Identifying Robust Sift Features for Improved Image Alignment, Sanjay Abhinav Vemuri, 2013 Advisor: John Gauch

A Secure and Fair Resource Sharing Model for Community Clouds, Santhosh S. Anand, 2013, Advisor: Brajendra Panda


Insider Threat Mitigation Models Based on Thresholds and Dependencies, Harini Ragavan, 2012, Advisor: Brajendra Panda

Location-Aware Traffic Managmeent on Mobile Phones, Sarath Krishna Mandava, 2012, Advisor: Nilanjan Banerjee

Extending the HybridThread SMP Model for Distributed Memory Systems, Eugene Anthony Cartwright, III, Advisor: David Andrews

Three-Dimensional Scene Reconstruction Using Multiple Microsoft Kinects, Matthew Thomas Miller, Advisor: John Gauch


Balancing Delay-Insensitive Ternary Logic Circuit for Mitigating Side-Channel Attacks, Christopher Porter, 2011, Advisor: Jia Di

Enabling Transfer-Of-Ownership Capability for Passive RFID Tags, Wiwat Leebhaisomboon, 2011, Advisor: Jia Di

Hardwire Trojan Detection Through Structural Checking, Jordan R. Yust, 2011, Advisor: Jia Di

The Effects of Anisotropic Gaussian Diffusion in Scale Invariant Feature Detection, Warner Skoch, 2011, Advisor: John Gauch

Motion Tracking in Video Sequences Using Features and Regions, Jonathan Dale Baran, 2011, Advisor: John Gauch

Creating Collaborative Panoramas Using Smart Phones, Anirudh Ladha, 2011, Advisor: John Gauch

Mobisafe: Using Cloud Computing to Prevent Phone Calls While Driving, Tri Le Nguyen, 2011, Advisor: Nilanjan Banerjee

L-LLAMA: A User-Adaptive Location-Based Energy Management System for Mobile Computers, Linlin Yang, 2011, Advisor: Nilanjan Banerjee

Location-Aware Traffic Management on Mobile Phones, Sarath Krishna Mandava, 2011, Advisor: Nilanjan Banerjee

Workflow Simulation in a Virtual World, Keith Stuart Perkins, 2011, Advisor: Craig Thompson

Defining, Executing and Visualizing Representative Workflows in a Retail Domain, May Zeineldin, 2011, Advisor: Craig Thompson

On The Complexity of Grid Coloring, Daniel Apon, 2011, Advisor: Wing Ning Li


Identifying Malicious User Collaboration in Information Systems, Khanh Nguyen Viet, 2010, Advisor: Brajendra Panda

Accelerometer Augmented GPS Localization Tool Using Hidden Markov Model, Haibo Zhang, 2010, Advisor: Nilanjan Banerjee

A Damage Prediction Based Transaction Management Model for Database Insider Threat Mitigation, Weihan Li, 2010, Advisor: Brajendra Panda

Exloration and Augmentation of Delay-Insensitive Asynchronous Circuits operating in Subthreshold Regime, David Coleman, 2010, Advisor: Jia Di

RFID Reader Module and Remote Electronics Unit Control Software, Kok Hin Liou, 2010, Advisor: Jia Di

Multi-Threshold CMOS Circuit Design Methodology from 2D to 3D, Ross Thian, 2010, Advisor: Jia Di

Investigation of Energy and Performance of Delay Insensitive Asynchronous Circuits With Concurrency, Anish Philip, 2010, Advisor: Jia Di

Optimum Transistor Sizing of MTNCL Threshold Gates for Various Design Constraints, David Roclin, 2010, Advisor: Jia Di

An Ontology-Based Hierarchical Browsing System for CiteSeerX, Nanhong Ye, 2010, Advisor: Susan Gauch

Ontology Learning Through Text Mining, Qiang Wang, 2010, Advisor: Susan Gauch

A Conceptual Recommender System for CiteSeerX, Ajith Kodakateri Pudhiyaveetil, 2010, Advisor: Susan Gauch

Deterring Free-Riding Behavior in BitTorrent Peer-To-Peer Networks, Aigul Khabdulina, 2010, Advisor: Dale R. Thompson

Transforming Interrupts to Prioritized, Schedulable Threads in Multicore Systems, Andres Esteban Baez Hidalgo, 2010, Advisor: David Andrews


Energy Efficient Mechanisms for High-Performance Wireless Sensor Networks, Baha' Adnan Alsaify, 2009, Advisor: Haiying Shen

The Hthreads Compiler Project: Lessons Learned from C to VHDL Compilation for FPGAS, James M. Stevens, 2009, Advisor: David L. Andrews

Design and Analysis of Multi-threshold CMOS (MTCMOS) Techniques in Synchrounous and Asynchronous Digital Designs, Ahmad Al-Zahrani, 2009, Advisor: Jia Di

An Ultra-low Power Methodology for Incorporating MTCMOS into Delay Insensitive Asynchronous Circuits, Andrew Bailey, 2009, Advisor: Jia Di

Side-channel Attack Mitigation using Dual-spacer Dual-rail Delay-insensitive Logic, Washington Alfredo Cilio, 2009, Advisor: Jia Di

Modeling Healthcare Logistics in a Virtual World: the Database Connection, Ala’a Y. Ahmad, 2009, Advisor: Craig W. Thompson

Using Cell B.E. and System-Z to Accelerate an Image Stitching Application, Sree Vardhani Malladi, 2009, Advisor: Craig W. Thompson


Fairshare Scheduling: A Case Study, Hung V. Bui, 2008, Advisor: Amy Apon

Power Efficient Implementation of Discrete Logarithm Transformation for Integer Exponentiation, Micah Byers, 2008, Advisor: Jia Di

8051-compliant Asynchronous Microcontroller Core Design, Fabrication, and Testing for Extreme Environment, Brent Hollosi, 2008, Advisor: Jia Di

A Corba-based Distributed and Multi-threaded Algorithm for Finding Related Records in a Large Data Set, Donald L. Hayes, 2008, Advisor: Wing Ning Li

Cost-effective Optimization of Data Dependency Based Intrusion Detection System, Yermek Nugmanov, 2008, Advisor: Brajendra Panda

Grouping Mechanism for Agent Based Damage Assessment, Naveen Ramanathan, 2008, Advisor: Brajendra Panda

Using FP-growth Algorithm for Database Intrusion Detection, Dinesh Neelapala, 2008, Advisor: Brajendra Panda

RFID as Electronic Article Surveillance: Feasibility Assessment, Justin Patton, 2008, Advisor: James Patrick Parkerson

Message Reliability over UDP, Suman Bharath, 2008, Advisor: Craig W. Thompson

Smart Device Virtualization: Building an LLRP RFID Reader Emulation Tool, Kyle Neumeier, 2008, Advisor: Craig W. Thompson

Developing a Test harness for Tagcentric, Swathi Musunuri, 2008, Advisor: Craig W. Thompson

Grindex3: Extensible Indexing Service for a Grid, Evan Kirkconnell, 2008, Advisor: Craig W. Thompson

Extending Menu-based Natural Language Interfaces with Geospatial Queries, Vinitha Reddy Chintapally, 2008, Advisor: Craig W. Thompson

Statistical Classifier: Case study of the Hotelling's Two Sample T2 Algorithm in the Presence of Noise, Nurbek Saparkhojayev, 2008, Advisor: Dale R. Thompson

Machine Learning Classification Analysis of Music Statistics, Kelli Janine Lee, 2008, Advisor: Dale R. Thompson


A Model for Data Authentication and Provenance Management, Hadi Sabaa, 2007, Advisor: Brajendra Panda

Identifying Unauthorized Activities by Insiders in Database System, Manideep Chagarlamudi, 2007, Advisor: Brajendra Panda

Overflow and Underflow Detection and Correction for Fixed-point Multiplication, Aaron J. Arthurs, 2007, Advisor: James Patrick Parkerson

Generations of Synthetic Data to Conform to Constraints Derived from Data Mining Applications, Joshua D. Eno, 2007, Advisor: Craig W. Thompson

Analysis of the Privacy Policies of Most Visited Web Sites, Jaanus Uudmae, 2007, Advisor: Dale R. Thompson

Fingerprinting RFID Tags, Senthilkumar Chinnappa Gounder Periaswamy, 2007, Advisor: Dale R. Thompson


Shibbolized Subersion, Linh Ngo, 2006, Advisor: Amy Apon

Methods for Maintaining Local Cluster Resources on the Open Science Grid, Matthew Michael Baker, 2006, Advisor: Amy Apon

Delay-insensitive Asynchronous Microcontroller Design for Extreme Temperatures, Jayamadhuri Penumarthi, 2006, Advisor: Jia Di

Parallel and Distributed Grouping Algorithms for Finding Related Records of Huge Data Set on Cluster Grids, Roopa Bheemavaram, 2006, Advisor: Wing Ning Li

A 3-D Approach and its Implementation Method for Storing Data Provenance in Relational Database, Frank Ching, 2006, Advisor: Brajendra Panda

Bit Vector Based Provenance Tracking Systems, Siddharta Gadang S., 2006, Advisor: Brajendra Panda

Data Validation in a Data Provenance Architecture, John A. Mathison, 2006, Advisor: Brajendra Panda

Query Aggregation Inference Control, Sastry Konduri, 2006, Advisor: Brajendra Panda

Development and Verification System for IEEE 1393 Ring Networks, John Ryan Serio, 2006, Advisor: James Patrick Parkerson

Grindex2: Framework and Prototype for a Grid Resident Database System, Reid A. Phillips, 2006, Advisor: Craig W. Thompson

Performance Analysis and Tuning of a Very Large Retail Application Implemented on a Grid Database Management System, Vijaya Satya Kalyan Jonnalagedda, 2006, Advisor: Craig W. Thompson

Architecture of an Extensible Agent System, Joseph Robertson, 2006, Advisor: Craig W. Thompson

Mimicking RFID Readers Using Honeyd Honeypots for intrusion Detection, Anthony DuShawn Lofton, 2006, Advisor: Dale R. Thompson

MIXNET Using Universal re-encryption for Radio Frequency Identification, Harshitha Sunkara, 2006, Advisor: Dale R. Thompson