Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Purdue University" +contributor:("Dongyan Xu"). Showing records 1 – 27 of 27 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Purdue University

1. Pei, Kexin. Bridging statistical learning and formal reasoning for cyber attack detection.

Degree: MS, Computer Science, 2016, Purdue University

  Current cyber-infrastructures are facing increasingly stealthy attacks that implant malicious payloads under the cover of benign programs. Current attack detection approaches based on statistical… (more)

Subjects/Keywords: Applied sciences; Machine learning; Program analysis; Security; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pei, K. (2016). Bridging statistical learning and formal reasoning for cyber attack detection. (Thesis). Purdue University. Retrieved from http://docs.lib.purdue.edu/open_access_theses/806

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pei, Kexin. “Bridging statistical learning and formal reasoning for cyber attack detection.” 2016. Thesis, Purdue University. Accessed March 29, 2020. http://docs.lib.purdue.edu/open_access_theses/806.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pei, Kexin. “Bridging statistical learning and formal reasoning for cyber attack detection.” 2016. Web. 29 Mar 2020.

Vancouver:

Pei K. Bridging statistical learning and formal reasoning for cyber attack detection. [Internet] [Thesis]. Purdue University; 2016. [cited 2020 Mar 29]. Available from: http://docs.lib.purdue.edu/open_access_theses/806.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pei K. Bridging statistical learning and formal reasoning for cyber attack detection. [Thesis]. Purdue University; 2016. Available from: http://docs.lib.purdue.edu/open_access_theses/806

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Purdue University

2. Saltaformaggio, Brendan D. Convicted by memory: Automatically recovering spatial-temporal evidence from memory images.

Degree: PhD, Computer Science, 2016, Purdue University

  Memory forensics can reveal “up to the minute” evidence of a device’s usage, often without requiring a suspect’s password to unlock the device, and… (more)

Subjects/Keywords: Applied sciences; Android; Cyber forensics; Memory forensics; Program analysis; Security; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Saltaformaggio, B. D. (2016). Convicted by memory: Automatically recovering spatial-temporal evidence from memory images. (Doctoral Dissertation). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_dissertations/996

Chicago Manual of Style (16th Edition):

Saltaformaggio, Brendan D. “Convicted by memory: Automatically recovering spatial-temporal evidence from memory images.” 2016. Doctoral Dissertation, Purdue University. Accessed March 29, 2020. https://docs.lib.purdue.edu/open_access_dissertations/996.

MLA Handbook (7th Edition):

Saltaformaggio, Brendan D. “Convicted by memory: Automatically recovering spatial-temporal evidence from memory images.” 2016. Web. 29 Mar 2020.

Vancouver:

Saltaformaggio BD. Convicted by memory: Automatically recovering spatial-temporal evidence from memory images. [Internet] [Doctoral dissertation]. Purdue University; 2016. [cited 2020 Mar 29]. Available from: https://docs.lib.purdue.edu/open_access_dissertations/996.

Council of Science Editors:

Saltaformaggio BD. Convicted by memory: Automatically recovering spatial-temporal evidence from memory images. [Doctoral Dissertation]. Purdue University; 2016. Available from: https://docs.lib.purdue.edu/open_access_dissertations/996


Purdue University

3. Hands, Nicole M. Detection of communication over DNSSEC covert channels.

Degree: MS, Computer and Information Technology, 2016, Purdue University

  Unauthorized data removal and modification from information systems represents a major and formidable threat in modern computing. Security researchers are engaged in a constant… (more)

Subjects/Keywords: Applied sciences; Covert channel; DNSSEC; Data breach; Information Technology; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hands, N. M. (2016). Detection of communication over DNSSEC covert channels. (Thesis). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_theses/949

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hands, Nicole M. “Detection of communication over DNSSEC covert channels.” 2016. Thesis, Purdue University. Accessed March 29, 2020. https://docs.lib.purdue.edu/open_access_theses/949.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hands, Nicole M. “Detection of communication over DNSSEC covert channels.” 2016. Web. 29 Mar 2020.

Vancouver:

Hands NM. Detection of communication over DNSSEC covert channels. [Internet] [Thesis]. Purdue University; 2016. [cited 2020 Mar 29]. Available from: https://docs.lib.purdue.edu/open_access_theses/949.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hands NM. Detection of communication over DNSSEC covert channels. [Thesis]. Purdue University; 2016. Available from: https://docs.lib.purdue.edu/open_access_theses/949

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Purdue University

4. Hoque, Md Endadul. ENSURING SPECIFICATION COMPLIANCE, ROBUSTNESS, AND SECURITY OF WIRELESS NETWORK PROTOCOLS.

Degree: PhD, Computer Science, 2015, Purdue University

 Several newly emerged wireless technologies (e.g., Internet-of-Things, Bluetooth, NFC)—extensively backed by the tech industry—are being widely adopted and have resulted in a proliferation of diverse… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hoque, M. E. (2015). ENSURING SPECIFICATION COMPLIANCE, ROBUSTNESS, AND SECURITY OF WIRELESS NETWORK PROTOCOLS. (Doctoral Dissertation). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_dissertations/1303

Chicago Manual of Style (16th Edition):

Hoque, Md Endadul. “ENSURING SPECIFICATION COMPLIANCE, ROBUSTNESS, AND SECURITY OF WIRELESS NETWORK PROTOCOLS.” 2015. Doctoral Dissertation, Purdue University. Accessed March 29, 2020. https://docs.lib.purdue.edu/open_access_dissertations/1303.

MLA Handbook (7th Edition):

Hoque, Md Endadul. “ENSURING SPECIFICATION COMPLIANCE, ROBUSTNESS, AND SECURITY OF WIRELESS NETWORK PROTOCOLS.” 2015. Web. 29 Mar 2020.

Vancouver:

Hoque ME. ENSURING SPECIFICATION COMPLIANCE, ROBUSTNESS, AND SECURITY OF WIRELESS NETWORK PROTOCOLS. [Internet] [Doctoral dissertation]. Purdue University; 2015. [cited 2020 Mar 29]. Available from: https://docs.lib.purdue.edu/open_access_dissertations/1303.

Council of Science Editors:

Hoque ME. ENSURING SPECIFICATION COMPLIANCE, ROBUSTNESS, AND SECURITY OF WIRELESS NETWORK PROTOCOLS. [Doctoral Dissertation]. Purdue University; 2015. Available from: https://docs.lib.purdue.edu/open_access_dissertations/1303


Purdue University

5. Deng, Zhui. BINARY INSTRUMENTATION AND TRANSFORMATION FOR SOFTWARE SECURITY APPLICATIONS.

Degree: PhD, Computer Science, 2015, Purdue University

 The capabilities of software analysis and manipulation are crucial to counter software security threats such as malware and vulnerabilities. Binary instrumentation and transformation are the… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Deng, Z. (2015). BINARY INSTRUMENTATION AND TRANSFORMATION FOR SOFTWARE SECURITY APPLICATIONS. (Doctoral Dissertation). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_dissertations/1348

Chicago Manual of Style (16th Edition):

Deng, Zhui. “BINARY INSTRUMENTATION AND TRANSFORMATION FOR SOFTWARE SECURITY APPLICATIONS.” 2015. Doctoral Dissertation, Purdue University. Accessed March 29, 2020. https://docs.lib.purdue.edu/open_access_dissertations/1348.

MLA Handbook (7th Edition):

Deng, Zhui. “BINARY INSTRUMENTATION AND TRANSFORMATION FOR SOFTWARE SECURITY APPLICATIONS.” 2015. Web. 29 Mar 2020.

Vancouver:

Deng Z. BINARY INSTRUMENTATION AND TRANSFORMATION FOR SOFTWARE SECURITY APPLICATIONS. [Internet] [Doctoral dissertation]. Purdue University; 2015. [cited 2020 Mar 29]. Available from: https://docs.lib.purdue.edu/open_access_dissertations/1348.

Council of Science Editors:

Deng Z. BINARY INSTRUMENTATION AND TRANSFORMATION FOR SOFTWARE SECURITY APPLICATIONS. [Doctoral Dissertation]. Purdue University; 2015. Available from: https://docs.lib.purdue.edu/open_access_dissertations/1348


Purdue University

6. Wilkin, Gregory Aaron. Efficient Aggregated Deliveries with Strong Guarantees in an Event-based Distributed System.

Degree: PhD, Computer Science, 2015, Purdue University

 A popular approach to designing large scale distributed systems is to follow an event-based approach. In an event-based approach, a set of software components interact… (more)

Subjects/Keywords: Aggregated deliveries; Strong guarantees

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wilkin, G. A. (2015). Efficient Aggregated Deliveries with Strong Guarantees in an Event-based Distributed System. (Doctoral Dissertation). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_dissertations/1434

Chicago Manual of Style (16th Edition):

Wilkin, Gregory Aaron. “Efficient Aggregated Deliveries with Strong Guarantees in an Event-based Distributed System.” 2015. Doctoral Dissertation, Purdue University. Accessed March 29, 2020. https://docs.lib.purdue.edu/open_access_dissertations/1434.

MLA Handbook (7th Edition):

Wilkin, Gregory Aaron. “Efficient Aggregated Deliveries with Strong Guarantees in an Event-based Distributed System.” 2015. Web. 29 Mar 2020.

Vancouver:

Wilkin GA. Efficient Aggregated Deliveries with Strong Guarantees in an Event-based Distributed System. [Internet] [Doctoral dissertation]. Purdue University; 2015. [cited 2020 Mar 29]. Available from: https://docs.lib.purdue.edu/open_access_dissertations/1434.

Council of Science Editors:

Wilkin GA. Efficient Aggregated Deliveries with Strong Guarantees in an Event-based Distributed System. [Doctoral Dissertation]. Purdue University; 2015. Available from: https://docs.lib.purdue.edu/open_access_dissertations/1434


Purdue University

7. Krishnamoorthy Chandrasekaran, Sivaramakrishnan. Functional programming abstractions for weakly consistent systems.

Degree: PhD, Computer Science, 2014, Purdue University

  In recent years, there has been a wide-spread adoption of both multicore and cloud computing. Traditionally, concurrent programmers have relied on the underlying system… (more)

Subjects/Keywords: Computer Engineering; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Krishnamoorthy Chandrasekaran, S. (2014). Functional programming abstractions for weakly consistent systems. (Doctoral Dissertation). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_dissertations/310

Chicago Manual of Style (16th Edition):

Krishnamoorthy Chandrasekaran, Sivaramakrishnan. “Functional programming abstractions for weakly consistent systems.” 2014. Doctoral Dissertation, Purdue University. Accessed March 29, 2020. https://docs.lib.purdue.edu/open_access_dissertations/310.

MLA Handbook (7th Edition):

Krishnamoorthy Chandrasekaran, Sivaramakrishnan. “Functional programming abstractions for weakly consistent systems.” 2014. Web. 29 Mar 2020.

Vancouver:

Krishnamoorthy Chandrasekaran S. Functional programming abstractions for weakly consistent systems. [Internet] [Doctoral dissertation]. Purdue University; 2014. [cited 2020 Mar 29]. Available from: https://docs.lib.purdue.edu/open_access_dissertations/310.

Council of Science Editors:

Krishnamoorthy Chandrasekaran S. Functional programming abstractions for weakly consistent systems. [Doctoral Dissertation]. Purdue University; 2014. Available from: https://docs.lib.purdue.edu/open_access_dissertations/310


Purdue University

8. Zhu, He. Learning Program Specifications from Sample Runs.

Degree: PhD, Computer Science, 2016, Purdue University

  With science fiction of yore being reality recently with self-driving cars, wearable computers and autonomous robots, software reliability is growing increasingly important. A critical… (more)

Subjects/Keywords: Applied sciences; Correctness proof; Learning; Program verification; Refinement types; Software engineering; Specification synthesis; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhu, H. (2016). Learning Program Specifications from Sample Runs. (Doctoral Dissertation). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_dissertations/900

Chicago Manual of Style (16th Edition):

Zhu, He. “Learning Program Specifications from Sample Runs.” 2016. Doctoral Dissertation, Purdue University. Accessed March 29, 2020. https://docs.lib.purdue.edu/open_access_dissertations/900.

MLA Handbook (7th Edition):

Zhu, He. “Learning Program Specifications from Sample Runs.” 2016. Web. 29 Mar 2020.

Vancouver:

Zhu H. Learning Program Specifications from Sample Runs. [Internet] [Doctoral dissertation]. Purdue University; 2016. [cited 2020 Mar 29]. Available from: https://docs.lib.purdue.edu/open_access_dissertations/900.

Council of Science Editors:

Zhu H. Learning Program Specifications from Sample Runs. [Doctoral Dissertation]. Purdue University; 2016. Available from: https://docs.lib.purdue.edu/open_access_dissertations/900


Purdue University

9. Xu, Cong. Optimizing Virtual Machine I/O Performance in Virtualized Cloud by Differenciated-frequency Scheduling and Functionality Offloading.

Degree: PhD, Computer Science, 2015, Purdue University

 Many enterprises are increasingly moving their applications to private cloud environments or public cloud platforms. A key technology driving cloud computing is virtualization which can… (more)

Subjects/Keywords: Cloud Computing; I/O Optimization; Operating Systems; Virtualization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Xu, C. (2015). Optimizing Virtual Machine I/O Performance in Virtualized Cloud by Differenciated-frequency Scheduling and Functionality Offloading. (Doctoral Dissertation). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_dissertations/1328

Chicago Manual of Style (16th Edition):

Xu, Cong. “Optimizing Virtual Machine I/O Performance in Virtualized Cloud by Differenciated-frequency Scheduling and Functionality Offloading.” 2015. Doctoral Dissertation, Purdue University. Accessed March 29, 2020. https://docs.lib.purdue.edu/open_access_dissertations/1328.

MLA Handbook (7th Edition):

Xu, Cong. “Optimizing Virtual Machine I/O Performance in Virtualized Cloud by Differenciated-frequency Scheduling and Functionality Offloading.” 2015. Web. 29 Mar 2020.

Vancouver:

Xu C. Optimizing Virtual Machine I/O Performance in Virtualized Cloud by Differenciated-frequency Scheduling and Functionality Offloading. [Internet] [Doctoral dissertation]. Purdue University; 2015. [cited 2020 Mar 29]. Available from: https://docs.lib.purdue.edu/open_access_dissertations/1328.

Council of Science Editors:

Xu C. Optimizing Virtual Machine I/O Performance in Virtualized Cloud by Differenciated-frequency Scheduling and Functionality Offloading. [Doctoral Dissertation]. Purdue University; 2015. Available from: https://docs.lib.purdue.edu/open_access_dissertations/1328


Purdue University

10. CHUANG, Wei-Chiu. A PROGRAMMING FRAMEWORK TO EASE DEVELOPMENT OF TIGHTLY-COUPLED CLOUD APPLICATIONS.

Degree: PhD, Computer Science, 2015, Purdue University

 Cloud application development is currently for professionals only. To make the cloud more accessible, cloud applications should ideally be easy to develop so that virtually… (more)

Subjects/Keywords: Cloud computing; Programming model; Sequential semantics; Tightly-coupled modularity; Transparent Elasticity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

CHUANG, W. (2015). A PROGRAMMING FRAMEWORK TO EASE DEVELOPMENT OF TIGHTLY-COUPLED CLOUD APPLICATIONS. (Doctoral Dissertation). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_dissertations/1344

Chicago Manual of Style (16th Edition):

CHUANG, Wei-Chiu. “A PROGRAMMING FRAMEWORK TO EASE DEVELOPMENT OF TIGHTLY-COUPLED CLOUD APPLICATIONS.” 2015. Doctoral Dissertation, Purdue University. Accessed March 29, 2020. https://docs.lib.purdue.edu/open_access_dissertations/1344.

MLA Handbook (7th Edition):

CHUANG, Wei-Chiu. “A PROGRAMMING FRAMEWORK TO EASE DEVELOPMENT OF TIGHTLY-COUPLED CLOUD APPLICATIONS.” 2015. Web. 29 Mar 2020.

Vancouver:

CHUANG W. A PROGRAMMING FRAMEWORK TO EASE DEVELOPMENT OF TIGHTLY-COUPLED CLOUD APPLICATIONS. [Internet] [Doctoral dissertation]. Purdue University; 2015. [cited 2020 Mar 29]. Available from: https://docs.lib.purdue.edu/open_access_dissertations/1344.

Council of Science Editors:

CHUANG W. A PROGRAMMING FRAMEWORK TO EASE DEVELOPMENT OF TIGHTLY-COUPLED CLOUD APPLICATIONS. [Doctoral Dissertation]. Purdue University; 2015. Available from: https://docs.lib.purdue.edu/open_access_dissertations/1344


Purdue University

11. Mohamed, Ahmed. A Cost-Effective Cloud-Based System for Analyzing Big Real-Time Visual Data From Thousands of Network Cameras.

Degree: PhD, Electrical and Computer Engineering, 2016, Purdue University

 Thousands of network cameras stream public real-time visual data from different environments, such as streets, shopping malls, and natural scenes. The big visual data from… (more)

Subjects/Keywords: Big Data; Cloud Computing; Computer Vision; Network Cameras; Resource Management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mohamed, A. (2016). A Cost-Effective Cloud-Based System for Analyzing Big Real-Time Visual Data From Thousands of Network Cameras. (Doctoral Dissertation). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_dissertations/1370

Chicago Manual of Style (16th Edition):

Mohamed, Ahmed. “A Cost-Effective Cloud-Based System for Analyzing Big Real-Time Visual Data From Thousands of Network Cameras.” 2016. Doctoral Dissertation, Purdue University. Accessed March 29, 2020. https://docs.lib.purdue.edu/open_access_dissertations/1370.

MLA Handbook (7th Edition):

Mohamed, Ahmed. “A Cost-Effective Cloud-Based System for Analyzing Big Real-Time Visual Data From Thousands of Network Cameras.” 2016. Web. 29 Mar 2020.

Vancouver:

Mohamed A. A Cost-Effective Cloud-Based System for Analyzing Big Real-Time Visual Data From Thousands of Network Cameras. [Internet] [Doctoral dissertation]. Purdue University; 2016. [cited 2020 Mar 29]. Available from: https://docs.lib.purdue.edu/open_access_dissertations/1370.

Council of Science Editors:

Mohamed A. A Cost-Effective Cloud-Based System for Analyzing Big Real-Time Visual Data From Thousands of Network Cameras. [Doctoral Dissertation]. Purdue University; 2016. Available from: https://docs.lib.purdue.edu/open_access_dissertations/1370


Purdue University

12. Kambatla, Karthik Shashank. Methods to Improve Applicability and Efficiency of Distributed Data-Centric Compute Frameworks.

Degree: PhD, Computer Science, 2016, Purdue University

 The success of modern applications depends on the insights they collect from their data repositories. Data repositories for such applications currently exceed exabytes and are… (more)

Subjects/Keywords: big data; distributed computing; distributed systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kambatla, K. S. (2016). Methods to Improve Applicability and Efficiency of Distributed Data-Centric Compute Frameworks. (Doctoral Dissertation). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_dissertations/1379

Chicago Manual of Style (16th Edition):

Kambatla, Karthik Shashank. “Methods to Improve Applicability and Efficiency of Distributed Data-Centric Compute Frameworks.” 2016. Doctoral Dissertation, Purdue University. Accessed March 29, 2020. https://docs.lib.purdue.edu/open_access_dissertations/1379.

MLA Handbook (7th Edition):

Kambatla, Karthik Shashank. “Methods to Improve Applicability and Efficiency of Distributed Data-Centric Compute Frameworks.” 2016. Web. 29 Mar 2020.

Vancouver:

Kambatla KS. Methods to Improve Applicability and Efficiency of Distributed Data-Centric Compute Frameworks. [Internet] [Doctoral dissertation]. Purdue University; 2016. [cited 2020 Mar 29]. Available from: https://docs.lib.purdue.edu/open_access_dissertations/1379.

Council of Science Editors:

Kambatla KS. Methods to Improve Applicability and Efficiency of Distributed Data-Centric Compute Frameworks. [Doctoral Dissertation]. Purdue University; 2016. Available from: https://docs.lib.purdue.edu/open_access_dissertations/1379


Purdue University

13. Jain, Rohit. Trustworthy data from untrusted databases.

Degree: PhD, Computer Science, 2014, Purdue University

  Increasingly, data are subjected to environments which can result in invalid (malicious or inadvertent) modifications to the data. For example, when we host the… (more)

Subjects/Keywords: Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jain, R. (2014). Trustworthy data from untrusted databases. (Doctoral Dissertation). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_dissertations/297

Chicago Manual of Style (16th Edition):

Jain, Rohit. “Trustworthy data from untrusted databases.” 2014. Doctoral Dissertation, Purdue University. Accessed March 29, 2020. https://docs.lib.purdue.edu/open_access_dissertations/297.

MLA Handbook (7th Edition):

Jain, Rohit. “Trustworthy data from untrusted databases.” 2014. Web. 29 Mar 2020.

Vancouver:

Jain R. Trustworthy data from untrusted databases. [Internet] [Doctoral dissertation]. Purdue University; 2014. [cited 2020 Mar 29]. Available from: https://docs.lib.purdue.edu/open_access_dissertations/297.

Council of Science Editors:

Jain R. Trustworthy data from untrusted databases. [Doctoral Dissertation]. Purdue University; 2014. Available from: https://docs.lib.purdue.edu/open_access_dissertations/297


Purdue University

14. Lee, Hyojeong. Automated performance attack discovery in distributed system implementations.

Degree: PhD, Computer Science, 2014, Purdue University

  Security and performance are critical goals for distributed systems. The increased complexity in design, incomplete expertise of developers, and limited functionality of existing testing… (more)

Subjects/Keywords: Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lee, H. (2014). Automated performance attack discovery in distributed system implementations. (Doctoral Dissertation). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_dissertations/313

Chicago Manual of Style (16th Edition):

Lee, Hyojeong. “Automated performance attack discovery in distributed system implementations.” 2014. Doctoral Dissertation, Purdue University. Accessed March 29, 2020. https://docs.lib.purdue.edu/open_access_dissertations/313.

MLA Handbook (7th Edition):

Lee, Hyojeong. “Automated performance attack discovery in distributed system implementations.” 2014. Web. 29 Mar 2020.

Vancouver:

Lee H. Automated performance attack discovery in distributed system implementations. [Internet] [Doctoral dissertation]. Purdue University; 2014. [cited 2020 Mar 29]. Available from: https://docs.lib.purdue.edu/open_access_dissertations/313.

Council of Science Editors:

Lee H. Automated performance attack discovery in distributed system implementations. [Doctoral Dissertation]. Purdue University; 2014. Available from: https://docs.lib.purdue.edu/open_access_dissertations/313


Purdue University

15. Holzer, Corey T. The application of natural language processing to open source intelligence for ontology development in the advanced persistent threat domain.

Degree: PhD, Computer and Information Technology, 2016, Purdue University

  Over the past decade, the Advanced Persistent Threat (APT) has risen to forefront of cybersecurity threats. APTs are a major contributor to the billions… (more)

Subjects/Keywords: Information Technology; Applied sciences; Advanced persistent threat; Cybersecurity; Natural language processing; Open source intelligence

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Holzer, C. T. (2016). The application of natural language processing to open source intelligence for ontology development in the advanced persistent threat domain. (Doctoral Dissertation). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_dissertations/948

Chicago Manual of Style (16th Edition):

Holzer, Corey T. “The application of natural language processing to open source intelligence for ontology development in the advanced persistent threat domain.” 2016. Doctoral Dissertation, Purdue University. Accessed March 29, 2020. https://docs.lib.purdue.edu/open_access_dissertations/948.

MLA Handbook (7th Edition):

Holzer, Corey T. “The application of natural language processing to open source intelligence for ontology development in the advanced persistent threat domain.” 2016. Web. 29 Mar 2020.

Vancouver:

Holzer CT. The application of natural language processing to open source intelligence for ontology development in the advanced persistent threat domain. [Internet] [Doctoral dissertation]. Purdue University; 2016. [cited 2020 Mar 29]. Available from: https://docs.lib.purdue.edu/open_access_dissertations/948.

Council of Science Editors:

Holzer CT. The application of natural language processing to open source intelligence for ontology development in the advanced persistent threat domain. [Doctoral Dissertation]. Purdue University; 2016. Available from: https://docs.lib.purdue.edu/open_access_dissertations/948


Purdue University

16. Stephen, Julian James. Securing cloud-based data analytics: A practical approach.

Degree: PhD, Computer Science, 2016, Purdue University

  The ubiquitous nature of computers is driving a massive increase in the amount of data generated by humans and machines. The shift to cloud… (more)

Subjects/Keywords: Applied sciences; Confidentiality; Data analytics; Integrity; Stream processing; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Stephen, J. J. (2016). Securing cloud-based data analytics: A practical approach. (Doctoral Dissertation). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_dissertations/949

Chicago Manual of Style (16th Edition):

Stephen, Julian James. “Securing cloud-based data analytics: A practical approach.” 2016. Doctoral Dissertation, Purdue University. Accessed March 29, 2020. https://docs.lib.purdue.edu/open_access_dissertations/949.

MLA Handbook (7th Edition):

Stephen, Julian James. “Securing cloud-based data analytics: A practical approach.” 2016. Web. 29 Mar 2020.

Vancouver:

Stephen JJ. Securing cloud-based data analytics: A practical approach. [Internet] [Doctoral dissertation]. Purdue University; 2016. [cited 2020 Mar 29]. Available from: https://docs.lib.purdue.edu/open_access_dissertations/949.

Council of Science Editors:

Stephen JJ. Securing cloud-based data analytics: A practical approach. [Doctoral Dissertation]. Purdue University; 2016. Available from: https://docs.lib.purdue.edu/open_access_dissertations/949


Purdue University

17. Midi, Daniele. Security techniques for sensor systems and the Internet of Things.

Degree: PhD, Consumer Science, 2016, Purdue University

  Sensor systems are becoming pervasive in many domains, and are recently being generalized by the Internet of Things (IoT). This wide deployment, however, presents… (more)

Subjects/Keywords: Applied sciences; Information Technology; Dynamic checking; Internet of Things; Memory safety; NesCheck; Security techniques; Sensor systems; Static analysis; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Midi, D. (2016). Security techniques for sensor systems and the Internet of Things. (Doctoral Dissertation). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_dissertations/973

Chicago Manual of Style (16th Edition):

Midi, Daniele. “Security techniques for sensor systems and the Internet of Things.” 2016. Doctoral Dissertation, Purdue University. Accessed March 29, 2020. https://docs.lib.purdue.edu/open_access_dissertations/973.

MLA Handbook (7th Edition):

Midi, Daniele. “Security techniques for sensor systems and the Internet of Things.” 2016. Web. 29 Mar 2020.

Vancouver:

Midi D. Security techniques for sensor systems and the Internet of Things. [Internet] [Doctoral dissertation]. Purdue University; 2016. [cited 2020 Mar 29]. Available from: https://docs.lib.purdue.edu/open_access_dissertations/973.

Council of Science Editors:

Midi D. Security techniques for sensor systems and the Internet of Things. [Doctoral Dissertation]. Purdue University; 2016. Available from: https://docs.lib.purdue.edu/open_access_dissertations/973

18. Bamunavita Gamage, Sahan. Improving Virtual Machine I/O Performance in Cloud Environments via I/O Functionality Offloading.

Degree: PhD, Computer Science, 2013, Purdue University

  In recent years there has been a rapid growth in the adoption of cloud computing. A key technology that drives cloud computing is virtualization.… (more)

Subjects/Keywords: cloud computing; datacenters; tcp; virtualization; Computer Sciences

…ABSTRACT Bamunavita Gamage, Sahan Ph.D., Purdue University, December 2013. Improving Virtual… …Dongyan Xu and Ramana Rao Kompella. In recent years there has been a rapid growth in the… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bamunavita Gamage, S. (2013). Improving Virtual Machine I/O Performance in Cloud Environments via I/O Functionality Offloading. (Doctoral Dissertation). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_dissertations/201

Chicago Manual of Style (16th Edition):

Bamunavita Gamage, Sahan. “Improving Virtual Machine I/O Performance in Cloud Environments via I/O Functionality Offloading.” 2013. Doctoral Dissertation, Purdue University. Accessed March 29, 2020. https://docs.lib.purdue.edu/open_access_dissertations/201.

MLA Handbook (7th Edition):

Bamunavita Gamage, Sahan. “Improving Virtual Machine I/O Performance in Cloud Environments via I/O Functionality Offloading.” 2013. Web. 29 Mar 2020.

Vancouver:

Bamunavita Gamage S. Improving Virtual Machine I/O Performance in Cloud Environments via I/O Functionality Offloading. [Internet] [Doctoral dissertation]. Purdue University; 2013. [cited 2020 Mar 29]. Available from: https://docs.lib.purdue.edu/open_access_dissertations/201.

Council of Science Editors:

Bamunavita Gamage S. Improving Virtual Machine I/O Performance in Cloud Environments via I/O Functionality Offloading. [Doctoral Dissertation]. Purdue University; 2013. Available from: https://docs.lib.purdue.edu/open_access_dissertations/201

19. Stanley, Dannie Michael. Improved Kernel Security Through Code Validation, Diversification, and Minimization.

Degree: PhD, Computer Science, 2013, Purdue University

  The vast majority of hosts on the Internet, including mobile clients, are running one of three commodity, general-purpose operating system families. In such operating… (more)

Subjects/Keywords: applied sciences; kernel; minimization; operating system; randomization; security; validation; Computer Sciences

…ABSTRACT Stanley, Dannie M. Ph.D., Purdue University, December 2013. Improved Kernel Security… …and Dongyan Xu. The vast majority of hosts on the Internet, including mobile clients, are… 

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Stanley, D. M. (2013). Improved Kernel Security Through Code Validation, Diversification, and Minimization. (Doctoral Dissertation). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_dissertations/44

Chicago Manual of Style (16th Edition):

Stanley, Dannie Michael. “Improved Kernel Security Through Code Validation, Diversification, and Minimization.” 2013. Doctoral Dissertation, Purdue University. Accessed March 29, 2020. https://docs.lib.purdue.edu/open_access_dissertations/44.

MLA Handbook (7th Edition):

Stanley, Dannie Michael. “Improved Kernel Security Through Code Validation, Diversification, and Minimization.” 2013. Web. 29 Mar 2020.

Vancouver:

Stanley DM. Improved Kernel Security Through Code Validation, Diversification, and Minimization. [Internet] [Doctoral dissertation]. Purdue University; 2013. [cited 2020 Mar 29]. Available from: https://docs.lib.purdue.edu/open_access_dissertations/44.

Council of Science Editors:

Stanley DM. Improved Kernel Security Through Code Validation, Diversification, and Minimization. [Doctoral Dissertation]. Purdue University; 2013. Available from: https://docs.lib.purdue.edu/open_access_dissertations/44

20. Hoffman, Kevin John. Ribbons: A Partially Shared Memory Programming Model.

Degree: PhD, Computer Science, 2013, Purdue University

  The need for programs to execute subcomponents in isolation from each other or with lower privileges is prevalent among today's systems. While modern operating… (more)

Subjects/Keywords: heap isolation; multiprocessing; shared memory; Computer Sciences

…Kevin J. Ph.D., Purdue University, December 2013. Ribbons: A Partially Shared Memory… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hoffman, K. J. (2013). Ribbons: A Partially Shared Memory Programming Model. (Doctoral Dissertation). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_dissertations/159

Chicago Manual of Style (16th Edition):

Hoffman, Kevin John. “Ribbons: A Partially Shared Memory Programming Model.” 2013. Doctoral Dissertation, Purdue University. Accessed March 29, 2020. https://docs.lib.purdue.edu/open_access_dissertations/159.

MLA Handbook (7th Edition):

Hoffman, Kevin John. “Ribbons: A Partially Shared Memory Programming Model.” 2013. Web. 29 Mar 2020.

Vancouver:

Hoffman KJ. Ribbons: A Partially Shared Memory Programming Model. [Internet] [Doctoral dissertation]. Purdue University; 2013. [cited 2020 Mar 29]. Available from: https://docs.lib.purdue.edu/open_access_dissertations/159.

Council of Science Editors:

Hoffman KJ. Ribbons: A Partially Shared Memory Programming Model. [Doctoral Dissertation]. Purdue University; 2013. Available from: https://docs.lib.purdue.edu/open_access_dissertations/159

21. Culhane, William J, IV. Optimal "Big Data" Aggregation Systems - From Theory to Practical Application.

Degree: PhD, Philosophy, 2015, Purdue University

  The integration of computers into many facets of our lives has made the collection and storage of staggering amounts of data feasible. However, the… (more)

Subjects/Keywords: Big data; Cloud computing; Aggregation; Top-k; Matching; Algorithms; Distributed Systems; Systems; Computer Sciences; Theory and Algorithms

…vii ABSTRACT Culhane, William John IV PhD, Purdue University, May 2015. Optimal “Big Data… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Culhane, William J, I. (2015). Optimal "Big Data" Aggregation Systems - From Theory to Practical Application. (Doctoral Dissertation). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_dissertations/216

Chicago Manual of Style (16th Edition):

Culhane, William J, IV. “Optimal "Big Data" Aggregation Systems - From Theory to Practical Application.” 2015. Doctoral Dissertation, Purdue University. Accessed March 29, 2020. https://docs.lib.purdue.edu/open_access_dissertations/216.

MLA Handbook (7th Edition):

Culhane, William J, IV. “Optimal "Big Data" Aggregation Systems - From Theory to Practical Application.” 2015. Web. 29 Mar 2020.

Vancouver:

Culhane, William J I. Optimal "Big Data" Aggregation Systems - From Theory to Practical Application. [Internet] [Doctoral dissertation]. Purdue University; 2015. [cited 2020 Mar 29]. Available from: https://docs.lib.purdue.edu/open_access_dissertations/216.

Council of Science Editors:

Culhane, William J I. Optimal "Big Data" Aggregation Systems - From Theory to Practical Application. [Doctoral Dissertation]. Purdue University; 2015. Available from: https://docs.lib.purdue.edu/open_access_dissertations/216

22. Peng, Wei. On several problems regarding the application of opportunistic proximate links in smartphone networks.

Degree: PhD, Computer Science, 2015, Purdue University

  A defining characteristic of smartphones is the availability of short-range radio transceivers (the proximate channel) such as Bluetooth, NFC, and Wi-Fi Direct, in addition… (more)

Subjects/Keywords: Computer Sciences

…xiv ABSTRACT Peng, Wei Ph.D., Purdue University, May 2015. On Several Problems Regarding… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Peng, W. (2015). On several problems regarding the application of opportunistic proximate links in smartphone networks. (Doctoral Dissertation). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_dissertations/535

Chicago Manual of Style (16th Edition):

Peng, Wei. “On several problems regarding the application of opportunistic proximate links in smartphone networks.” 2015. Doctoral Dissertation, Purdue University. Accessed March 29, 2020. https://docs.lib.purdue.edu/open_access_dissertations/535.

MLA Handbook (7th Edition):

Peng, Wei. “On several problems regarding the application of opportunistic proximate links in smartphone networks.” 2015. Web. 29 Mar 2020.

Vancouver:

Peng W. On several problems regarding the application of opportunistic proximate links in smartphone networks. [Internet] [Doctoral dissertation]. Purdue University; 2015. [cited 2020 Mar 29]. Available from: https://docs.lib.purdue.edu/open_access_dissertations/535.

Council of Science Editors:

Peng W. On several problems regarding the application of opportunistic proximate links in smartphone networks. [Doctoral Dissertation]. Purdue University; 2015. Available from: https://docs.lib.purdue.edu/open_access_dissertations/535

23. Wang, Qifan. Learning compact hashing codes with complex objectives from multiple sources for large scale similarity search.

Degree: PhD, Computer Science, 2015, Purdue University

  Similarity search is a key problem in many real world applications including image and text retrieval, content reuse detection and collaborative filtering. The purpose… (more)

Subjects/Keywords: Computer Sciences

…ABSTRACT Wang, Qifan Ph.D., Purdue University, May 2015. Learning Compact Hashing Codes with… …Dongyan Xu. LEAPS: Detecting Camouflaged Attacks with Statistical Learning Guided by Program… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, Q. (2015). Learning compact hashing codes with complex objectives from multiple sources for large scale similarity search. (Doctoral Dissertation). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_dissertations/584

Chicago Manual of Style (16th Edition):

Wang, Qifan. “Learning compact hashing codes with complex objectives from multiple sources for large scale similarity search.” 2015. Doctoral Dissertation, Purdue University. Accessed March 29, 2020. https://docs.lib.purdue.edu/open_access_dissertations/584.

MLA Handbook (7th Edition):

Wang, Qifan. “Learning compact hashing codes with complex objectives from multiple sources for large scale similarity search.” 2015. Web. 29 Mar 2020.

Vancouver:

Wang Q. Learning compact hashing codes with complex objectives from multiple sources for large scale similarity search. [Internet] [Doctoral dissertation]. Purdue University; 2015. [cited 2020 Mar 29]. Available from: https://docs.lib.purdue.edu/open_access_dissertations/584.

Council of Science Editors:

Wang Q. Learning compact hashing codes with complex objectives from multiple sources for large scale similarity search. [Doctoral Dissertation]. Purdue University; 2015. Available from: https://docs.lib.purdue.edu/open_access_dissertations/584

24. Wang, Man. Dependence-Based Source Level Tracing and Replay for Networked Embedded Systems.

Degree: PhD, Computer Science, 2013, Purdue University

  Error detection and diagnosis for networked embedded systems remain challenging and tedious due to issues such as a large number of computing entities, hardware… (more)

Subjects/Keywords: applied sciences; error detections; source level tracing; networked embedded systems; static verification; error diagnosis; Computer Sciences

…Wang, Man Ph.D., Purdue University, December 2013. Dependence-Based Source Level Tracing and… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, M. (2013). Dependence-Based Source Level Tracing and Replay for Networked Embedded Systems. (Doctoral Dissertation). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_dissertations/23

Chicago Manual of Style (16th Edition):

Wang, Man. “Dependence-Based Source Level Tracing and Replay for Networked Embedded Systems.” 2013. Doctoral Dissertation, Purdue University. Accessed March 29, 2020. https://docs.lib.purdue.edu/open_access_dissertations/23.

MLA Handbook (7th Edition):

Wang, Man. “Dependence-Based Source Level Tracing and Replay for Networked Embedded Systems.” 2013. Web. 29 Mar 2020.

Vancouver:

Wang M. Dependence-Based Source Level Tracing and Replay for Networked Embedded Systems. [Internet] [Doctoral dissertation]. Purdue University; 2013. [cited 2020 Mar 29]. Available from: https://docs.lib.purdue.edu/open_access_dissertations/23.

Council of Science Editors:

Wang M. Dependence-Based Source Level Tracing and Replay for Networked Embedded Systems. [Doctoral Dissertation]. Purdue University; 2013. Available from: https://docs.lib.purdue.edu/open_access_dissertations/23

25. Sumner, William Nicholas. Automated Failure Explanation Through Execution Comparison.

Degree: PhD, Computer Science, 2013, Purdue University

  When fixing a bug in software, developers must build an understanding or explanation of the bug and how the bug flows through a program.… (more)

Subjects/Keywords: applied sciences; automated debugging; execution comparison; failure explanation; Computer Sciences

…127 110 x ABSTRACT Sumner, William N. Ph.D., Purdue University, December 2013. Automated… 

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sumner, W. N. (2013). Automated Failure Explanation Through Execution Comparison. (Doctoral Dissertation). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_dissertations/67

Chicago Manual of Style (16th Edition):

Sumner, William Nicholas. “Automated Failure Explanation Through Execution Comparison.” 2013. Doctoral Dissertation, Purdue University. Accessed March 29, 2020. https://docs.lib.purdue.edu/open_access_dissertations/67.

MLA Handbook (7th Edition):

Sumner, William Nicholas. “Automated Failure Explanation Through Execution Comparison.” 2013. Web. 29 Mar 2020.

Vancouver:

Sumner WN. Automated Failure Explanation Through Execution Comparison. [Internet] [Doctoral dissertation]. Purdue University; 2013. [cited 2020 Mar 29]. Available from: https://docs.lib.purdue.edu/open_access_dissertations/67.

Council of Science Editors:

Sumner WN. Automated Failure Explanation Through Execution Comparison. [Doctoral Dissertation]. Purdue University; 2013. Available from: https://docs.lib.purdue.edu/open_access_dissertations/67

26. Nagaraj, Karthik Swaminathan. Enabling Richer Insight Into Runtime Executions Of Systems.

Degree: PhD, Computer Science, 2013, Purdue University

  Systems software of very large scales are being heavily used today in various important scenarios such as online retail, banking, content services, web search… (more)

Subjects/Keywords: applied sciences; distributed systems; machine learning; system performance; runtime executions; Computer Sciences

…Swaminathan Ph.D., Purdue University, December 2013. Enabling Richer Insight into Runtime Executions… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nagaraj, K. S. (2013). Enabling Richer Insight Into Runtime Executions Of Systems. (Doctoral Dissertation). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_dissertations/96

Chicago Manual of Style (16th Edition):

Nagaraj, Karthik Swaminathan. “Enabling Richer Insight Into Runtime Executions Of Systems.” 2013. Doctoral Dissertation, Purdue University. Accessed March 29, 2020. https://docs.lib.purdue.edu/open_access_dissertations/96.

MLA Handbook (7th Edition):

Nagaraj, Karthik Swaminathan. “Enabling Richer Insight Into Runtime Executions Of Systems.” 2013. Web. 29 Mar 2020.

Vancouver:

Nagaraj KS. Enabling Richer Insight Into Runtime Executions Of Systems. [Internet] [Doctoral dissertation]. Purdue University; 2013. [cited 2020 Mar 29]. Available from: https://docs.lib.purdue.edu/open_access_dissertations/96.

Council of Science Editors:

Nagaraj KS. Enabling Richer Insight Into Runtime Executions Of Systems. [Doctoral Dissertation]. Purdue University; 2013. Available from: https://docs.lib.purdue.edu/open_access_dissertations/96


Purdue University

27. Gu, Zhongshu. Securing Virtualized System via Active Protection.

Degree: PhD, Computer Science, 2015, Purdue University

Virtualization is the predominant enabling technology of current cloud infrastructures Advisors/Committee Members: Dongyan Xu, Xiangyu Zhang, Ninghui Li, Sonia Fahmy.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gu, Z. (2015). Securing Virtualized System via Active Protection. (Doctoral Dissertation). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_dissertations/1353

Chicago Manual of Style (16th Edition):

Gu, Zhongshu. “Securing Virtualized System via Active Protection.” 2015. Doctoral Dissertation, Purdue University. Accessed March 29, 2020. https://docs.lib.purdue.edu/open_access_dissertations/1353.

MLA Handbook (7th Edition):

Gu, Zhongshu. “Securing Virtualized System via Active Protection.” 2015. Web. 29 Mar 2020.

Vancouver:

Gu Z. Securing Virtualized System via Active Protection. [Internet] [Doctoral dissertation]. Purdue University; 2015. [cited 2020 Mar 29]. Available from: https://docs.lib.purdue.edu/open_access_dissertations/1353.

Council of Science Editors:

Gu Z. Securing Virtualized System via Active Protection. [Doctoral Dissertation]. Purdue University; 2015. Available from: https://docs.lib.purdue.edu/open_access_dissertations/1353

.