Browsing RPI Theses Open Access by Author "Yener, Bülent, 1959-"
Now showing items 1-20 of 24
-
A context-sensitive security type system for Java
Kaiser, Benjamin (Rensselaer Polytechnic Institute, Troy, NY, 2015-05)This thesis presents the theoretical framework for A context-sensitive security type system for Java programs. The primary contribution is JSec, a two-stage protocol that prepares a program containing sensitive data to ... -
Analysis of random equivalence class selection algorithms for K-anonymity and another O(k)-approximation of optimal K-anonymity by cell suppression
Cerna, David M. (Rensselaer Polytechnic Institute, Troy, NY, 2010-08) -
Animal detection for photographic censusing
Parham, Jason Remington (Rensselaer Polytechnic Institute, Troy, NY, 2021-12)Animal population monitoring is hard to do at large scales. It is too logistically demanding to track thousands of animals with invasive tools like ear tagging, and methods like aerial surveys and hand-based counts cannot ... -
Antikernel: a decentralized secure hardware-software operating system architecture
Zonenberg, Andrew D. (Rensselaer Polytechnic Institute, Troy, NY, 2015-05)Security of monolithic kernels, and even microkernels, relies on a large and complex body of code (including both software and hardware components) being entirely bug-free. Most contemporary operating systems can be ... -
Computer-assisted human annotation for animal identification
Beard, Audrey (Rensselaer Polytechnic Institute, Troy, NY, 2020-08)Photographic wildlife censusing (PWC) -- in which animals are surveilled by way of photography, entered into a database, and counted -- has historically required significant labor on the part of human annotators, largely ... -
Data analytics of time-series for complex (biological) systems
Dhulekar, Nimit (Rensselaer Polytechnic Institute, Troy, NY, 2015-05)Complex time-series systems such as biological networks have been studied for many years using conventional molecular and cellular techniques. However, the multiscale nature of these networks make these techniques limited ... -
Design and implementation of the web interfaces and middleware for synergy project
Zhuang, Juntao (Rensselaer Polytechnic Institute, Troy, NY, 2017-05)Recent biomedical researches usually involve novel combination of molecules. The goal of the Synergy Project is to facilitate biomedical researchers to find hidden relation among molecules and their potential collaborators. ... -
Distributed interference management under low network visibility : theory and applications
Fadel, Maha (Rensselaer Polytechnic Institute, Troy, NY, 2020-08)Reliable communication in wireless networks currently relies on the perfect estimation of the varying state of the wireless channel at all communicating nodes. While the next generation of wireless networks promises ... -
Dynamic language bridges and applications in LED patent citation networks
Pringle, Benjamin (Rensselaer Polytechnic Institute, Troy, NY, 2014-05)A simple strategy is presented for dynamically interpreting remote procedure calls in scripting languages, resulting in the ability to transparently use libraries from both languages in a single program. The protocol ... -
Identifying humpback whale flukes by sequence matching of trailing edge curvature
Jablons, Zachary (Rensselaer Polytechnic Institute, Troy, NY, 2016-05)To our knowledge, this is the first method that can achieve this level of accuracy on humpback fluke identification without extensive manual effort at inference time. -
Identifying individual animals using ranking, verification, and connectivity
Crall, Jonathan P. (Rensselaer Polytechnic Institute, Troy, NY, 2017-08)In this thesis we address the problem of identifying individual animals using images in the context of assisting an ecologist in performing a population census. We are motivated by events like the "Great Zebra Count" where ... -
Improved first-order power analysis attacks on low entropy masking schemes
Cozzens, Brennan G. (Rensselaer Polytechnic Institute, Troy, NY, 2015-05)We validate the efficiency of this attack using side-channel measurements publicly available from the DPA Contest V4. We demonstrate that an attack modeling leakage using leakage sets can recover an encryption key with ... -
Long contextualized document embeddings for financial reports
Rawte, Vipula Dattatrey (Rensselaer Polytechnic Institute, Troy, NY, 2021-05)With rapid advancements in the area of Natural Language Processing (NLP), Transformer-based techniques have been applied to a variety of downstream tasks such as question answering, text classification, and so on. However, ... -
Modeling efforts for improved meal prediction with application to blood glucose control
Diamond, Travis (Rensselaer Polytechnic Institute, Troy, NY, 2022-08)Type 1 Diabetes Mellitus is a disease characterized by the loss of insulin production from beta cells in the pancreas, which results in unregulated blood glucose (BG). The condition is permanent, exacting a high toll on ... -
Obfuscation through the observer-effect : thinking outside the virtual black-box
Blackthorne, Jeremy Lee (Rensselaer Polytechnic Institute, Troy, NY, 2015-05)In this work, we initiate a theoretical study of obfuscation with regards to programs that interact with a user and an environment. We define the System-Interaction model to formally represent this additional dimension of ... -
Parallel subgraph mining on hybrid platforms : HPC systems, multi-cores and GPUs
Talukder, Nilothpal (Rensselaer Polytechnic Institute, Troy, NY, 2016-05)Finally, we describe parallel frequent subgraph mining on a database of multiple labeled graphs, using Graphics Processing Units (GPUs). In recent times, GPUs have emerged as a relatively cheap but powerful architecture ... -
Photographic censusing of zebra and giraffe in the Nairobi National Park
Parham, Jason R. (Rensselaer Polytechnic Institute, Troy, NY, 2015-12)In March of 2015, the IBEIS team helped to administer "The Great Zebra & Giraffe Count" (GZGC), which collected 9,406 images from 58 volunteer citizen scientists. The contributed images yielded a total of 8,659 sightings ... -
Predicting change points in multivariate time series data
Khan, Haidar (Rensselaer Polytechnic Institute, Troy, NY, 2019-05)Time series data produced by a dynamic system may contain multiple states characterized by distinct patterns. Predicting the phase transitions between them is critical for many important applications including automatic ... -
Probabilistic models for phylogenetic classification of Mycobacterium tuberculosis complex genotyping data
Blondin, James (Rensselaer Polytechnic Institute, Troy, NY, 2013-05)The model and algorithms presented in this thesis use spoligotype and MIRU data combined from multiple heterogeneous data sources labeled by different experts to provide a model that is able to classify MTBC isolates into ... -
Program analysis for more efficient secure computation
Kennard, Lindsey (Rensselaer Polytechnic Institute, Troy, NY, 2020-12)The world of large scale secure computation has changed. Computational needs have far outpaced the ability of most modern companies to build and maintain their own datacenters. Cloud computation has picked up this slack ...