Browsing Rensselaer Libraries by Subject "Computer science"
Now showing items 1-20 of 411
-
A bug definition and classification system using program levels and error types
(Rensselaer Polytechnic Institute, Troy, NY, 2017-12)Software bugs and security vulnerabilities are becoming more and more common, yet the question still remains, "What is a bug?". In this paper, we present a definition of a software bug. Once a base definition is defined, ... -
A comparison of the quality of light distribution in different diamond models
(Rensselaer Polytechnic Institute, Troy, NY, 2016-05)We created visualizations to show both single photons traveling through the scene and many photons in a single scene. Different colors were used to differentiate photon wavelengths or to show the number of bounces a photon ... -
A computational analysis of human genetic variation
(Rensselaer Polytechnic Institute, Troy, NY, 2008-12) -
A computational approach to lexical semantic shift across time and domain : methods and applications
(Rensselaer Polytechnic Institute, Troy, NY, 2022-12)Neural natural language models are designed to learn word and sequence representations from large volumes of text. Such amount of data is typically achieved by merging multiple heterogeneous corpora from the Web. However, ... -
A contact model for geometrically accurate treatment of polytopes in simulation
(Rensselaer Polytechnic Institute, Troy, NY, 2014-12)I herein present a formulation of non-penetration constraints between pairs of bodies which accounts for all possible combinations of active contact. This is the first formulation that accurately models the body geometries ... -
A context-sensitive security type system for Java
(Rensselaer Polytechnic Institute, Troy, NY, 2015-05)This thesis presents the theoretical framework for A context-sensitive security type system for Java programs. The primary contribution is JSec, a two-stage protocol that prepares a program containing sensitive data to ... -
A discrete-event simulation tool for resource constrained networks
(Rensselaer Polytechnic Institute, Troy, NY, 2015-12)Resource Constrained Networks (RCN) have become a hot topic in recent years, they includes Wireless Sensor Networks (WSN), Mobile Ad-Hoc Networks (MANET) and Delay-Tolerant Networks (DTN). Security is one of the major ... -
A fast exponential decomposition algorithm and its applications to structured matrices
(Rensselaer Polytechnic Institute, Troy, NY, 1996-12)The origins of these problems can be traced back to a paper published in 1795 by the French scientist Prony. A translation of this pioneering work is provided. -
A framework for comparison of methods for solving complemetarity problems that arise in multibody dynamics
(Rensselaer Polytechnic Institute, Troy, NY, 2016-08)Among the simulation software packages in popular use today, there is no entirely satisfactory algorithm to compute the contact impacts with friction, and unbiased comparison and physical validation remain rare. Users with ... -
A framework for the dynamic reconfiguration of scientific applications in grid environments
(Rensselaer Polytechnic Institute, Troy, NY, 2007-05) -
A hybrid approach to developing ontology-driven applications : a case study in describing radio spectrum usage policies
(Rensselaer Polytechnic Institute, Troy, NY, 2021-05)As such, applications need a simple and stable API that abstracts much of the structure, but keeps the strengths of OWL in reasoning or clarity. To meet this need, we utilize a hybrid approach to integrating an ontology ... -
A look into virtual machine malleability
(Rensselaer Polytechnic Institute, Troy, NY, 2014-05)The benefits provided by virtual machine malleability can be put into 3 categories: scalability and elasticity, energy improvements and process scheduling. Traditionally, the approach of application scaling at the application ... -
A model to characterize the sustainability of digital repositories
(Rensselaer Polytechnic Institute, Troy, NY, 2015-05)Responsible data stewardship underlies progress in the information age. The effective curation of digital data contributes toward scientific achievement and advancement, as well as organized and efficient access to data ... -
A network and agent basedmodel of political polarization
(Rensselaer Polytechnic Institute, Troy, NY, 2021-05)In this thesis we discuss the model from the paper “Polarization and Tipping Points” which the author of this thesis coauthored. We go into depth about the decisioning and reasoning behind multiple features of the model ... -
A network intrusion detection system (NIDS) based on information centrality to identify systemic cyber attacks in large systems
(Rensselaer Polytechnic Institute, Troy, NY, 2018-08)This thesis proposes a new approach to intrusion detection in networks. This approach is based on Information Centrality (IC) using which systemic attacks can perform the same level of intrusion detection using approximately ... -
A new stability method for singularly perturbed convection-diffusion equations
(Rensselaer Polytechnic Institute, Troy, NY, 2007-05) -
A p-adaptive stabilized finite element method for fluid dynamics
(Rensselaer Polytechnic Institute, Troy, NY, 2008-08) -
A parallel ghosting algorithm for the Flexible Distributed Mesh Database (FMDB)
(Rensselaer Polytechnic Institute, Troy, NY, 2011-05) -
A random walk method for handling sparse training set in collaborative filtering
(Rensselaer Polytechnic Institute, Troy, NY, 2007-12) -
A scheduling and routing algorithm for digital microfluidic ring layouts with bus-phase addressing
(Rensselaer Polytechnic Institute, Troy, NY, 2008-05)