Follow

Theses from 2014

PDF

A comparison of dropout and weight decay for regularizing deep neural networks, Thomas Grant Slatton

Theses from 2013

PDF

Algorithms and a Software Application for the Discovery of Heparin-Binding Proteins for Chemical Analysis, Christopher Dempewolf

PDF

Forensic Investigation of MySQL Database Management System, Andrew C. Lawrence

Theses from 2012

PDF

The Design and Implementation of a Mobile Game Engine for the Android Platform, Jon Hammer

PDF

Wi-Fi Sensing Algorithms Utilizing ZigBee RF Reciever for use in Emergency Communications Mesh, Alexander Nelson

PDF

A modular framework for home healthcare monitoring, Blake Puryear

PDF

Virtual "University of Arkansas" Campus, Seth Williams

PDF

Simple touch-based gaming: project pond, Taylor Yust

Theses from 2011

PDF

WebTailor: Internet Service for Salient and Automatic User Interest Profiles, John Anderson

PDF

Parallelizing Scale Invariant Feature Transform On A Distributed Memory Cluster, Stanislav Bobovych

PDF

Object recognition based on shape and function, Akihiro Eguchi

PDF

PowerSearch: Augmenting mobile phone search through personalization, Xiangyu Liu

PDF

An introductory educational board game for use in early computer science education, Tyler Moore

PDF

Making an Impact on the Obesity Epidemic by Deploying a Mobile Fitness Suite on the Android Market, Chad Richards

PDF

Portable network analyzer, Tyler Warren

Theses from 2010

PDF

Analysis of a database insider threat model, Andrea Samuel

Theses from 2009

PDF

Understanding sources and consequences of variation in self-assembly, Arjun Dasgupta

Theses from 2008

PDF

Adding Virtual RFID to Second Life, Casey Bailey

PDF

Service oriented transitive closure solution, Jonathan Baran

PDF

An Efficient Hardware Implementation of Target Recognition Algorithms and Investigation of Secure Wireless Communication for a Modified Manet, Stephen Barnes

PDF

Developing Subgrade Inputs for Mechanistic-Empirical Pavement Design, Meagan Berlau

PDF

Holistic Characterization of Parallel Programming Models in a Distributed Memory Environment, Christopher Bryan

PDF

Location-Based Hashing for Querying and Searching, Felix Ching

PDF

Key factors in tag recognition for RFID system, Nachiketa Das

PDF

Visualization of an Approach to Data Clustering, Marisabel Guevara

PDF

Computer Generation and Processing of Music: Pitch Correction for the Human Voice, Jason Hardy

PDF

Mapping reality into virtual worlds, Josh McFarlane

PDF

Steganography in IPV6, Barret Miller

PDF

Pitch correction on the human voice, Suzanne Ownbey

PDF

MultiUAV2 Agent Swarming for Distributed ATR Simulation, Kyle White