UNT College of Engineering - 365 Matching Results
Search Results
- Data Mining Techniques for Predicting Breast Cancer Survivability Among Women in the United States
- Poster for the 2014 UNT Graduate Exhibition in the Computer Science and Information Technology category. This poster discusses data mining techniques for predicting breast cancer survivability among women in the United States.
- Identifying Leaders in an Online Cancer Survivor Community
- Paper on identifying leaders in an online cancer survivor community.
- Protein sequence classification using feature hashing
- Article discussing protein sequence classification using feature hashing.
- Global Stochastic Field Simulator
- This poster was featured at the 2013 Perot Museum of Nature and Science's 'Social Science' exhibit. It discusses the Global Stochastic Field Simulator, conceived in the summer of 2011.
- A Framework to Simulate and Visualize Epidemics
- This poster was featured at the 2013 Perot Museum of Nature and Science's 'Social Science' exhibit. The poster discusses a framework to simulate and visualize epidemics.
- Current Research in Wireless at UNT
- This presentation discusses wireless networks, access point selections, traffic balancing, multi-cell CDMA, user distribution modeling, and call admission control.
- Global versus Local Call Admission Control in CDMA Cellular Networks [Presentation]
- This presentation discusses interference model impacts on capacity, global call admission controls, local call admission controls, and the differences in global versus local call admission controls.
- WiFi and WCDMA Network Design
- This presentation discusses WiFi access point selection and traffic balancing, multi-cell wideband code division multiple access (WCDMA) with multiple classes, user modeling using 2D Gaussian distribution, and intra-cell and inter-cell interference and capacity.
- Energy-Aware Routing and Hybrid Synchronization in Sensor Networks
- This presentation discusses the research of sensor synchronization, sensor grid routing, and voice over internet protocol (VoIP).
- Self-Configuring Wireless MEMS Network
- This presentation discusses miniature, lightweight, self-powered wireless sensors, and networking software needs.
- Instance Based Learning with Automatic Feature Selection Applied to Word Sense Disambiguation
- This paper discusses instance based learning with automatic feature selection applied to word sense disambiguation.
- Letter Level Learning for Language Independent Diacritics Restoration
- This paper discusses letter level learning for language independent diacritics restoration.
- Building Multilingual Semantic Networks with Non-Expert Contributions over the Web
- This paper discusses building multilingual semantic networks.
- Protein Sequence Classification Using Feature Hashing
- Article on protein sequence classification using feature hashing.
- Reconfigurable Surface Plasmon Polariton Wave Adapter Designed by Transformation Optics
- This article proposes a reconfigurable surface plasmon polariton (SPP) wave adapter designed by transformation optics, which can control the propagation of SPP waves on un-even surfaces.
- Virtualization Based Secure Execution And Testing Framework
- Article discussing the use of a virtualization software to build a Virtualization Based Secure Execution and Testing Framework for testing hardware secure architectures.
- Secure Embedded Platform Networked Automotive Systems
- This paper discusses secure embedded platforms for networked automotive systems.
- How to Hide Secrets from Operating System: Architecture Level Support for Dynamic Address Trace Obfuscation
- This technical report addresses how to hide secrets from an operating system. The authors provide a detailed design for the VM blackbox and some microarchitecture level simulation derived performance data. They also describe a compiler directed prefetch scheme that uses both instruction and data prefetches to obfuscate the address traces on the address bus between on-chip L2 cache and memory.
- Efficient Energy Saving Scheme for On-Chip Caches
- This paper discusses efficient energy saving techniques for on-chip caches, focusing especially on drowsy cache schemes.
- Gleipnir: A Memory Analysis Tool
- This paper from the International Conference on Computational Science, ICCS 2011 conference proceedings describes a program profiling and analysis tool called Gleipnir.
- On the security of the Courtois-Finiasz-Sendrier signature
- This article proves that a variant of the Courtois-Finiasz-Sendrier signature is strongly existentially unforgeable under chosen message attack in the random oracle model, assuming hardness of the Permuted Goppa Syndrome Decoding Problem (also known as the Niederreiter problem).
- NLP (Natural Language Processing) for NLP (Natural Language Programming)
- This paper discusses Natural Language Processing (NLP).
- Investigations in Unsupervised Back-of-the-Book Indexing
- This paper discusses investigations in unsupervised back-of-the-book indexing.
- The Multidisciplinary Facets of Research on Humour
- In this paper, the authors summarize the main theories of humor that emerged from philosophical and modern psychological research, and survey the past and present developments in the fields of theoretical and computational linguistics.
- A Bootstrapping Method for Building Subjectivity Lexicons for Languages with Scarce Resources
- This article discusses a bootstrapping method for building subjectivity lexicons for languages with scarce resources.
- BABYLON Parallel Text Builder: Gathering Parallel Texts for Low-Density Languages
- This paper discusses BABYLON parallel text builder.
- Learning to Identify Emotions in Text
- This paper discusses learning to identify emotions in text.
- An Algorithm for Open Text Semantic Parsing
- This paper describes an algorithm for open text shallow semantic parsing.
- Making Sense Out of the Web
- This paper discusses the main lines of research in deriving efficient Word Sense Disambiguation.
- Putting Pieces Together: Combining FrameNet, VerbNet and WordNet for Robust Semantic Parsing
- This paper describes the authors' work in integrating three different lexical resources: FrameNet, VerbNet, and WordNet, into a unified, richer knowledge-base, to the end of enabling more robust semantic parsing.
- Text Semantic Similarity, with Applications
- In this paper, the authors present a knowledge-based method for measuring the semantic-similarity of texts. Through experiments performed on two different applications: (1) paraphrase and entailment identification, and (2) word sense similarity, the authors show that this method outperforms the traditional text similarity metrics based on lexical matching.
- Topic Identification Using Wikipedia Graph Centrality
- This paper presents a method for automatic topic identification using a graph-centrality algorithm applied to an encyclopedic graph derived from Wikipedia. When tested on a data set with manually assigned topics, the system is found to significantly improve over a simpler baseline that does not make use of the external encyclopedic knowledge.
- Using Encyclopedic Knowledge for Automatic Topic Identification
- This paper presents a method for automatic topic identification using an encyclopedic graph derived from Wikipedia. The system is found to exceed the performance of previously proposed machine learning algorithms for topic identification, with an annotation consistency comparable to human annotations.
- Channel Assignment in an IEEE 802.11 WLAN Based on Signal-to-Interference Ratio
- This article discusses channel assignment in an IEEE 802.11 WLAN based on signal-to-interference ratio.
- The Effect of an Enhanced Channel Assignment Algorithm on an IEEE 802.11 WLAN
- This article discusses the effect of an enhanced channel assignment algorithm on an IEEE 802.11 WLAN.
- Strategies for Retention and Recruitment of Women and Minorities in Computer Science and Engineering
- Article discussing strategies for the retention and recruitment of women and minorities in computer science and engineering.
- Optimal Access Point Selection and Traffic Allocation in IEEE 802.11 Networks
- This paper discusses optimal access point selection and the traffic allocation in IEEE 802.11 networks.
- Capacity Allocations in Multi-cell UMTS Networks for Different Spreading Factors with Perfect and Imperfect Power Control
- This paper discusses capacity allocation in multi-cell UMTS networks.
- Indoor Propagation Modeling at 2.4 GHZ for IEEE 802.11 Networks
- This paper discusses indoor propagation modeling.
- Intra-Class Competitive Assignments in CS2: A One-Year Study
- This paper discusses intra-class competitive assignments in CS2.
- Performance Enhancement by Eliminating Redundant Function Execution
- This paper discusses performance enhancement by eliminating redundant function execution.
- Simulation of Throughput in UMTS Networks with Different Spreading Factors
- In this paper, the authors design and implement a local session admission control (SAC) algorithm for third-generation wireless networks which allows for the simulation of network throughput for different spreading factors and various mobility scenarios.
- Towards a Domain Independent Semantics: Enhancing Semantic Representation with Construction Grammar
- This paper shows results from an investigation whether a classifier can be taught to identify these constructions and consideration of the hypothesis that identifying construction types can improve the semantic interpretation of previously unseen predicate uses.
- Classification Errors in a Domain-Independent Assessment System
- This paper presents a domain-independent technique for assessing learners' constructed responses.
- Detecting Sarcasm is Extremely Easy ;-)
- This paper analyzes the performance of a domain-general sarcasm detection system on datasets from two different domains: Twitter and Amazon product reviews.
- Secure execution environments through reconfigurable lightweight cryptographic components
- This doctoral dissertation discusses secure execution environments through reconfigurable lightweight cryptographic components. The author considers the four most important dimensions of software protection.
- Classifying Drug Resistance in the NCI60 Cancer Cell Lines Based on the mRNA Expression Levels of the 48 ABC Transporters
- Poster for the 2014 MCBIOS Conference. This poster discusses classifying drug resistance in the NCI60 cancer cell lines based on the mRNA expression levels of the 48 ABC transporters.
- Comparison of Machine Learning Algorithms for Identifying Cancer Types
- Poster for the 2014 MidSouth Computational Biology and Bioinformatics Society (MCBIOS) Annual Conference. This poster discusses a comparison of machine learning algorithms for identifying cancer types.
- Deep learning for peptide identification from metaproteomics datasets
- This article explores a proposed deep-learning-based algorithm called DeepFilter for improving peptide identifications from a collection of tandem mass spectra. The authors find that DeepFilter is believed to generalize properly to new, previously unseen peptide-spectrum-matches and can be readily applied in peptide identification from metaproteomics data.
- Nonuniform Grid-Based Coordinated Routing in Wireless Sensor Networks
- This article discusses nonuniform grid-based coordinated routing in wireless sensor networks.