Follow

Documents from 2012

PDF

Real-time content-aware video retargeting on the Android platform for tunnel vision assistance, Thomas Knack

PDF

Low power context adaptive variable length encoder in H.264, Soumya Lingupanda

PDF

Error analysis of sequence modeling for projecting cyber attacks, Venkata Mudireddy

PDF

Public safety application for approaching emergency vehicle alert and accident reporting in VANETs using WAVE, Harshad Phule

PDF

Power analysis attacks on the SHA-3 candidate Grøstl, Garrett Smith

PDF

Hardware neuromorphic learning systems utilizing memristive devices, Michael Soltiz

PDF

Adaptive code division multiple access protocol for wireless network-on-chip architectures, Vineeth Vijayakumaran

Documents from 2011

PDF

Real-time data acquisition, transmission and archival framework, Piyush Agarwal

PDF

An Analysis of open security issues of Android interfaces to cloud computing platforms, Corey Beres

PDF

TangiPaint: Interactive tangible media, Anthony Blatner

PDF

An Analysis of VP8, a new video codec for the web, Sean Cassidy

PDF

Real-time software electric guitar audio transcription, Xander Fiss

PDF

Towards flexible hardware/software encoding using H.264, Mark Hogan

PDF

Non-intrusive identification of speech codecs in digital audio signals, Frank Jenner

PDF

A Power efficient pulsed MAC protocol for body area networks, David Layerle

PDF

Simulation model of Pacinian corpuscle for haptic system design, Daniel Liu

PDF

Optimal economic planning and control for the management of ecosystems, Kevin Macksamie

PDF

Thermal profiling in CMOS/memristor hybrid architectures, Cory Merkel

PDF

Design and synthesis of a high-performance, hyper-programmable DSP on an FPGA, Stephen Nichols

PDF

Investigating data throughput and partial dynamic reconfiguration in a commodity FPGA cluster framework, Nicholas Palladino

PDF

Routing protocol evaluation and development of a fully functional simulation environment for vehicular ad hoc networks, Matthew Prokop

PDF

Extremely low overhead off-chip memory encryption, Michael Sanfilippo

PDF

Investigating low-bitrate, low-complexity H.264 region of interest techniques in error-prone environments, Timothy Sperr

PDF

Low vision assistance with mobile devices, Mark Stump

PDF

CUDA accelerated cone‐beam reconstruction, Albert Sze

PDF

Distributed reactive routing for selective forwarding attack resilience in wireless sensor networks, Jonathan Szymaniak

PDF

Versatile FPGA architecture for skein hashing algorithm, David Webster

Documents from 2010

PDF

Cryptographic algorithm acceleration using CUDA enabled GPUs in typical system configurations, Maksim Bobrov

PDF

Investigation of GPGPU for use in processing of EEG in real-time, Dan Brandt

PDF

Thermal profiling of homogeneous multi-core processors using sensor mini-networks, Katherine Dellaquila

PDF

A Generic attack on CubeHash, a SHA-3 candidate, Philip Doughty Jr.

PDF

Print engine color management using customer image content, Michael William Elliot

PDF

Design and analysis of an FPGA-based, multi-processor HW-SW system for SCC applications, Andrew Fitzgerald

PDF

FTP-like streams for the 9P file protocol, John Floren

PDF

The Integration of nearthreshold and subthreshold CMOS logic for energy minimization, John Hicks

PDF

Hardware co-processor to enable MIMO in next generation wireless networks, Nathaniel Horner

PDF

Autonomous robot patrolling of a sparsely populated unknown environment, Patrick LaRocque

PDF

Asset protection in a limited swarm environment utilizing artificial potential fields, Dieter Laskowski

PDF

Scalable data clustering using GPUs, Andrew D. Pangborn

PDF

Medical image segmentation using GPU-accelerated variational level set methods, Nathan Prosser

PDF

Performance analysis of a scalable hardware FPGA Skein implementation, Aric Schorr

PDF

A Novel variation-tolerant 9T SRAM design for nanoscale CMOS, Sreeharsha Tavva

PDF

Framework for optimizing intelligence collection requirements, Khiem Tong

PDF

Modeling of micro-scale touch sensations for use with haptically augmented reality, Adam Woodrow Weissman

Documents from 2009

PDF

Telemedicine patient identification with RFID; an embedded approach, Onder Aksoy

PDF

High-performance subthreshold standard cell design and cell placement optimization, Sumanth Amarchinta

PDF

Communication framework for distributed computer vision on stationary and mobile platforms, Christopher Armenio

PDF

CHAracterization of Relevant Attributes using Cyber Trajectory Similarities, Jordan Bean

PDF

Recognition of human interactions using limb-level feature points, Michael David Dudley

PDF

Use of wireless sensors to improve robot lifetime for multi-threat containment, Michael D. Ellis

PDF

Scalable framework for heterogeneous clustering of commodity FPGAs, Jeremy K. Espenshade

PDF

VHDL modeling and synthesis of the JPEG-XR inverse transform, Peter Frandina

PDF

Optimizing scalar multiplication for koblitz curves using hybrid FPGAs, Gregory Głuszek

PDF

GPU acceleration of object classification algorithms using NVIDIA CUDA, Jesse Patrick Harvey

PDF

Direct occlusion handling for high level image processing algorithms, Carl Ryan Kelso

PDF

Recognition of human activities and expressions in video sequences using shape context descriptor, Natasha Prashant Kholgade

PDF

Face recognition with variation in pose angle using face graphs, Sooraj Kumar

PDF

TelosRFID an ad-hoc wireless networking capable multi-protocol RFID reader system, Michael P. Lewis

PDF

Dynamic voltage and frequency scaling with multi-clock distribution systems on SPARC core, Michael Nasri Michael

PDF

CACTUSS: Clustering of Attack Tracks using Significant Services, Christopher Thomas Murphy

PDF

Disaster recovery heuristic, Sapna Guniguntla Murthy

PDF

Visualizing threat and impact assessment to improve situation awareness, Michael Cooper Nusinov

PDF

Intelli MAC Layer Protocol for Cognitive Radio Networks, Rahul K. Patibandla

PDF

Volume ray casting techniques and applications using general purpose computations on graphics processing units, Michael Romero

PDF

An Optimization approach to plant-controller co-design, Jared S. Russell

PDF

Extremely low-overhead security for wireless sensor networks: Algorithms and implementation, Michael Schab

PDF

Methodologies for power analysis attacks on hardware implementations of AES, Kenneth James Smith

PDF

Scalable ray tracing with multiple GPGPUs, Rodrigo A. Urra

PDF

Course grained low power design flow using UPF, Archana Varanasi

PDF

GPU-based implementation of real-time system for spiking neural networks, Dmitri Yudanov

Documents from 2008

PDF

Face recognition in low resolution video sequences using super resolution, Somi Ruwan Arachchige

PDF

VTAC: Virtual Terrain Assisted Impact Assessment for Cyber Attacks, Brian Argauer and Shanchieh Jay Yang

PDF

Human activity recognition using limb component extraction, Jamie Boeheim

PDF

Hardware study on the H.264/AVC video stream parser, Michelle M. Brown

PDF

Real-time fusion and projection of network intrusion activity, Stephen Reed Byers

PDF

On-chip probe metrology, William Robert Farner

PDF

A novel partial reconfiguration methodology for FPGAs of multichip systems, Juan Manuel Galindo

PDF

Modeling and synthesis of the HD photo compression algorithm, Seth Groder

PDF

Low bandwidth eye tracker for scanning laser ophthalmoscopy, Zachary Harvey

PDF

Intrusion Signature Creation via Clustering Anomalies, Gilbert R. Hendry and Shanchieh Jay Yang

PDF

A monocular color vision system for road intersection detection, Michael Scott Kurdziel

PDF

Using the cell processor as an offload streaming assist for sessionization of network traffic for cross packet inspection, John Martellaro

PDF

Novel low power CAM architecture, Ka Fai Ng

PDF

Hardware/software optimizations for elliptic curve scalar multiplication on hybrid FPGAs, Glenn Ramsey Jr.

PDF

Multi-threat containment with dynamic wireless neighborhoods, Nathan Ransom

PDF

Hardware implementation of elliptic curve Diffie-Hellman key agreement scheme in GF(p), Zerene Sangma

PDF

An FPGA architecture design of a high performance adaptive notch filter, Michael James Szalkowski

PDF

Distributed pre-computation for a cryptanalytic time-memory trade-off, Michael S. Taber

PDF

Study of hardware and software optimizations of SPEA2 on hybrid FPGAs, Brad Theophila

PDF

Indirect camera calibration in a medical environment, Bennet Tillapaugh

PDF

Implementing efficient 384-Bit NIST elliptic curves over prime fields on an ARM946E, Tracy VanAmeron

PDF

Aspects of hardware methodologies for the NTRU public-key cryptosystem, Kyle Wilhelm

PDF

Classification algorithms on the cell processor, Mateusz Wyganowski

PDF

FPGA design and performance analysis of SHA-512, whirlpool and PHASH hashing functions, Przemyslaw Zalewski

Documents from 2007

PDF

MAC/Routing design for under water sensor networks, Yamin Al-Mousa

PDF

VTAC: Virtual terrain assisted impact assessment for cyber attacks, Brian Argauer

PDF

Hardware and software optimization of fourier transform infrared spectrometry on hybrid-FPGAs, Dmitriy Bekker

PDF

RFID-Assisted wireless sensor networks for cardiac tele-healthcare, Laura J. Celentano

PDF

Subthreshold and gate leakage current analysis and reduction in VLSI circuits, Vinay Chinta

PDF

Privacy & authentication in extreme low power wireless devices: RFID and µ-sensors, Ena Choudhary