Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Digital signatures are essential to Internet applications and more generally electronic commerce. However, they are subject to various attacks that lend them impractical for some legal applications. In this thesis we consider...
There has been a great deal of research devoted to computer vision related assistive technologies. Unfortunately, this area of research has not produced many usable solutions. The long cane and the guard dog are still far more useful...
Memory hungry applications consistently keep their memory requirement curves ahead of the growth of DRAM capacity in modern computer systems. Such applications quickly start paging to swap space on the local disk, which brings down their...
Three dimensional scalar heightfields, also known as volumetric datasets, abound in science and medicine. Viewing the isosurfaces, or level sets, is one of the two main ways to display these datasets, the other being volume visualization...
Wireless mesh network is usually used to provide Internet access to communities or citywide. Opportunistic Routing (OR) exploits overheard packets in a wireless network and has been proven to be effective for wireless mesh networks....
Every day, computer software becomes more important for the functioning of the world. The expectation causes increasing code size and complex logic. These factors unavoidably lead to more and more vulnerabilities, many of which can be...
Vector-borne diseases account for more than 17% of infectious diseases, causing more than 1 million deaths annually from malaria, dengue fever, yellow fever, etc. Diseases once thought to be controlled, have experienced a resurgence. For...
Since the explosion of computer systems and computer networks within the past decade, e-commerce, online banking, and other "internet" oriented applications have risen exponentially. According to Forrester Research Group, online shopping...
Software systems contain an immense amount of information captured in a variety of documents such as source code files, user documentation, use and test cases, bug reports, and system requirements among others. Relationships between...
With the recent advances in using nonlocal approaches to approximate traditional partial differential equations(PDEs), a number of new research avenues have been opened that warrant further study. One such path, that has yet to be...
This thesis describes the implementation of a fast, dynamic, approximate, nearest-neighbor search algorithm that works well in fixed dimensions (d The implementation is competitive with the best approximate nearest neighbor searching...
Applications in embedded systems often need to meet specified timing constraints. It is advantageous to not only calculate the Worst-Case Execution Time (WCET) of an application, but to also perform transformations that attempt to reduce...
The enormous growth in wireless communications and miniaturized handheld devices in the last few years, have given rise to a vast range of new services for heterogeneous user environments. The concept of a Peer-to-Peer (P2P) Grid has...
Performance counters are becoming more complex as multi-core systems are becoming more wide spread. Consequently, evaluating these counters has become more complex as well. We propose providing hardware that monitors performance counters...
This thesis develops and studies a traffic-aware inter-domain routing (TIDR) protocol, which drastically improves the convergence and stability of the BGP-based inter-domain routing system. TIDR is designed based on two important...
Graph drawing is widely used in many fields. Good visualization in graph drawing makes it easier for humans to understand the concepts being represented. This thesis deals with what is known as a hierarchical graph and concerns one of...
This work's focus is on the behavior analysis of data in the caching hierarchy. Especially as it pertains to the L1 data cache. Modern caching research often neglects detailed analysis of the current behavior found within the data cache...
This thesis introduces in detail how we apply deep neural networks to solve several natural language processing problems, including Word Sense Disambiguation (WSD), word representation and knowledge-base completion. We apply...
The revolution in next-generation DNA sequencing technologies is leading to explosive data growth in genomics, posing a significant challenge to the computing infrastructure and software algorithms for genomics analysis. Various big data...
The unique physical properties of nanoparticles depend on their sizes and shapes. Therefore, an ability to precisely control the size of nanoparticles and tune their morphology will allow scientists and engineers to modify their physical...
The rapidly expanding capabilities of modern smartphones now enable the creation of new classes of applications for health, wellness, and entertainment. Data collected from on-board sensors, web services, social media and external...
Mobile ad hoc networks, or MANETs, are wireless networks that do not depend on a fixed infrastructure. The wide array of uses for ad hoc networks creates many different levels of security requirements. This work begins by exploring...
This dissertation presents contributions to several problems relevant to cyber physical system (CPS) vulnerability research. Cyber physical systems encompass any computational systems that interact with physical processes, encompassing...
At its heart, a password cracking attack is just a guessing attack. An attacker makes guesses about a user's password until they guess correctly or they give up. While the defender may limit the number of guesses an attacker is allowed, ...
IP Networks have become an integral part of our daily lives. As we become more dependent on this technology, we realize the importance and use of networks that can be configured to cater to various classes of services and users. Given...
Modern science and technology have witnessed in the past decade a proliferation of complex data that can be naturally modeled and interpreted as graphs. In real-world networked applications, the underlying graphs oftentimes exhibit...
In this thesis we adapt the concept of visual cryptography to digital projectors as opposed to over-head projectors. Digital projectors are used to project the images from the computer monitor, whereas over-head projectors display the...
Distributed real-time multiplayer games are played over a network among a set of players competing against each other and/or against Artificial Intelligence (AI). A latency hiding and bandwidth reduction technique known as 'Dead...
The number and type of digital devices are increasing tremendously in today's world. However, as the code size soars, the hidden vulnerabilities become a major threat to user security and privacy. Vulnerability mitigation, detection, and...
One of the goals of biology is to be able to understand the structure and interaction of macromolecules, to be able to better understand life at a macromolecular level. One of the most important inventions that revolutionized the study...
In this dissertation, I present a table-driven streaming XML (Extensible Markup Language) parsing and searching technique, called TDX, and investigate related techniques. TDX expedites XML parsing, validation and searching by pre...
Processors that employ instruction fusion can improve performance and energy usage beyond traditional processors by collapsing and simultaneously executing dependent instruction chains on the critical path. This paper describes compiler...
Collaborative filtering is a class of methods that analyze past user feedback to find relationship among users and items, or to predict a relationship between a user and a new item. Predicting user preferences is an important problem...
Existing wireless ad hoc routing protocols, such as DSDV, AODV, DSR, TORA and GPSR, rely heavily upon the use of a large number of control messages to build and maintain routes between communicating mobile end-points. In this thesis, we...
Due to the wide use of collective operations in Message Passing Interface (MPI) applications, developing efficient collective communication routines is essential. Despite numerous research efforts for optimizing MPI collective operations...
Intrusion Detection has become an essential component of security mechanisms for information systems. Traditional Intrusion Detection Systems generally apply a single detection model and data source. Thus, they tend to suffer from large...
Quasi-Monte Carlo methods are a variant of ordinary Monte Carlo methods that employ highly uniform quasirandom numbers in place of Monte Carlo's pseudorandom numbers. Monte Carlo methods offer statistical error estimates; however, while...
Though there are many feature selection methods for learning, they might not scale well to very large datasets, such as those generated in computer vision data. Furthermore, it can be beneficial to capture and model the variability...
In numerous applications involving high dimensional data, certain subspace techniques such as principal components analysis (PCA) may be utilized in feature extraction. Often, PCA can reduce the dimensionality while retaining most of the...
Interaction design patterns provide best-practice solutions to software user interface design problems. Several interaction design pattern collections have been published, but none of them address the details of interaction for software...
This dissertation is centered on indexing, searching, and mining methods for large-scale and high-dimensional visual data. While the processing to such data has been widely acknowledged to be difficult, the problem becomes more serious...
Coordinating storage components across abstraction layers has demonstrated significant performance gains. However, when applied near the physical storage, this approach relies on exposing and exploiting low-level hardware characteristics...
Finite element methods are a common tool to solve problems in computational fluid dynamics (CFD). This thesis explores the finite element package deal.ii and specific applications to incompressible CFD. Some notation and results from...
Internet fault diagnosis has attracted much attention in recent years. In this paper, we focus on the problem of finding the Link Pass Ratios (LPRs) when the Path Pass Ratios (PPRs) of a set of paths are given. Usually, given the PPRs of...
Research concerning optimization of reuse of software assets developed and consumed within large software enterprises is prevalent within academia and industry. Comparatively few research efforts have been devoted to exploring asset...
Modern day high performance computing (HPC) clusters and data centers require a large number of computing and storage elements to be interconnected. Interconnect performance is considered a major bottleneck to the overall performance of...
The nature of embedded systems development places a great deal of importance on meeting strict requirements in areas such as static code size, power consumption, and execution time. Due to this, embedded developers frequently generate...
A new generation of mobile applications requires reduced energy consumption without sacrificing execution performance. A common approach for improving performance of processors is instruction pipelining. The way pipelining is...
This thesis presents and evaluates a particular algorithm used for the real time computations of time dependent ordinary and partial differential equations which employs a parallelization strategy over the temporal domain. We also...
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.