Living in a world where the machine and the Internet are ubiquitous, many people work and play online, in a world that is, ironically, often isolated and lonesome. While the Internet, as intended, connects us to information, products and services, it often draws us away from the rich connections that...
Constructing 3D objects from 2D images has been an active research area for decades. Given captured 2D information from various devices, different techniques were developed to assign 3D positions to the target object. However, methods for reconstructing a 3D model from a single 2D image remain largely manual and labor-intensive....
The optimization problems associated with adaptive and autonomic computing systems are often difficult to pose well and solve efficiently. A key challenge is that for many applications, particularly interactive applications, the user or developer is unlikely or unable to provide either the objective function f, or constraints. It is a...
Frictionless Information Systems (FIS) are a class of software systems that automatically bring users information and services related to what they are doing. These systems bridge the gap between the information a user wants and the repositories that contain the information - making the user more effective and informed. By...
With a large sphere of activity and ability to transfer data through wireless communication system, drones have proven to be more and more useful in both research and manufacturing. Whether by allowing researchers to collect measurements or filmmakers to attain aerial shots, the use of drone has allowed collection of...
Self-assembly is the process by which objects autonomously assemble into complexes. It is believed that self-assembly technology will ultimately permit the precise fabrication of complex nanostructures. Of particular interest are self-assembly systems that are highly programmable. That is, we can view a self-assembly system as analogous to a program, the...
In the last decade we have seen tremendous increases in computer and network speeds and performance, resulting in the emergence of wide-area distributed computing. However, its potential has not been realized, primarily due to lack of security and isolation, provisioning issues and challenges involved in developing distributed applications.
We present...
Image creation is an attempt to record a scene for presentation to a viewer. However, there is a precarious mapping between how a scene would be perceived and how an image is perceived. For example, although the human visual system does not have a strong absolute sense of color or...
Web users suffer from security and privacy threats. According to Symantec, 430 million new unique pieces of malware have been discovered in 2015, and over half a billion personal records were stolen or lost in the same year. Defense mechanisms can be classified as reactive approach and proactive approach. Reactive...
Spatial-temporal data mining, with data driven model and machine learning techniques, significantly benefit the traditional transportation research. This dissertation focus on three problems related to uncertain location data, lane-level traffic speed clustering and anomalous traffic speed prediction.
We take a first step towards combining the uncertain location data i.e., fusing...