Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 10531 - 10560 of 12808

Full-Text Articles in Physical Sciences and Mathematics

Self-Stabilizing Computation Of 3-Edge-Connected Components, Abusayeed Saifullah, Yung Tsin Jan 2009

Self-Stabilizing Computation Of 3-Edge-Connected Components, Abusayeed Saifullah, Yung Tsin

All Computer Science and Engineering Research

No abstract provided.


Efficient Tracking Of Many Objects In Structured Environments, Nathan Jacobs, Michael Dixon, Scott Satkin, Robert Pless Jan 2009

Efficient Tracking Of Many Objects In Structured Environments, Nathan Jacobs, Michael Dixon, Scott Satkin, Robert Pless

All Computer Science and Engineering Research

We consider the special case of tracking objects in highly structured scenes. In the context of vehicle tracking in urban environments, we offer a fully automatic, end-to-end system that discovers and parametrizes the lanes along which vehicles drive, then uses just these pixels to simultaneously track dozens of objects. This system includes a novel active contour energy function used to parametrize the lanes of travel based only on the accumulation of spatio-temporal image derivatives, and a tracking algorithm that exploits longer temporal constraints made possible by our compact data representation; we believe both of these may be of independent interest. …


Adaptive Service Provisioning For Wireless Sensor Networks, Chien-Liang Fok, Gruia-Catalin Roman, Chenyang Lu Jan 2009

Adaptive Service Provisioning For Wireless Sensor Networks, Chien-Liang Fok, Gruia-Catalin Roman, Chenyang Lu

All Computer Science and Engineering Research

Service provisioning has gained significant attention as a promising programming model for heterogeneous wireless sensor networks. Its key idea is to exploit the decoupling of service providers and consumers to enable platform-independent applications that are dynamically bound to platform-specific services. We explore novel adaptive service binding strategies that are able to cope with network dynamics and to promote energy conservation. To achieve this goal, we developed policies and algorithms that automatically switch providers in response to network topology changes and adapt application behavior when opportunities for energy savings surface. The latter is accomplished by providing limited information about the energy …


Supporting Protocols For Structuring And Intelligent Information Dissemination In Vehicular Ad Hoc Networks, Filip Cuckov Jan 2009

Supporting Protocols For Structuring And Intelligent Information Dissemination In Vehicular Ad Hoc Networks, Filip Cuckov

Electrical & Computer Engineering Theses & Dissertations

The goal of this dissertation is the presentation of supporting protocols for structuring and intelligent data dissemination in vehicular ad hoc networks (VANETs). The protocols are intended to first introduce a structure in VANETs, and thus promote the spatial reuse of network resources. Segmenting a flat VANET in multiple cluster structures allows for more efficient use of the available bandwidth, which can effectively increase the capacity of the network. The cluster structures can also improve the scalability of the underlying communication protocols. The structuring and maintenance of the network introduces additional overhead. The aim is to provide a mechanism for …


Hierarchical Routing In Manets Using Simple Clustering, Adam Carnine Jan 2009

Hierarchical Routing In Manets Using Simple Clustering, Adam Carnine

UNLV Theses, Dissertations, Professional Papers, and Capstones

This thesis presents both a review of current MANET routing protocols and a new MANET routing algorithm. The routing protocols reviewed include representative samples from the three primary forms of routing found in MANETS: proactive routing, reactive routing and hybrid routing. Secure algorithms are given special treatment in the review. In addition several protocol enhancements are discussed.

The proposed routing protocol is designed to support networks of a medium size, containing over 200 nodes but less than 3,000 nodes. The design is intentionally simple to allow ease of implementation in comparison with other MANET protocols that provide similar functionality.


Computational Techniques For Reducing Spectra Of The Giant Planets In Our Solar System, Holly L. Grimes Jan 2009

Computational Techniques For Reducing Spectra Of The Giant Planets In Our Solar System, Holly L. Grimes

Dissertations and Theses

The dynamic atmospheres of Jupiter, Saturn, Uranus, and Neptune provide a rich source of meteorological phenomena for scientists to study. To investigate these planets, scientists obtain spectral images of these bodies using various instruments including the Cooled Mid-Infrared Camera and Spectrometer (COMICS) at the Subaru Telescope Facility at Mauna Kea, Hawaii. These spectral images are two-dimensional arrays of double precision floating point values that have been read from a detector array. Such images must be reduced before the information they contain can be analyzed. The reduction process for spectral images from COMICS involves several steps:

1. Sky subtraction: the …


A Three-Dimensional Pattern-Space Representation For Volumetric Arrays, William C. Barott, Paul G. Steffes Dec 2008

A Three-Dimensional Pattern-Space Representation For Volumetric Arrays, William C. Barott, Paul G. Steffes

Publications

A three-dimensional pattern-space representation is presented for volumetric arrays. In this representation, the radiation pattern of an array is formed by the evaluation of the three-dimensional pattern-space on a spherical surface. The scan angle of the array determines the position of this surface within the pattern-space. This pattern-space representation is used in conjunction with a genetic algorithm to minimize the sidelobe levels exhibited by a thinned volumetric array during scanning.


Steganography In Ipv6, Barret Miller Dec 2008

Steganography In Ipv6, Barret Miller

Computer Science and Computer Engineering Undergraduate Honors Theses

Steganography is the process of hiding a secret message within another message such that it is difficult to detect the presence of the secret message. In other words, the existence of the secret message is hidden. A covert channel refers to the actual medium that is used to communicate the information such as a message, image, or file. This honors thesis uses steganography within the source address fields of Internet Protocol Version 6 (IPv6) packets to create a covert channel through which clandestine messages are passed from one party to another. A fully functional computer program was designed and written …


Mapping Reality Into Virtual Worlds, Josh Mcfarlane Dec 2008

Mapping Reality Into Virtual Worlds, Josh Mcfarlane

Computer Science and Computer Engineering Undergraduate Honors Theses

As virtual worlds become more prevalent, they become increasingly useful as a means of information dissemination. This thesis examines the possible connections between real world objects and their virtual world counterparts. We look at how, by attaching sensors to an object, or by using a smart object with embedded sensors, the information can be relayed to a server. From this information, it will be possible to create a duplicate object in the virtual world and have it mirror the real world object in terms of state and movement. Almost all current solutions for remotely viewing a room or area are …


Graphical User Interfaces As Updatable Views, James Felger Terwilliger Nov 2008

Graphical User Interfaces As Updatable Views, James Felger Terwilliger

Dissertations and Theses

In contrast to a traditional setting where users express queries against the database schema, we assert that the semantics of data can often be understood by viewing the data in the context of the user interface (UI) of the software tool used to enter the data. That is, we believe that users will understand the data in a database by seeing the labels, dropdown menus, tool tips, help text, control contents, and juxtaposition or arrangement of controls that are built in to the user interface. Our goal is to allow domain experts with little technical skill to understand and query …


Leading Firms As Knowledge Gatekeepers In A Networked Environment, Deogratias Harorimana Mr Nov 2008

Leading Firms As Knowledge Gatekeepers In A Networked Environment, Deogratias Harorimana Mr

Dr Deogratias Harorimana

This chapter introduces the role of the knowledge gatekeeper as a mechanism by which knowledge is created and transferred in a networked environment. Knowledge creation and transfer are essential for building a knowledge based economy. The chapter considers obstacles that inhibit this process and argues that leading firms create a shared socio-cultural context that enables the condivision of tacit meanings and codification of knowledge. Leading firms act as gatekeepers of knowledge through the creation of shared virtual platforms. There will be a leading firm that connects several networks of clients and suppliers may not interact directly with one another, but …


Irrelevance, Polymorphism, And Erasure In Type Theory, Richard Nathan Mishra-Linger Nov 2008

Irrelevance, Polymorphism, And Erasure In Type Theory, Richard Nathan Mishra-Linger

Dissertations and Theses

Dependent type theory is a proven technology for verified functional programming in which programs and their correctness proofs may be developed using the same rules in a single formal system. In practice, large portions of programs developed in this way have no computational relevance to the ultimate result of the program and should therefore be removed prior to program execution. In previous work on identifying and removing irrelevant portions of programs, computational irrelevance is usually treated as an intrinsic property of program expressions. We find that such an approach forces programmers to maintain two copies of commonly used datatypes: a …


Ceg 420/620: Computer Architecture, Jack Jean Oct 2008

Ceg 420/620: Computer Architecture, Jack Jean

Computer Science & Engineering Syllabi

No abstract provided.


Ceg 453/653: Embedded Systems, Jack Jean Oct 2008

Ceg 453/653: Embedded Systems, Jack Jean

Computer Science & Engineering Syllabi

No abstract provided.


Ceg 210: Pc Networking I, Karen Meyer Oct 2008

Ceg 210: Pc Networking I, Karen Meyer

Computer Science & Engineering Syllabi

Introduction to networking technologies including infrastructure and architectures, standards, protocols and directory services, administration, security and management. Integrated lecture and lab.


Ceg 433/633: Operating Systems, Prabhaker Mateti Oct 2008

Ceg 433/633: Operating Systems, Prabhaker Mateti

Computer Science & Engineering Syllabi

Overview of operating systems internals. File-system usage and design, process usage and control, virtual memory, multi user systems, access control. Course projects use C++ language.


Ceg 460/660: Introduction To Software Computer Engineering, Jeffrey Mcdonald Oct 2008

Ceg 460/660: Introduction To Software Computer Engineering, Jeffrey Mcdonald

Computer Science & Engineering Syllabi

This course is concerned with the techniques of designing and constructing large programs. Some of the required basic concepts necessarily have to be developed using small programs as examples. To this extent we also study programming-in-the-small. The overall objectives are to present an overview of issues in the development of sot1ware, to discuss terminology, to illustrate via example case studies, and to give sufficiently detailed advice on how to develop quality software. Hands-on experience is emphasized through the use of homework and a class project.


Ceg 724: Computer Vision I, Arthur A. Goshtasby Oct 2008

Ceg 724: Computer Vision I, Arthur A. Goshtasby

Computer Science & Engineering Syllabi

This course covers basic techniques for low-level and some mid-level vision. The techniques include: camera calibration, image filtering and edge detection, image segmentation and feature selection, and stereo depth perception.


Ceg 436/636: Mobile Computing, Yong Pei Oct 2008

Ceg 436/636: Mobile Computing, Yong Pei

Computer Science & Engineering Syllabi

Increasingly.. people, computers and microelectronic devices are being linked together to bring to life the communications mantra: anybody, anything, anytime, anywhere. This junior/senior/graduate course provides an in-depth study of networking protocol and system design in the area of wireless networking and mobile computing. It will help engineering and computer science students establish a solid foundation in concepts, architecture, design, and performance evaluation of mobile computing principle, protocols and applications. It will also introduce students to a few hot topics in wireless networking and mobile computing research such as mobile IP, wireless TCP, 802. l l, agent techniques, etc. The course …


Ceg 220: Introduction To C Programming For Engineers I, Jay Dejongh Oct 2008

Ceg 220: Introduction To C Programming For Engineers I, Jay Dejongh

Computer Science & Engineering Syllabi

This course provides a general introduction to computers as a problem-solving tool using the C programming language. Emphasis is on algorithms and techniques useful to engineers. Topics include data representation, debugging, and program verification. 4 credit hours. Prerequisite: MTH 229 (Calculus I) or EGR 101 (Engineering Mathematics).


Ceg 476/676: Computer Graphics I, Thomas Wischgoll Oct 2008

Ceg 476/676: Computer Graphics I, Thomas Wischgoll

Computer Science & Engineering Syllabi

By the end of this quarter, you will have learnt techniques for constructing 2-D and 3-D objects
as well as manipulating and rendering the objects using OpenGL.
The outline of the course is as follows:

Introduction

  • Geometric primitives
  • Attributes of geometric primitives
  • Antialiasing techniques
  • Homogeneous coordinate system
  • 2-D and 3-D viewing transformations
  • Structures and hierarchical modeling
  • Input devices and interactive techniques
  • Visible surface detection methods


Ceg 498: Design Experience, Thomas C. Hartrum Oct 2008

Ceg 498: Design Experience, Thomas C. Hartrum

Computer Science & Engineering Syllabi

CEG 498 (Design Experience) is a summative computer engineering design project course that builds upon previous engineering, science, mathematics and communications course work. CEG 498 projects are a minimum of two quarters in length and must be completed in groups of at least three students. Projects are selected under the guidance of the course instructor and are tailored to both student interest and formal classroom preparation. Students are evaluated both on their individual contributions as recorded in a graded engineering journal and on the quality of their collective efforts as reflected in group generated products.


Ceg 355: Introduction To The Design Of Information Technology Systems, Thomas C. Hartrum Oct 2008

Ceg 355: Introduction To The Design Of Information Technology Systems, Thomas C. Hartrum

Computer Science & Engineering Syllabi

Introduction to the design of information systems comprising modern technologies such as SQL database programming, networks, and distributed computing with CORBA, electronic and hypertext (HTML) documents, and multimedia.

This course is concerned with the techniques of designing and implementing distributed business software. Emphasis is on developing graphical user interfaces (GUIs) using Java Swing classes, storing and accessing data in a relational database using SQL, and implementing a distributed system using CORBA technology. Especially in light of Java and CORBA, there is a focus on object-oriented programming. The overall objective is to make the student aware of the technology available to …


Ceg 720: Computer Architecture I, Soon M. Chung Oct 2008

Ceg 720: Computer Architecture I, Soon M. Chung

Computer Science & Engineering Syllabi

Review of sequential computer architecture and study of parallel computers. Topics include memory hierarchy, reduced instruction set computer, pipeline processing, multiprocessing, various parallel computers, interconnection networks, and fault-tolerant computing.


Ceg 402/602: Introduction To Computer Communication, Bin Wang Oct 2008

Ceg 402/602: Introduction To Computer Communication, Bin Wang

Computer Science & Engineering Syllabi

This course provides an introduction to basic concepts of communication networks, different types of networks, protocols over different layers, and network applications through lectures, labs, homework, and reading on relevant materials. You will

• Understand networking principles, protocols, and technologies.

• Understand some design and performance issues involved in providing a network service.

• Acquire background for supporting e-commerce, e-government, and e-education.

• Gain hands-on experience with programming techniques for network protocols.

• Obtain background for original research in computer networks.


Ceg 434/634: Concurrent Software Design, Yong Pei Oct 2008

Ceg 434/634: Concurrent Software Design, Yong Pei

Computer Science & Engineering Syllabi

This course provides an introduction to concurrent program design in the UNIX environment. Classical problems of synchronization, concurrency, and their solutions are examined through course projects and through readings on operating system design.


Ceg 260: Digital Computer Hardware Switching Circuits, Meilin Liu Oct 2008

Ceg 260: Digital Computer Hardware Switching Circuits, Meilin Liu

Computer Science & Engineering Syllabi

We will discuss and cover basic digital, combinational and sequential logic systems. Labs will be used to gain valuable practical experience in implementing elementary circuits and logic designs.


Ceg 320/520: Computer Organization And Assembly Language Programming, Travis E. Doom Oct 2008

Ceg 320/520: Computer Organization And Assembly Language Programming, Travis E. Doom

Computer Science & Engineering Syllabi

Terminology and understanding of functional organizations and sequential operation of a digital computer. Program structure, and machine and assembly language topics including addressing, stacks, argument pasing, arithmetic operations, traps, and input/output. Macros, modularization, linkers, and debuggers are used.


Ceg 360/560 Ee 451/651: Digital System Design, Travis E. Doom Oct 2008

Ceg 360/560 Ee 451/651: Digital System Design, Travis E. Doom

Computer Science & Engineering Syllabi

No abstract provided.


Ceg 420/620: Computer Architecture, Jack Jean Oct 2008

Ceg 420/620: Computer Architecture, Jack Jean

Computer Science & Engineering Syllabi

No abstract provided.