Recent Submissions

  • Application-aware in-network service deployment for Collaborative Adaptive Sensing of the Atmosphere (CASA) 

    Contributor:Lee, Panho; Banka, Tarun; Lim, Sang-hun; Jayasumana, Anura P.; Chandrasekar, V.
    Date Submitted:2008
    An Engineering Research Center for Collaborative Adaptive Sensing of the Atmosphere (CASA) funded by the National Science Foundation, seeks to revolutionize the way we detect, monitor and predict atmospheric phenomena by ...
  • Wireless sensor network based system for underground chemical plume tracking, A 

    Contributor:Bandara, Herath M. N. Dilum; Jayasumana, Anura P.; Illangasekare, T. H.; Han, Qi
    Date Submitted:2008
    A real-time subsurface chemical plume monitoring and tracking system is being developed that uses wireless-sensor networking to automatically extract data from underground chemical sensors. This system is aimed at tracking ...
  • Good Samaritan Robotics User Interface Team 

    Contributor:Tranby, Steven Michael; Schmitt, Josh C.; Robinson, Jonathan Shea; Goebel, Stephen Richard; Darbonne, Kenneth C.; Wilkins, Brent H.; Kaiser, Carl L.
    Date Submitted:2006
    This poster presents the topic of the user interface team for the Urban Search And Rescue (USAR) Robot, Good Samaritan, senior design project. The USAR senior design project consists of four teams: platform, robotic arm, ...
  • Good Samaritan Mini: Urban Search and Rescue Robot 

    Contributor:Hoover, Nathaniel David; Haygood, Nicholas John; Guthrie, Brian D.; Bernstein, Ian H.; Rector, Michael Holman; Maciejewski, Anthony A.
    Date Submitted:2006
    In the wake of disasters such as the 9/11 attacks, it becomes clear that immediate rescue efforts must take place in a way that doesn't put the lives of the rescue workers themselves at stake. It is situations like these ...
  • Trust based routing protocol in MANET 

    Contributor:Poolsappsit, Nayot; Chakraborty, Sudip; Indrajit, Ray
    Traditional network routing protocols find the shortest path by minimizing a cost over the paths. Number of hops is the most common metric to measure this cost of forwarding. However, this administrative cost metric is not ...
  • Model the system security risk by an Attack Tree 

    Contributor:Poolsappasit, Nayot; Edwards, John; Ray, Indrajit
    Traditional Vulnerabilities scanners only give a list of vulnerabilities of the systems. This one dimensional information does not give analysts the perception of how exploits can be chained together and form more complex ...
  • Technology and history : bringing the past into the future 

    Contributor:Speaker, Ryan D.; Lyons, Linda
    Using photos, paintings, and other primary sources, students will discover World War I. This project is to demonstrate the importance of personal research, and to take a break from the monotony of textbook readings.
  • Measuring the robustness of resource allocations for distributed domputer systems in a stochastic dynamic environment 

    Contributor:Dewri, Rinku; Alqudah, Amin; Govindasamy, Sudha; Janovy, David; Sutton, Andrew; Ladd, Joshua; Prakash, Puneet; Renner, Timothy; Siegel, Howard Jay; Maciejewski, Anthony A.; Briceño, Luis D.; Smith, Jay; Shestak, Vladimir
    Heterogeneous distributed computing systems often must function in an environment where system parameters are subject to variations during operation. Robustness can be defined as the degree to which a system can function ...
  • Study of an iterative resource allocation technique to minimize machine completion times in a distributed computing system 

    Contributor:Oltikar, Mohana; Briceño, Luis D.; Maciejewski, Anthony A.; Siegel, Howard Jay
    Heterogeneous computing (HC) is the coordinated use of different types of machines, networks, and interfaces to maximize the combined performance and/or cost effectiveness. Heuristics for allocating resources in an HC ...
  • Retrieval of surface-layer moisture fields using CSU radars 

    Contributor:Fritz, Jason; Chandrasekar, Chandra V.
    The surface-layer refractivity, i.e., the refractive index of air near the earth’s surface, can be retrieved from radar by examining the phase of stationary ground targets. The index of refraction is a function of pressure, ...
  • Automatic generation of bit-vector analyses using OpenAnalysis 

    Contributor:Hovland, Paul; Strout, Michelle; Behere, Shweta
    Effective program analysis is essential for program optimization, program understanding and error detection. Classic data-flow analysis techniques assume only scalar variables within a program. However, real programs consist ...
  • For Your AMUSEment! : creating an online literary magazine to showcase student talent and achievement 

    Contributor:Johnson, Amanda; De Miranda, Michael Anthony
    This poster highlights/illustrates how technology can be integrated into an English Liberal Artsssroom using Publishing software. Designed for a high school level English student, students will express their school work, ...
  • Integrating technology in the classroom : how technology can enhance social studies 

    Contributor:Perry, Lynsey Malia; De Miranda, Michael Anthony
    This poster highlights the integration of technology within the classroom, focusing on U.S. History as a content area.
  • Technology in music education 

    Contributor:Stahly, Robert; De Miranda, Michael Anthony
    This poster will examine the many uses of technology in the instruction of music.
  • WebCT in the classroom : taking the discussion to the Net 

    Contributor:Hoggarth, Sean; De Miranda, Michael Anthony
    I want to create a poster that showed how I would use a webCT sort of program to hold discussion, peer-editing, and how that would lead to publishing of a student's work.
  • Technology in English education 

    Contributor:Sullivan, Brianna; De Miranda, Michael Anthony
    This poster will demonstrate technology in english education. It will demonstrate how technology can be used when teaching Shakespeare.
  • Robust resource allocation in a client/server hybrid network for virtual world environments 

    Contributor:Wedyan, Fadi Ibrahim; Teli, Mohammad Nayeem; Lock, Bradley Leo; Hong, Ye; Briceno, Luis D.; Zhang, Chen; Panaccione, Charles; Siegel, Howard Jay; Maciejewski, Anthony A.
    Date Submitted:2008
    HC is the coordinated use of different types of machines, networks, and interfaces to maximize performance. A virtual world environment is a multi-user program that creates a game world. In this study we maximize the ...
  • Active Sensing in an Urban Environment: Closing the Loop 

    Contributor:Barbosa, Patricia de Rezende; Li, Yun, 1970-; Chong, Edwin Kah Pin
    Date Submitted:2006
    When compared to tracking airborne targets, tracking ground targets on urban terrain brings a new set of challenges. Target mobility is constrained by road networks, and the quality of measurements is affected by dense ...
  • Opportunistic Scheduling for Wireless Networks 

    Contributor:Zhang, Zhi; Chong, Edwin Kah Pin
    Date Submitted:2006
    We consider the problem of downlink scheduling for multi-user OFDM (Orthogonal Frequency Division Multiplexing) systems. We derive optimal scheduling policies under three QoS/fairness constraints -- temporal fairness, ...
  • Portfolio Management using Partially Observable Markov Decision Process 

    Contributor:Zahedi, Ramin; Chong, Edwin Kah Pin
    Date Submitted:2006
    Portfolio theory is concerned with how an investor should divide his wealth among different securities. This problem was first formulated by Markowitz in 1952. Since then, other more sophisticated formulations have been ...

View more