Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
The research goal of this dissertation is to point the way towards a better understanding for the hidden complexities of knowledge communication and content markup, with a view to cleaner, more principled designs. The following four...
Since the growth of electronic voting systems in the United States after the year 2000, electronic voting products have received significant scrutiny and examination. Subsequently, studies and reports have identified vulnerabilities as...
Research into routing protocol development for mobile ad hoc networks has been a significant undertaking since the late 1990's. Secure routing protocols for mobile ad hoc networks provide the necessary functionality for proper network...
Similarity join has been widely studied and used in various scientific and commercial applications. Given two datasets, similarity join finds all pairs of similar objects (one from each input dataset), subject to a distance metric and a...
Python Package Index (PyPI) is a repository that hosts all the packages ever developed for the Python community. It hosts thousands of packages from different developers and for the Python community, it is the primary source for...
Teachers are expected to plan the daily learning environment in the classroom, and incorporate technology effectively in the curriculum and instruction. They need to provide information to parents and educational materials to students in...
Soft Computing is the fusion of methodologies that were designed to model and enable solutions to real world problems, which are not modeled, or too difficult to model, mathematically. These problems are typically associated with fuzzy, ...
Message Passing Interface (MPI) is broadly used in parallel applications. As High Performance Computing (HPC) systems become massively parallel, the efficiency of communication among processes has become more critical. Since the birth of...
Managing the effects of changing requirements remains one of the greatest challenges of enterprise software development. The iterative and incremental model provides an expedient framework for addressing such concerns. This thesis...
Over the years, the storage substrate of operating systems has evolved with changing storage devices and workloads [2, 6, 7, 8, 12, 15, 18, 26, 29, 33, 34, 35, 39, 41, 42, 44, 47, 48, 54]. Both academia and industry have devoted...
Biological databases are growing at an exponential rate. Designing algorithms to deal with the inherent redundancy in these databases which can cope with the overwhelming amount of data returned from similarity searches is an active area...
Neural network based word embeddings have demonstrated outstanding results in a variety of tasks, and become a standard input for Natural Language Processing (NLP) related deep learning methods. Despite these representations are able to...
Many of today's underwater vehicles have a limited set of pre-planned behaviors that are of varying utility. This is due, in part, to very low underwater communication rates and difficulties observing the vehicle's underwater behavior...
The objective of my doctoral dissertation research is to formulate, implement, and validate metrics and techniques towards perceiving some of the influences on software development, predicting the impact of user initiated changes on a...
Computational simulation is expected to play a vital role in the nanotechnology revolution. Molecular dynamics (MD) has been used traditionally by physicists and chemists to predict physical and chemical properties of small atomic...
The dissertation research is concerned with enabling parallel, high-performance computationâ in particular development of scientific software in the network-aware programming language, Java. Traditionally, this kind of computing was...
This thesis presents the Sampling-Based Model Predictive Control (SBMPC) Algorithm, a novel sampling-based planning algorithm. This algorithm was originally designed for dynamic system which are described by a set of system states and a...
Phishing scams have grown in frequency and developed in sophistication, and in recent years emails have been misused by scammers to frequently launch criminal attacks. By using phishing emails, scammers can make money in a very short...
Protein is a linear chain of amino acids bonded by peptide bonds. Protein plays a vital role in almost every biological process. For most proteins, they need to fold into a stable 3D structure (native state) in order to function properly...
Topology Aggregation is concerned about summarizing a network domain in a concise manner. This thesis deals with topology aggregation for networks with two additive metrics. Summarizing such a network domain is difficult for a number of...
The performance of a content-based image retrieval system depends on the representation of images. As a typical image consists of different objects, an image segmentation is needed for more accurate representations of contents. The first...
In this dissertation a unified compiler framework for program analysis, optimization, and automatic vectorization with techniques based on the Chains of Recurrences (CR) algebra is proposed. The root theoretical foundations of the CR...
As we reach the limits of single-core computing, we are promised more and more cores in our systems. Modern architectures include many performance counters per core, but few or no inter-core counters. In fact, performance counters were...
The phase ordering problem has been a long-standing problem in compiler optimizations. Different orderings of applying optimization phases by a compiler can result in different code generated, with potentially significant performance...
Many scientific problems are posed as Ordinary differential Equations (ODEs). A large subset of these are initial value problems, which are typically solved numerically. The solution starts by using a known state-space of the ODE system...
Statically pipelined processors offer a new way to improve the performance beyond that of a traditional in-order pipeline while simultaneously reducing energy usage by enabling the compiler to control more fine-grained details of the...
High performance computing(HPC) and data center systems have undergone rapid growth in recent years. To meet the current and future demand of compute- and data-intensive applications, these systems require the integration of a large...
Temporal and spatial localities are basic concepts in operating systems, and storage systems rely on localities to perform well. Surprisingly, it is difficult to quantify the localities present in workloads and how localities are...
This thesis presents and evaluates a generic algorithm for incrementally computing the dominant singular subspaces of a matrix. The relationship between the generality of the results and the necessary computation is explored. The...
Selection of a suitable Ph.D. supervisor is a very important step in a student's career. This dissertation presents a multi-criteria decision support system to assist students in making this choice. The system employs a hybrid method...
Digital image steganography is the art and science of hidden information. Currently, steganographic (stego) algorithms are rapidly evolving and reducing their artifacts. There-fore, detecting of altered cover images, i.e. steganalysis, ...
Software tools designed for disk analysis play a critical role today in digital forensics investigations. However, these digital forensics tools are often difficult to use, usually task specific, and generally require professionally...
An Analysis of the Secure Routing Protocol for Mobile Ad Hoc Network Route Discovery: Using Intuitive Reasoning and Formal Verification to Identify Flaws
With this work we analyze the Secure Routing Protocol (SRP) proposed by Papadimitratos and Haas as a means for securing source-driven route discovery in ad hoc networks. We discuss aws in SRP's design and expose SRP's shortcomings with...
Adversarial yet interacting interdependent relationships in information sharing and service provisioning have been a pressing issue of the Internet. Such relationships exist among autonomous software agents, in networking system peers, ...
We present two tools that utilize the end-to-end approach for topology discovery for Ethernet switched LANs. Unlike existing Ethernet topology discovery methods that rely on Simple Network Management Protocol (SNMP) queries to obtain...
The current Internet architecture reveals its chronic limitations against the new paradigms of networking. The advancement of technology has changed the network use from communication to content distribution. Unfortunately, the IP-based...
The problems inherent to providing security for network systems are relative to the openness and design of network architecture. Typically network security is achieved through the use of monitoring tools based on pattern recognition or...
The main task of a Lexical Analyzer such as Lex [20], Flex [26] and RE/Flex [34], is to perform tokenization of a given input file within reasonable time and with limited storage requirements. Hence, most lexical analyzers use...
The Distributed Oceanographic Match-Up Service (DOMS) currently under development is a centralized service that allows researchers to easily match in situ and satellite oceanographic data from distributed sources to facilitate satellite...
Recent surveys have shown that over 6.8 billion mobile phones are in use today where roughly 50% are running the Android Operating System. This large population of devices can be utilized for message-passing interface (MPI) computing....
The purpose of this project is to create MATLAB applications that use the capabilities of the World Wide Web to send data to a remote server for computation and to display the results in on a local MATLAB® application. The data is sent...
Routing in mobile ad hoc networks presents many challenging problems not faced when routing in static networks with infrastructure. While much research has been done in this area, there is still much progress left to make before routing...
InfiniBand is the de facto networking technology for commodity HPC clusters and has been widely deployed. However, most production large-scale InfiniBand clusters use simple routing schemes such as the destination-mod-k routing to route...
Sustainability research of the environment depends on accurate land cover information over large areas. Even with the increased number of satellite systems and sensors acquiring data with improved spectral, spatial, radiometric and...
The amount of sensitive data stored on electronic media increases as the use of computers and mobile devices becomes more prevalent. For example, home computers and devices may store financial information (e.g., Quicken files or tax...
DAGDA exposes some of the hidden operations that the hardware uses when performing loads and stores to the compiler to save energy and increase performance. We decouple the micro-operations for loads and stores into two operations: the...
We propose the use of randomized (scrambled) quasirandom sequences for the purpose of providing practical error estimates for quasi-Monte Carlo (QMC) applications. One popular quasirandom sequence among practitioners is the Halton...
The OpenSPARC T1 is a multithreading processor developed and open sourced by Sun Microsystems (now Oracle). This paper presents an implementation of the low-power Tagless-Hit Instruction Cache (TH-IC) for the T1, after adapting it to the...
Instant messaging has been and still is a revolutionary technology, bringing people in communication with each other faster and easier. Its characteristic as sending messaging in real-time make it even more appealing than e-mail itself....
This work will examine enhancements to the library for scalable, parallel pseudorandom number generation (SPRNG). SPRNG uses parameterization to produce many streams of random numbers with emphasis on parallel Monte Carlo methods. We...
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.