Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
I/O services provided by general-purpose operating systems and commodity hardware are designed for achieving high average-case performance without worrying about timing constraints. A common trend is to use such components to build...
As the world is moving towards exascale computing, interconnect networks are becoming more and more important because of their omnipresent use in high performance computing systems and in large scale data centers. The performance of an...
The demand for high performance wireless networks and systems have become increasingly high over the last decade. This dissertation addresses three systems that were designed to improving the efficiency, reliability and security of...
This thesis studies the 1-center problem on road networks, an important problem in GIS. Using Euclidean embeddings, and reduction to fast nearest neighbor search, an approximation algorithm is devised for this problem. On real world data...
Level-one data cache (L1 DC) accesses impact energy usage as they frequently occur and use signif icantly more energy than register file accesses. Modern processors use virtually-indexed, physically tagged caches to reduce the L1 DC...
The computer architecture community relies on standard benchmark suites like MiBench, NAS, PARSEC, SPEC CPU2006 (SPEC)®, and SPLASH to study different hardware designs, but such suites are insufficient for evaluating mobile platforms...
Universal Global Adaptive routing (UGAL) is a common routing scheme used in systems based on the Dragonfly interconnect topology. UGAL uses information about local link-loads to make adaptive routing decisions. Traffic Pattern-based...
The Prisoners' Problem can be stated as follows: Two prisoners, Alice and Bob, want to communicate a secret escape plan under the surveillance of a warden, Wendy. To be indiscernible, the communication must appear to Wendy to be `...
The most common method of preventing unauthorized access to digital information is through the use of a password-based authentication system. The strength of a password-based authentication system relies on a humans ability to generate a...
Mobile computing is the new norm. As people feel increasingly comfortable computing in public places such as coffee shops and transportation hubs, the threat of exposing sensitive information increases. While solutions exist to guard the...
As the gap between CPU speed and memory speed widens, it is appropriate to investigate alternative storage systems. One approach is to use a large data register file. Registers, in general, offer several advantages when accessing data, ...
In addition to requiring routing to be dead-lock free and deterministic, Infiniband networks adopt destination based routing, which further complicates the routing design by putting additional constraints on the paths that can be...
Compromised machines are one of the key security threats on the Internet; they are often used to launch various security attacks such as DDoS, spamming, and identity theft. In this thesis we address this issue by investigating effective...
This research presents several important developments in pattern classification using fuzzy neural networks and BK-Square products and presents extensions to max-min fuzzy neural network research. In this research, the max and min...
Mobile Ad Hoc Networks (MANETs) are a collection of wireless mobile nodes with links that are made and broken arbitrarily. They have limited resources in power, computation, broadcast range, and a dynamic topology with no fixed...
This dissertation addresses the creation of a unique, adaptable, and light-weight core methodology to address the problem of Soft Error Modeling and Simulation. This core methodology was successfully tailored, validated, and expanded to...
Monte Carlo applications are widely perceived as computationally intensive but naturally parallel. Therefore, they can be effectively executed on the grid using the dynamic bag-of-work model. We improve the efficiency of the subtask...
This paper will discuss the development of a music classification system as a component in a music recommendation system. The front-end portion of the system is an Android Media Player application named SmartPlayer. The player is an...
The computing power on the leadership-class supercomputers has been growing exponentially over the past few decades, and is projected to reach exascale in the near future. This trend, however, will continue to push forward the peak I/O...
Recent advances in multicasting present new opportunities for improving communication performance for clusters of workstations. The standard IP multicast, however, only supports unreliable multicast, which is diffcult to use for building...
Recently, the prevalence of WiFi devices and ubiquitous coverage of WiFi network provide us the opportunity to extend WiFi capabilities beyond communication, particularly in sensing the physical environment. Most existing systems that...
Random number generators have been studied and used for decades, and various kinds of generators have been proposed and improved to fit different types of problems. Better generators fit the problem tightly and utilize the architecture...
The computing capabilities of the high performance computing systems have increased manyfold over the span of years following Moores law and have achieved petascale recently. Following the trend, the computation cababilities are expected...
There are a wide variety of clustering and optimization algorithms which work in vector spaces, but relatively fewer that work on graphs. An algorithm to embed road network metrics into vector spaces is presented in this document, which...
Anonymous networks play a critical role in supporting free speech and user privacy on the Internet. Over the years, many fundamental algorithms and schemes have been proposed to facilitate the development of anonymous networks, including...
In this paper we show that botnets and specifically peer-to-peer botnets, pose a considerable threat to our national security. We examine the rise of the botnet threat and the technology that makes this threat possible. We also examine...
Mobile agent systems provide a new method for computer communication. A mobile agent can migrate from platform to platform, performing a task or computation for its originator. Mobile agents are a promising new technology; however, there...
Thesis abstract With the continuous expansion of the Big Data universe, researchers have been relentlessly searching for ways to improve the efficiency of big data services, including data analytics and data infrastructures. In the...
This thesis describes two algorithms for face detection that rely on a generic feature representation called spectral histogram representation. The sufficiency and generalization of this representation is demonstrated through a...
Fuzzy relational calculi based on BK products of relations have representational and computational means for handling both concrete numerical representations of relations and symbolic manipulation of relations. BK calculus of relations...
Diffusion Monte Carlo is the most popular Quantum Monte Carlo method used for obtaining accurate results. Unlike with simpler Monte Carlo techniques, load imbalance can be a significant factor affecting its performance on massively...
In today's world, data information, exchange, and processing are sustenance to corporations, organizations, and government agencies. Communications networks are relied upon to meet the computing needs of such organizations. These groups...
A significant percentage of execution cycles are devoted to performing conditional transfers of control, which occur frequently, cause pipeline flushes when mis-predicted and can prevent other code improving transformations from being...
We have considered the problem of tracking and recognition using a three dimensional representation of human faces. First we present a review of the research in the tracking and recognition fields including a list of several commercially...
Efficient implementations of the Discrete Fourier Transform (DFT) for GPUs provide good performance with large data sizes, but are not competitive with CPU code for small data sizes. On the other hand, several applications require the...
Simulation software is used in a multitude of industry and academic fields, in an assortment of scopes. One might be interested in gravitation of celestial bodies, or field structures of molecular interactions. The scale to which these...
Closed domain question answering (QA) systems achieve precision and recall at the cost of complex language processing techniques to parse the answer corpus. We propose a query-based model for indexing answers in a closed domain factoid...
Clusters of Symmetric Multiprocessing (SMP) nodes with multi-core Chip Multiprocessors (CMP), also known as SMP-CMP clusters, are ubiquitous today. Message Passing Interface (MPI) is the de facto standard for developing message passing...
Pseudorandom number generators (PRNGs) are an essential tool in many areas, including simulation studies of stochastic processes, modeling, randomized algorithms, and games. The performance of any PRNGs depends on the quality of the...
In wireless LANs, a packet may be received correctly for the most part but contains only a few errors. Such packets are usually referred to as partial packets. The current 802.11 standard will retransmit the entire packet even if the...
In this dissertation we design a system that allows Semantic Web agents to reason within what has come to be known as the Web of Trust. We integrated reasoning about belief and trust, so agents can reason about information from different...
A specialized variation of associations for biodiversity data is defined and developed that makes the capture and discovery of information about biological images easier and more efficient. Biodiversity is the study of the diversity of...
The ART executes apps in the Dalvik VM. The Dalvik VM creates a Zygote instance when the device first boots which is responsible for sharing Android runtime libraries to new applications. New apps rely heavily on external libraries in...
This research examines the development of a system architecture for collaborative learning that combines feedback, group awareness, and chat in the form of both textual and auditory input. The goals are to evaluate the capability of...
Near point problems are widely used in computational geometry as well as a variety of other scientific fields. This work examines four common near point problems and presents original algorithms that solve them. Planar nearest neighbor...
Energy efficiency is an important design consideration in nearly all classes of processors, but is of particular importance to mobile and embedded systems. The data cache accounts for a significant portion of processor power. We have...
The Internet provides a general communication environment for distributed resource sharing. XML has become a key technology for information representation and exchange on the Internet, increasing the opportunity for integration of the...
Most algorithms for Group Key distribution were not created with ad hoc networks in mind. In a wired network with a distinct infrastructure, generating a key distribution algorithm is based on a static environment and, therefore, more...
Wireless networks have been widely adopted in homes, offices and public hot spots. Two problems with wireless networks are the limited range and unavoidable packet loss. Much effort has been investigated in these problems, such as packet...
This research explores the idea of extracting three-dimensional features from video clips, in order to aid various video analysis and mining tasks. Although video analysis problems are well-established in the literature, the use of three...
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.