Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Every day, computer software becomes more important for the functioning of the world. The expectation causes increasing code size and complex logic. These factors unavoidably lead to more and more vulnerabilities, many of which can be...
Vector-borne diseases account for more than 17% of infectious diseases, causing more than 1 million deaths annually from malaria, dengue fever, yellow fever, etc. Diseases once thought to be controlled, have experienced a resurgence. For...
Phishing scams which use emails to trick users into revealing personal data have become pandemic in the world. Analyzing such emails to extract maximum information about them and make intelligent forensic decisions based on such an...
Since the explosion of computer systems and computer networks within the past decade, e-commerce, online banking, and other "internet" oriented applications have risen exponentially. According to Forrester Research Group, online shopping...
Software systems contain an immense amount of information captured in a variety of documents such as source code files, user documentation, use and test cases, bug reports, and system requirements among others. Relationships between...
This thesis describes the implementation of a fast, dynamic, approximate, nearest-neighbor search algorithm that works well in fixed dimensions (d The implementation is competitive with the best approximate nearest neighbor searching...
Applications in embedded systems often need to meet specified timing constraints. It is advantageous to not only calculate the Worst-Case Execution Time (WCET) of an application, but to also perform transformations that attempt to reduce...
The enormous growth in wireless communications and miniaturized handheld devices in the last few years, have given rise to a vast range of new services for heterogeneous user environments. The concept of a Peer-to-Peer (P2P) Grid has...
Performance counters are becoming more complex as multi-core systems are becoming more wide spread. Consequently, evaluating these counters has become more complex as well. We propose providing hardware that monitors performance counters...
This thesis develops and studies a traffic-aware inter-domain routing (TIDR) protocol, which drastically improves the convergence and stability of the BGP-based inter-domain routing system. TIDR is designed based on two important...
Graph drawing is widely used in many fields. Good visualization in graph drawing makes it easier for humans to understand the concepts being represented. This thesis deals with what is known as a hierarchical graph and concerns one of...
This work's focus is on the behavior analysis of data in the caching hierarchy. Especially as it pertains to the L1 data cache. Modern caching research often neglects detailed analysis of the current behavior found within the data cache...
The revolution in next-generation DNA sequencing technologies is leading to explosive data growth in genomics, posing a significant challenge to the computing infrastructure and software algorithms for genomics analysis. Various big data...
The rapidly expanding capabilities of modern smartphones now enable the creation of new classes of applications for health, wellness, and entertainment. Data collected from on-board sensors, web services, social media and external...
Mobile ad hoc networks, or MANETs, are wireless networks that do not depend on a fixed infrastructure. The wide array of uses for ad hoc networks creates many different levels of security requirements. This work begins by exploring...
This dissertation presents contributions to several problems relevant to cyber physical system (CPS) vulnerability research. Cyber physical systems encompass any computational systems that interact with physical processes, encompassing...
At its heart, a password cracking attack is just a guessing attack. An attacker makes guesses about a user's password until they guess correctly or they give up. While the defender may limit the number of guesses an attacker is allowed, ...
IP Networks have become an integral part of our daily lives. As we become more dependent on this technology, we realize the importance and use of networks that can be configured to cater to various classes of services and users. Given...
Modern science and technology have witnessed in the past decade a proliferation of complex data that can be naturally modeled and interpreted as graphs. In real-world networked applications, the underlying graphs oftentimes exhibit...
In this thesis we adapt the concept of visual cryptography to digital projectors as opposed to over-head projectors. Digital projectors are used to project the images from the computer monitor, whereas over-head projectors display the...
Distributed real-time multiplayer games are played over a network among a set of players competing against each other and/or against Artificial Intelligence (AI). A latency hiding and bandwidth reduction technique known as 'Dead...
The number and type of digital devices are increasing tremendously in today's world. However, as the code size soars, the hidden vulnerabilities become a major threat to user security and privacy. Vulnerability mitigation, detection, and...
One of the goals of biology is to be able to understand the structure and interaction of macromolecules, to be able to better understand life at a macromolecular level. One of the most important inventions that revolutionized the study...
In this dissertation, I present a table-driven streaming XML (Extensible Markup Language) parsing and searching technique, called TDX, and investigate related techniques. TDX expedites XML parsing, validation and searching by pre...
Processors that employ instruction fusion can improve performance and energy usage beyond traditional processors by collapsing and simultaneously executing dependent instruction chains on the critical path. This paper describes compiler...
Collaborative filtering is a class of methods that analyze past user feedback to find relationship among users and items, or to predict a relationship between a user and a new item. Predicting user preferences is an important problem...
Existing wireless ad hoc routing protocols, such as DSDV, AODV, DSR, TORA and GPSR, rely heavily upon the use of a large number of control messages to build and maintain routes between communicating mobile end-points. In this thesis, we...
Due to the wide use of collective operations in Message Passing Interface (MPI) applications, developing efficient collective communication routines is essential. Despite numerous research efforts for optimizing MPI collective operations...
Intrusion Detection has become an essential component of security mechanisms for information systems. Traditional Intrusion Detection Systems generally apply a single detection model and data source. Thus, they tend to suffer from large...
Quasi-Monte Carlo methods are a variant of ordinary Monte Carlo methods that employ highly uniform quasirandom numbers in place of Monte Carlo's pseudorandom numbers. Monte Carlo methods offer statistical error estimates; however, while...
Interaction design patterns provide best-practice solutions to software user interface design problems. Several interaction design pattern collections have been published, but none of them address the details of interaction for software...
This dissertation is centered on indexing, searching, and mining methods for large-scale and high-dimensional visual data. While the processing to such data has been widely acknowledged to be difficult, the problem becomes more serious...
Coordinating storage components across abstraction layers has demonstrated significant performance gains. However, when applied near the physical storage, this approach relies on exposing and exploiting low-level hardware characteristics...
Internet fault diagnosis has attracted much attention in recent years. In this paper, we focus on the problem of finding the Link Pass Ratios (LPRs) when the Path Pass Ratios (PPRs) of a set of paths are given. Usually, given the PPRs of...
Research concerning optimization of reuse of software assets developed and consumed within large software enterprises is prevalent within academia and industry. Comparatively few research efforts have been devoted to exploring asset...
Modern day high performance computing (HPC) clusters and data centers require a large number of computing and storage elements to be interconnected. Interconnect performance is considered a major bottleneck to the overall performance of...
The nature of embedded systems development places a great deal of importance on meeting strict requirements in areas such as static code size, power consumption, and execution time. Due to this, embedded developers frequently generate...
A new generation of mobile applications requires reduced energy consumption without sacrificing execution performance. A common approach for improving performance of processors is instruction pipelining. The way pipelining is...
This thesis presents the Scalable Parallel Random Number Generators Library (SPRNG) version 4.0. SPRNG is a widely used software package for both serial and parallel pseudorandom number generation. Its generators satisfy every known...
In this dissertation, I explore different types of applications in the area of applied machine learning, time series analysis, and prediction. Time series forecasting is a fundamental task in machine learning and data mining. It is an...
The fast increasing length of random number streams, the application of more powerful cores and emerging various Random Number Generators (RNGs) lead to a revolution from traditional RNGs. The authentic RNGs are mainly based on the...
Alzheimer's disease (AD) is one of the top 10 leading causes of death in the US; it debilitates memory and impairs cognition. The current core clinical criteria for diagnosis of AD are based on functional deficits and cognitive...
Metadata is an important aspect in learning resource discovery, reuse of learning resources, within-collection organization of learning resources, retrieval of non-textual media, and interoperability among learning resources. This paper...
Since 2008, the Android ecosystem has been tremendously popular with consumers, developers, and manufacturers due to the open nature of the operating system and its compatibility and availability on a range of devices. This, however, ...
Pattern recognition is fundamental to a variety of significant applications that includes but is not limited to medical diagnoses, speech recognition, and object recognition. The increased security concerns in the aftermath of the 9/11...
The most common approaches to analyzing algorithms are worst-case analysis, average-case analysis, and experimental analysis. In most cases, until recently, experimental analysis has not been given priority. The theoretical computer...
Mobility models, or the mobility patterns used to simulate the motion of participating nodes, play a vital role in the simulation of Vehicular Ad Hoc Networks (VANET). Even with recent research focusing on development of mobility models...
In many pattern classification problems, efficiently learning a suitable low-dimensional representation of high dimensional data is essential. The advantages of linear dimension reduction methods are their simplicity and efficiency....
This dissertation is concerned with efficient compilation of our Java-based, high- performance, library-oriented, SPMD style, data parallel programming language: HPJava. It starts with some historical review of data-parallel languages...
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.