Now showing items 1-10 of 72
On the Provision of Public Goods on Networks: Incentives, Exit Equilibrium, and Applications to Cyber .
(2016)
Attempts to improve the state of cyber-security have been on the rise over the past years. The importance of incentivizing better security decisions by users in the current landscape is two-fold: it not only helps users ...
Towards Scalable Design of Future Wireless Networks
(2016)
Wireless operators face an ever-growing challenge to meet the throughput and processing requirements of billions of devices that are getting connected. In current wireless networks, such as LTE and WiFi, these requirements ...
Toward Co-Design of Autonomous Aerospace Cyber-Physical Systems.
(2014)
Modern vehicles are equipped with a complex suite of computing (cyber) and electromechanical (physical) systems. Holistic design, modeling, and optimization of such Cyber-Physical Systems (CPS) requires new techniques ...
Chip-Level Thermal Analysis, Modeling, and Optimization Using Multilayer Green's Function.
(2008)
With the continual scaling of devices and interconnects, accurate analysis and effective optimization of the temperature distribution of a ULSI chip are increasingly important in predicting and ensuring the performance and ...
Unified Models for Recovering Semantics and Geometry from Scenes.
(2014)
Understanding contents of an image, or scene understanding, is an important yet very challenging problem in computer vision. In the last few years, substantially different approaches have been adopted for understanding ...
Supporting Large Scale Communication Systems on Infrastructureless Networks Composed of Commodity Mobile Devices: Practicality, Scalability, and Security.
(2016)
Infrastructureless Delay Tolerant Networks (DTNs) composed of
commodity mobile devices have the potential to support communication
applications resistant to blocking and censorship, as well as certain
types of surveillance. ...
Computational Electromagnetic Methods for Transcranial Magnetic Stimulation.
(2015)
Transcranial magnetic stimulation (TMS) is a noninvasive technique used both as a research tool for cognitive neuroscience and as a FDA approved treatment for depression. During TMS, coils positioned near the scalp generate ...
Resilient Monitoring and Control Systems: Design, Analysis, and Performance Evaluation.
(2015)
Critical infrastructure systems (i.e., power plants, transportation networks, chemical plants, etc.) and their sensor networks are vulnerable to cyber-physical attacks. Cyber-attacks refer to the malicious manipulation of ...
Automatic Emotion Recognition: Quantifying Dynamics and Structure in Human Behavior.
(2016)
Emotion is a central part of human interaction, one that has a huge influence on its overall tone and outcome. Today's human-centered interactive technology can greatly benefit from automatic emotion recognition, as the ...
Online Learning in Bandit Problems.
(2013)
In a bandit problem there is a set of arms, each of which when played by an agent yields some reward depending on its internal state which evolves stochastically over time. In this thesis we consider bandit problems in an ...