Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Colorado State University" +contributor:("Malaiya, Yashwant"). Showing records 1 – 25 of 25 total matches.

Search Limiters

Last 2 Years | English Only

Degrees

Levels

▼ Search Limiters


Colorado State University

1. Puranik, Mugdha. Optimal design space exploration for FPGA-based accelerators: a case study on 1-D FDTD.

Degree: MS(M.S.), Electrical and Computer Engineering, 2015, Colorado State University

 Hardware accelerators are optimized functional blocks designed to offload specific tasks from the CPU, speed up them up and reduce their dynamic power consumption. It… (more)

Subjects/Keywords: hardware accelerators; stencil computations

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Puranik, M. (2015). Optimal design space exploration for FPGA-based accelerators: a case study on 1-D FDTD. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/170328

Chicago Manual of Style (16th Edition):

Puranik, Mugdha. “Optimal design space exploration for FPGA-based accelerators: a case study on 1-D FDTD.” 2015. Masters Thesis, Colorado State University. Accessed March 08, 2021. http://hdl.handle.net/10217/170328.

MLA Handbook (7th Edition):

Puranik, Mugdha. “Optimal design space exploration for FPGA-based accelerators: a case study on 1-D FDTD.” 2015. Web. 08 Mar 2021.

Vancouver:

Puranik M. Optimal design space exploration for FPGA-based accelerators: a case study on 1-D FDTD. [Internet] [Masters thesis]. Colorado State University; 2015. [cited 2021 Mar 08]. Available from: http://hdl.handle.net/10217/170328.

Council of Science Editors:

Puranik M. Optimal design space exploration for FPGA-based accelerators: a case study on 1-D FDTD. [Masters Thesis]. Colorado State University; 2015. Available from: http://hdl.handle.net/10217/170328


Colorado State University

2. Mahindre, Gunjan S. Coordinate repair and medial axis detection in virtual coordinate based sensor networks.

Degree: MS(M.S.), Electrical and Computer Engineering, 2014, Colorado State University

 Wireless Sensor Networks (WSNs) perform several operations like routing, topology extraction, data storage and data processing that depend on the efficiency of the localization scheme… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mahindre, G. S. (2014). Coordinate repair and medial axis detection in virtual coordinate based sensor networks. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/88571

Chicago Manual of Style (16th Edition):

Mahindre, Gunjan S. “Coordinate repair and medial axis detection in virtual coordinate based sensor networks.” 2014. Masters Thesis, Colorado State University. Accessed March 08, 2021. http://hdl.handle.net/10217/88571.

MLA Handbook (7th Edition):

Mahindre, Gunjan S. “Coordinate repair and medial axis detection in virtual coordinate based sensor networks.” 2014. Web. 08 Mar 2021.

Vancouver:

Mahindre GS. Coordinate repair and medial axis detection in virtual coordinate based sensor networks. [Internet] [Masters thesis]. Colorado State University; 2014. [cited 2021 Mar 08]. Available from: http://hdl.handle.net/10217/88571.

Council of Science Editors:

Mahindre GS. Coordinate repair and medial axis detection in virtual coordinate based sensor networks. [Masters Thesis]. Colorado State University; 2014. Available from: http://hdl.handle.net/10217/88571


Colorado State University

3. He, Xin. Outlier detection approach for PCB testing based on Principal Component Analysis, An.

Degree: MS(M.S.), Electrical and Computer Engineering, 2011, Colorado State University

 Capacitive Lead Frame Testing, a widely used approach for printed circuit board testing, is very effective for open solder detection. The approach, however, is affected… (more)

Subjects/Keywords: board; principal component analysis; open defect; CDF

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

He, X. (2011). Outlier detection approach for PCB testing based on Principal Component Analysis, An. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/47315

Chicago Manual of Style (16th Edition):

He, Xin. “Outlier detection approach for PCB testing based on Principal Component Analysis, An.” 2011. Masters Thesis, Colorado State University. Accessed March 08, 2021. http://hdl.handle.net/10217/47315.

MLA Handbook (7th Edition):

He, Xin. “Outlier detection approach for PCB testing based on Principal Component Analysis, An.” 2011. Web. 08 Mar 2021.

Vancouver:

He X. Outlier detection approach for PCB testing based on Principal Component Analysis, An. [Internet] [Masters thesis]. Colorado State University; 2011. [cited 2021 Mar 08]. Available from: http://hdl.handle.net/10217/47315.

Council of Science Editors:

He X. Outlier detection approach for PCB testing based on Principal Component Analysis, An. [Masters Thesis]. Colorado State University; 2011. Available from: http://hdl.handle.net/10217/47315


Colorado State University

4. Algarni, Abdullah Mahdi. Quantitative economics of security: software vulnerabilities and data breaches.

Degree: PhD, Computer Science, 2016, Colorado State University

 Security vulnerabilities can represent enormous risks to society and business organizations. A large percentage of vulnerabilities in software are discovered by individuals external to the… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Algarni, A. M. (2016). Quantitative economics of security: software vulnerabilities and data breaches. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/176634

Chicago Manual of Style (16th Edition):

Algarni, Abdullah Mahdi. “Quantitative economics of security: software vulnerabilities and data breaches.” 2016. Doctoral Dissertation, Colorado State University. Accessed March 08, 2021. http://hdl.handle.net/10217/176634.

MLA Handbook (7th Edition):

Algarni, Abdullah Mahdi. “Quantitative economics of security: software vulnerabilities and data breaches.” 2016. Web. 08 Mar 2021.

Vancouver:

Algarni AM. Quantitative economics of security: software vulnerabilities and data breaches. [Internet] [Doctoral dissertation]. Colorado State University; 2016. [cited 2021 Mar 08]. Available from: http://hdl.handle.net/10217/176634.

Council of Science Editors:

Algarni AM. Quantitative economics of security: software vulnerabilities and data breaches. [Doctoral Dissertation]. Colorado State University; 2016. Available from: http://hdl.handle.net/10217/176634


Colorado State University

5. Mandyam Narasiodeyar, Raghunandan. Impact of resequencing buffer distribution on packet reordering.

Degree: MS(M.S.), Electrical and Computer Engineering, 2011, Colorado State University

 Packet reordering in Internet has become an unavoidable phenomenon wherein packets get displaced during transmission resulting in out of order packets at the destination. Resequencing… (more)

Subjects/Keywords: buffer; resequencing; packet reordering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mandyam Narasiodeyar, R. (2011). Impact of resequencing buffer distribution on packet reordering. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/47296

Chicago Manual of Style (16th Edition):

Mandyam Narasiodeyar, Raghunandan. “Impact of resequencing buffer distribution on packet reordering.” 2011. Masters Thesis, Colorado State University. Accessed March 08, 2021. http://hdl.handle.net/10217/47296.

MLA Handbook (7th Edition):

Mandyam Narasiodeyar, Raghunandan. “Impact of resequencing buffer distribution on packet reordering.” 2011. Web. 08 Mar 2021.

Vancouver:

Mandyam Narasiodeyar R. Impact of resequencing buffer distribution on packet reordering. [Internet] [Masters thesis]. Colorado State University; 2011. [cited 2021 Mar 08]. Available from: http://hdl.handle.net/10217/47296.

Council of Science Editors:

Mandyam Narasiodeyar R. Impact of resequencing buffer distribution on packet reordering. [Masters Thesis]. Colorado State University; 2011. Available from: http://hdl.handle.net/10217/47296


Colorado State University

6. Pendharkar, Gayatri Arun. Topology inference of Smart Fabric grids - a virtual coordinate based approach.

Degree: MS(M.S.), Electrical and Computer Engineering, 2020, Colorado State University

 Driven by increasing potency and decreasing cost/size of the electronic devices capable of sensing, actuating, processing and wirelessly communicating, the Internet of Things (IoT) is… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pendharkar, G. A. (2020). Topology inference of Smart Fabric grids - a virtual coordinate based approach. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/208450

Chicago Manual of Style (16th Edition):

Pendharkar, Gayatri Arun. “Topology inference of Smart Fabric grids - a virtual coordinate based approach.” 2020. Masters Thesis, Colorado State University. Accessed March 08, 2021. http://hdl.handle.net/10217/208450.

MLA Handbook (7th Edition):

Pendharkar, Gayatri Arun. “Topology inference of Smart Fabric grids - a virtual coordinate based approach.” 2020. Web. 08 Mar 2021.

Vancouver:

Pendharkar GA. Topology inference of Smart Fabric grids - a virtual coordinate based approach. [Internet] [Masters thesis]. Colorado State University; 2020. [cited 2021 Mar 08]. Available from: http://hdl.handle.net/10217/208450.

Council of Science Editors:

Pendharkar GA. Topology inference of Smart Fabric grids - a virtual coordinate based approach. [Masters Thesis]. Colorado State University; 2020. Available from: http://hdl.handle.net/10217/208450


Colorado State University

7. Shah, Pritam. Virtual coordinate based techniques for wireless sensor networks: a simulation tool and localization & planarization algorithms.

Degree: MS(M.S.), Electrical and Computer Engineering, 2013, Colorado State University

 Wireless sensor Networks (WSNs) are deployments of smart sensor devices for monitoring environmental or physical phenomena. These sensors have the ability to communicate with other… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shah, P. (2013). Virtual coordinate based techniques for wireless sensor networks: a simulation tool and localization & planarization algorithms. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/80311

Chicago Manual of Style (16th Edition):

Shah, Pritam. “Virtual coordinate based techniques for wireless sensor networks: a simulation tool and localization & planarization algorithms.” 2013. Masters Thesis, Colorado State University. Accessed March 08, 2021. http://hdl.handle.net/10217/80311.

MLA Handbook (7th Edition):

Shah, Pritam. “Virtual coordinate based techniques for wireless sensor networks: a simulation tool and localization & planarization algorithms.” 2013. Web. 08 Mar 2021.

Vancouver:

Shah P. Virtual coordinate based techniques for wireless sensor networks: a simulation tool and localization & planarization algorithms. [Internet] [Masters thesis]. Colorado State University; 2013. [cited 2021 Mar 08]. Available from: http://hdl.handle.net/10217/80311.

Council of Science Editors:

Shah P. Virtual coordinate based techniques for wireless sensor networks: a simulation tool and localization & planarization algorithms. [Masters Thesis]. Colorado State University; 2013. Available from: http://hdl.handle.net/10217/80311


Colorado State University

8. Mussa, Awad A. Younis. Quantifying the security risk of discovering and exploiting software vulnerabilities.

Degree: PhD, Computer Science, 2016, Colorado State University

 Most of the attacks on computer systems and networks are enabled by vulnerabilities in a software. Assessing the security risk associated with those vulnerabilities is… (more)

Subjects/Keywords: software security; vulnerabilities exploitation; vulnerability rewards program and time to vulnerability disclosure; software vulnerabilities; cvss and OWASP metrics; vulnerabilities risk and severity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mussa, A. A. Y. (2016). Quantifying the security risk of discovering and exploiting software vulnerabilities. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/176641

Chicago Manual of Style (16th Edition):

Mussa, Awad A Younis. “Quantifying the security risk of discovering and exploiting software vulnerabilities.” 2016. Doctoral Dissertation, Colorado State University. Accessed March 08, 2021. http://hdl.handle.net/10217/176641.

MLA Handbook (7th Edition):

Mussa, Awad A Younis. “Quantifying the security risk of discovering and exploiting software vulnerabilities.” 2016. Web. 08 Mar 2021.

Vancouver:

Mussa AAY. Quantifying the security risk of discovering and exploiting software vulnerabilities. [Internet] [Doctoral dissertation]. Colorado State University; 2016. [cited 2021 Mar 08]. Available from: http://hdl.handle.net/10217/176641.

Council of Science Editors:

Mussa AAY. Quantifying the security risk of discovering and exploiting software vulnerabilities. [Doctoral Dissertation]. Colorado State University; 2016. Available from: http://hdl.handle.net/10217/176641


Colorado State University

9. Joh, HyunChul. Quantitative analyses of software vulnerabilities.

Degree: PhD, Computer Science, 2011, Colorado State University

 There have been numerous studies addressing computer security and software vulnerability management. Most of the time, they have taken a qualitative perspective. In many other… (more)

Subjects/Keywords: modeling; quantitative analysis; risk; security; software; vulnerability discovery process

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Joh, H. (2011). Quantitative analyses of software vulnerabilities. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/70444

Chicago Manual of Style (16th Edition):

Joh, HyunChul. “Quantitative analyses of software vulnerabilities.” 2011. Doctoral Dissertation, Colorado State University. Accessed March 08, 2021. http://hdl.handle.net/10217/70444.

MLA Handbook (7th Edition):

Joh, HyunChul. “Quantitative analyses of software vulnerabilities.” 2011. Web. 08 Mar 2021.

Vancouver:

Joh H. Quantitative analyses of software vulnerabilities. [Internet] [Doctoral dissertation]. Colorado State University; 2011. [cited 2021 Mar 08]. Available from: http://hdl.handle.net/10217/70444.

Council of Science Editors:

Joh H. Quantitative analyses of software vulnerabilities. [Doctoral Dissertation]. Colorado State University; 2011. Available from: http://hdl.handle.net/10217/70444


Colorado State University

10. Wedyan, Fadi. Testing with state variable data-flow criteria for aspect-oriented programs.

Degree: PhD, Computer Science, 2011, Colorado State University

 Data-flow testing approaches have been used for procedural and object-oriented (OO) programs, and empirically shown to be effective in detecting faults. However, few such approaches… (more)

Subjects/Keywords: aspectJ; aspect-oriented testing; coverage tool; data-flow criteria; mutation testing; software testing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wedyan, F. (2011). Testing with state variable data-flow criteria for aspect-oriented programs. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/48181

Chicago Manual of Style (16th Edition):

Wedyan, Fadi. “Testing with state variable data-flow criteria for aspect-oriented programs.” 2011. Doctoral Dissertation, Colorado State University. Accessed March 08, 2021. http://hdl.handle.net/10217/48181.

MLA Handbook (7th Edition):

Wedyan, Fadi. “Testing with state variable data-flow criteria for aspect-oriented programs.” 2011. Web. 08 Mar 2021.

Vancouver:

Wedyan F. Testing with state variable data-flow criteria for aspect-oriented programs. [Internet] [Doctoral dissertation]. Colorado State University; 2011. [cited 2021 Mar 08]. Available from: http://hdl.handle.net/10217/48181.

Council of Science Editors:

Wedyan F. Testing with state variable data-flow criteria for aspect-oriented programs. [Doctoral Dissertation]. Colorado State University; 2011. Available from: http://hdl.handle.net/10217/48181


Colorado State University

11. Woo, Sung-Whan. Simple and dynamic data structure for pattern matching in texts, A.

Degree: PhD, Computer Science, 2011, Colorado State University

 The demand for a pattern matching algorithm is currently on the rise from diverse areas such as string search, image matching, voice recognition and bioinformatics.… (more)

Subjects/Keywords: data structure; string searching; pattern matching; dynamic string matching

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Woo, S. (2011). Simple and dynamic data structure for pattern matching in texts, A. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/48169

Chicago Manual of Style (16th Edition):

Woo, Sung-Whan. “Simple and dynamic data structure for pattern matching in texts, A.” 2011. Doctoral Dissertation, Colorado State University. Accessed March 08, 2021. http://hdl.handle.net/10217/48169.

MLA Handbook (7th Edition):

Woo, Sung-Whan. “Simple and dynamic data structure for pattern matching in texts, A.” 2011. Web. 08 Mar 2021.

Vancouver:

Woo S. Simple and dynamic data structure for pattern matching in texts, A. [Internet] [Doctoral dissertation]. Colorado State University; 2011. [cited 2021 Mar 08]. Available from: http://hdl.handle.net/10217/48169.

Council of Science Editors:

Woo S. Simple and dynamic data structure for pattern matching in texts, A. [Doctoral Dissertation]. Colorado State University; 2011. Available from: http://hdl.handle.net/10217/48169


Colorado State University

12. Yu, Lijun. Scenario-based technique to analyze UML design class models, A.

Degree: PhD, Computer Science, 2014, Colorado State University

 Identifying and resolving design problems in the early design phases can help reduce the number of design errors in implementations. In this dissertation a tool-supported… (more)

Subjects/Keywords: unified modeling language; consistency check; software engineering experiment; scenario; formal verification; formal analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yu, L. (2014). Scenario-based technique to analyze UML design class models, A. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/82485

Chicago Manual of Style (16th Edition):

Yu, Lijun. “Scenario-based technique to analyze UML design class models, A.” 2014. Doctoral Dissertation, Colorado State University. Accessed March 08, 2021. http://hdl.handle.net/10217/82485.

MLA Handbook (7th Edition):

Yu, Lijun. “Scenario-based technique to analyze UML design class models, A.” 2014. Web. 08 Mar 2021.

Vancouver:

Yu L. Scenario-based technique to analyze UML design class models, A. [Internet] [Doctoral dissertation]. Colorado State University; 2014. [cited 2021 Mar 08]. Available from: http://hdl.handle.net/10217/82485.

Council of Science Editors:

Yu L. Scenario-based technique to analyze UML design class models, A. [Doctoral Dissertation]. Colorado State University; 2014. Available from: http://hdl.handle.net/10217/82485


Colorado State University

13. Al Lail, Mustafa. Unified modeling language framework for specifying and analyzing temporal properties, A.

Degree: PhD, Computer Science, 2018, Colorado State University

 In the context of Model-Driven Engineering (MDE), designers use the Unified Modeling Language (UML) to create models that drive the entire development process. Once UML… (more)

Subjects/Keywords: properties; temporal; verification; specification; model checking; UML

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al Lail, M. (2018). Unified modeling language framework for specifying and analyzing temporal properties, A. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/191492

Chicago Manual of Style (16th Edition):

Al Lail, Mustafa. “Unified modeling language framework for specifying and analyzing temporal properties, A.” 2018. Doctoral Dissertation, Colorado State University. Accessed March 08, 2021. http://hdl.handle.net/10217/191492.

MLA Handbook (7th Edition):

Al Lail, Mustafa. “Unified modeling language framework for specifying and analyzing temporal properties, A.” 2018. Web. 08 Mar 2021.

Vancouver:

Al Lail M. Unified modeling language framework for specifying and analyzing temporal properties, A. [Internet] [Doctoral dissertation]. Colorado State University; 2018. [cited 2021 Mar 08]. Available from: http://hdl.handle.net/10217/191492.

Council of Science Editors:

Al Lail M. Unified modeling language framework for specifying and analyzing temporal properties, A. [Doctoral Dissertation]. Colorado State University; 2018. Available from: http://hdl.handle.net/10217/191492


Colorado State University

14. Doshi, Saket Sham. Applications of inertial measurement units in monitoring rehabilitation progress of arm in stroke survivors.

Degree: MS(M.S.), Electrical and Computer Engineering, 2011, Colorado State University

 Constraint Induced Movement Therapy (CIMT) has been clinically proven to be effective in restoring functional abilities of the affected arm among stroke survivors. Current CIMT… (more)

Subjects/Keywords: stroke rehabilitation; accelerometers; constraint induced movement therapy; inertial measurement unit; Kalman filter; motion tracking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Doshi, S. S. (2011). Applications of inertial measurement units in monitoring rehabilitation progress of arm in stroke survivors. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/48196

Chicago Manual of Style (16th Edition):

Doshi, Saket Sham. “Applications of inertial measurement units in monitoring rehabilitation progress of arm in stroke survivors.” 2011. Masters Thesis, Colorado State University. Accessed March 08, 2021. http://hdl.handle.net/10217/48196.

MLA Handbook (7th Edition):

Doshi, Saket Sham. “Applications of inertial measurement units in monitoring rehabilitation progress of arm in stroke survivors.” 2011. Web. 08 Mar 2021.

Vancouver:

Doshi SS. Applications of inertial measurement units in monitoring rehabilitation progress of arm in stroke survivors. [Internet] [Masters thesis]. Colorado State University; 2011. [cited 2021 Mar 08]. Available from: http://hdl.handle.net/10217/48196.

Council of Science Editors:

Doshi SS. Applications of inertial measurement units in monitoring rehabilitation progress of arm in stroke survivors. [Masters Thesis]. Colorado State University; 2011. Available from: http://hdl.handle.net/10217/48196

15. Mosharraf Ghahfarokhi, Negar. Cooperative defense mechanisms for detection, identification and filtering of DDoS attacks.

Degree: PhD, Electrical and Computer Engineering, 2016, Colorado State University

To view the abstract, please see the full text of the document. Advisors/Committee Members: Jayasumana, Anura P. (advisor), Ray, Indrakshi (advisor), Pezeshki, Ali (committee member), Malaiya, Yashwant (committee member).

…40 3.4.3 Colorado State University Dataset… …traffic against DDoS attacks by analysis of network traffic collected from Colorado State… …State University [20] and University of Auckland dataset [6]. The… …University, Auckland University, and attack traffic from CAIDA. It is important to minimize the… …evaluated using the DARPA 1998 dataset [19] as well as extensive analysis over Colorado… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mosharraf Ghahfarokhi, N. (2016). Cooperative defense mechanisms for detection, identification and filtering of DDoS attacks. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/176690

Chicago Manual of Style (16th Edition):

Mosharraf Ghahfarokhi, Negar. “Cooperative defense mechanisms for detection, identification and filtering of DDoS attacks.” 2016. Doctoral Dissertation, Colorado State University. Accessed March 08, 2021. http://hdl.handle.net/10217/176690.

MLA Handbook (7th Edition):

Mosharraf Ghahfarokhi, Negar. “Cooperative defense mechanisms for detection, identification and filtering of DDoS attacks.” 2016. Web. 08 Mar 2021.

Vancouver:

Mosharraf Ghahfarokhi N. Cooperative defense mechanisms for detection, identification and filtering of DDoS attacks. [Internet] [Doctoral dissertation]. Colorado State University; 2016. [cited 2021 Mar 08]. Available from: http://hdl.handle.net/10217/176690.

Council of Science Editors:

Mosharraf Ghahfarokhi N. Cooperative defense mechanisms for detection, identification and filtering of DDoS attacks. [Doctoral Dissertation]. Colorado State University; 2016. Available from: http://hdl.handle.net/10217/176690

16. Desai, Srinivas. Design and analysis of energy-efficient hierarchical electro-photonic network-on-chip architectures.

Degree: MS(M.S.), Electrical and Computer Engineering, 2015, Colorado State University

 Future applications running on chip multiprocessors (CMPs) with tens to hundreds of cores on a chip will require an efficient inter-core communication strategy to achieve… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Desai, S. (2015). Design and analysis of energy-efficient hierarchical electro-photonic network-on-chip architectures. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/166959

Chicago Manual of Style (16th Edition):

Desai, Srinivas. “Design and analysis of energy-efficient hierarchical electro-photonic network-on-chip architectures.” 2015. Masters Thesis, Colorado State University. Accessed March 08, 2021. http://hdl.handle.net/10217/166959.

MLA Handbook (7th Edition):

Desai, Srinivas. “Design and analysis of energy-efficient hierarchical electro-photonic network-on-chip architectures.” 2015. Web. 08 Mar 2021.

Vancouver:

Desai S. Design and analysis of energy-efficient hierarchical electro-photonic network-on-chip architectures. [Internet] [Masters thesis]. Colorado State University; 2015. [cited 2021 Mar 08]. Available from: http://hdl.handle.net/10217/166959.

Council of Science Editors:

Desai S. Design and analysis of energy-efficient hierarchical electro-photonic network-on-chip architectures. [Masters Thesis]. Colorado State University; 2015. Available from: http://hdl.handle.net/10217/166959

17. Shirazi, Hossein. Unbiased phishing detection using domain name based features.

Degree: MS(M.S.), Computer Science, 2018, Colorado State University

 Internet users are coming under a barrage of phishing attacks of increasing frequency and sophistication. While these attacks have been remarkably resilient against the vast… (more)

Subjects/Keywords: domain name; phishing; biased datasets; phishing detection; machine learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shirazi, H. (2018). Unbiased phishing detection using domain name based features. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/191323

Chicago Manual of Style (16th Edition):

Shirazi, Hossein. “Unbiased phishing detection using domain name based features.” 2018. Masters Thesis, Colorado State University. Accessed March 08, 2021. http://hdl.handle.net/10217/191323.

MLA Handbook (7th Edition):

Shirazi, Hossein. “Unbiased phishing detection using domain name based features.” 2018. Web. 08 Mar 2021.

Vancouver:

Shirazi H. Unbiased phishing detection using domain name based features. [Internet] [Masters thesis]. Colorado State University; 2018. [cited 2021 Mar 08]. Available from: http://hdl.handle.net/10217/191323.

Council of Science Editors:

Shirazi H. Unbiased phishing detection using domain name based features. [Masters Thesis]. Colorado State University; 2018. Available from: http://hdl.handle.net/10217/191323

18. Belyaev, Kirill. On component-oriented access control in lightweight virtualized server environments.

Degree: PhD, Computer Science, 2017, Colorado State University

 With the advancements in contemporary multi-core CPU architectures and increase in main memory capacity, it is now possible for a server operating system (OS), such… (more)

Subjects/Keywords: data and application security; security architectures; tuple spaces; denial of service protection; access control; service and systems design

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Belyaev, K. (2017). On component-oriented access control in lightweight virtualized server environments. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/185748

Chicago Manual of Style (16th Edition):

Belyaev, Kirill. “On component-oriented access control in lightweight virtualized server environments.” 2017. Doctoral Dissertation, Colorado State University. Accessed March 08, 2021. http://hdl.handle.net/10217/185748.

MLA Handbook (7th Edition):

Belyaev, Kirill. “On component-oriented access control in lightweight virtualized server environments.” 2017. Web. 08 Mar 2021.

Vancouver:

Belyaev K. On component-oriented access control in lightweight virtualized server environments. [Internet] [Doctoral dissertation]. Colorado State University; 2017. [cited 2021 Mar 08]. Available from: http://hdl.handle.net/10217/185748.

Council of Science Editors:

Belyaev K. On component-oriented access control in lightweight virtualized server environments. [Doctoral Dissertation]. Colorado State University; 2017. Available from: http://hdl.handle.net/10217/185748

19. Chittamuru, Sai Vineel Reddy. Reliable, energy-efficient, and secure silicon photonic network-on-chip design for manycore architectures.

Degree: PhD, Electrical and Computer Engineering, 2018, Colorado State University

 Advances in technology scaling over the past s+H91everal decades have enabled the integration of billions of transistors on a single die. Such a massive number… (more)

Subjects/Keywords: hardware security; photonic network on chip; reliability; MR aging; crosstalk noise; process and thermal variations

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chittamuru, S. V. R. (2018). Reliable, energy-efficient, and secure silicon photonic network-on-chip design for manycore architectures. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/189288

Chicago Manual of Style (16th Edition):

Chittamuru, Sai Vineel Reddy. “Reliable, energy-efficient, and secure silicon photonic network-on-chip design for manycore architectures.” 2018. Doctoral Dissertation, Colorado State University. Accessed March 08, 2021. http://hdl.handle.net/10217/189288.

MLA Handbook (7th Edition):

Chittamuru, Sai Vineel Reddy. “Reliable, energy-efficient, and secure silicon photonic network-on-chip design for manycore architectures.” 2018. Web. 08 Mar 2021.

Vancouver:

Chittamuru SVR. Reliable, energy-efficient, and secure silicon photonic network-on-chip design for manycore architectures. [Internet] [Doctoral dissertation]. Colorado State University; 2018. [cited 2021 Mar 08]. Available from: http://hdl.handle.net/10217/189288.

Council of Science Editors:

Chittamuru SVR. Reliable, energy-efficient, and secure silicon photonic network-on-chip design for manycore architectures. [Doctoral Dissertation]. Colorado State University; 2018. Available from: http://hdl.handle.net/10217/189288

20. Sun, Wuliang. Using slicing techniques to support scalable rigorous analysis of class models.

Degree: PhD, Computer Science, 2015, Colorado State University

 Slicing is a reduction technique that has been applied to class models to support model comprehension, analysis, and other modeling activities. In particular, slicing techniques… (more)

Subjects/Keywords: slicing; class model; UML

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sun, W. (2015). Using slicing techniques to support scalable rigorous analysis of class models. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/166933

Chicago Manual of Style (16th Edition):

Sun, Wuliang. “Using slicing techniques to support scalable rigorous analysis of class models.” 2015. Doctoral Dissertation, Colorado State University. Accessed March 08, 2021. http://hdl.handle.net/10217/166933.

MLA Handbook (7th Edition):

Sun, Wuliang. “Using slicing techniques to support scalable rigorous analysis of class models.” 2015. Web. 08 Mar 2021.

Vancouver:

Sun W. Using slicing techniques to support scalable rigorous analysis of class models. [Internet] [Doctoral dissertation]. Colorado State University; 2015. [cited 2021 Mar 08]. Available from: http://hdl.handle.net/10217/166933.

Council of Science Editors:

Sun W. Using slicing techniques to support scalable rigorous analysis of class models. [Doctoral Dissertation]. Colorado State University; 2015. Available from: http://hdl.handle.net/10217/166933

21. Lazrig, Ibrahim Meftah. Privacy preserving linkage and sharing of sensitive data.

Degree: PhD, Computer Science, 2018, Colorado State University

 Sensitive data, such as personal and business information, is collected by many service providers nowadays. This data is considered as a rich source of information… (more)

Subjects/Keywords: record-linkage; privacy; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lazrig, I. M. (2018). Privacy preserving linkage and sharing of sensitive data. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/191341

Chicago Manual of Style (16th Edition):

Lazrig, Ibrahim Meftah. “Privacy preserving linkage and sharing of sensitive data.” 2018. Doctoral Dissertation, Colorado State University. Accessed March 08, 2021. http://hdl.handle.net/10217/191341.

MLA Handbook (7th Edition):

Lazrig, Ibrahim Meftah. “Privacy preserving linkage and sharing of sensitive data.” 2018. Web. 08 Mar 2021.

Vancouver:

Lazrig IM. Privacy preserving linkage and sharing of sensitive data. [Internet] [Doctoral dissertation]. Colorado State University; 2018. [cited 2021 Mar 08]. Available from: http://hdl.handle.net/10217/191341.

Council of Science Editors:

Lazrig IM. Privacy preserving linkage and sharing of sensitive data. [Doctoral Dissertation]. Colorado State University; 2018. Available from: http://hdl.handle.net/10217/191341


Colorado State University

22. Hossain, KM Mozammel. Design methodology and productivity improvement in high speed VLSI circuits.

Degree: PhD, Electrical and Computer Engineering, 2017, Colorado State University

To view the abstract, please see the full text of the document. Advisors/Committee Members: Chen, Thomas W. (advisor), Malaiya, Yashwant (committee member), Pasricha, Sudeep (committee member), Pezeshki, Ali (committee member).

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hossain, K. M. (2017). Design methodology and productivity improvement in high speed VLSI circuits. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/181405

Chicago Manual of Style (16th Edition):

Hossain, KM Mozammel. “Design methodology and productivity improvement in high speed VLSI circuits.” 2017. Doctoral Dissertation, Colorado State University. Accessed March 08, 2021. http://hdl.handle.net/10217/181405.

MLA Handbook (7th Edition):

Hossain, KM Mozammel. “Design methodology and productivity improvement in high speed VLSI circuits.” 2017. Web. 08 Mar 2021.

Vancouver:

Hossain KM. Design methodology and productivity improvement in high speed VLSI circuits. [Internet] [Doctoral dissertation]. Colorado State University; 2017. [cited 2021 Mar 08]. Available from: http://hdl.handle.net/10217/181405.

Council of Science Editors:

Hossain KM. Design methodology and productivity improvement in high speed VLSI circuits. [Doctoral Dissertation]. Colorado State University; 2017. Available from: http://hdl.handle.net/10217/181405


Colorado State University

23. Kim, Jin Yoo. Vulnerability discovery in multiple version software systems: open source and commercial software systems.

Degree: MS(M.S.), Computer Science, 2007, Colorado State University

 The vulnerability discovery process for a program describes the rate at which the vulnerabilities are discovered. A model of the discovery process can be used… (more)

Subjects/Keywords: DBMS; VDM; Apache HTTP web server; Mysql; database management system; software vulnerability discovery model; Computer viruses; Spyware (Computer software); Computer security  – Methodology; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kim, J. Y. (2007). Vulnerability discovery in multiple version software systems: open source and commercial software systems. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/26808

Chicago Manual of Style (16th Edition):

Kim, Jin Yoo. “Vulnerability discovery in multiple version software systems: open source and commercial software systems.” 2007. Masters Thesis, Colorado State University. Accessed March 08, 2021. http://hdl.handle.net/10217/26808.

MLA Handbook (7th Edition):

Kim, Jin Yoo. “Vulnerability discovery in multiple version software systems: open source and commercial software systems.” 2007. Web. 08 Mar 2021.

Vancouver:

Kim JY. Vulnerability discovery in multiple version software systems: open source and commercial software systems. [Internet] [Masters thesis]. Colorado State University; 2007. [cited 2021 Mar 08]. Available from: http://hdl.handle.net/10217/26808.

Council of Science Editors:

Kim JY. Vulnerability discovery in multiple version software systems: open source and commercial software systems. [Masters Thesis]. Colorado State University; 2007. Available from: http://hdl.handle.net/10217/26808


Colorado State University

24. AlSagheer, Abdullah. Kuwaiti engineers' perspectives of the engineering senior design (capstone) course as related to their professional experiences.

Degree: PhD, Education, 2010, Colorado State University

 This study looks into transfer of learning and its application in the actual employment of engineering students after graduation. At Kuwait University, a capstone course… (more)

Subjects/Keywords: Jāmiʻat al-Kuwayt; strategic management; senior design; Kuwait University; engineering education; capstone course; Engineering  – Study and teaching (Higher)  – Kuwait; Learning, Psychology of  – Kuwait; Professional education  – Curricula  – Kuwait; Transfer of training  – Kuwait

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

AlSagheer, A. (2010). Kuwaiti engineers' perspectives of the engineering senior design (capstone) course as related to their professional experiences. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/44765

Chicago Manual of Style (16th Edition):

AlSagheer, Abdullah. “Kuwaiti engineers' perspectives of the engineering senior design (capstone) course as related to their professional experiences.” 2010. Doctoral Dissertation, Colorado State University. Accessed March 08, 2021. http://hdl.handle.net/10217/44765.

MLA Handbook (7th Edition):

AlSagheer, Abdullah. “Kuwaiti engineers' perspectives of the engineering senior design (capstone) course as related to their professional experiences.” 2010. Web. 08 Mar 2021.

Vancouver:

AlSagheer A. Kuwaiti engineers' perspectives of the engineering senior design (capstone) course as related to their professional experiences. [Internet] [Doctoral dissertation]. Colorado State University; 2010. [cited 2021 Mar 08]. Available from: http://hdl.handle.net/10217/44765.

Council of Science Editors:

AlSagheer A. Kuwaiti engineers' perspectives of the engineering senior design (capstone) course as related to their professional experiences. [Doctoral Dissertation]. Colorado State University; 2010. Available from: http://hdl.handle.net/10217/44765


Colorado State University

25. Dinh-Trong, Trung T. Systematic approach to testing UML designs, A.

Degree: PhD, Computer Science, 2006, Colorado State University

 In Model Driven Engineering (MDE) approaches, developers create and refine design models from which substantial portions of implementations are generated. During refinement, undetected faults in… (more)

Subjects/Keywords: VAG; model driven engineering; JAL; Java-like action language; fault detection; unified modeling language; UMLAnT; UML; variable assignment graph; MDE; UML (Computer science); Computer software  – Development

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dinh-Trong, T. T. (2006). Systematic approach to testing UML designs, A. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/26932

Chicago Manual of Style (16th Edition):

Dinh-Trong, Trung T. “Systematic approach to testing UML designs, A.” 2006. Doctoral Dissertation, Colorado State University. Accessed March 08, 2021. http://hdl.handle.net/10217/26932.

MLA Handbook (7th Edition):

Dinh-Trong, Trung T. “Systematic approach to testing UML designs, A.” 2006. Web. 08 Mar 2021.

Vancouver:

Dinh-Trong TT. Systematic approach to testing UML designs, A. [Internet] [Doctoral dissertation]. Colorado State University; 2006. [cited 2021 Mar 08]. Available from: http://hdl.handle.net/10217/26932.

Council of Science Editors:

Dinh-Trong TT. Systematic approach to testing UML designs, A. [Doctoral Dissertation]. Colorado State University; 2006. Available from: http://hdl.handle.net/10217/26932

.