Documents from 2012
Real-time content-aware video retargeting on the Android platform for tunnel vision assistance, Thomas Knack
Low power context adaptive variable length encoder in H.264, Soumya Lingupanda
Error analysis of sequence modeling for projecting cyber attacks, Venkata Mudireddy
Public safety application for approaching emergency vehicle alert and accident reporting in VANETs using WAVE, Harshad Phule
Power analysis attacks on the SHA-3 candidate Grøstl, Garrett Smith
Hardware neuromorphic learning systems utilizing memristive devices, Michael Soltiz
Adaptive code division multiple access protocol for wireless network-on-chip architectures, Vineeth Vijayakumaran
Documents from 2011
Real-time data acquisition, transmission and archival framework, Piyush Agarwal
An Analysis of open security issues of Android interfaces to cloud computing platforms, Corey Beres
TangiPaint: Interactive tangible media, Anthony Blatner
An Analysis of VP8, a new video codec for the web, Sean Cassidy
Real-time software electric guitar audio transcription, Xander Fiss
Towards flexible hardware/software encoding using H.264, Mark Hogan
Non-intrusive identification of speech codecs in digital audio signals, Frank Jenner
A Power efficient pulsed MAC protocol for body area networks, David Layerle
Simulation model of Pacinian corpuscle for haptic system design, Daniel Liu
Optimal economic planning and control for the management of ecosystems, Kevin Macksamie
Thermal profiling in CMOS/memristor hybrid architectures, Cory Merkel
Design and synthesis of a high-performance, hyper-programmable DSP on an FPGA, Stephen Nichols
Investigating data throughput and partial dynamic reconfiguration in a commodity FPGA cluster framework, Nicholas Palladino
Routing protocol evaluation and development of a fully functional simulation environment for vehicular ad hoc networks, Matthew Prokop
Extremely low overhead off-chip memory encryption, Michael Sanfilippo
Investigating low-bitrate, low-complexity H.264 region of interest techniques in error-prone environments, Timothy Sperr
Low vision assistance with mobile devices, Mark Stump
CUDA accelerated cone‐beam reconstruction, Albert Sze
Distributed reactive routing for selective forwarding attack resilience in wireless sensor networks, Jonathan Szymaniak
Versatile FPGA architecture for skein hashing algorithm, David Webster
Documents from 2010
Cryptographic algorithm acceleration using CUDA enabled GPUs in typical system configurations, Maksim Bobrov
Investigation of GPGPU for use in processing of EEG in real-time, Dan Brandt
Thermal profiling of homogeneous multi-core processors using sensor mini-networks, Katherine Dellaquila
A Generic attack on CubeHash, a SHA-3 candidate, Philip Doughty Jr.
Print engine color management using customer image content, Michael William Elliot
Design and analysis of an FPGA-based, multi-processor HW-SW system for SCC applications, Andrew Fitzgerald
FTP-like streams for the 9P file protocol, John Floren
The Integration of nearthreshold and subthreshold CMOS logic for energy minimization, John Hicks
Hardware co-processor to enable MIMO in next generation wireless networks, Nathaniel Horner
Autonomous robot patrolling of a sparsely populated unknown environment, Patrick LaRocque
Asset protection in a limited swarm environment utilizing artificial potential fields, Dieter Laskowski
Scalable data clustering using GPUs, Andrew D. Pangborn
Medical image segmentation using GPU-accelerated variational level set methods, Nathan Prosser
Performance analysis of a scalable hardware FPGA Skein implementation, Aric Schorr
A Novel variation-tolerant 9T SRAM design for nanoscale CMOS, Sreeharsha Tavva
Framework for optimizing intelligence collection requirements, Khiem Tong
Modeling of micro-scale touch sensations for use with haptically augmented reality, Adam Woodrow Weissman
Documents from 2009
Telemedicine patient identification with RFID; an embedded approach, Onder Aksoy
High-performance subthreshold standard cell design and cell placement optimization, Sumanth Amarchinta
Communication framework for distributed computer vision on stationary and mobile platforms, Christopher Armenio
CHAracterization of Relevant Attributes using Cyber Trajectory Similarities, Jordan Bean
Recognition of human interactions using limb-level feature points, Michael David Dudley
Use of wireless sensors to improve robot lifetime for multi-threat containment, Michael D. Ellis
Scalable framework for heterogeneous clustering of commodity FPGAs, Jeremy K. Espenshade
VHDL modeling and synthesis of the JPEG-XR inverse transform, Peter Frandina
Optimizing scalar multiplication for koblitz curves using hybrid FPGAs, Gregory Głuszek
GPU acceleration of object classification algorithms using NVIDIA CUDA, Jesse Patrick Harvey
Direct occlusion handling for high level image processing algorithms, Carl Ryan Kelso
Recognition of human activities and expressions in video sequences using shape context descriptor, Natasha Prashant Kholgade
Face recognition with variation in pose angle using face graphs, Sooraj Kumar
TelosRFID an ad-hoc wireless networking capable multi-protocol RFID reader system, Michael P. Lewis
Dynamic voltage and frequency scaling with multi-clock distribution systems on SPARC core, Michael Nasri Michael
CACTUSS: Clustering of Attack Tracks using Significant Services, Christopher Thomas Murphy
Disaster recovery heuristic, Sapna Guniguntla Murthy
Visualizing threat and impact assessment to improve situation awareness, Michael Cooper Nusinov
Intelli MAC Layer Protocol for Cognitive Radio Networks, Rahul K. Patibandla
Volume ray casting techniques and applications using general purpose computations on graphics processing units, Michael Romero
An Optimization approach to plant-controller co-design, Jared S. Russell
Extremely low-overhead security for wireless sensor networks: Algorithms and implementation, Michael Schab
Methodologies for power analysis attacks on hardware implementations of AES, Kenneth James Smith
Scalable ray tracing with multiple GPGPUs, Rodrigo A. Urra
Course grained low power design flow using UPF, Archana Varanasi
GPU-based implementation of real-time system for spiking neural networks, Dmitri Yudanov
Documents from 2008
Face recognition in low resolution video sequences using super resolution, Somi Ruwan Arachchige
VTAC: Virtual Terrain Assisted Impact Assessment for Cyber Attacks, Brian Argauer and Shanchieh Jay Yang
Human activity recognition using limb component extraction, Jamie Boeheim
Hardware study on the H.264/AVC video stream parser, Michelle M. Brown
Real-time fusion and projection of network intrusion activity, Stephen Reed Byers
On-chip probe metrology, William Robert Farner
A novel partial reconfiguration methodology for FPGAs of multichip systems, Juan Manuel Galindo
Modeling and synthesis of the HD photo compression algorithm, Seth Groder
Low bandwidth eye tracker for scanning laser ophthalmoscopy, Zachary Harvey
Intrusion Signature Creation via Clustering Anomalies, Gilbert R. Hendry and Shanchieh Jay Yang
A monocular color vision system for road intersection detection, Michael Scott Kurdziel
Using the cell processor as an offload streaming assist for sessionization of network traffic for cross packet inspection, John Martellaro
Novel low power CAM architecture, Ka Fai Ng
Hardware/software optimizations for elliptic curve scalar multiplication on hybrid FPGAs, Glenn Ramsey Jr.
Multi-threat containment with dynamic wireless neighborhoods, Nathan Ransom
Hardware implementation of elliptic curve Diffie-Hellman key agreement scheme in GF(p), Zerene Sangma
An FPGA architecture design of a high performance adaptive notch filter, Michael James Szalkowski
Distributed pre-computation for a cryptanalytic time-memory trade-off, Michael S. Taber
Study of hardware and software optimizations of SPEA2 on hybrid FPGAs, Brad Theophila
Indirect camera calibration in a medical environment, Bennet Tillapaugh
Implementing efficient 384-Bit NIST elliptic curves over prime fields on an ARM946E, Tracy VanAmeron
Aspects of hardware methodologies for the NTRU public-key cryptosystem, Kyle Wilhelm
Classification algorithms on the cell processor, Mateusz Wyganowski
FPGA design and performance analysis of SHA-512, whirlpool and PHASH hashing functions, Przemyslaw Zalewski
Documents from 2007
MAC/Routing design for under water sensor networks, Yamin Al-Mousa
VTAC: Virtual terrain assisted impact assessment for cyber attacks, Brian Argauer
Hardware and software optimization of fourier transform infrared spectrometry on hybrid-FPGAs, Dmitriy Bekker
RFID-Assisted wireless sensor networks for cardiac tele-healthcare, Laura J. Celentano
Subthreshold and gate leakage current analysis and reduction in VLSI circuits, Vinay Chinta
Privacy & authentication in extreme low power wireless devices: RFID and µ-sensors, Ena Choudhary