Browsing by Author "Hedrick, George E."
Now showing items 1-20 of 32
-
Amortized Analysis of Computational Complexity for Data Structures
Hu, Ruo-Ling (Oklahoma State University, 1988-12-01) -
Analytical Comparison of Grid File and K-d-b-tree Structures
Saritepe, Hatice Nilufer Anlar (Oklahoma State University, 1987-12-01) -
Comparison of Activation Functions for Multilayer Perceptrons
Nallavelli, Sudheer (2001-12-01) -
Comparison of the Computational Performance of Three Quadratic Programming Algorithms
Khalili, Fouad Mustapha (Oklahoma State University, 1987-12-01)The main objective of this study is to compare the computational perforinance of three quadratic programming algorithms. A quadratic programming problem is one in which the objective function to be minimized is quadratic ... -
Compression Techniques for the Grid File
Chun, Sei Hoon (Oklahoma State University, 1988-12-01) -
Computer science education: Secure software
Cain, James Francis, III (2010-12)Computer security problems have been increasing significantly as the Internet has been increasing the means to both access and to distribute both code and data. Attempts to address these problems through computer science ... -
Decision support systems: An object-oriented conceptual architecture
Le Claire, Brian Phillip (1989-12) -
Demand Driven Data Flow Environment for a Locality Study
Schneider, Robert Jeffrey (Oklahoma State University, 1983-07-01)This study is an analysis of program behavior in a demand driven data flow environment to determine the existence of locality in such an environment. The motivation for performing such an analysis is to determine if a ... -
Design of Efficient Sorting and Searching Structures and Algorithms Using a Torus Topology
Gaston, Billy D'Angelo (2001-05-01) -
Design of Hierarchical Intrusion Detection Unit for Ad-hoc Networks Based On Bayesian Networks
Kulkarni, Pranav (Oklahoma State University, 2008-05-01)Mobile ad-hoc networks (MANETs) are susceptible to security attacks due to their limited resources and the wireless medium they operate in. These attacks range from snooping to passive eavesdropping to active interference ... -
Dimension Updates in Data Warehouses
Ma, Haihong (2004-12-01) -
Distributed System for Functional Computing
Liu, Zhilan (2001-05-01) -
Effect of Data Flow Architecture on Programming Language Design
Venkataraman, Krishnan (Oklahoma State University, 1981-07-01)This study is concerned with the aspects of data flow architecture. A survey of data flow processors is presented. The two broad classes of languages, procedural and applicative, are considered for the language design for ... -
Enhancements to the Timing Simulator of the Enhanced Modular Signal Processor
Nelson, Steven Craig (Oklahoma State University, 1988-12-01) -
Expression Verifier for an Interactive Program Generator
Lucas, John Frederic (Oklahoma State University, 1982-12-01)The aim of this study is to uncover and to resolve the fundamental issues facing the designer of an expression verifier system for an interactive program generator. The work presented here is intended to serve as the basis ... -
Finding the Median in Linear Worst-Case Time
Crow, David B. (2001-12-01) -
Graphical Simulation for Two-Way Linear-Bounded Automata (LBA)
Doi, Joji (2001-05-01) -
Identification of Transcription Factor Binding Sites
Zhao, Liang (2004-05-01) -
Investigating the Relationship Between Aspects and Program Slices
Lu, Yee Ping (2004-05-01) -
Investigation of an Intermediate Representation for a High Level Language
Harden, Asa David (Oklahoma State University, 1988-05-01)