Search
Skip to Search Results- 1Harrison, Adam P
- 1Herman, Ashley
- 1Luu, Nghe S.
- 1Lydia Pilli
- 1Mukherjee, Ayantika
- 1Romansky, Stephen
- 5Graduate and Postdoctoral Studies (GPS), Faculty of
- 5Graduate and Postdoctoral Studies (GPS), Faculty of /Theses and Dissertations
- 2Toolkit for Grant Success
- 1Master of Science in Internetworking (MINT)
- 1Master of Science in Internetworking (MINT)/Capstone Projects & Reports (Master of Science in Internetworking (MINT))
- 1Toolkit for Grant Success/Successful Grants (Toolkit for Grant Success)
-
2019-06-17
CFI-JELF awarded 2020: The proposed infrastructure request will support work in the use of projected media in live performance. This specific request is to transform the theatre from a primarily text-based aural experience to one that is based in visual language. Our proposal includes five...
-
Estimating Fine-Grained Mobile Application Energy Use based on Run-Time Software Measured Features
DownloadFall 2020
Inefficient mobile software kills battery life. Yet, developers lack the tools necessary to detect and solve energy bugs in software. In addition, developers are usually tasked with the creation of software features and triaging existing bugs. This means that most developers do not have the time...
-
Fall 2018
This thesis is composed of three individual papers in information system area. In the first paper, we build an economic model to study the problem of o↵ering a new, high-certainty channel on an existing business-to-consumer platform such as Taobao and eBay. In the second paper, we use game...
-
Spring 2016
Technical computing is a cornerstone of modern scientific practice. Within technical computing, the matrix-vector (MV) framework, composed of MV algebra and MV software, dominates the discipline in representing and manipulating linear mappings applied to vectors. Indeed, prominent technical...
-
Analysis of Artificial Intelligence Techniques to Detect, Prevent, Analyze and Respond to Malware
Download2023-04-01
Malware has been posing a significant problem to almost every organization. Every organization online and every user using the services of the internet is susceptible to attacks. The preparators of these attacks are humans; malware is the tool they use to exploit the systems. The “malicious”...
-
Towards Context-Independent Gamification: An Evaluation of Intrinsic Motivation in Gamified Contexts
DownloadFall 2020
Gamification is becoming widely adopted as a way of making applications fun and engaging, in order to motivate adoption and use. Despite its popularity, the question of whether gamification actually has any effect on user motivation remains open [1]. For many years, video game designers have...
-
The validity, reliability and time requirement of study model analysis using cone-beam computed tomography generated virtual study models
DownloadFall 2011
Objectives: To investigate the validity, reliability and time spent on performing a full orthodontic study model analysis (SMA) on Cone Beam Computed Tomography (CBCT)-generated dental models (Anatomodels) compared with conventional Plaster models and a subset of Extracted Premolars. Methods:...