Search
Now showing items 211-220 of 506
An Evaluation of Basic Protection Mechanisms in Financial Apps on Mobile Devices
This thesis concerns the robustness of security checks in financial mobile applications (or simply
financial apps). The best practices recommended by OWASP for developing such apps demand
that developers include several ...
Recovery Algorithms for planted structures in Semi-random models
For many NP-hard problems, the analysis of best-known approximation algorithms yields “poor” worst-case guarantees. However, using various heuristics, the problems can be solved (to some extent) in real-life instances. ...
Design, Fabrication and Characterization of ZnO based Thin Film Schottky Diodes and Transistors
The thesis focuses on the development of thin film Schottky diodes and thin film transistors (TFTs) based on ZnO. ZnO has been recognized as a promising candidates for the next generation of transparent and flexible ...
Scheduling Algorithms for Wireless Networks and Cloud Computing Platforms
This thesis focuses on designing scheduling algorithms for wireless communication networks, FMCW radar networks, and cloud computing platforms. In each case, the algorithms aim at efficient utilization of resources, e.g., ...
Achieving practical secure non-volatile memory system with in-Memory Integrity Verification (iMIV)
Recent commercialization of Non-Volatile Memory (NVM) technology in the form of Intel Optane enables programmers to write recoverable programs. However, the data on NVM is susceptible to a plethora of data remanence attacks, ...
Opportunistic Beamforming and Asymptotic Throughput Analysis of Hybrid Analog-Digital mmWave Multi-User MIMO Systems
In this thesis, we address the problem of large training/feedback overhead and the requirement
of computationally intensive algorithms to determine the phase angles of the analog
precoder for downlink data transmission ...
Operating System Support for Efficient Virtual Memory
Computers rely on the virtual memory abstraction to simplify programming, portability, physical memory management and ensure isolation among co-running applications. However, it creates a layer of indirection in the ...
Improved Algorithms for Variants of Bin Packing and Knapsack
We study variants of two classical optimization problems: Bin Packing and Knapsack. Both bin packing and knapsack fall under the regime of "Packing and Covering Problems". In bin packing, we are given a set of input items, ...
Performance Characterization and Optimizations of Traditional ML Applications
Even in the era of Deep Learning based methods, traditional machine learning methods with large data sets continue to attract significant attention. However, we find an apparent lack of a detailed performance characterization ...
Nonlinear Optical Enhancement Studies in Silicon-based Resonant Metasurfaces
Metasurfaces are two dimensional arrangements of building blocks called meta-atoms which have been found to be useful to manipulate amplitude, phase, polarization of light at the nanoscale. Using these properties, functional ...

