Browsing by Author "Xiao, Yang"

Sort by: Order: Results:

  • Acharyya, Soumyadip (University of Alabama Libraries, 2015)
    Let us consider the operator-theoretic difference of two composition operators acting on a weighted Hilbert Bergman space. In 2011, Choe , Hosokawa and Koo [CHK] proved a necessary and sufficient condition under which the ...
  • Zeng, Lei (University of Alabama Libraries, 2014)
    Logging has become a fundamental feature within the modern operating systems due to the fact that logging may be used through a variety of applications and fashion. Syslog daemon is the logging implementation in Unix/Linux ...
  • Liu, Jing (University of Alabama Libraries, 2013)
    Although advanced cyber security technology has protected every level of current network infrastructure, vulnerabilities continue to emerge after new functions are added. As a complement, accountability is required to ...
  • Fu, Bo (University of Alabama Libraries, 2013)
    Today's computer and network systems were not originally designed for accountability which plays a crucial role in information assurance systems. To assure accountability, each entity in the system should be held responsible ...
  • Chen, Qiang (University of Alabama Libraries, 2014)
    In this dissertation, we create a portfolio of simple vanilla put and call options as an optimal approximation of nonlinear payoffs by using static replication (1995, 1998) [1, 2] under certain measure which is called ...
  • Liu, Jing; Xiao, Yang; Ghaboosi, Kaveh; Deng, Hongmei; Zhang, Jingyuan (2009)
    Botnets become widespread in wired and wireless networks, whereas the relevant research is still in the initial stage. In this paper, a survey of botnets is provided. We first discuss fundamental concepts of botnets, ...
  • Liang, Xiannuan (University of Alabama Libraries, 2014)
    Mobile sensors have been widely applied in sensing applications. The performance of mobile sensors in intrusion detection has drawn a lot of attention from researchers. In this dissertation, we model the behaviors of mobile ...
  • Gu, Bo (University of Alabama Libraries, 2011)
    Many scenarios for mobile and wireless networks demonstrate disruptions in communications where connections may not be available from time to time, examples include wireless sensor networks, tactical mobile ad hoc networks, ...
  • Li, Nanxiang (University of Alabama Libraries, 2009)
    Human tracking and recognition are desirable yet challenging for many applications including surveillance, computer vision, robotics, virtual reality, etc. Many biometric modalities have been used on these applications. ...
  • Chen, Jiming; Cao, Kejie; Sun, Youxian; Xiao, Yang; Su, Xu (2007)
    While a typical way for diabetes therapy is discrete insulin infusion based on long-time interval measurement, in this paper, we design a closed-loop control system for continuous drug infusion to improve the traditional ...
  • Wellman, Briana Lowe (University of Alabama Libraries, 2011)
    Multi-robot systems are an important research topic in wide area coverage applications such as hazardous waste clean-up, bomb detection, surveillance, and search and rescue missions. They can work in parallel and complete ...
  • Gao, Jingcheng (University of Alabama Libraries, 2015)
    The world has been on a fast track of industrial development thanks to human activities. On the back of the same coin is the fact that people are consuming more and more energy to support the fast-paced development. Studies ...
  • Xiao, Zhifeng (University of Alabama Libraries, 2013)
    This dissertation focuses on the design and analysis of accountable computing for a wide range of networked systems with affordable expense. The central idea is to incorporate accountability, a long-neglected security ...
  • Peng, Miao (University of Alabama Libraries, 2012)
    Wireless sensor networks (WSNs) have many important applications such as monitoring and tracking. Unlike traditional networks, a WSN has its own constraints, such as a limited amount of energy, short communication range, ...
  • Kathiresshan, Nandhakumar (University of Alabama Libraries, 2010)
    Security in computer systems has been a major concern since the very beginning. Although security has been addressed in various aspects, accountability is a main stream of security which is lacking in today's computer ...
  • Cui, Wei (University of Alabama Libraries, 2016)
    In this dissertation, we consolidate previous research done by [3], [5], [13], [14] and [22] on an optimal strategy to reduce the running risk in hedging a long-term supply commitment with short-term futures contracts. ...
  • McCary, Eric Anthony (University of Alabama Libraries, 2015)
    The presented dissertation concentrates on the security landscape in smart grid and proposes works to create a more accountable environment in the smart grid home area network (HAN). The principal thought behind the research ...
  • Deng, Zhonghai (University of Alabama Libraries, 2014)
    Today with the advent of low-cost imaging devices, such as smart phones, digital cameras and surveillance video systems, digital images become quite common in our everyday life. People tend to believe the scene they have ...
  • Ying, Mengyi (University of Alabama Libraries, 2014)
    The basic framework in this thesis is the standard Hansen method. The standard Hansen method has become a very well-known and popular method over the last few decades in the area of Interval Arithmetic [1] for finding all ...
  • Sen, Shraddha Pradip (University of Alabama Libraries, 2011)
    Log data that is generated during a number of processes such as Networking, Web surfing, Failures, etc. is quite large. Such log data are supposed to be processed and analyzed so that it can be used to improve the quality ...

Search DSpace

Browse

My Account