ASU Electronic Theses and Dissertations
This collection includes most of the ASU Theses and Dissertations from 2011 to present. ASU Theses and Dissertations are available in downloadable PDF format; however, a small percentage of items are under embargo. Information about the dissertations/theses includes degree information, committee members, an abstract, supporting data or media.
In addition to the electronic theses found in the ASU Digital Repository, ASU Theses and Dissertations can be found in the ASU Library Catalog.
Dissertations and Theses granted by Arizona State University are archived and made available through a joint effort of the ASU Graduate College and the ASU Libraries. For more information or questions about this collection contact or visit the Digital Repository ETD Library Guide or contact the ASU Graduate College at gradformat@asu.edu.
- Xue, Guoliang
- 54 Arizona State University
- 16 Sen, Arunabha
- 14 Ye, Jieping
- 9 Huang, Dijiang
- 8 Liu, Huan
- 7 Ahn, Gail-Joon
- more
- 7 Richa, Andrea
- 6 Zhang, Junshan
- 6 Zhang, Yanchao
- 5 He, Jingrui
- 5 Li, Jing
- 4 Dasgupta, Partha
- 4 Syrotiuk, Violet R
- 3 Li, Baoxin
- 3 Richa, Andrea W
- 3 Wang, Yalin
- 2 Konjevod, Goran
- 2 Kumar, Sudhir
- 2 Sarjoughian, Hessam
- 2 Scheideler, Christian
- 2 Tsai, Wei-Tek
- 2 Ying, Lei
- 1 Adler, Jonathan David
- 1 Aggarwal, Charu
- 1 Alelyani, Salem
- 1 Alipourfard, Omid
- 1 Askin, Ronald
- 1 Bai, Ke
- 1 Banerjee, Joydeep
- 1 Banerjee, Sujogya
- 1 Bapat, Namrata
- 1 Cao, Yu
- 1 Caselli, Richard
- 1 Caverlee, James
- 1 Chakrabarti, Chaitali
- 1 Chatha, Karam S
- 1 Chatha, Karamvir
- 1 Chen, Jianhui
- 1 Chung, Chun-Jen
- 1 Cárdenas-Haro, José Antonio
- 1 Dalvucu, Hasan
- 1 Das, Arun
- 1 Davulcu, Hasan
- 1 Derakhshandeh, Zahra
- 1 Doupe, Adam
- 1 Duman, Tolga
- 1 Duman, Tolga Mete
- 1 Fainekos, Georgios
- 1 Faloutsos, Christos
- 1 Fang, Xi
- 1 Gao, Huiji
- 1 Gel, Esma
- 1 Ghaffarinejad, Ashkan
- 1 Gollapudi, Narasimha Aditya
- 1 Hu, Xinhui
- 1 Hui, Joseph
- 1 Hurlbert, Glenn
- 1 Jain, Karan
- 1 Johnson, Thienne
- 1 Kambhampati, Subbarao
- 1 Khodadadeh, Roozbeh
- 1 Kilari, Vishnu Teja
- 1 Kosut, Oliver
- 1 Leskovec, Jure
- 1 Li, Bing
- 1 Li, Jundong
- 1 Li, Lingjun
- 1 Li, Qingyang
- 1 Li, Wu
- 1 Liu, Mengxue
- 1 Liu, Yashu
- 1 Mazumder, Anisha
- 1 Medhi, Deepankar
- 1 Mirchandani, Pitu
- 1 Mirchandani, Pitu B
- 1 Mittelmann, Hans D
- 1 Nie, Zhi
- 1 Qiao, Chunming
- 1 Raravi, Gurulingesh
- 1 Reisslein, Martin
- 1 Richa, Andrea W.
- 1 Sankar, Lalitha
- 1 Saripalli, Srikanth
- 1 Sarwat, Mohamed
- 1 Schmid, Stefan
- 1 Shi, Jie
- 1 Shirazipourazad, Shahrzad
- 1 Shrivastava, Aviral
- 1 Sun, Qian
- 1 Sun, Xin
- 1 Tang, Jiliang
- 1 Tepedelenlioglu, Cihan
- 1 Thulasiram, Ramesh L.
- 1 Todd, Margaret Nicole
- 1 Tong, Hanghang
- 1 Vrudhula, Sarma
- 1 Walkowiak, Krzysztof
- 1 Wang, Shanshan
- 1 Wang, Zhijie
- 46 Computer science
- 4 Cloud Computing
- 4 Electrical engineering
- 4 Machine Learning
- 4 Optimization
- 3 Computer Science
- 3 Computer engineering
- more
- 3 Resource allocation
- 2 Algorithm
- 2 Algorithms
- 2 Bioinformatics
- 2 Distributed Computing
- 2 Information technology
- 2 Network security
- 2 Networks
- 2 OpenFlow
- 2 Resource Allocation
- 2 SDN
- 2 SaaS
- 2 Software Defined Networking
- 2 Sparse Learning
- 1 Access Control
- 1 Adaptation
- 1 Algorithmic Foundations
- 1 Alternative-fuels
- 1 Analysis
- 1 Android Permissions
- 1 Android Security
- 1 Anonymity
- 1 Applications
- 1 Applying Distrust
- 1 Approximate dynamic programming
- 1 Approximation algorithm
- 1 Artificial intelligence
- 1 Attack Graph
- 1 Attributed Networks
- 1 Auction
- 1 Bilingual Spam Detection
- 1 BioImage Annotation
- 1 Biomedical engineering
- 1 Blockchain
- 1 Caching
- 1 Cloud
- 1 Cloud Security
- 1 Code Generation
- 1 Cognitive Radios Networks
- 1 Column generation
- 1 Communication
- 1 Communication Networks
- 1 Compiler
- 1 Computer Networks
- 1 Constant competitive throughput
- 1 Constrained shortest path
- 1 Critical Infrastructure Networks
- 1 Critical Infrastructure Networks Analysis
- 1 Customization
- 1 Cyber-physical systems
- 1 Cybersecurity
- 1 Data Analysis
- 1 Data Mining
- 1 Deep Learning
- 1 Design
- 1 Developmental biology
- 1 Dictionary Learning
- 1 Distributed Systems
- 1 Distrust
- 1 Dynamic Programming
- 1 Dynamic power management
- 1 Dynamic voltage/frequency scaling
- 1 EMS
- 1 Edge Computing
- 1 Electric vehicles
- 1 FDI
- 1 Fault-tolerance
- 1 Feature Selection
- 1 Game Theory
- 1 Human Mobility
- 1 IPS
- 1 Identity
- 1 Imaging Genetics
- 1 Industrial engineering
- 1 Internet-of-Things
- 1 Intrusion Detection System
- 1 Intrusion Prevention System
- 1 Jamming defense
- 1 Jamming-resistant MAC protocols
- 1 Lasso
- 1 Load Balancing
- 1 Location-based Social Networks
- 1 Low power design
- 1 Manycore
- 1 Mathematics
- 1 Medical Imaging
- 1 Memory
- 1 Minimum Information
- 1 Mining across Sites
- 1 Mobile Authentication
- 1 Mobile Cloud Computing
- 1 Mobile Data Mule Path Planning
- 1 Mobile Network
- Dwarf Galaxies as Laboratories of Protogalaxy Physics: Canonical Star Formation Laws at Low Metallicity
- Evolutionary Genetics of CORL Proteins
- Social Skills and Executive Functioning in Children with PCDH-19
- Deep Domain Fusion for Adaptive Image Classification
- Software Defined Pulse-Doppler Radar for Over-The-Air Applications: The Joint Radar-Communications Experiment
Attributes - that delineating the properties of data, and connections - that describing the dependencies of data, are two essential components to characterize most real-world phenomena. The synergy between these two principal elements renders a unique data representation - the attributed networks. In many cases, people are inundated with vast amounts of data that can be structured into attributed networks, and their use has been attractive to researchers and practitioners in different disciplines. For example, in social media, users interact with each other and also post personalized content; in scientific collaboration, researchers cooperate and are distinct from peers by their …
- Contributors
- Li, Jundong, Liu, Huan, Faloutsos, Christos, et al.
- Created Date
- 2019
Emerging from years of research and development, the Internet-of-Things (IoT) has finally paved its way into our daily lives. From smart home to Industry 4.0, IoT has been fundamentally transforming numerous domains with its unique superpower of interconnecting world-wide devices. However, the capability of IoT is largely constrained by the limited resources it can employ in various application scenarios, including computing power, network resource, dedicated hardware, etc. The situation is further exacerbated by the stringent quality-of-service (QoS) requirements of many IoT applications, such as delay, bandwidth, security, reliability, and more. This mismatch in resources and demands has greatly hindered the …
- Contributors
- Yu, Ruozhou, Xue, Guoliang, Huang, Dijiang, et al.
- Created Date
- 2019
There are many applications where the truth is unknown. The truth values are guessed by different sources. The values of different properties can be obtained from various sources. These will lead to the disagreement in sources. An important task is to obtain the truth from these sometimes contradictory sources. In the extension of computing the truth, the reliability of sources needs to be computed. There are models which compute the precision values. In those earlier models Banerjee et al. (2005) Dong and Naumann (2009) Kasneci et al. (2011) Li et al. (2012) Marian and Wu (2011) Zhao and Han (2012) …
- Contributors
- Jain, Karan, Xue, Guoliang, Sen, Arunabha, et al.
- Created Date
- 2019
Energy management system (EMS) is at the heart of the operation and control of a modern electrical grid. Because of economic, safety, and security reasons, access to industrial grade EMS and real-world power system data is extremely limited. Therefore, the ability to simulate an EMS is invaluable in researching the EMS in normal and anomalous operating conditions. I first lay the groundwork for a basic EMS loop simulation in modern power grids and review a class of cybersecurity threats called false data injection (FDI) attacks. Then I propose a software architecture as the basis of software simulation of the EMS …
- Contributors
- Khodadadeh, Roozbeh, Sankar, Lalitha, Xue, Guoliang, et al.
- Created Date
- 2019
In the realm of network science, many topics can be abstracted as graph problems, such as routing, connectivity enhancement, resource/frequency allocation and so on. Though most of them are NP-hard to solve, heuristics as well as approximation algorithms are proposed to achieve reasonably good results. Accordingly, this dissertation studies graph related problems encountered in real applications. Two problems studied in this dissertation are derived from wireless network, two more problems studied are under scenarios of FIWI and optical network, one more problem is in Radio- Frequency Identification (RFID) domain and the last problem is inspired by satellite deployment. The objective …
- Contributors
- Zhou, Chenyang, Richa, Andrea, Sen, Arunabha, et al.
- Created Date
- 2019
Models using feature interactions have been applied successfully in many areas such as biomedical analysis, recommender systems. The popularity of using feature interactions mainly lies in (1) they are able to capture the nonlinearity of the data compared with linear effects and (2) they enjoy great interpretability. In this thesis, I propose a series of formulations using feature interactions for real world problems and develop efficient algorithms for solving them. Specifically, I first propose to directly solve the non-convex formulation of the weak hierarchical Lasso which imposes weak hierarchy on individual features and interactions but can only be approximately solved …
- Contributors
- Liu, Yashu, Ye, Jieping, Xue, Guoliang, et al.
- Created Date
- 2018
Many applications require efficient data routing and dissemination in Delay Tolerant Networks (DTNs) in order to maximize the throughput of data in the network, such as providing healthcare to remote communities, and spreading related information in Mobile Social Networks (MSNs). In this thesis, the feasibility of using boats in the Amazon Delta Riverine region as data mule nodes is investigated and a robust data routing algorithm based on a fountain code approach is designed to ensure fast and timely data delivery considering unpredictable boat delays, break-downs, and high transmission failures. Then, the scenario of providing healthcare in Amazon Delta Region …
- Contributors
- Liu, Mengxue, Richa, Andrea W, Johnson, Thienne, et al.
- Created Date
- 2018
The power and communication networks are highly interdependent and form a part of the critical infrastructure of a country. Similarly, dependencies exist within the networks itself. Owing to cascading failures, interdependent and intradependent networks are extremely susceptible to widespread vulnerabilities. In recent times the research community has shown significant interest in modeling to capture these dependencies. However, many of them are simplistic in nature which limits their applicability to real world systems. This dissertation presents a Boolean logic based model termed as Implicative Interdependency Model (IIM) to capture the complex dependencies and cascading failures resulting from an initial failure of …
- Contributors
- Banerjee, Joydeep, Sen, Arunabha, Dasgupta, Partha, et al.
- Created Date
- 2017
Major Depression, clinically called Major Depressive Disorder, is a mood disorder that affects about one eighth of population in US and is projected to be the second leading cause of disability in the world by the year 2020. Recent advances in biotechnology have enabled us to collect a great variety of data which could potentially offer us a deeper understanding of the disorder as well as advancing personalized medicine. This dissertation focuses on developing methods for three different aspects of predictive analytics related to the disorder: automatic diagnosis, prognosis, and prediction of long-term treatment outcome. The data used for each …
- Contributors
- Nie, Zhi, Ye, Jieping, He, Jingrui, et al.
- Created Date
- 2017
Imagine that we have a piece of matter that can change its physical properties like its shape, density, conductivity, or color in a programmable fashion based on either user input or autonomous sensing. This is the vision behind what is commonly known as programmable matter. Envisioning systems of nano-sensors devices, programmable matter consists of systems of simple computational elements, called particles, that can establish and release bonds, compute, and can actively move in a self-organized way. In this dissertation the feasibility of solving fundamental problems relevant for programmable matter is investigated. As a model for such self-organizing particle systems (SOPS), …
- Contributors
- Derakhshandeh, Zahra, Richa, Andrea, Sen, Arunabha, et al.
- Created Date
- 2017