Search Constraints

Filtering by: Contributor sim Krovetz, Ted Remove constraint Contributor sim: Krovetz, Ted

Search Results

  • 2j62s530s?file=thumbnail
    Project
    Bibodi, Jay Nikhil
    This system will eliminate the need for common platforms to publish pod-cast. The methods create a new ERC-20 token named as 'Pods.' Users will have an ability to create an account and get some specific number of tokens (that is, Pods) as joining bonu . . .
  • Dn39x186q?file=thumbnail
    Project
    Deo, Sudarshan
    This project collects several experiments in Deep Learning Convolutional Neural Network for Image predictions. It makes use of Google TensorFlow and TFlearn Deep Learning libraries for computations, training, and testing of images. The project is deve . . .
  • V118rd62d?file=thumbnail
    Project
    Tester, Andrew Ryan
    In this project a hardware Hash Tree Engine (HTE) embedded within a secure processor is modeled and simulated that verifies the authenticity of untrusted memory accessed by the processor. The HTE maintains a Merkle Hash Tree to attest the integrity of . . .
  • 4b29b602s?file=thumbnail
    Project
    Contreras, Ricardo
    This project aims at integrating a new software tool into a software flow within the company’s development cycle, enforcing a new flow that requires the use of this tool via the integration and use of an API. No such tool exists, either open sourced o . . .
  • Work
    Project
    Clift, Pamela
    Encryption of data has become a necessary practice in our technological society. Encryption tries to ensure protection of important information, corporate secrets, classified information, and private information. Along with protecting data, we need to . . .
  • Work
    Project
    Durai, Maththaiya
    Information is an organization’s most important asset. According to the Identity Theft Resource Center1, there were 761 reported data security breaches in 2014 impacting over 83 million breached records across industries. In today’s informational worl . . .
  • Work
    Project
    Pervaiz, Muhammad Haider
    Today we live in an age where data security in digital communication has become an important requirement. The need for privacy and protection of data has made major companies take appropriate actions like recent addition of end-to-end encryption by Wh . . .
  • Work
    Project
    Patel, Bhargi
    Cloud is a collection of computers that are used for their services. Out of the many services offered, cloud is best known for its data storage. Cloud backs up files and folders varying from photos, music files to sensitive documents, mitigating the c . . .
  • Bg257f089?file=thumbnail
    Project
    Ganorkar, Chinmay Sanjay
    International Collegiate Programming Contest (ICPC) is a competition between university teams around the world. Local university contests, regional contests and world finals contest are part of ICPC. The contest usually consists of teams, judges, prob . . .