Now showing items 217-236 of 405

    • A machine learning application for form-finding of tensegrity structures 

      Perera, Nuwan
      Tensegrity (tensional integrity) is a structural principle where rigid elements (struts) under compression are held together by a network of elastic elements (cables) under tension. Tensegrity structures have many applications ...
    • Machine Learning QoE Prediction for Video Streaming over HTTP 

      Riad, Mary
      Streaming video services have been growing rapidly in the past decade due to the wide adoption of more capable mobile devices such as smartphones and tablets, together with the deployment of higher capacity mobile networks ...
    • MagicWand: A Comparison of Gestural Affordances Between Cylindrical and Flat Display Form Factors 

      Lakmal, Lahiru
      An affordance is the intrinsic ability of an object to allow an action. Affordances are generated by matching the fit of the body under action to the physical shape of the object. For example, a vertical door handle affords ...
    • Managing Long-Running Queries Using A Query Progress Indicator 

      Hassannezhad, Mastoureh (2014-12-04)
      Database management systems (DBMSs) are the essential tools to monitor and manage data and transactions in databases. Normally a database receives hundreds of requests, called workloads so dynamic workload management is ...
    • Measuring Incrementally Developed Model Transformations Using Change Metrics 

      Paen, Eyrak (2012-09-28)
      Transformations play a central role in Model Based Software Engineering. Similar to the development of other types of software, a transformation's specification and implementation does not necessarily remain static over ...
    • Measuring Interestingness of Documents Using Variability 

      Kondi Chandrasekaran, Pradeep Kumar (2012-02-01)
      The amount of data we are dealing with is being generated at an astronomical pace. With the rapid technological advances in the field of data storage techniques, storing and transmitting copious amounts of data has become ...
    • Meerkat: Extending Entity-based Programming to Networked Games 

      Hamza, MD Ameer (2012-08-29)
      Game development is a complex and time-consuming activity that requires domain-specific knowledge and implementation skills. Networked games are particularly difficult due to the additional challenges of implementing the ...
    • MEWSE - Multi Engine Workflow Submission and Execution on Apache YARN 

      Sundaravarathan, Kiran (2015-09-15)
      In this era of BigData, designing a workflow to gain insights from the vast amount of data has become more complex. There are several different frameworks which individually process the batch and streaming data but ...
    • Migrating web Applications from SQL to NoSQL Databases 

      Al Mahruqi, Rahma
      In the Big Data era, data is emerging dramatically and the structure of data is becoming increasingly flexible. Non-Relational databases, such as the NoSQL class of Databases, are playing a major role as an enabler technology ...
    • Minimum Perimeter Convex Hull of a Set of Line Segments: An Approximation 

      Hassanzadeh, Farzad (2008-12-09)
      The problem of finding the convex hull of a set of points in the plane is one of the fundamental and well-studied problems in Computational Geometry. However, for a set of imprecise points, the convex hull problem has not ...
    • Mining development knowledge to understand and support software logging practices 

      Li, Heng
      Developers insert logging statements in their source code to trace the runtime behaviors of software systems. Logging statements print runtime log messages, which play a critical role in monitoring system status, diagnosing ...
    • Mining Unstructured Software Repositories Using IR Models 

      Thomas, Stephen (2012-12-12)
      Mining Software Repositories, which is the process of analyzing the data related to software development practices, is an emerging field which aims to aid development teams in their day to day tasks. However, data in many ...
    • Mitigation of Web-Based Program Security Vulnerability Exploitations 

      Shahriar, Hossain (2011-11-30)
      Over the last few years, web-based attacks have caused significant harm to users. Many of these attacks occur through the exploitations of common security vulnerabilities in web-based programs. Given that, mitigation of ...
    • Mobile Data Collectors in Wireless Sensor Networks 

      Al-Salih, Waleed (2009-04-27)
      Recent advances in wireless and sensing technologies have enabled the deployment of large scale Wireless Sensor Networks (WSNs) which have a wide range of scientific and commercial applications. However, due to the limited ...
    • Mobile Small cells in Cellular Heterogeneous Networks 

      Qutqut, Mahmoud (2014-10-01)
      The unprecedented soaring demand for capacity and coverage on cellular networks is challenging and straining operators. The current improvements in cellular standards are significantly behind the exponential growth in ...
    • Model Development Guidelines and Validation Support for UML-RT 

      Das, Tuhin
      Software development guidelines are a set of rules which can help improve the quality of software. These rules are defined on the basis of experience gained by the software development community over time. This research ...
    • A Model for Hierarchical Open Real-Time Systems 

      Waez, MD Tawhid Bin (2015-09-26)
      Introducing automated formal methods for large industrial real-time systems is an important research challenge. We propose timed process automata for modeling and analysis of time-critical systems which can be open, ...
    • A Model for Run-time Measurement of Input and Round-off Error 

      Meng, Nicholas Jie (2012-09-25)
      For scientists, the accuracy of their results is a constant concern. As the programs they write to support their research grow in complexity, there is a greater need to understand what causes the inaccuracies in their ...
    • Model Transformation at Runtime for Dynamic Adaptation in Distributed Groupware 

      Wolfe, Christopher (2011-02-28)
      Adaptive distributed systems have the potential to revolutionize how humans and computers interact. They can enable software to adapt to dynamic human demands, as users change their focuses, goals, locations and devices. ...
    • Model-driven Abusive Language Detection 

      LeBlanc, Hannah
      Abusive user-posted content has become a serious issue for many different forms of online communication, especially communication on social media platforms. While the effects of abusive content on society and governments ...