Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"University of Illinois – Urbana-Champaign" +contributor:("Iyer, Ravishankar K."). Showing records 1 – 21 of 21 total matches.

Search Limiters

Last 2 Years | English Only

▼ Search Limiters


University of Illinois – Urbana-Champaign

1. Jha, Saurabh. Analysis of Gemini interconnect recovery mechanisms: methods and observations.

Degree: MS, Computer Science, 2016, University of Illinois – Urbana-Champaign

 This thesis focuses on the resilience of network components, and recovery capabilities of extreme-scale high-performance computing (HPC) systems, specifically petaflop-level supercomputers, aimed at solving complex… (more)

Subjects/Keywords: High Performance Computing; Fault Tolerance; Interconnects

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jha, S. (2016). Analysis of Gemini interconnect recovery mechanisms: methods and observations. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/95450

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jha, Saurabh. “Analysis of Gemini interconnect recovery mechanisms: methods and observations.” 2016. Thesis, University of Illinois – Urbana-Champaign. Accessed October 15, 2019. http://hdl.handle.net/2142/95450.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jha, Saurabh. “Analysis of Gemini interconnect recovery mechanisms: methods and observations.” 2016. Web. 15 Oct 2019.

Vancouver:

Jha S. Analysis of Gemini interconnect recovery mechanisms: methods and observations. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2016. [cited 2019 Oct 15]. Available from: http://hdl.handle.net/2142/95450.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jha S. Analysis of Gemini interconnect recovery mechanisms: methods and observations. [Thesis]. University of Illinois – Urbana-Champaign; 2016. Available from: http://hdl.handle.net/2142/95450

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Illinois – Urbana-Champaign

2. Chung, Key-whan. Game theory with learning for cyber security monitoring.

Degree: MS, Electrical & Computer Engineering, 2015, University of Illinois – Urbana-Champaign

 Carefully crafted computer worms such as Stuxnet and recent data breaches on retail organizations (e.g., Target, Home Depot) are very sophisticated security attacks on critical… (more)

Subjects/Keywords: Computer security; Game theory

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chung, K. (2015). Game theory with learning for cyber security monitoring. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/89157

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chung, Key-whan. “Game theory with learning for cyber security monitoring.” 2015. Thesis, University of Illinois – Urbana-Champaign. Accessed October 15, 2019. http://hdl.handle.net/2142/89157.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chung, Key-whan. “Game theory with learning for cyber security monitoring.” 2015. Web. 15 Oct 2019.

Vancouver:

Chung K. Game theory with learning for cyber security monitoring. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2015. [cited 2019 Oct 15]. Available from: http://hdl.handle.net/2142/89157.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chung K. Game theory with learning for cyber security monitoring. [Thesis]. University of Illinois – Urbana-Champaign; 2015. Available from: http://hdl.handle.net/2142/89157

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Illinois – Urbana-Champaign

3. Saleheen, Mushfiq U. Embedded hardware architecture for multi-parameter physiological signal monitoring.

Degree: MS, 1200, 2011, University of Illinois – Urbana-Champaign

 Advancements in device technology along with development of robust and sophisticated signal processing algorithms have attracted considerable attention in realization of portable devices capable of… (more)

Subjects/Keywords: Physiological Monitoring; Embedded Hardware; Multi-Parameter; Statistical Signal Processing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Saleheen, M. U. (2011). Embedded hardware architecture for multi-parameter physiological signal monitoring. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/24518

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Saleheen, Mushfiq U. “Embedded hardware architecture for multi-parameter physiological signal monitoring.” 2011. Thesis, University of Illinois – Urbana-Champaign. Accessed October 15, 2019. http://hdl.handle.net/2142/24518.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Saleheen, Mushfiq U. “Embedded hardware architecture for multi-parameter physiological signal monitoring.” 2011. Web. 15 Oct 2019.

Vancouver:

Saleheen MU. Embedded hardware architecture for multi-parameter physiological signal monitoring. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2011. [cited 2019 Oct 15]. Available from: http://hdl.handle.net/2142/24518.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Saleheen MU. Embedded hardware architecture for multi-parameter physiological signal monitoring. [Thesis]. University of Illinois – Urbana-Champaign; 2011. Available from: http://hdl.handle.net/2142/24518

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Illinois – Urbana-Champaign

4. Cao, Phuong. An experiment using factor graph for early attack detection.

Degree: MS, Computer Science, 2015, University of Illinois – Urbana-Champaign

 This paper presents a factor graph based framework (named AttackTagger) for high accuracy and preemptive detection of attacks. We use security logs of real-incidents that… (more)

Subjects/Keywords: probabilistic graphical models; factor graph; security incidents; preemptive intrusion detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cao, P. (2015). An experiment using factor graph for early attack detection. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/78579

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cao, Phuong. “An experiment using factor graph for early attack detection.” 2015. Thesis, University of Illinois – Urbana-Champaign. Accessed October 15, 2019. http://hdl.handle.net/2142/78579.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cao, Phuong. “An experiment using factor graph for early attack detection.” 2015. Web. 15 Oct 2019.

Vancouver:

Cao P. An experiment using factor graph for early attack detection. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2015. [cited 2019 Oct 15]. Available from: http://hdl.handle.net/2142/78579.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cao P. An experiment using factor graph for early attack detection. [Thesis]. University of Illinois – Urbana-Champaign; 2015. Available from: http://hdl.handle.net/2142/78579

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Illinois – Urbana-Champaign

5. Hong, Zhihao. A data-driven approach to soil moisture collection and prediction using a wireless sensor network and machine learning techniques.

Degree: MS, Electrical & Computer Engineering, 2015, University of Illinois – Urbana-Champaign

 Agriculture has been one of the most underinvestigated areas in technology, and the development of Precision Agriculture is still in its early stages. This thesis… (more)

Subjects/Keywords: soil moisture; data driven; wireless sensor network; machine learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hong, Z. (2015). A data-driven approach to soil moisture collection and prediction using a wireless sensor network and machine learning techniques. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/88145

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hong, Zhihao. “A data-driven approach to soil moisture collection and prediction using a wireless sensor network and machine learning techniques.” 2015. Thesis, University of Illinois – Urbana-Champaign. Accessed October 15, 2019. http://hdl.handle.net/2142/88145.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hong, Zhihao. “A data-driven approach to soil moisture collection and prediction using a wireless sensor network and machine learning techniques.” 2015. Web. 15 Oct 2019.

Vancouver:

Hong Z. A data-driven approach to soil moisture collection and prediction using a wireless sensor network and machine learning techniques. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2015. [cited 2019 Oct 15]. Available from: http://hdl.handle.net/2142/88145.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hong Z. A data-driven approach to soil moisture collection and prediction using a wireless sensor network and machine learning techniques. [Thesis]. University of Illinois – Urbana-Champaign; 2015. Available from: http://hdl.handle.net/2142/88145

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Illinois – Urbana-Champaign

6. Tseng, Kuan-Yu. Asynchronous hardware-enforced memory safety.

Degree: MS, 0112, 2013, University of Illinois – Urbana-Champaign

 Memory corruption attacks, such as buffer overflow attacks, have been threatening software security for more than three decades. Despite tremendous efforts by developers and researchers… (more)

Subjects/Keywords: Memory Safety; Memory errors; Hardware; Field-Programmable Gate Array (FPGA); Memory Corruption Attacks; C Programming language; Bounds checking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tseng, K. (2013). Asynchronous hardware-enforced memory safety. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/45568

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tseng, Kuan-Yu. “Asynchronous hardware-enforced memory safety.” 2013. Thesis, University of Illinois – Urbana-Champaign. Accessed October 15, 2019. http://hdl.handle.net/2142/45568.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tseng, Kuan-Yu. “Asynchronous hardware-enforced memory safety.” 2013. Web. 15 Oct 2019.

Vancouver:

Tseng K. Asynchronous hardware-enforced memory safety. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2013. [cited 2019 Oct 15]. Available from: http://hdl.handle.net/2142/45568.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tseng K. Asynchronous hardware-enforced memory safety. [Thesis]. University of Illinois – Urbana-Champaign; 2013. Available from: http://hdl.handle.net/2142/45568

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Illinois – Urbana-Champaign

7. Patel, Prateek. Design and evaluation of information flow signature for secure computation of applications.

Degree: MS, 1200, 2012, University of Illinois – Urbana-Champaign

 This thesis presents an architectural solution that provides secure and reliable execution of an application that computes critical data, in spite of potential hardware and… (more)

Subjects/Keywords: Information Flow Signature (IFS)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Patel, P. (2012). Design and evaluation of information flow signature for secure computation of applications. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/34511

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Patel, Prateek. “Design and evaluation of information flow signature for secure computation of applications.” 2012. Thesis, University of Illinois – Urbana-Champaign. Accessed October 15, 2019. http://hdl.handle.net/2142/34511.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Patel, Prateek. “Design and evaluation of information flow signature for secure computation of applications.” 2012. Web. 15 Oct 2019.

Vancouver:

Patel P. Design and evaluation of information flow signature for secure computation of applications. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2012. [cited 2019 Oct 15]. Available from: http://hdl.handle.net/2142/34511.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Patel P. Design and evaluation of information flow signature for secure computation of applications. [Thesis]. University of Illinois – Urbana-Champaign; 2012. Available from: http://hdl.handle.net/2142/34511

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Illinois – Urbana-Champaign

8. Alemzadeh, Homa. Data-driven resiliency assessment of medical cyber-physical systems.

Degree: PhD, Electrical & Computer Engr, 2016, University of Illinois – Urbana-Champaign

 Advances in computing, networking, and sensing technologies have resulted in the ubiquitous deployment of medical cyber-physical systems in various clinical and personalized settings. The increasing… (more)

Subjects/Keywords: Resiliency; Safety; Security; Cyber-Physical Systems; Medical Devices; Robotic Surgery; Food and Drug Administration (FDA); Manufacturer and User Facility Device Experience (MAUDE); Recalls; Adverse Events; Accident Analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alemzadeh, H. (2016). Data-driven resiliency assessment of medical cyber-physical systems. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/90562

Chicago Manual of Style (16th Edition):

Alemzadeh, Homa. “Data-driven resiliency assessment of medical cyber-physical systems.” 2016. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed October 15, 2019. http://hdl.handle.net/2142/90562.

MLA Handbook (7th Edition):

Alemzadeh, Homa. “Data-driven resiliency assessment of medical cyber-physical systems.” 2016. Web. 15 Oct 2019.

Vancouver:

Alemzadeh H. Data-driven resiliency assessment of medical cyber-physical systems. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2016. [cited 2019 Oct 15]. Available from: http://hdl.handle.net/2142/90562.

Council of Science Editors:

Alemzadeh H. Data-driven resiliency assessment of medical cyber-physical systems. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2016. Available from: http://hdl.handle.net/2142/90562

9. Cheriyan, Ajay M. Reliable health monitoring: a commercial off-the-shelf and a field programmable hardware approach.

Degree: MS, 1200, 2010, University of Illinois – Urbana-Champaign

 With the tremendous advancements in low cost, power-efficient hardware and the recent interest in biomedical embedded systems, numerous traditional biomedical systems can be replaced with… (more)

Subjects/Keywords: Commercial off-the-shelf (COTS); Field-Programmable Gate Array (FPGA); Electroencephalography (EEG); Seizure; Microcontroller; MSP430; Leon3; Advanced Microcontroller Bus Architecture (AMBA)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cheriyan, A. M. (2010). Reliable health monitoring: a commercial off-the-shelf and a field programmable hardware approach. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/16175

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cheriyan, Ajay M. “Reliable health monitoring: a commercial off-the-shelf and a field programmable hardware approach.” 2010. Thesis, University of Illinois – Urbana-Champaign. Accessed October 15, 2019. http://hdl.handle.net/2142/16175.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cheriyan, Ajay M. “Reliable health monitoring: a commercial off-the-shelf and a field programmable hardware approach.” 2010. Web. 15 Oct 2019.

Vancouver:

Cheriyan AM. Reliable health monitoring: a commercial off-the-shelf and a field programmable hardware approach. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2010. [cited 2019 Oct 15]. Available from: http://hdl.handle.net/2142/16175.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cheriyan AM. Reliable health monitoring: a commercial off-the-shelf and a field programmable hardware approach. [Thesis]. University of Illinois – Urbana-Champaign; 2010. Available from: http://hdl.handle.net/2142/16175

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

10. Yuan, Flore Q. Formal framework and tools to derive efficient application-level detectors against memory corruption attacks.

Degree: MS, 1200, 2010, University of Illinois – Urbana-Champaign

 Memory corruptions are a major part of security attacks observed nowadays. Many protection mechanisms have been proposed to fight against them. These techniques can be… (more)

Subjects/Keywords: Formal verification; memory corruption; application specific detectors

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yuan, F. Q. (2010). Formal framework and tools to derive efficient application-level detectors against memory corruption attacks. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/16469

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yuan, Flore Q. “Formal framework and tools to derive efficient application-level detectors against memory corruption attacks.” 2010. Thesis, University of Illinois – Urbana-Champaign. Accessed October 15, 2019. http://hdl.handle.net/2142/16469.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yuan, Flore Q. “Formal framework and tools to derive efficient application-level detectors against memory corruption attacks.” 2010. Web. 15 Oct 2019.

Vancouver:

Yuan FQ. Formal framework and tools to derive efficient application-level detectors against memory corruption attacks. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2010. [cited 2019 Oct 15]. Available from: http://hdl.handle.net/2142/16469.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yuan FQ. Formal framework and tools to derive efficient application-level detectors against memory corruption attacks. [Thesis]. University of Illinois – Urbana-Champaign; 2010. Available from: http://hdl.handle.net/2142/16469

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

11. Lee, So Youn. Analysis of the impact of sequencing errors on BLAST using fault injection.

Degree: MS, 1200, 2013, University of Illinois – Urbana-Champaign

 This thesis investigates the impact of sequencing errors in post-sequence computational analyses, including local alignment search and multiple sequence alignment. While the error rates of… (more)

Subjects/Keywords: blast; sequencing error; fault injection; sequence alignment; smith-waterman algorithm; ssearch

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lee, S. Y. (2013). Analysis of the impact of sequencing errors on BLAST using fault injection. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/45490

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lee, So Youn. “Analysis of the impact of sequencing errors on BLAST using fault injection.” 2013. Thesis, University of Illinois – Urbana-Champaign. Accessed October 15, 2019. http://hdl.handle.net/2142/45490.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lee, So Youn. “Analysis of the impact of sequencing errors on BLAST using fault injection.” 2013. Web. 15 Oct 2019.

Vancouver:

Lee SY. Analysis of the impact of sequencing errors on BLAST using fault injection. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2013. [cited 2019 Oct 15]. Available from: http://hdl.handle.net/2142/45490.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lee SY. Analysis of the impact of sequencing errors on BLAST using fault injection. [Thesis]. University of Illinois – Urbana-Champaign; 2013. Available from: http://hdl.handle.net/2142/45490

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

12. Pham, Cuong. CloudVal: a framework for failure validation of virtualization environment in cloud infrastructure.

Degree: MS, 1200, 2013, University of Illinois – Urbana-Champaign

 We present CloudVal, a framework to validate the reliability of virtualization environment in cloud computing infrastructure. A case study, based on injecting faults in the… (more)

Subjects/Keywords: Virtualization; Fault Injection; Reliability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pham, C. (2013). CloudVal: a framework for failure validation of virtualization environment in cloud infrastructure. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/45314

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pham, Cuong. “CloudVal: a framework for failure validation of virtualization environment in cloud infrastructure.” 2013. Thesis, University of Illinois – Urbana-Champaign. Accessed October 15, 2019. http://hdl.handle.net/2142/45314.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pham, Cuong. “CloudVal: a framework for failure validation of virtualization environment in cloud infrastructure.” 2013. Web. 15 Oct 2019.

Vancouver:

Pham C. CloudVal: a framework for failure validation of virtualization environment in cloud infrastructure. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2013. [cited 2019 Oct 15]. Available from: http://hdl.handle.net/2142/45314.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pham C. CloudVal: a framework for failure validation of virtualization environment in cloud infrastructure. [Thesis]. University of Illinois – Urbana-Champaign; 2013. Available from: http://hdl.handle.net/2142/45314

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Illinois – Urbana-Champaign

13. Estrada, Zachary. Dynamic reliability and security monitoring: a virtual machine approach.

Degree: PhD, Electrical & Computer Engr, 2016, University of Illinois – Urbana-Champaign

 While one always works to prevent attacks and failures, they are inevitable and situational awareness is key to taking appropriate action. Monitoring plays an integral… (more)

Subjects/Keywords: virtualization; emulation; security; reliability; hprobes; cloud; hardware-asssisted virtualization; dynamic analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Estrada, Z. (2016). Dynamic reliability and security monitoring: a virtual machine approach. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/95458

Chicago Manual of Style (16th Edition):

Estrada, Zachary. “Dynamic reliability and security monitoring: a virtual machine approach.” 2016. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed October 15, 2019. http://hdl.handle.net/2142/95458.

MLA Handbook (7th Edition):

Estrada, Zachary. “Dynamic reliability and security monitoring: a virtual machine approach.” 2016. Web. 15 Oct 2019.

Vancouver:

Estrada Z. Dynamic reliability and security monitoring: a virtual machine approach. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2016. [cited 2019 Oct 15]. Available from: http://hdl.handle.net/2142/95458.

Council of Science Editors:

Estrada Z. Dynamic reliability and security monitoring: a virtual machine approach. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2016. Available from: http://hdl.handle.net/2142/95458


University of Illinois – Urbana-Champaign

14. Pham, Cuong Manh. Continuous monitoring methods to achieve resiliency for virtual machines.

Degree: PhD, Electrical & Computer Engr, 2016, University of Illinois – Urbana-Champaign

 This dissertation describes monitoring methods to achieve both security and reliability in virtualized computer systems. Our key contribution is showing how we can perform continuous… (more)

Subjects/Keywords: Security; Reliability; Machine Virtualization; Virtual Machine; Operating System; Continuous Monitoring

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pham, C. M. (2016). Continuous monitoring methods to achieve resiliency for virtual machines. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/95470

Chicago Manual of Style (16th Edition):

Pham, Cuong Manh. “Continuous monitoring methods to achieve resiliency for virtual machines.” 2016. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed October 15, 2019. http://hdl.handle.net/2142/95470.

MLA Handbook (7th Edition):

Pham, Cuong Manh. “Continuous monitoring methods to achieve resiliency for virtual machines.” 2016. Web. 15 Oct 2019.

Vancouver:

Pham CM. Continuous monitoring methods to achieve resiliency for virtual machines. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2016. [cited 2019 Oct 15]. Available from: http://hdl.handle.net/2142/95470.

Council of Science Editors:

Pham CM. Continuous monitoring methods to achieve resiliency for virtual machines. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2016. Available from: http://hdl.handle.net/2142/95470


University of Illinois – Urbana-Champaign

15. Jacques da Silva, Gabriela. Partial fault tolerance in stream processing applications - methods and evaluation techniques.

Degree: PhD, 1200, 2011, University of Illinois – Urbana-Champaign

 Stream processing emerged as a paradigm to continuously process incoming live data streams, such as audio, video, and business feeds. These applications are assembled as… (more)

Subjects/Keywords: fault tolerance; fault injection; stream processing; model-based evaluation; high-availability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jacques da Silva, G. (2011). Partial fault tolerance in stream processing applications - methods and evaluation techniques. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/18383

Chicago Manual of Style (16th Edition):

Jacques da Silva, Gabriela. “Partial fault tolerance in stream processing applications - methods and evaluation techniques.” 2011. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed October 15, 2019. http://hdl.handle.net/2142/18383.

MLA Handbook (7th Edition):

Jacques da Silva, Gabriela. “Partial fault tolerance in stream processing applications - methods and evaluation techniques.” 2011. Web. 15 Oct 2019.

Vancouver:

Jacques da Silva G. Partial fault tolerance in stream processing applications - methods and evaluation techniques. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2011. [cited 2019 Oct 15]. Available from: http://hdl.handle.net/2142/18383.

Council of Science Editors:

Jacques da Silva G. Partial fault tolerance in stream processing applications - methods and evaluation techniques. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2011. Available from: http://hdl.handle.net/2142/18383


University of Illinois – Urbana-Champaign

16. Badrinath Krishna, Varun. Data-driven methods to improve resource utilization, fraud detection, and cyber-resilience in smart grids.

Degree: PhD, Electrical & Computer Engr, 2018, University of Illinois – Urbana-Champaign

 This dissertation demonstrates that empirical models of generation and consumption, constructed using machine learning and statistical methods, improve resource utilization, fraud detection, and cyber-resilience in… (more)

Subjects/Keywords: Data; Machine Learning; Security; Smart Grids; Artificial Intelligence; Neural Network; Power; Energy; Wind; Solar; Networks; Attack; Detection; Generation; Consumption; Anomaly; Fraud; Resilience; Outage; Frequency; Demand Response; Signal Processing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Badrinath Krishna, V. (2018). Data-driven methods to improve resource utilization, fraud detection, and cyber-resilience in smart grids. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/102493

Chicago Manual of Style (16th Edition):

Badrinath Krishna, Varun. “Data-driven methods to improve resource utilization, fraud detection, and cyber-resilience in smart grids.” 2018. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed October 15, 2019. http://hdl.handle.net/2142/102493.

MLA Handbook (7th Edition):

Badrinath Krishna, Varun. “Data-driven methods to improve resource utilization, fraud detection, and cyber-resilience in smart grids.” 2018. Web. 15 Oct 2019.

Vancouver:

Badrinath Krishna V. Data-driven methods to improve resource utilization, fraud detection, and cyber-resilience in smart grids. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2018. [cited 2019 Oct 15]. Available from: http://hdl.handle.net/2142/102493.

Council of Science Editors:

Badrinath Krishna V. Data-driven methods to improve resource utilization, fraud detection, and cyber-resilience in smart grids. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2018. Available from: http://hdl.handle.net/2142/102493

17. Varatharajah, Yogatheesan. Prediction of canine epilepsy.

Degree: MS, Electrical & Computer Engineering, 2015, University of Illinois – Urbana-Champaign

 Seizure prediction is a problem in biomedical science which now is possible to solve with machine learning methods. A seizure prediction system has the power… (more)

Subjects/Keywords: Seizure prediction; Canine epilepsy; Preictal state; Prediction pipeline; Machine learning; Dimensionality Reduction

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Varatharajah, Y. (2015). Prediction of canine epilepsy. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/89052

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Varatharajah, Yogatheesan. “Prediction of canine epilepsy.” 2015. Thesis, University of Illinois – Urbana-Champaign. Accessed October 15, 2019. http://hdl.handle.net/2142/89052.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Varatharajah, Yogatheesan. “Prediction of canine epilepsy.” 2015. Web. 15 Oct 2019.

Vancouver:

Varatharajah Y. Prediction of canine epilepsy. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2015. [cited 2019 Oct 15]. Available from: http://hdl.handle.net/2142/89052.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Varatharajah Y. Prediction of canine epilepsy. [Thesis]. University of Illinois – Urbana-Champaign; 2015. Available from: http://hdl.handle.net/2142/89052

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

18. Badger, Eric C. Scalable data analytics pipeline for real-time attack detection: design, validation, and deployment in a honeypot environment.

Degree: MS, Electrical & Computer Engineering, 2015, University of Illinois – Urbana-Champaign

 This work explores a scalable data analytics pipeline for real-time attack detection through the use of customized honeypots at the National Center for Supercomputing Applications… (more)

Subjects/Keywords: Intrusion Detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Badger, E. C. (2015). Scalable data analytics pipeline for real-time attack detection: design, validation, and deployment in a honeypot environment. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/89057

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Badger, Eric C. “Scalable data analytics pipeline for real-time attack detection: design, validation, and deployment in a honeypot environment.” 2015. Thesis, University of Illinois – Urbana-Champaign. Accessed October 15, 2019. http://hdl.handle.net/2142/89057.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Badger, Eric C. “Scalable data analytics pipeline for real-time attack detection: design, validation, and deployment in a honeypot environment.” 2015. Web. 15 Oct 2019.

Vancouver:

Badger EC. Scalable data analytics pipeline for real-time attack detection: design, validation, and deployment in a honeypot environment. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2015. [cited 2019 Oct 15]. Available from: http://hdl.handle.net/2142/89057.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Badger EC. Scalable data analytics pipeline for real-time attack detection: design, validation, and deployment in a honeypot environment. [Thesis]. University of Illinois – Urbana-Champaign; 2015. Available from: http://hdl.handle.net/2142/89057

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

19. Li, Qingkun. An energy-efficient hardware system for robust and reliable heart rate monitoring.

Degree: MS, Electrical & Computer Engr, 2015, University of Illinois – Urbana-Champaign

 Cardiac arrhythmia, one of the most common causes of death in the world today, is not always effectively detected by regular examinations, as it usually… (more)

Subjects/Keywords: reconfigurable hardware; biomedical monitoring; fault tolerance; embedded hardware; heart rate monitoring

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Li, Q. (2015). An energy-efficient hardware system for robust and reliable heart rate monitoring. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/78330

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Li, Qingkun. “An energy-efficient hardware system for robust and reliable heart rate monitoring.” 2015. Thesis, University of Illinois – Urbana-Champaign. Accessed October 15, 2019. http://hdl.handle.net/2142/78330.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Li, Qingkun. “An energy-efficient hardware system for robust and reliable heart rate monitoring.” 2015. Web. 15 Oct 2019.

Vancouver:

Li Q. An energy-efficient hardware system for robust and reliable heart rate monitoring. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2015. [cited 2019 Oct 15]. Available from: http://hdl.handle.net/2142/78330.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Li Q. An energy-efficient hardware system for robust and reliable heart rate monitoring. [Thesis]. University of Illinois – Urbana-Champaign; 2015. Available from: http://hdl.handle.net/2142/78330

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

20. Yim, Keun Soo. From experiment to design – fault characterization and detection in parallel computer systems using computational accelerators.

Degree: PhD, 0112, 2013, University of Illinois – Urbana-Champaign

 This dissertation summarizes experimental validation and co-design studies conducted to optimize the fault detection capabilities and overheads in hybrid computer systems (e.g., using CPUs and… (more)

Subjects/Keywords: Fault tolerance system design; Experimental validation; Error detection; Fault injection; Measurement-based co-design; Graphics Processing Unit fault tolerance; Message Passing Interface; CPU-GPU hybrid computers; COTS-based mission-critical systems; Reliability; Dependability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yim, K. S. (2013). From experiment to design – fault characterization and detection in parallel computer systems using computational accelerators. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/44390

Chicago Manual of Style (16th Edition):

Yim, Keun Soo. “From experiment to design – fault characterization and detection in parallel computer systems using computational accelerators.” 2013. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed October 15, 2019. http://hdl.handle.net/2142/44390.

MLA Handbook (7th Edition):

Yim, Keun Soo. “From experiment to design – fault characterization and detection in parallel computer systems using computational accelerators.” 2013. Web. 15 Oct 2019.

Vancouver:

Yim KS. From experiment to design – fault characterization and detection in parallel computer systems using computational accelerators. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2013. [cited 2019 Oct 15]. Available from: http://hdl.handle.net/2142/44390.

Council of Science Editors:

Yim KS. From experiment to design – fault characterization and detection in parallel computer systems using computational accelerators. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2013. Available from: http://hdl.handle.net/2142/44390

21. Wang, Long. Providing application-aware reliability through OS/hypervisor-level techniques.

Degree: PhD, 1200, 2011, University of Illinois – Urbana-Champaign

 Operating systems and hypervisors enable the collection and extraction of rich information on application and system execution characteristics. This thesis describes a Reliability MicroKernel (RMK)… (more)

Subjects/Keywords: checkpoint; reliability, virtual machine; hypervisor; system hang; microkernel; operating system; error detection; error injection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, L. (2011). Providing application-aware reliability through OS/hypervisor-level techniques. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/18440

Chicago Manual of Style (16th Edition):

Wang, Long. “Providing application-aware reliability through OS/hypervisor-level techniques.” 2011. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed October 15, 2019. http://hdl.handle.net/2142/18440.

MLA Handbook (7th Edition):

Wang, Long. “Providing application-aware reliability through OS/hypervisor-level techniques.” 2011. Web. 15 Oct 2019.

Vancouver:

Wang L. Providing application-aware reliability through OS/hypervisor-level techniques. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2011. [cited 2019 Oct 15]. Available from: http://hdl.handle.net/2142/18440.

Council of Science Editors:

Wang L. Providing application-aware reliability through OS/hypervisor-level techniques. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2011. Available from: http://hdl.handle.net/2142/18440

.