According to a 2016 study by the American Road and Transportation Builders Association (ARTBA) one bridge in every ten is structurally deficient. Two major contributors of structural deficiency are corrosion, which causes ...
Low power, lossy networks (LLNs) are becoming a critical infrastructure for future applications that are ad-hoc and untethered for periods of years. The applications enabled by LLNs include Smart Grid, data center power ...
Recommender systems are intended to help users make effective product and service choices, especially over the Internet. They are used in a variety of applications and have proven to be valuable for predicting the utility ...
The approach-and-landing is one of the most complex procedures in airline operations. To mitigate the potential risks in this phase of flight, airlines and regulators have published stabilized approach criteria that require ...
Digital information goods include computer software, music, movies, electronic version of newspapers and magazines, electronic books, video games, and other multimedia products. These goods are characterized by a relatively ...
Component-based software architectures (CBSAs) are a well-known approach for building increasingly complex software systems from components that are intended to be distributed and autonomic. However, CBSAs often run in ...
The growing complexity of modern real-time embedded systems makes component-based software engineering (CBSE) technology more desirable. Although many ideas have been proposed for building component-based real-time embedded ...
Network forensics is the science that addresses the capture, recording and analysis of network events and traffic for detecting intrusions and investigating them, attributing blame and supporting a case against potential ...
Moving Target Defenses (MTDs) are techniques used to defend computer networks that seek to delay or prevent attacks during any phase of the cyber kill chain by dynamically changing the makeup of the systems or network such ...
This dissertation presents an approach to the abstraction of the reasoning of a
knowledge-based agent that facilitates human-agent collaboration in complex problem
solving and decision-making and the development of systems ...
Ocean acoustic tomography is a powerful method that uses sound to study
ocean properties such as temperature, which is directly related to sound speed in
water. This thesis focuses on using ambient noise to infer the ...
Active, or continuous, authentication is gradually gaining grounds as the preferred method of personal authentication. This is due to the limited nature of standard authentication methods that are unable to guarantee user ...
“The significant problems we face today cannot be solved at the same level of thinking at which they were created” (Albert Einstein). Information Technology (IT) systems have become an important competitive element across ...
A botnet is a network of compromised machines remotely controlled by an attacker. Over the past two decades, the modus operandi of botnets has evolved to facilitate a wide array of attacks ranging from stealthy exfiltration ...
This thesis addresses digital identity for biometric / face recognition screening and cyberspace security subject to denial and deception characteristic of adversarial behavior. The adversarial aspect concerns defense and ...
The purpose of this research is to determine a coach’s optimal basketball lineup throughout the course of a game while accounting for players’ changing endurance levels. Coaches currently use a variety of substitution ...
Conventional wisdom suggests that a software system's architecture has a significant impact on its evolution. Well-designed software architecture employs the principle of separation of concern to allocate different ...
Mobile app markets have created a fundamental shift in the way software is delivered to the consumers. The benefits of this software supply model are plenty, including the ability to rapidly and effectively deploy, maintain, ...
In this thesis, we have first characterized candidates of the Competition for Authenticated Encryption, Security, Applicability, and Robustness (CAESAR). Then, we have chosen five candidates from the Round 2 and Round 3 ...