Department of Computer Science

Recent Submissions

  • Kuai, Meng (University of Alabama Libraries, 2018)
    Vehicular networking has become an attractive scenario, where Intelligent Transportation Systems can provide tremendous benefits. Realizing this vision needs a careful design of network architecture due to the dynamic ...
  • Corley, Christopher Scott (University of Alabama Libraries, 2018)
    Topic modeling is a machine learning technique for discovering thematic structure within a corpus. Topic models have been applied to several areas of software engineering, including bug localization, feature location, ...
  • Hu, Wenhua (University of Alabama Libraries, 2017)
    Developing correct software requirements is important for overall software quality. Most existing quality improvement approaches focus on detection and removal of faults (i.e., problems recorded in a document) as opposed ...
  • Al-Zubidy, Ahmed (University of Alabama Libraries, 2017)
    The Systematic Literature Review (SLR) is an approach for conducting literature reviews that provides less bias and more reliability than the more typical ad hoc approach. One of the first phases of the SLR process is to ...
  • Zeng, Yuguang (University of Alabama Libraries, 2017)
    Nowadays, large displays are common in our life and work. The dramatic changes in display sizes hinder users' interaction based on traditional input devices. Recently, mobile devices have been massively adopted and have ...
  • Han, Wenlin (University of Alabama Libraries, 2017)
    Utility companies consistently suffer from the harassing of Non-Technical Loss (NTL) frauds globally. In the traditional power grid, electricity theft is the main form of NTL frauds. In Smart Grid, smart meter thwarts ...
  • Elliott, Terry Beau (University of Alabama Libraries, 2017)
    Law Enforcement must be vigilant in utilizing their limited resources to address both criminal activity and traffic safety. Past research has concentrated on determining optimal routes for law enforcement entities under ...
  • Williams, Elizabeth (University of Alabama Libraries, 2017)
    Traditional query-based search engines such as Google are often not able to discover real-time, contextual information such as traffic accidents or severe weather situations. As an alternative, social media can often provide ...
  • Hudnall, Matthew (University of Alabama Libraries, 2017)
    E-mail is generally regarded as an insecure method of electronic communication for numerous reasons. Most notably, the default does not guarantee the authentic identity of either the intended sender or receiver of a message, ...
  • Ergin, Huseyin (University of Alabama Libraries, 2017)
    MDE is considered a well-established software development approach that uses abstraction to bridge the gap between the problem space and the software implementation. These abstractions are represented by models that make ...
  • Robinson, Jeffrey A. (University of Alabama Libraries, 2017)
    General Purpose Programming using Graphical Processing Units (GPGPU) is a fast growing subfield in High Performance Computing (HPC). These devices provide a very high throughput with low cost to many parallel problems, ...
  • Gao, Jingcheng (University of Alabama Libraries, 2015)
    The world has been on a fast track of industrial development thanks to human activities. On the back of the same coin is the fact that people are consuming more and more energy to support the fast-paced development. Studies ...
  • Yue, Songqing (University of Alabama Libraries, 2015)
    Advances in the software industry over the past half-century have resulted in a large amount of legacy code implemented across hundreds of different programming languages and paradigms running throughout various application ...
  • Bosu, Amiangshu Shekhar (University of Alabama Libraries, 2015)
    Prior research indicates that peer code review is an effective method for reducing the number of defects and improving the quality of code. Besides maintaining the integrity of the code, code review spreads knowledge, ...
  • Liang, Xiannuan (University of Alabama Libraries, 2014)
    Mobile sensors have been widely applied in sensing applications. The performance of mobile sensors in intrusion detection has drawn a lot of attention from researchers. In this dissertation, we model the behaviors of mobile ...
  • Zeng, Lei (University of Alabama Libraries, 2014)
    Logging has become a fundamental feature within the modern operating systems due to the fact that logging may be used through a variety of applications and fashion. Syslog daemon is the logging implementation in Unix/Linux ...
  • Zhang, Yanping (University of Alabama Libraries, 2012)
    Wireless sensor networks have many applications. In our research, we are particularly interested in applications of monitoring a field to detect emergent incidents, such as forest fire, or intrusion objects such as enemy ...
  • Corley, Jonathan Adam (University of Alabama Libraries, 2016)
    Model-Driven Engineering (MDE) has emerged as a software development paradigm that can assist in separating the issues of the problem space of a software system from a particular solution space of implementation. MDE ...
  • Zhao, Lei (University of Alabama Libraries, 2016)
    Intelligent Transportation System (ITS) is the integration of advanced communication technologies into the transportation infrastructure and in vehicles. It is aimed to improve transportation safety and to enhance traffic ...
  • Heaton, Dustin (University of Alabama Libraries, 2015)
    Scientific software is code written by scientists for the purpose of doing research. While the results of this software development have been widely published, there has been relatively little publication of the development ...

View more