***Graduate students submitting a thesis or dissertation MUST submit to the correct collection, based on their degree (Masters [thesis] or PhD [dissertation]) and department.
Also, when you create an account on MavMatrix, please use an email address that you will continue to have access to after graduation. For example, don't use a UTA STAFF email address (ending in only uta.edu) unless you will continue your employment after graduation. Access to those emails terminates immediately upon graduation. Student email addresses (ending in mavs.uta.edu) should have longer access periods. We recommend using a personal, non-UTA email address to ensure continued access and communication.***
Theses from 2012
Selective Grouping Algorithm For Low Latency Anonymous Systems, Vishal Gupta
Shaping Network Topology For Privacy And Performance, Md Monjurul Hasan
Hydrological Visualization And Analysis System And Drought Related Feature Selection Based On Sectional Correlation Measurement, Piraporn Jangyodsuk
Learning Partially Observable Markov Decision Processes Using Abstract Actions, Hamed Janzadeh
Development Of A Detached Vital Sign Home Monitoring Management System, Anderson John
Implementation Of A Middleware Architecture For Collaboration Among Mobile Devices In Opportunistic Networks., Samaya Madhavan
On Feasibility Of Fingerprinting Wireless Sensor Nodes Using Physical Properties, Xiaowei Mei
An Experiment In Developing Small Mobile Phone Applications Comparing On-phone To Off-phone Development, Tuan Anh Nguyen
Prominent Streaks Discovery On Blog Articles, Jijo John Philip
Dynamic Cache Reconfiguration For Energy Optimization In Chip Multiprocessors, Gaurav Puri
Point Of Gaze Applications For Assistive Interaction, Jonathan Walter Rich
SubRosa 2 : An Experimental Evaluation Of Timing Analysis Attacks And Defenses In Anonymity Systems, Payap Sirinam
Pushpop: A Card Game, Vishal Subramani
Choices And Consequences: A Game-based Risky Behavior Prevention Program, Amanda Michelle Vines
Comparing Web Application Scanners For XSS Attacks, Dengfeng Xia
Theses from 2011
Performance Tuning Of An Embedded Template Analysis Tool, Ashwin Arikere
Automatic discovery of significant events from databases, Avinash Shankar Bharadwaj
Delay Tolerant Lazy Release Consistency For Distributed Shared Memory In Opportunistic Networks, Chance Ray Eary
GPU Parallel Collections For Scala, Kishen Das Kondabagilu Rajanna
Concurrent Polyglot: An Extensible Compiler Framework, Saurabh Satish Kothari
Sybil Defense For Online Social Networks Using Partial Graph Information, Vritant Naresh Jain
Privacy For Location Based Services With Smartphones, James Nathaniel Spargo
Theses from 2010
Selective Cross Correlation In Passive Timing Analysis Attacks Against Low-latency Mixes, Titus Abraham
Measuring Named Entity Similarity Through Wikipedia Category Hierarchies, Jared M. Ashman
A Comparison And Evaluation Of Motion Indexing Techniques, Harnish Bhatia
A Human Motion Database: The Cognitive And Parametric Sampling Of Human Motion, Arnab Biswas
Target Tracking With Lucas-kanade Optical Flow And Particle Filters Through Affine Transforms And Occlusion, Justin Graham
Typifying Wikipedia Articles, Quazi Mainul Hasan
Embedded Sparse Representation For Image Classification, Jin Huang
Mathematical Modeling For Phagocyte Transmigration And Reverse Engineering, Min Gon Kang
Mimic: An Active Covert Channel That Evades Regularity-based Detection, Kush Kothari
Towards Modeling The Behavior Of Physical Intruders In A Region Monitored By A Wireless Sensor Network, Pranav Krishnamoorthy
Real Time Hardware And Software Systems For Micro Air Vehicle Flight Control Testing, Christopher Dale McMurrough
A Framework For Real-time Fault Detection And Response In Multi-agent Teams, Matthew B. Middleton
A Novel Architecture For Mobility Enabled Video Conferencing In Next Generation Wireless Networks, Avinash Narayan
Handling Periodic Signs In American Sign Language Using Synthetic Generation Of Periods, Himanshu Pahwa
Fast And Energy-efficient Technique For Jammed Region Mapping In Wireless Sensor Networks, Nabila Rahman
Fast Jamming Detection In Wireless Sensor Networks, Kartik Siddhabathula
Recommender Systems: An Algorithm To Predict "Who Rate What", Rahul Singhal
Evaluation Of Ferry Based Opportunistic Message Dissemination With Deterministic Inter Contact Times, Samreen Tahir
Building Bayesian Network Based Expert Systems From Rules, Saravanan Thirumuruganathan
Detecting Medication Consumption Patterns In Assistive Environments, Jyothi K. Vinjumur
Theses from 2009
Enabling Context-aware Applications In Smart Environments, Roman Arora
Pseudo-hierarchical Ant-based Clustering Using A Heterogeneous Agent Hierarchy And Automatic Boundary Formation, Jeremy Bernard Brown
Design And Analysis Of A Mobile File Sharing System For Opportunistic Networks, Gautam Ravendra Chavan
The Reputation System For Robust, Structured P2p Systems, Apurv Ashok Dhadphale
Web Application Integration Using Mashups, Ronda Hilton
Reactive Control Composition For Mobile Manipulators, Binu George Mathew
Query Auditing Against Partial Disclosure, Mayur Motgi
Design And Analysis Of Application Architecture For Opportunistic Networks Using Ad Hoc Wi-Fi, Sankalp Vinod Shere
Peon: Privacy-enhanced Opportunistic Networks With Applications In Assistive Environments, Gauri Vakde
Liquid: A Detection Resistant Covert Timing Channel Based On Ipd Shaping, Robert J. Walls
Theses from 2008
Computational Analysis Of Variability Of Recombination In Mice, Vishnukumar Galigekere Nagabhushana
High Performance Cluster And Grid Computing Solutions For Science, Umeshkumar Ashok Keswani
The Dynamics Of Salsa: A Structured Approach To Large-scale Anonymity, Safwan Mahmud Khan
Location Privacy In Sensor Networks Against A Global Eavesdropper, Kiran K. Mehta
Automated Integration Of Biomedical Information For The Support Of Genome-wide Association Studies, Abhijit R. Tendulkar
High-level Constraint Support For Combinatorial Testing, Anthony C. Opara
Stepping-stone Network Attack Kit (SNEAK) For Evading Timing-based Detection Methods Under The Cloak Of Constant Rate Multimedia Streams, Jaideep D. Padhye
CAP: A Context-aware Privacy Protection System For Location-based Services, Aniket Pingley
Efficient Processing Of Set Queries Using Bitmap Index, Muhammad Assad Safiullah
An Influenza Virus Molecular Infection Model And Discrete Event, Stochastic Simulation., Richard Burke Squires
An Assistive Navigation Paradigm For Semi-autonomous Wheelchairs Using Force-feedback And Goal Prediction, John H.C. Staton
Hierarchical Reinforcement Learning Using Automatic Task Decomposition And Exploration Shaping, Predrag Djurdjevic
Texture Measurement And Skid Number Prediction Using Laser Data Acquisition, Digital Signal Processing, And Neural Networks, John Michael Kebrle
Visualization Of Monitor-based Executions, Keerthika Koteeswaran
Enhancing JSWAT For Monitor-based Executions, Arun Ramani
Use Of Wireless Signal Characteristics For Mobile Robotics Localization And Access Point Mapping, Joshua Davies
A Particle Filter Based Framework For Indoor Wireless Localization Using Custom Ieee 802.15.4 Nodes, Vijay Vasant Dixit
Adapting Harmonic Function Path Planning: To Reflect User Motion Preferences, Giles John D'Silva
Modeling And Simulation Of A General Motors Conveyor System Using A Custom Decision Optimizer, Mirza Mohammad Lutfe Elahi
Temporal Potential Function Approach For Path Planning In Dynamic Environments, Vamsikrishna Gopikrishna
Towards An Implementation Of Avoip: Anonymous Voice-over-ip, Bikas Raj Gurung
Increasing Localization Precision In Sensor Networks With Mobile Beacons - A Genetic Path Planning Approach, Awais Iqbal
Dynacet: A Minimum-effort Driven Dynamic Faceted Search System Over Structured Databases, Haidong Wang
Theses from 2007
Subrosa: An Experimental Platform For Studying Timing Analysis Of Real Time Anonymity Systems, Hatim Asger Daginawala
Distributed Predictive Health Monitoring, Jorge David Herrera Gonzalez
CXLEngine - A Comprehensive XML Loosely Structured Search Engine, Indhu Krishna Sivaramakrishnan
Panda Monitoring - a System To Monitor High Performance Computing for the Atlas Experiment-Design, Development,Implementation and Deployment, Prem A. Thilagar
Limitations Of IEEE 802.15.4 Based Wireless Mesh Networks For Wireless Localization, William Anthony Wallace
Distinct Value Estimation By Sampling On Unstructured Peer To Peer Networks, Zubin Matthew Joseph
Building Energy-efficient Broadcast Trees Using A Genetic Algorithm In Wireless Sensor Networks, Min Kyung An
Rate Control Algorithms For IEEE 802.11 Wireless Networks, Bodhisatwa Chakravarty
Performance Analysis Of Caching Effect On Real Time Packet Processing In A Multi-threaded Processor, Miao Ju
Dynamic Push And Pull Strategy Based On Data Interpolation For Web Sensor Networks, Rohita Mohan
Sequence Alignment Editor - A New Tool To Assist With Inferring Phylogenetic And Functional Relationships In Biological Data, Ramya Raghukumar
Resource Adaptive Agent Based Fault Tolerant Architecture, Shreyas Shetty
Top K Query Processing In Distributed Database, Amrita Tamrakar
Incremental Retrieval And Ranking Of Complex Patterns From Text Repositiories, Jayakrishna Thathireddy
M-infosift : A Graph-based Approach For Multiclass Document Classification, Aravind Venkatachalam
Medical Decision Support System Using Augmentable Guideline Engine, Adetayo Afolabi Aiyedun
Hiearchical Overlay For Service Composition In Pervasive Environments, Aparna Kailas
Flash Crowd Mitigation System, Dongchul Kim
HEROS: A Patient-centered Goal-directed Electronic Medical Record System For The Homeless, Kallol Silas Mahata
Efficient Visualization Of Streaming Sensor Network Data Using Approximation Technique, Sunil Pai
SEES - An Adaptive Multimodal User Interface For The Visually Impaired, Aparajit Saigal
A Dynamic Framework For Testing The Synchronization Behavior Of Java Monitors, Andres Yanes
Computing Best Coverage Path In The Presence Of Obstacles In Wireless Sensor Networks, Senjuti Basu Roy
A Random Walk Approach To Sampling Hidden Databases, Arjun Dasgupta