Get Latest CSE Projects in your Email


Strategies for Comparing Metabolic Profiles: Implications for the Inference of Biochemical Mechanisms from Metabolomics Data

Large amounts of metabolomics data have been accumulated in recent years and await analysis. Previously we had developed a systems biological approach to infer biochemical mechanisms underlying metabolic alterations observed in Continue reading

Balancing Dependability Quality Attributes for Increased Embedded Systems Dependability

Embedded systems are used in many critical applications where a failure can have serious consequences. Therefore, achieving a high level of dependability is an ultimate goal. However, in order to achieve this goal we are in Continue reading

GPU-Accelerated Visualization of Scattered Point Data

As data sets continue to grow in size, visualization has become a vitally important tool for extracting meaningful knowledge. Scattered point data, which are unordered sets of point coordinates with Continue reading

Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine-Grained Benchmark, and Feature Evaluation

When a new bug report is received, developers usually need to reproduce the bug and perform code reviews to find the cause, a process that can be tedious and time consuming. A tool for ranking all the source files with respect to Continue reading

Software Defined Networking With Pseudonym Systems for Secure Vehicular Clouds

The vehicular cloud is a promising new paradigm, where vehicular networking and mobile cloud computing are elaborately integrated to enhance the quality of Continue reading

M2M: A Simple MATLAB-to-Map Reduce Translator for Cloud Computing

MapReduce is a very popular parallel programming model for cloud computing platforms, and has become an effective method for processing massive data by Continue reading

Efficient Secure Computation for Real-world Settings and Security Models

Introduction:
Secure computation involves multiple parties computing a common function while keeping their inputs private, and is a growing field of cryptography due to its Continue reading