This page contains all publications submitted to SURFACE written by students, faculty, and staff in the department.

Follow

2018

PDF

STATIC ENFORCEMENT OF TERMINATION-SENSITIVE NONINTERFERENCE USING THE C++ TEMPLATE TYPE SYSTEM, Scott Douglas Constable

ON FUSION-BASED APPROACHES FOR DETECTING, CLASSIFYING AND TRACKING OBJECTS FROM IMAGE AND VIDEO DATA, Maria Cornacchia

PDF

Breaking Symmetry: A Study of Novel Phenomena in Asymmetric Nanoplasmonic Systems, Matthew Scott Davis

PDF

On Classification in Human-driven and Data-driven Systems, Qunwei Li

PDF

Efficient Online Scheduling in Distributed Stream Data Processing Systems, Teng Li

PDF

Efficient machine learning: models and accelerations, Zhe Li

PDF

INTERPOLATION AND EXTRAPOLATION OF MISSING ANTENNA MEASUREMENT DATASETS USING THE CAUCHY METHOD AND MATRIX PENCIL METHOD, Nicolas Reginelli

PDF

Computational Analysis of Developmental Disorders in Children, Siri Chandana Sambatur

PDF

MODELING AND RESOURCE ALLOCATION IN MOBILE WIRELESS NETWORKS, Jing Wang

PDF

multimedia transmission over wireless networks: performance analysis and optimal resource allocation, Chuang Ye

PDF

Multi-type Fair Resource Allocation for Distributed Multi-Robot Systems, Qinyun Zhu

2017

PDF

Facilitating High Performance Code Parallelization, Maria Abi Saad

PDF

Efficient Implementation of Stochastic Inference on Heterogeneous Clusters and Spiking Neural Networks, Khadeer Ahmed

Software Performance Estimation Using Feedback-Directed Analysis, Elie ElAaraj

PDF

THE SCALABLE AND ACCOUNTABLE BINARY CODE SEARCH AND ITS APPLICATIONS, Qian Feng

PDF

DETECTION, DIAGNOSIS AND MITIGATION OF MALICIOUS JAVASCRIPT WITH ENRICHED JAVASCRIPT EXECUTIONS, Xunchao Hu

PDF

Delay QoS Provisioning and Optimal Resource Allocation for Wireless Networks, Yi Li

PDF

Computer Vision Algorithms for Mobile Camera Applications, KORAY OZCAN

PDF

Wireless Throughput and Energy Efficiency under QoS Constraints, Mustafa Ozmen

PDF

ONLINE LEARNING WITH BANDITS FOR COVERAGE, Mahmuda Rahman

PDF

Multi-target Extension for Beacon Foraging Methods, Christopher Sanford, Ziong Jiao, and Jae Oh

PDF

A Data Driven Approach to Solar Generation Forecasting, Guangyuan Shi

PDF

Rectangular Waveguide Filled with Uniaxial Medium and Negative Resistance Enhanced Composite Right/Left-Handed Transmission Line, Kepei Sun

PDF

Information Theoretic Limits of State-dependent Networks, Yunhao Sun

PDF

Associative Pattern Recognition for Biological Regulation Data, Yiou Xiao

PDF

Risk-aware navigation for UAV digital data collection, Zhi Xing

Enhancing survivability and reliability in the cloud, Jielong Xu

DATA LEAKAGE CONCERNS OF COMMERCIAL OFF-THE-SHELF SMALL UNMANNED AERIAL SYSTEMS: AN IN-DEPTH LOOK AT ANDROID DJI CONTROL SOFTWARE THROUGH A NEW ANALYSIS PROCESS, Andrew Zeliff

PDF

Wireless Information and Power Transfer in Communication Networks: Performance Analysis and Optimal Resource Allocation, Tewodros Aklilu Zewde

PDF

Algorithms and Theory for Robust PCA and Phase Retrieval, Huishuai Zhang

PDF

Ensemble Methods for Anomaly Detection, Zhiruo Zhao

PDF

Quantized Consensus by the Alternating Direction Method of Multipliers: Algorithms and Applications, Shengyu Zhu

2016

PDF

SYSTEMATIC DISCOVERY OF ANDROID CUSTOMIZATION HAZARDS, Yousra Aafer

PDF

Optimal Inference for Distributed Detection, Earnest Akofor

PDF

Automated code extraction from packed android applications., Abhishek Vasisht Bhaskar

A Low-Computation-Complexity, Energy-Efficient, and High-Performance Linear Program Solver Using Memristor Crossbars, Ruizhe Cai

PDF

SENSOR MANAGEMENT FOR LOCALIZATION AND TRACKING IN WIRELESS SENSOR NETWORKS, Nianxia Cao

PDF

Neuromorphic Learning Systems for Supervised and Unsupervised Applications, Qiuwen Chen

PDF

Resource Allocation for Interference Management in Wireless Networks, Raghed El Bardan

PDF

Identification of key players in networks using multi-objective optimization and its applications, R Chulaka Gunasekara

PDF

Selective Dynamic Analysis of Virtualized Whole-System Guest Environments, Andrew William Henderson

PDF

Risk-Aware Planning for Sensor Data Collection, Jeffrey Hudack

PDF

Distributed Inference and Learning with Byzantine Data, Bhavya Kailkhura

Efficient search algorithms for social networking scheduling applications, Subodh Kalia

PDF

Resource Management for Distributed Estimation via Sparsity-Promoting Regularization, Sijia Liu

PDF

PARAMETERS THAT AFFECT PARALLEL PROCESSING FOR COMPUTATIONAL ELECTROMAGNETIC SIMULATION CODES ON HIGH PERFORMANCE COMPUTING CLUSTERS, Hongsik Moon

PDF

On the Design and Analysis of Secure Inference Networks, Venkata Sriram Siddhardh Nadendla

PDF

Cognitive Radio Systems: Performance Analysis and Optimal Resource Allocation, Gozde Ozcan

PDF

On Distributed and Acoustic Sensing for Situational Awareness, FANGRONG PENG

PDF

A Graph-based Bandit Algorithm for Maximum User Coverage in Online Recommendation Systems, Mahmuda Rahman and Jae C. Oh

PDF

Understanding and Improving Security of the Android Operating System, Edward Paul Ratazzi

PDF

Assessing gender inequality from large scale online student reviews, Souradeep Sinha

PDF

An All-in-One Debugging Approach: Java Debugging, Execution Visualization and Verification, Beinan Wang

PDF

Data Driven Nonparametric Detection, Weiguang Wang

PDF

Intentio Ex Machina: Android Intent Access Control via an Extensible Application Hook, Carter Yagemann

PDF

ROBUST KULLBACK-LEIBLER DIVERGENCE AND ITS APPLICATIONS IN UNIVERSAL HYPOTHESIS TESTING AND DEVIATION DETECTION, Pengfei Yang

PDF

UNCOVERING AND MITIGATING UNSAFE PROGRAM INTEGRATIONS IN ANDROID, Xiao Zhang

PDF

Improving the Efficiency of Energy Harvesting Embedded System, Yukan Zhang

PDF

Contributions On Theory And Practice For Multi-Mission Wireless Systems, Yu Zhao

PDF

Nonparametric Anomaly Detection and Secure Communication, Shaofeng Zou

2015

PDF

GraphTracker: A User Opt-in Approach to Web Tracking, Kevin Daniel Aziz

PDF

On robust and secure wireless communication system design using software-defined radios, Kapil Meghashyam Borle

PDF

Surface Plasmon Polaritons: Guided-wave Devices and Applications, Ashish Chanana

PDF

CHARACTERIZATION OF FUNDAMENTAL COMMUNICATION LIMITS OF STATE-DEPENDENT INTERFERENCE NETWORKS, Ruchen Duan

FABRICATION AND TESTING OF NANOSCALE THICKNESS METAL CYLINDER FIBER, Ronak B. Gandhi

PDF

Power-Aware Planning and Design for Next Generation Wireless Networks, Chenfei Gao

PDF

Coalition Formation For Distributed Constraint Optimization Problems, Nathaniel Gemelli

PDF

Heterogeneous Sensor Signal Processing for Inference with Nonlinear Dependence, Hao He

PDF

INDIUM TELLURIDE (In2Te3) SEMICONDUCTOR CYLINDER FIBER SENSOR, Xun Huang

PDF

Design of a High Capacity, Scalable, and Green Wireless Communication System Leveraging the Unlicensed Spectrum, Mohammad Riaz Khawer

PDF

Link Prediction in Dynamic Weighted and Directed Social Network using Supervised Learning, Ricky Laishram

PDF

Gate-level timing analysis and waveform evaluation, Chaobo Li

PDF

Motion in the Field: A Study of Movement in Computer Science, Catherine Martin

PDF

Integration of EVs and DGs into the Electric Power System for Grid Modernization, Mohammad Nikkhah Mojdehi

PDF

Binary Program Integrity Models for Defeating Code-Reuse Attacks, Aravind Prakash

The Rootbeer Gpu Compiler, Phil Pratt-Szeliga

PDF

PINPOINT: Efficient and Effective Resource Isolation for Mobile Security and Privacy, Paul Ratazzi, Ashok Bommisetti, Nian Ji, and Wenliang Du

PDF

A Unified And Green Platform For Smartphone Sensing, Xiang Sheng

PDF

Reliable Inference from Unreliable Agents, Aditya Vempaty

A Semantics and Context -Aware Approach to Android Application Security, Mu Zhang

PDF

Capacity Analysis for Gaussian and Discrete Memoryless Interference Networks, Fangfang Zhu

2014

PDF

Accelerating Pattern Matching in Neuromorphic Text Recognition System Using Intel Xeon Phi Coprocessor, Khadeer Ahmed

PDF

ENERGY-EFFICIENT LIGHTWEIGHT ALGORITHMS FOR EMBEDDED SMART CAMERAS: DESIGN, IMPLEMENTATION AND PERFORMANCE ANALYSIS, Mauricio Casares

PDF

EARLY PERFORMANCE PREDICTION METHODOLOGY FOR MANY-CORES ON CHIP BASED APPLICATIONS, Boray S. Deepaksubramanyan

PDF

A STUDY FOR THE PROPAGATION OF ELECTROMAGNETIC WAVES OVER IMPERFECT GROUND PLANES BASED ON SCHELKUNOFF INTEGRALS, Walid Mohamed Galal Dyab

PDF

DYADIC GREEN'S FUNCTIONS FOR LAYERED GENERAL ANISOTROPIC MEDIA AND THEIR APPLICATION TO RADIATION OF DIPOLE ANTENNAS, Ying Huang

PDF

ADVANCED IMPLEMENTATIONS OF THE ITERATIVE MULTI REGION TECHNIQUE, Fatih Kaburcuk

PDF

Identifying Extract Class and Extract Method Refactoring Opportunities Through Analysis of Variable Declarations and Uses, Mehmet Kaya

PDF

Network Theoretic Analyses and Enhancements of Evolutionary Algorithms, Karthik Kuber

PDF

REPUTATION COMPUTATION IN SOCIAL NETWORKS AND ITS APPLICATIONS, JooYoung Lee

PDF

ATTACKS AND COUNTERMEASURES FOR WEBVIEW ON MOBILE SYSTEMS, Tongbo Luo

PDF

Solving time domain scattering and radiation problems in a marching-on-in-degree technique for method of moment, Zicong Mei

PDF

Problems in the Theory of Convergence Spaces, Daniel R. Patten

Wideband Phased Array Design and Characterization, Mark J. Povinelli

PDF

A Systematic Security Evaluation of Android’s Multi-User Framework, Edward Paul Ratazzi, Yousra Aafer, Amit Ahlawat, Hao Hao, Yifei Wang, and Wenliang Du

PDF

The Unified-FFT Method for Fast Solution of Integral Equations as Applied to Shielded-Domain Electromagnetics, Brian J. Rautio

MULTI-FREQUENCY ADAPTIVE BEAMFORMING USING DIRECT DATA DOMAIN LEAST SQUARES APPROACH, Dojana Salama

PDF

Instructions-Based Detection of Sophisticated Obfuscation and Packing, Moustafa Saleh, Edward Paul Ratazzi, and Shouhuai Xu

PDF

Indium Telluride Cylinder Fiber Laser, Abhinay Sandupatla

PDF

ADAPTIVE POWER MANAGEMENT FOR COMPUTERS AND MOBILE DEVICES, Hao Shen