Search
Now showing items 1-8 of 8
Cost-performance trade-offs in fog computing for IoT data processing of social virtual reality
(University of Missouri--Columbia, 2018)
[ACCESS RESTRICTED TO THE UNIVERSITY OF MISSOURI AT AUTHOR'S REQUEST.] Virtual Reality (VR)-based Learning Environments (VRLEs) are gaining popularity due to the wide availability of cloud and its edge (a.k.a. fog) technologies and high...
Mechanizing the metatheory of rewire
(University of Missouri--Columbia, 2019)
The [lambda]-calculus provides a simple, well-established framework for research in functional programming languages that readily lends itself to the use offormal methods--that is, the use of mathematically sound techniques ...
Machine learning methods for 3D object classification and segmentation
(University of Missouri--Columbia, 2018)
Object understanding is a fundamental problem in computer vision and it has been extensively researched in recent years thanks to the availability of powerful GPUs and labelled data, especially in the context of images. ...
Trusted resource allocation in volunteer edge-cloud computing for scientific applications
(University of Missouri--Columbia, 2022)
Data-intensive science applications in fields such as e.g., bioinformatics, health sciences, and material discovery are becoming increasingly dynamic and demanding with resource requirements. Researchers using these ...
Multi-modal and multi-dimensional biomedical image data analysis using deep learning
(University of Missouri--Columbia, 2023)
There is a growing need for the development of computational methods and tools for automated, objective, and quantitative analysis of biomedical signal and image data to facilitate disease and treatment monitoring, early ...
Three dimensional reconstruction of plant roots via low energy x-ray computed tomography
(University of Missouri--Columbia, 2018)
Plant roots are vital organs for water and nutrient uptake. The structure and spatial distribution of plant roots in the soil affects a plant's physiological functions such as soil-based resource acquisition, yield and its ...
Machine-aided analysis of vote privacy using computationally complete symbolic attacker
(University of Missouri--Columbia, 2019)
Security protocols employ cryptographic primitives such as encryption and digital signatures to provide security guarantees of confidentiality and authenticity in the presence of malicious attackers. Due to the complexities ...
Intelligent orchestration of computation and networking for drone swarm applications
(University of Missouri--Columbia, 2023)
[EMBARGOED UNTIL 5/1/2024] Drone swarms that are equipped with high-resolution sensors and video cameras can benefit many applications (e.g., disaster response management, smart farming, traffic control). This requires ...