Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"University of New Mexico" +contributor:("Lane, Terran"). Showing records 1 – 14 of 14 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


University of New Mexico

1. Neil, Joshua. Scan statistics for the online detection of locally anomalous subgraphs.

Degree: Mathematics & Statistics, 2011, University of New Mexico

 Identifying anomalies in computer networks is a challenging and complex problem. Often, anomalies occur in extremely local areas of the network. Locality is complex in… (more)

Subjects/Keywords: Computer networks – Security measures – Statistical methods; Computer networks – Monitoring – Statistical methods; Computer security – Statistical methods.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Neil, J. (2011). Scan statistics for the online detection of locally anomalous subgraphs. (Doctoral Dissertation). University of New Mexico. Retrieved from http://hdl.handle.net/1928/13885

Chicago Manual of Style (16th Edition):

Neil, Joshua. “Scan statistics for the online detection of locally anomalous subgraphs.” 2011. Doctoral Dissertation, University of New Mexico. Accessed February 24, 2020. http://hdl.handle.net/1928/13885.

MLA Handbook (7th Edition):

Neil, Joshua. “Scan statistics for the online detection of locally anomalous subgraphs.” 2011. Web. 24 Feb 2020.

Vancouver:

Neil J. Scan statistics for the online detection of locally anomalous subgraphs. [Internet] [Doctoral dissertation]. University of New Mexico; 2011. [cited 2020 Feb 24]. Available from: http://hdl.handle.net/1928/13885.

Council of Science Editors:

Neil J. Scan statistics for the online detection of locally anomalous subgraphs. [Doctoral Dissertation]. University of New Mexico; 2011. Available from: http://hdl.handle.net/1928/13885


University of New Mexico

2. Roy, Sushmita. Learning condition-specific networks.

Degree: Department of Computer Science, 2009, University of New Mexico

 Condition-specific cellular networks are networks of genes and proteins that describe functional interactions among genes occurring under different environmental conditions. These networks provide a systems-level… (more)

Subjects/Keywords: Machine learning; Computational Biology; Probabilistic graphical models; Gene expression; Condition-specific response

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Roy, S. (2009). Learning condition-specific networks. (Doctoral Dissertation). University of New Mexico. Retrieved from http://hdl.handle.net/1928/10331

Chicago Manual of Style (16th Edition):

Roy, Sushmita. “Learning condition-specific networks.” 2009. Doctoral Dissertation, University of New Mexico. Accessed February 24, 2020. http://hdl.handle.net/1928/10331.

MLA Handbook (7th Edition):

Roy, Sushmita. “Learning condition-specific networks.” 2009. Web. 24 Feb 2020.

Vancouver:

Roy S. Learning condition-specific networks. [Internet] [Doctoral dissertation]. University of New Mexico; 2009. [cited 2020 Feb 24]. Available from: http://hdl.handle.net/1928/10331.

Council of Science Editors:

Roy S. Learning condition-specific networks. [Doctoral Dissertation]. University of New Mexico; 2009. Available from: http://hdl.handle.net/1928/10331


University of New Mexico

3. Al-Saleh, Mohammed I. Fine-grained reasoning about the security and usability trade-off in modern security tools.

Degree: Department of Computer Science, 2011, University of New Mexico

 Defense techniques detect or prevent attacks based on their ability to model the attacks. A balance between security and usability should always be established in… (more)

Subjects/Keywords: security; usability; Fine-grained reasoning; DIFT; Antivirus; Timing attack; Sensor network security; dynamic information flow tracking; Computer security.; Intrusion detection systems (Computer security); Computer viruses – Prevention; User-centered system design.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al-Saleh, M. I. (2011). Fine-grained reasoning about the security and usability trade-off in modern security tools. (Doctoral Dissertation). University of New Mexico. Retrieved from http://hdl.handle.net/1928/13120

Chicago Manual of Style (16th Edition):

Al-Saleh, Mohammed I. “Fine-grained reasoning about the security and usability trade-off in modern security tools.” 2011. Doctoral Dissertation, University of New Mexico. Accessed February 24, 2020. http://hdl.handle.net/1928/13120.

MLA Handbook (7th Edition):

Al-Saleh, Mohammed I. “Fine-grained reasoning about the security and usability trade-off in modern security tools.” 2011. Web. 24 Feb 2020.

Vancouver:

Al-Saleh MI. Fine-grained reasoning about the security and usability trade-off in modern security tools. [Internet] [Doctoral dissertation]. University of New Mexico; 2011. [cited 2020 Feb 24]. Available from: http://hdl.handle.net/1928/13120.

Council of Science Editors:

Al-Saleh MI. Fine-grained reasoning about the security and usability trade-off in modern security tools. [Doctoral Dissertation]. University of New Mexico; 2011. Available from: http://hdl.handle.net/1928/13120


University of New Mexico

4. Yackley, Benjamin. Proxy-Based Acceleration for Combinatorial Optimization Problems.

Degree: Department of Computer Science, 2014, University of New Mexico

 Combinatorial optimization problems occur in a wide range of domains, from Bayesian network structure search to questions in neuroscience and biochemistry. However, all of these… (more)

Subjects/Keywords: bayesian; combinatoric optimization; optimization; machine learning; learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yackley, B. (2014). Proxy-Based Acceleration for Combinatorial Optimization Problems. (Doctoral Dissertation). University of New Mexico. Retrieved from http://hdl.handle.net/1928/24360

Chicago Manual of Style (16th Edition):

Yackley, Benjamin. “Proxy-Based Acceleration for Combinatorial Optimization Problems.” 2014. Doctoral Dissertation, University of New Mexico. Accessed February 24, 2020. http://hdl.handle.net/1928/24360.

MLA Handbook (7th Edition):

Yackley, Benjamin. “Proxy-Based Acceleration for Combinatorial Optimization Problems.” 2014. Web. 24 Feb 2020.

Vancouver:

Yackley B. Proxy-Based Acceleration for Combinatorial Optimization Problems. [Internet] [Doctoral dissertation]. University of New Mexico; 2014. [cited 2020 Feb 24]. Available from: http://hdl.handle.net/1928/24360.

Council of Science Editors:

Yackley B. Proxy-Based Acceleration for Combinatorial Optimization Problems. [Doctoral Dissertation]. University of New Mexico; 2014. Available from: http://hdl.handle.net/1928/24360


University of New Mexico

5. Ensafi, Roya. Advanced Network Inference Techniques Based on Network Protocol Stack Information Leaks.

Degree: Department of Computer Science, 2014, University of New Mexico

 Side channels are channels of implicit information flow that can be used to find out information that is not allowed to flow through explicit channels.… (more)

Subjects/Keywords: Internet Measurment; Side Channels; Idle Scan; Censorship

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ensafi, R. (2014). Advanced Network Inference Techniques Based on Network Protocol Stack Information Leaks. (Doctoral Dissertation). University of New Mexico. Retrieved from http://hdl.handle.net/1928/25775

Chicago Manual of Style (16th Edition):

Ensafi, Roya. “Advanced Network Inference Techniques Based on Network Protocol Stack Information Leaks.” 2014. Doctoral Dissertation, University of New Mexico. Accessed February 24, 2020. http://hdl.handle.net/1928/25775.

MLA Handbook (7th Edition):

Ensafi, Roya. “Advanced Network Inference Techniques Based on Network Protocol Stack Information Leaks.” 2014. Web. 24 Feb 2020.

Vancouver:

Ensafi R. Advanced Network Inference Techniques Based on Network Protocol Stack Information Leaks. [Internet] [Doctoral dissertation]. University of New Mexico; 2014. [cited 2020 Feb 24]. Available from: http://hdl.handle.net/1928/25775.

Council of Science Editors:

Ensafi R. Advanced Network Inference Techniques Based on Network Protocol Stack Information Leaks. [Doctoral Dissertation]. University of New Mexico; 2014. Available from: http://hdl.handle.net/1928/25775


University of New Mexico

6. Martinez, Antonio Diego. Genome architecture in the fungal kingdom.

Degree: UNM Biology Department, 2010, University of New Mexico

 Previous studies have suggested that the location of genes in genomes is not random; instead they may be organized in a way that is beneficial… (more)

Subjects/Keywords: Genomics; Fungi; Clusters; Gene Position

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Martinez, A. D. (2010). Genome architecture in the fungal kingdom. (Doctoral Dissertation). University of New Mexico. Retrieved from https://digitalrepository.unm.edu/biol_etds/76

Chicago Manual of Style (16th Edition):

Martinez, Antonio Diego. “Genome architecture in the fungal kingdom.” 2010. Doctoral Dissertation, University of New Mexico. Accessed February 24, 2020. https://digitalrepository.unm.edu/biol_etds/76.

MLA Handbook (7th Edition):

Martinez, Antonio Diego. “Genome architecture in the fungal kingdom.” 2010. Web. 24 Feb 2020.

Vancouver:

Martinez AD. Genome architecture in the fungal kingdom. [Internet] [Doctoral dissertation]. University of New Mexico; 2010. [cited 2020 Feb 24]. Available from: https://digitalrepository.unm.edu/biol_etds/76.

Council of Science Editors:

Martinez AD. Genome architecture in the fungal kingdom. [Doctoral Dissertation]. University of New Mexico; 2010. Available from: https://digitalrepository.unm.edu/biol_etds/76


University of New Mexico

7. Zhang, Jun. Markov random field modeling of the spatial distribution of proteins on cell membranes.

Degree: Department of Computer Science, 2010, University of New Mexico

 Cell membranes display a range of receptors that bind ligands and activate signaling pathways. Signaling is characterized by dramatic changes in membrane molecular topography, including… (more)

Subjects/Keywords: Cell membrane; Spatial distribution; Markov random fields; Parameter estimation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, J. (2010). Markov random field modeling of the spatial distribution of proteins on cell membranes. (Doctoral Dissertation). University of New Mexico. Retrieved from http://hdl.handle.net/1928/10918

Chicago Manual of Style (16th Edition):

Zhang, Jun. “Markov random field modeling of the spatial distribution of proteins on cell membranes.” 2010. Doctoral Dissertation, University of New Mexico. Accessed February 24, 2020. http://hdl.handle.net/1928/10918.

MLA Handbook (7th Edition):

Zhang, Jun. “Markov random field modeling of the spatial distribution of proteins on cell membranes.” 2010. Web. 24 Feb 2020.

Vancouver:

Zhang J. Markov random field modeling of the spatial distribution of proteins on cell membranes. [Internet] [Doctoral dissertation]. University of New Mexico; 2010. [cited 2020 Feb 24]. Available from: http://hdl.handle.net/1928/10918.

Council of Science Editors:

Zhang J. Markov random field modeling of the spatial distribution of proteins on cell membranes. [Doctoral Dissertation]. University of New Mexico; 2010. Available from: http://hdl.handle.net/1928/10918


University of New Mexico

8. Banerjee, Soumya. Scaling in the immune system.

Degree: Department of Computer Science, 2013, University of New Mexico

 How different is the immune system in a human from that of a mouse? Do pathogens replicate at the same rate in different species? Answers… (more)

Subjects/Keywords: scaling; immune system; mathematical modeling; viral dynamics; lymph node scaling

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Banerjee, S. (2013). Scaling in the immune system. (Doctoral Dissertation). University of New Mexico. Retrieved from http://hdl.handle.net/1928/23083

Chicago Manual of Style (16th Edition):

Banerjee, Soumya. “Scaling in the immune system.” 2013. Doctoral Dissertation, University of New Mexico. Accessed February 24, 2020. http://hdl.handle.net/1928/23083.

MLA Handbook (7th Edition):

Banerjee, Soumya. “Scaling in the immune system.” 2013. Web. 24 Feb 2020.

Vancouver:

Banerjee S. Scaling in the immune system. [Internet] [Doctoral dissertation]. University of New Mexico; 2013. [cited 2020 Feb 24]. Available from: http://hdl.handle.net/1928/23083.

Council of Science Editors:

Banerjee S. Scaling in the immune system. [Doctoral Dissertation]. University of New Mexico; 2013. Available from: http://hdl.handle.net/1928/23083


University of New Mexico

9. Oyen, Diane. Interactive Exploration of Multitask Dependency Networks.

Degree: Department of Computer Science, 2013, University of New Mexico

 Scientists increasingly depend on machine learning algorithms to discover patterns in complex data. Two examples addressed in this dissertation are identifying how information sharing among… (more)

Subjects/Keywords: machine learning; probabilistic graphical models

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Oyen, D. (2013). Interactive Exploration of Multitask Dependency Networks. (Doctoral Dissertation). University of New Mexico. Retrieved from http://hdl.handle.net/1928/23359

Chicago Manual of Style (16th Edition):

Oyen, Diane. “Interactive Exploration of Multitask Dependency Networks.” 2013. Doctoral Dissertation, University of New Mexico. Accessed February 24, 2020. http://hdl.handle.net/1928/23359.

MLA Handbook (7th Edition):

Oyen, Diane. “Interactive Exploration of Multitask Dependency Networks.” 2013. Web. 24 Feb 2020.

Vancouver:

Oyen D. Interactive Exploration of Multitask Dependency Networks. [Internet] [Doctoral dissertation]. University of New Mexico; 2013. [cited 2020 Feb 24]. Available from: http://hdl.handle.net/1928/23359.

Council of Science Editors:

Oyen D. Interactive Exploration of Multitask Dependency Networks. [Doctoral Dissertation]. University of New Mexico; 2013. Available from: http://hdl.handle.net/1928/23359


University of New Mexico

10. Anderson, Blake. Integrating Multiple Data Views for Improved Malware Analysis.

Degree: Department of Computer Science, 2014, University of New Mexico

 Malicious software (malware) has become a prominent fixture in computing. There have been many methods developed over the years to combat the spread of malware,… (more)

Subjects/Keywords: Malware; Support Vector Machine; Classification; Clustering; Phylogeny

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Anderson, B. (2014). Integrating Multiple Data Views for Improved Malware Analysis. (Doctoral Dissertation). University of New Mexico. Retrieved from http://hdl.handle.net/1928/24289

Chicago Manual of Style (16th Edition):

Anderson, Blake. “Integrating Multiple Data Views for Improved Malware Analysis.” 2014. Doctoral Dissertation, University of New Mexico. Accessed February 24, 2020. http://hdl.handle.net/1928/24289.

MLA Handbook (7th Edition):

Anderson, Blake. “Integrating Multiple Data Views for Improved Malware Analysis.” 2014. Web. 24 Feb 2020.

Vancouver:

Anderson B. Integrating Multiple Data Views for Improved Malware Analysis. [Internet] [Doctoral dissertation]. University of New Mexico; 2014. [cited 2020 Feb 24]. Available from: http://hdl.handle.net/1928/24289.

Council of Science Editors:

Anderson B. Integrating Multiple Data Views for Improved Malware Analysis. [Doctoral Dissertation]. University of New Mexico; 2014. Available from: http://hdl.handle.net/1928/24289


University of New Mexico

11. Potluru, Vamsi. Matrix Factorization: Nonnegativity, Sparsity and Independence.

Degree: Department of Computer Science, 2014, University of New Mexico

 Matrix factorization arises in a wide range of application domains and is useful for extracting the latent features in the dataset. Examples include recommender systems,… (more)

Subjects/Keywords: Matrix factorization; Nonnegativity; Sparsity; Independence

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Potluru, V. (2014). Matrix Factorization: Nonnegativity, Sparsity and Independence. (Doctoral Dissertation). University of New Mexico. Retrieved from http://hdl.handle.net/1928/24336

Chicago Manual of Style (16th Edition):

Potluru, Vamsi. “Matrix Factorization: Nonnegativity, Sparsity and Independence.” 2014. Doctoral Dissertation, University of New Mexico. Accessed February 24, 2020. http://hdl.handle.net/1928/24336.

MLA Handbook (7th Edition):

Potluru, Vamsi. “Matrix Factorization: Nonnegativity, Sparsity and Independence.” 2014. Web. 24 Feb 2020.

Vancouver:

Potluru V. Matrix Factorization: Nonnegativity, Sparsity and Independence. [Internet] [Doctoral dissertation]. University of New Mexico; 2014. [cited 2020 Feb 24]. Available from: http://hdl.handle.net/1928/24336.

Council of Science Editors:

Potluru V. Matrix Factorization: Nonnegativity, Sparsity and Independence. [Doctoral Dissertation]. University of New Mexico; 2014. Available from: http://hdl.handle.net/1928/24336


University of New Mexico

12. Groat, Michael. Energy conserving privacy enhancing algorithms for resource-constrained devices.

Degree: Department of Computer Science, 2012, University of New Mexico

 Resource-constrained devices such as wireless sensor networks, body area networks, or smart phones collect confidential and sensitive information about their users. Traditional solutions to protect… (more)

Subjects/Keywords: Multidimensional Negative Surveys; Concealed Data Aggregation; Wireless Sensor Network Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Groat, M. (2012). Energy conserving privacy enhancing algorithms for resource-constrained devices. (Doctoral Dissertation). University of New Mexico. Retrieved from http://hdl.handle.net/1928/22043

Chicago Manual of Style (16th Edition):

Groat, Michael. “Energy conserving privacy enhancing algorithms for resource-constrained devices.” 2012. Doctoral Dissertation, University of New Mexico. Accessed February 24, 2020. http://hdl.handle.net/1928/22043.

MLA Handbook (7th Edition):

Groat, Michael. “Energy conserving privacy enhancing algorithms for resource-constrained devices.” 2012. Web. 24 Feb 2020.

Vancouver:

Groat M. Energy conserving privacy enhancing algorithms for resource-constrained devices. [Internet] [Doctoral dissertation]. University of New Mexico; 2012. [cited 2020 Feb 24]. Available from: http://hdl.handle.net/1928/22043.

Council of Science Editors:

Groat M. Energy conserving privacy enhancing algorithms for resource-constrained devices. [Doctoral Dissertation]. University of New Mexico; 2012. Available from: http://hdl.handle.net/1928/22043

13. Yan, Xiaoran. Model Selection for Stochastic Block Models.

Degree: Department of Computer Science, 2013, University of New Mexico

 As a flexible representation for complex systems, networks (graphs) model entities and their interactions as nodes and edges. In many real-world networks, nodes divide naturally… (more)

Subjects/Keywords: complex networks; community detection; block model; model selection; information criterion; variational inference

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yan, X. (2013). Model Selection for Stochastic Block Models. (Doctoral Dissertation). University of New Mexico. Retrieved from http://hdl.handle.net/1928/23591

Chicago Manual of Style (16th Edition):

Yan, Xiaoran. “Model Selection for Stochastic Block Models.” 2013. Doctoral Dissertation, University of New Mexico. Accessed February 24, 2020. http://hdl.handle.net/1928/23591.

MLA Handbook (7th Edition):

Yan, Xiaoran. “Model Selection for Stochastic Block Models.” 2013. Web. 24 Feb 2020.

Vancouver:

Yan X. Model Selection for Stochastic Block Models. [Internet] [Doctoral dissertation]. University of New Mexico; 2013. [cited 2020 Feb 24]. Available from: http://hdl.handle.net/1928/23591.

Council of Science Editors:

Yan X. Model Selection for Stochastic Block Models. [Doctoral Dissertation]. University of New Mexico; 2013. Available from: http://hdl.handle.net/1928/23591


University of New Mexico

14. Ingham, Kenneth, III. Anomaly detection for HTTP intrusion detection : algorithm comparisons and the effect of generalization on accuracy.

Degree: Department of Computer Science, 2007, University of New Mexico

 Network servers are vulnerable to attack, and this state of affairs shows no sign of abating. Therefore security measures to protect vulnerable software is an… (more)

Subjects/Keywords: HTTP anomaly detection; Computer and network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ingham, Kenneth, I. (2007). Anomaly detection for HTTP intrusion detection : algorithm comparisons and the effect of generalization on accuracy. (Doctoral Dissertation). University of New Mexico. Retrieved from http://hdl.handle.net/1928/2874

Chicago Manual of Style (16th Edition):

Ingham, Kenneth, III. “Anomaly detection for HTTP intrusion detection : algorithm comparisons and the effect of generalization on accuracy.” 2007. Doctoral Dissertation, University of New Mexico. Accessed February 24, 2020. http://hdl.handle.net/1928/2874.

MLA Handbook (7th Edition):

Ingham, Kenneth, III. “Anomaly detection for HTTP intrusion detection : algorithm comparisons and the effect of generalization on accuracy.” 2007. Web. 24 Feb 2020.

Vancouver:

Ingham, Kenneth I. Anomaly detection for HTTP intrusion detection : algorithm comparisons and the effect of generalization on accuracy. [Internet] [Doctoral dissertation]. University of New Mexico; 2007. [cited 2020 Feb 24]. Available from: http://hdl.handle.net/1928/2874.

Council of Science Editors:

Ingham, Kenneth I. Anomaly detection for HTTP intrusion detection : algorithm comparisons and the effect of generalization on accuracy. [Doctoral Dissertation]. University of New Mexico; 2007. Available from: http://hdl.handle.net/1928/2874

.