Ultra-Low Voltage Digital Circuits and Extreme Temperature Electronics Design, Aaron J. Arthurs, 2012, Advisor: Jia Di

Recognizing Patterns in Transmitted Signals for Identification Purposes, Baha' A. Alsaify, 2012, Advisor: Dale R. Thompson

Mitigating Insider Threat in Relational Database Systems, Qussai Yaseen, 2012, Advisor: Brajendra Panda

A Domain Specific Model for Generating ETL Workflows From Business Intents, Wesley Deneke, 2012, Advisor: Craig Thompson


File System Simulation: Hierarchical Performance Measurement and Modeling, Hai Quang Nguyen, 2011, Advisor: Amy Apon

Application of The Empirical Mode Decomposition On The Characterization And Forecasting Of The Arrival Data Of An Enterprise Cluster, Linh Bao Ngo, 2011, Advisor: Amy Apon

High Performance Geospatial Analysis On Emerging Parallel Architectures, Seth Warn, 2011, Advisor: Amy Apon

Modeling Interprocess Shared-Cache Contention On Multicore Architecutres With Applications in Virtual Machine CPU, Wesley Emeneker, 2011, Advisor: Amy Apon


Methodologies to Automatically Identify and Protect Critical Data in order to Mitigate Insider Threats, Jonathan White, 2010, Advisor: Brajendra Panda

Search Engine for Virtual Worlds, Joshua Eno, 2010, Advisors: Susan Gauch and Craig Thompson

Authentication of Radio Frequency Identification Devices Using Electronic Characteristics, Senthilkumar Chinnappa Gounder Periaswamy (Senthilkumar CP), 2010, Advisor: Dale Thompson

Hardware Microkernels - A Novel Method for Constructing Operating Systems for Hetergeneous Multi-Core Platforms, Jason M. Agron, 2010, Advisor: David Andrews

Reusing Domain Ontologies, Mirco Speretta, 2010, Advisor: Susan Gauch


Layout Inference: File Schema Recognition Via Content-based Oracles, Reid A. Phillips, 2009, Advisor: Wing Ning Li and Craig W. Thompson


An Integrated Capacity Planning Environment for Enterprise Grids, Baochuan Lu, 2008, Advisor: Amy Apon

Semantic Mining of Networks with Scale Free Structure, Ameera Jaradat, 2008, Advisor: Russell Deaton

Design and Analysis of Knowledge-base Centric Insider Threat Models, Qutaibah Althebyan, 2008, Advisor: Brajendra Panda

Synthetic Data Generation: Theory, Techniques and Applications, Joseph E. Hoag, 2008, Advisor: Craig W. Thompson