona, Pratik (2008-01-11)
      Applications such as video and audio streaming, online gaming, video conferencing, Voice over IP (VoIP) and File Transfer Protocol (FTP) demand a wide range of QoS requirements such as bandwidth and delay. Existing wireless ...
    • Consistency Maintenance for Multiplayer Video Games 

      Fletcher, Robert D. S. (2008-01-16)
      Multiplayer games have to support activities which have differing usability requirements. The usability of the system is directly influenced by the choice of consistency maintenance algorithm. These algorithms must accommodate ...
    • Workload Adaptation in Autonomic Database Management Systems 

      Niu, Baoning (2008-01-30)
      Workload adaptation is a performance management process in which an autonomic database management system (DBMS) efficiently makes use of its resources by filtering or controlling the workload presented to it in order to ...
    • Language Implementation by Source Transformation 

      Dayanand, Pooja (2008-02-01)
      Compilation involves transforming a high level language source program into an equivalent assembly or machine language program. Programming language implementation can therefore be viewed as a source to source transformation ...