Ricerca
Filtro per:
Campus
Sacramento
Cancella il filtro Campus: Sacramento
Department
Computer Science
Cancella il filtro Department: Computer Science
Risultati della ricerca
-
ProjectRajguru, Aniruddha ShekharOver the years, data privacy has been a major concern amongst consumers. Applications such as Facebook, Uber, and Instagram collect a huge amount of data from users in return for the free service. Some of this data collection is necessary for the serv . . .
-
ProjectLuman, RijulSince the rise of internet and e-commerce, buying and selling goods over the internet has relied heavily on financial institutions acting as 3rd parties to process financial transactions. These 3rd parties often charge a good percentage of the payment . . .
-
ProjectKollu, SindhuIn modern economic times, everyone wants to save their money and keep expenses with in their budget limit. But, due to our busy schedules in our day to day life, we may lose track of our expenses and end up overspending which leads to debts. In this p . . .
-
ProjectJain, AnshulIndoor localization has become one of the most talked about services in today’s technology. We have observed that there have been huge demand of Indoor Location services due to increase in smartphone market in last few years. GPS is widely used to fin . . .
-
ProjectDevarakonda, Divya SindhuriUSA has been grappling with crime for decades now and had made significant improvement. However, crime remains to be one of the core societal problems. To build a safer society, we need to take advantage of 21st century’s technology. With current tech . . .
-
ProjectPoon, Dennis YiuwingRefactoring is a process used by programmers to improve the non-functional qualities of code. It does not affect the actual output of the program, but it is useful for making the code easier to read and maintain. In practice, it often requires a lot o . . .
-
ProjectShah, JinalibenActive database systems support applications by moving the reactive behavior from applications into database management systems. It is a database system that includes an event-driven architecture that can respond to different types of events automatic . . .
-
ProjectPalanisamy, SharmilaA stochastic prediction modeling method such as Hidden Markov Model (HMM) is a complex system. The HMM is suitable to analyze and predict time-dependent phenomena and has been widely used in applications such as speech recognition, weather and stock m . . .
-
ProjectShenoy, ShwetaSecurity and usability have been on the opposite ends of the spectrum; sometimes, to achieve one, the other must be compromised to some extent. Passwords are a typical example in which usability, psychology, and security meet. Absurd password rules fo . . .
-
ProjectPinto, RodneyOne of the most critical resources that ensure the current working of the internet is the domain name system (DNS). It is a decentralized, hierarchical naming system that is responsible for translating the human-readable domain name to its associated . . .