Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

PDF

William & Mary

2009

Articles 1 - 4 of 4

Full-Text Articles in Physical Sciences and Mathematics

Enabling Technology For Non-Rigid Registration During Image-Guided Neurosurgery, Andriy Yuri Fedorov Jan 2009

Enabling Technology For Non-Rigid Registration During Image-Guided Neurosurgery, Andriy Yuri Fedorov

Dissertations, Theses, and Masters Projects

In the context of image processing, non-rigid registration is an operation that attempts to align two or more images using spatially varying transformations. Non-rigid registration finds application in medical image processing to account for the deformations in the soft tissues of the imaged organs. During image-guided neurosurgery, non-rigid registration has the potential to assist in locating critical brain structures and improve identification of the tumor boundary. Robust non-rigid registration methods combine estimation of tissue displacement based on image intensities with the spatial regularization using biomechanical models of brain deformation. In practice, the use of such registration methods during neurosurgery is …


Malware Detection And Analysis Via Layered Annotative Execution, Heng Yin Jan 2009

Malware Detection And Analysis Via Layered Annotative Execution, Heng Yin

Dissertations, Theses, and Masters Projects

Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars damages each year. A large volume of new malware samples are discovered daily. Even worse, malware is rapidly evolving to be more sophisticated and evasive to strike against current malware analysis and defense systems. This dissertation takes a root-cause oriented approach to the problem of automatic malware detection and analysis. In this approach, we aim to capture the intrinsic natures of malicious behaviors, rather than the external symptoms of existing attacks. We propose a new architecture for binary code …


A Privacy Preserving Framework For Cyber-Physical Systems And Its Integration In Real World Applications, Haodong Wang Jan 2009

A Privacy Preserving Framework For Cyber-Physical Systems And Its Integration In Real World Applications, Haodong Wang

Dissertations, Theses, and Masters Projects

A cyber-physical system (CPS) comprises of a network of processing and communication capable sensors and actuators that are pervasively embedded in the physical world. These intelligent computing elements achieve the tight combination and coordination between the logic processing and physical resources. It is envisioned that CPS will have great economic and societal impact, and alter the qualify of life like what Internet has done. This dissertation focuses on the privacy issues in current and future CPS applications. as thousands of the intelligent devices are deeply embedded in human societies, the system operations may potentially disclose the sensitive information if no …


Dependence-Driven Techniques In System Design, Ningfang Mi Jan 2009

Dependence-Driven Techniques In System Design, Ningfang Mi

Dissertations, Theses, and Masters Projects

Burstiness in workloads is often found in multi-tier architectures, storage systems, and communication networks. This feature is extremely important in system design because it can significantly degrade system performance and availability. This dissertation focuses on how to use knowledge of burstiness to develop new techniques and tools for performance prediction, scheduling, and resource allocation under bursty workload conditions.;For multi-tier enterprise systems, burstiness in the service times is catastrophic for performance. Via detailed experimentation, we identify the cause of performance degradation on the persistent bottleneck switch among various servers. This results in an unstable behavior that cannot be captured by existing …