Search Constraints
Filtering by:
Unit
Electrical & Computer Engineering
Remove constraint Unit: Electrical & Computer Engineering
Publisher
Worcester Polytechnic Institute
Remove constraint Publisher: Worcester Polytechnic Institute
Resource type
Dissertation
Remove constraint Resource type: Dissertation
« Previous |
1 - 100 of 125
|
Next »
Number of results to display per page
Search Results
Select an image to start the slideshow
Safe Control of Cyber-Physical Systems under False Data Injection Attacks
1 of 100
Enhancing Vehicular Networking Using Bumblebee Foraging Theory and Signals of Opportunity
2 of 100
Machine Learning Models for Parkinson's Disease Gait Assessment and Medication Adherence from Smartphone Sensor Data
3 of 100
Dual-Antiphase Patch Antennas for Microwave Imaging and Osteoporosis Screening Results Based on Neural Networks: Theoretical and Experimental Results
4 of 100
Advanced Control of Upper-Limb Prostheses with Time-Synchronized Distributed Wireless Electrodes
5 of 100
Visual Cross-Modal Mapping, Labeling and Localization
6 of 100
Cross-Layer Vulnerability Analysis of System-on-Chip against Physical Hardware Attacks
7 of 100
Secure Control for Autonomous Cyber-Physical Systems Under Temporal Logic Constraints
8 of 100
Software-Induced Fault Attacks on Post-Quantum Signature Schemes
9 of 100

Analog/Mixed-Signal Techniques for Luminescent Lifetime Estimation with Applications in Transcutaneous Oxygen Measurements
10 of 100
NDTNet: An End-to-End Design of an Optical Nondestructive Evaluation System for Metallic Objects on FPGA
11 of 100
Securing Physical Layer Passband Signals Via Machine Learning
12 of 100
Mixed Analog-Digital Signal Techniques for Wearable Medical Sensors in Healthcare Applications
13 of 100
2D Representation Learning of 3D Point Clouds in Segmentation and Localization for Autonomous Driving
14 of 100
Autonomous Driving Perception System on FPGA
15 of 100
Empowering Computer Vision Models with Deep Learning for Robotic Perception and Drone Geolocation
16 of 100
Three Cyberspace Applications for IoT RF Cloud in Localization, Motion Detection, and Security
17 of 100
Proportional, Simultaneous and Independent Control (PsiCon) of Upper-Limb Prostheses for the Limb-Absent Population
18 of 100
Wireless Communications and Spectrum Characterization in Impaired Channel Environments
19 of 100
Primary User Emulation Detection in Cognitive Radio Networks
20 of 100
On Random Sampling for Compliance Monitoring in Opportunistic Spectrum Access Networks
21 of 100
From Theory to Practice: Evaluating Sparsening Filter designs on a Software-Defined Radio Platform
22 of 100
Digital Pre-distortion for Interference Reduction in Dynamic Spectrum Access Networks
23 of 100
An Investigation of Security in Near Field Communication Systems
24 of 100
Distributed Adaptation Techniques for Connected Vehicles
25 of 100
Enabling 5G Technologies
26 of 100
Vehicular Dynamic Spectrum Access: Using Cognitive Radio for Automobile Networks
27 of 100
SRML: Space Radio Machine Learning
28 of 100
Non-Submodular Combinatorial Optimization in Control Systems: Efficient Algorithms with Provable Bounds
29 of 100
Revisiting Isolated and Trusted Execution via Microarchitectural Cryptanalysis
30 of 100
Machine Learning for Reliable Communication and Improved Tracking of Dynamical Systems
31 of 100
Sub-Picosecond Jitter Clock Generation for Time Interleaved Analog to Digital Converter
32 of 100
A Highly Digital VCO-Based ADC With Lookup-Table-Based Background Calibration
33 of 100
Development and Validation of a Method of Moments approach for modeling planar antenna structures
34 of 100
The VHP-F Computational Phantom and its Applications for Electromagnetic Simulations
35 of 100
Theoretical and Experimental Development of an Array of Droopy Bowties with Integrated Baluns
36 of 100
Development of Human Body CAD Models and Related Mesh Processing Algorithms with Applications in Bioelectromagnetics
37 of 100
Carrier Synchronization, Impairment Estimation and Interference Alignment for Wireless Communication Systems
38 of 100
A Novel Approach for MAC and PHY Performance Analysis in Relay Networks in Presence of Interference and Shadow Fading
39 of 100
Channel Estimation Error, Oscillator Stability And Wireless Power Transfer In Wireless Communication With Distributed Reception Networks
40 of 100
Understanding and Countermeasures against IoT Physical Side Channel Leakage
41 of 100
Hybrid DES-based Vehicular Network Simulator with Multichannel Operations
42 of 100
Applications of Fully Homomorphic Encryption
43 of 100
Micro-architectural Threats to Modern Computing Systems
44 of 100
Towards Automated Analysis of Microarchitectural Attacks using Machine Learning
45 of 100
Energy Efficient Cooperative Communication
46 of 100
Cooperative Distributed Transmission and Reception
47 of 100
Improving Channel Estimation and Tracking Performance in Distributed MIMO Communication Systems
48 of 100
Distributed Cooperative Communications and Wireless Power Transfer
49 of 100
Improving the Performance of Dynamic Electromyogram-to-Force Models for the Hand-Wrist and Multiple Fingers
50 of 100
Age of Information in Multi-Hop Status Update Systems: Fundamental Bounds and Scheduling Policy Design
51 of 100
DIGITALLY ASSISTED TECHNIQUES FOR NYQUIST RATE ANALOG-to-DIGITAL CONVERTERS
52 of 100
Improving the Efficiency of Homomorphic Encryption Schemes
53 of 100
Multiple resonant multiconductor transmission line resonator design using circulant block matrix algebra
54 of 100

Adaptive Energy Storage System Control for Microgrid Stability Enhancement
55 of 100
Computer Vision System-On-Chip Designs for Intelligent Vehicles
56 of 100
Statistical Modelling and Performance Evaluation of TOA for Localization inside the Human Body using Computational Techniques
57 of 100
Side Channel Leakage Exploitation, Mitigation and Detection of Emerging Cryptosystems
58 of 100
Computer Vision and Machine Learning for Autonomous Vehicles
59 of 100

Change-points Estimation in Statistical Inference and Machine Learning Problems
60 of 100
Precise Tracking of Things via Hybrid 3-D Fingerprint Database and Kernel Method Particle Filter
61 of 100
Diffraction Analysis with UWB Validation for ToA Ranging in the Proximity of Human Body and Metallic Objects
62 of 100
Distributed Statistical Learning under Communication Constraints
63 of 100
New Approaches for Efficient Fully Homomorphic Encryption
64 of 100
Feasibility Investigation of Real-time Quantitative Quasi-static Ultrasound Elastography
65 of 100
Cross-core Microarchitectural Attacks and Countermeasures
66 of 100
Fundamental Limits of Poisson Channels in Visible Light Communications
67 of 100
System Designs for Diabetic Foot Ulcer Image Assessment
68 of 100
Radio Propagation for Localization and Motion Tracking In Three Body Area Network Applications
69 of 100
Near Optimal Indoor Localization With Coherent Array Reconciliation Tomography
70 of 100
Studies of the relationship between the surface electromyogram, joint torque and impedance
71 of 100
A Study of Myoelectric Signal Processing
72 of 100
Side Channel Leakage Analysis – Detection, Exploitation and Quantification
73 of 100
Quickest Change-Point Detection with Sampling Right Constraints
74 of 100
Active and Passive Thermography for the Detection of Defects in Green-State Powdermetallic Compacts
75 of 100
A Markov Random Field Based Approach to 3D Mosaicing and Registration Applied to Ultrasound Simulation
76 of 100
On Simultaneous Localization and Mapping inside the Human Body (Body-SLAM)
77 of 100
Accelerating Cryptosystems on Hardware Platforms
78 of 100
Experimental Investigations of EMG-Torque Modeling for the Human Upper Limb
79 of 100
Security in Voice Authentication
80 of 100
Enhanced Acquisition Techniques for GPS L1C Receivers
81 of 100
Adaptive Suppression of Interfering Signals in Communication Systems
82 of 100
Inverse Synthetic Array Reconciliation Tomography
83 of 100
Bounds on RF cooperative localization for video capsule endoscopy
84 of 100
Transactional Array Reconciliation Tomography for Precision Indoor Location
85 of 100
Exploiting Diversity in Broadband Wireless Relay Networks
86 of 100
Secure and Reliable Data Outsourcing in Cloud Computing
87 of 100
Cryptographic Primitives from Physical Variables
88 of 100
High-Performance Decoder Architectures For Low-Density Parity-Check Codes
89 of 100
Network Electrophysiology Sensor-On-A- Chip
90 of 100
User-Centric Security and Privacy Mechanisms in Untrusted Networking and Computing Environments
91 of 100
Network Coding in Multihop Wireless Networks: Throughput Analysis and Protocol Design
92 of 100
Resource Allocation and Performance Optimization in Wireless Networks
93 of 100
Error Detection Techniques Against Strong Adversaries
94 of 100
Efficient Side-Channel Aware Elliptic Curve Cryptosystems over Prime Fields
95 of 100
Data Sharing on Untrusted Storage with Attribute-Based Encryption
96 of 100
Geometric Autoconfiguration for Precision Personnel Location
97 of 100
All Digital, Background Calibration for Time-Interleaved and Successive Approximation Register Analog-to-Digital Converters
98 of 100
Modeling the Behavior of Multipath Components Pertinent to Indoor Geolocation
99 of 100
Wind Energy Conversion Systems based on DFIG Technology used as Active Filters: Steady-State and Transient Analysis
100 of 100