This collection includes theses and dissertations from the Department of Computer Engineering and Computer Science, in the J.B. Speed School of Engineering. It is not exhaustive since most paper theses and dissertations have not been digitized. Generally, paper copies of theses and dissertations published prior to 2014 (Master of Engineering, prior to 2005) can be accessed in the University of Louisville Libraries. If you would like to add your thesis or dissertation to this collection, please fill out the Electronic Theses & Dissertations form.

Follow


Theses/Dissertations from 2012

PDF

Role based access control and authentication for SCADA field devices using a dual Bloom filter and challenge-response., Jacob Schreiver

PDF

Toward an isomorphic diagram of the Backus-Naur form., Neil A. Smith

PDF

Enhanced web-based summary generation for search., Brent Wenerstrom 1980-

Theses/Dissertations from 2011

PDF

Stereoscopic vision in vehicle navigation., Behnoush Abdollahi 1986-

PDF

A water distribution and treatment simulation for testing cyber security enhancements for water sector SCADA systems., Justin Robert Adams

PDF

Unsupervised and semi-supervised clustering with learnable cluster dependent kernels., Ouiem Bchir 1978-

PDF

Coronal loop detection from solar images and extraction of salient contour groups from cluttered images., Nurcan Durak

PDF

Clustering digital ink content to assist with the grading of student work., Jared Hatfield

PDF

Image annotation and retrieval based on multi-modal feature clustering and similarity propagation., Mohamed Maher Ben Ismail 1979-

PDF

Using principal component analysis for early fault detection in Louisville water distribution system., Kevin M. Kastensmidt

PDF

An implementation of a multi-touch Draw-A-Secret password schema for Windows-based computers., Matthew Lichtenberger

PDF

Data center resilience assessment : storage, networking and security., Yehia H. Khalil Mohamed

PDF

Image registration and visualization of in situ gene expression images., Ernur Saka

PDF

Swarm intelligence for clustering dynamic data sets for web usage mining and personalization., Esin Saka

PDF

Click fraud : how to spot it, how to stop it?, Chamila Kumara Walgampaya

File

Low-time-resolution structures in music and its computer applications., Yindong Yu

Theses/Dissertations from 2010

PDF

A generic framework for context-dependent fusion with application to landmine detection., Ahmed Chamseddine Ben Abdallah

PDF

Assessment and performance of VSN-INV normalization on the NCI-60 microRNA expression profiles., Martin T. Disibio

PDF

Generalized quantifiers in distributed databases., Michael Dobbs

PDF

Enhanced cryptographic approaches for SCADA network security., Waleed H. ElSaid

PDF

Enhancing reliability with Latin Square redundancy on desktop grids., Nathan Patrick Johnson

PDF

Implementation of a Microsoft Windows embedded standard system., Kristopher L. Kumler

PDF

Application of temporal difference learning to the game of Snake., Christopher Lockhart

PDF

Reduced hyperBF networks : practical optimization, regularization, and applications in bioinformatics., Rami Nezar Mahdi 1982-

PDF

Adaptive constrained clustering with application to dynamic image database categorization and visualization., Jason Daron Meredith 1982-

PDF

Architecture analysis of peer-to-peer network structure and data exhanges for distribution of contraband material., Nicholas Miles

PDF

Generalized multi-stream hidden Markov models., Oualid Missaoui

PDF

Dynamic probe positioning within peer-to-peer networks for mining contraband file exchanges., Derek Reese

PDF

Features extraction using random matrix theory., Viktoria Borisovna Rojkova

Theses/Dissertations from 2009

PDF

Bridging the semantic gap in content-based image retrieval., Joshua David Caudill

PDF

Increasing performance of blowfish encryption using CUDA., Joseph Anthony Feist

PDF

A hybrid genetic-greedy approach to the skills management problem., Daniel Grieshaber 1986-

PDF

Secure messaging with Apple's iPhone., Todd Randal Grooms

PDF

An analysis pipeline for the processing, annotation, and dissemination of Expressed Sequence Tags., Joseph P. Morris

PDF

Context-dependent fusion with application to landmine detection., Lijun Zhang

Theses/Dissertations from 2008

PDF

Computational analysis of expressed sequence tags for understanding gene regulation., I. Elizabeth Cha 1973-

PDF

Architecture for intelligent power systems management, optimization, and storage., J. Chris Foreman

PDF

Mining and tracking evolving web user trends from very large web server logs., Basheer Hawwash 1984-

PDF

Security hardened remote terminal units for SCADA networks., Jeff Hieb

PDF

Re-engineering the Enigma cipher., Max Samuel Stoler

PDF

Focused image search in the social Web., Zhiyong Zhang

Theses/Dissertations from 2007

PDF

Intrusion detection and response model for mobile ad hoc networks., Sathishkumar Alampalayam 1974-

PDF

Automatic pure anchor-based taxonomy generation from the world wide web., Joseph Paul Elliott

PDF

Monitoring frequent items over distributed data streams., Robert Harrison Fuller 1984-

PDF

Cellular automata for dynamic S-boxes in cryptography., William Matthew Luckett

PDF

Deploying a secure Windows operating system and applications., Russell Slater Miles 1982-

PDF

Selfish node isolation in Mobile Ad-Hoc Networks., Michael Probus

PDF

Evaluation of using Swarm intelligence to produce facility layout solutions., Andrew Bao Thai 1984-

PDF

Methods for detecting kernel rootkits., Douglas Ray Wampler

PDF

YMAGE : a resource for real-time sharing of high resolution digital images., Yetu A. Yachim

Theses/Dissertations from 2006

PDF

Multivariate discretization of continuous valued attributes., Ehab Ahmed El Sayed Ahmed 1978-

PDF

Advancements in frameworks for educational games through sound software engineering principles., Christy M. Bogard

PDF

Mining sequences in distributed sensors data for energy production., John Damon Gant 1977-

PDF

Analysis of NMR spectra using digital signal processing techniques., Jason Aaron Gearheart

PDF

ARF : an Automated Real-Time Fuzzy Logic Threat Evaluation System., Jeremy D. Gray

PDF

Evaluation of MILS and reduced kernel security concepts for SCADA remote terminal units., Brent L. Guffey 1982-

PDF

Software based deployment of encryption keys in wireless sensor networks., Timothy William Hnat

PDF

Service oriented architecture for real time data fusion., Derek Ray Massey

PDF

Computer forensics methodology and praxis., Robin Cincinnatis Morrison 1975-

PDF

Mobility-based predictive call admission control and resource reservation for next-generation mobile communications networks., Sherif Said Rashad 1974-

PDF

On secure communication in integrated internet and heterogeneous multi-hop wireless networks., Bin Xie 1970-

Theses/Dissertations from 2005

PDF

Website optimization, design, and restructuring., Christopher Thomas Gibson

PDF

Towards a scalable and efficient data classification technique., Fadi Samih Omar Mehanna

PDF

New families of voltage-mode and current-mode filter circuits., Tongfeng Qian

PDF

Toward autonomic distributed data mining using intelligent web services., Padmanabhan Ramaswamy 1976-

Theses/Dissertations from 2004

PDF

Software integrity management system., Joseph H. Brown 1980-

PDF

Anomaly based intrusion detection for network monitoring using a dynamic honeypot., Jeff Hieb

PDF

Developing a database for Genbank information., Nathan Mann

PDF

Distributed data mining using web services., Vivek Mongolu 1977-

PDF

The Java CoG kit grid desktop : a simple and central approach to grid computing using the graphical desktop paradigm., Pankaj R. Sahasrabudhe 1980-

Theses/Dissertations from 1995

PDF

Preprocessing of microcirculatory images., Mohamed S. Mansour