Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
In today's world, data information, exchange, and processing are sustenance to corporations, organizations, and government agencies. Communications networks are relied upon to meet the computing needs of such organizations. These groups...
A significant percentage of execution cycles are devoted to performing conditional transfers of control, which occur frequently, cause pipeline flushes when mis-predicted and can prevent other code improving transformations from being...
We have considered the problem of tracking and recognition using a three dimensional representation of human faces. First we present a review of the research in the tracking and recognition fields including a list of several commercially...
Efficient implementations of the Discrete Fourier Transform (DFT) for GPUs provide good performance with large data sizes, but are not competitive with CPU code for small data sizes. On the other hand, several applications require the...
Simulation software is used in a multitude of industry and academic fields, in an assortment of scopes. One might be interested in gravitation of celestial bodies, or field structures of molecular interactions. The scale to which these...
Closed domain question answering (QA) systems achieve precision and recall at the cost of complex language processing techniques to parse the answer corpus. We propose a query-based model for indexing answers in a closed domain factoid...
As the rise in availability of natural language data, the underlying language structures can be better learned and play the important roles in many natural language processing tasks. Although the neural language representation models...
Clusters of Symmetric Multiprocessing (SMP) nodes with multi-core Chip Multiprocessors (CMP), also known as SMP-CMP clusters, are ubiquitous today. Message Passing Interface (MPI) is the de facto standard for developing message passing...
Pseudorandom number generators (PRNGs) are an essential tool in many areas, including simulation studies of stochastic processes, modeling, randomized algorithms, and games. The performance of any PRNGs depends on the quality of the...
In wireless LANs, a packet may be received correctly for the most part but contains only a few errors. Such packets are usually referred to as partial packets. The current 802.11 standard will retransmit the entire packet even if the...
In this dissertation we design a system that allows Semantic Web agents to reason within what has come to be known as the Web of Trust. We integrated reasoning about belief and trust, so agents can reason about information from different...
A specialized variation of associations for biodiversity data is defined and developed that makes the capture and discovery of information about biological images easier and more efficient. Biodiversity is the study of the diversity of...
Over recent years, sensors have increasingly become used to improve the performance of humans. Popular sensors provide a cost efficient way to gather various inputs ranging from temperature to movements to sound. Today, smartphones are...
The ART executes apps in the Dalvik VM. The Dalvik VM creates a Zygote instance when the device first boots which is responsible for sharing Android runtime libraries to new applications. New apps rely heavily on external libraries in...
This research examines the development of a system architecture for collaborative learning that combines feedback, group awareness, and chat in the form of both textual and auditory input. The goals are to evaluate the capability of...
Near point problems are widely used in computational geometry as well as a variety of other scientific fields. This work examines four common near point problems and presents original algorithms that solve them. Planar nearest neighbor...
Energy efficiency is an important design consideration in nearly all classes of processors, but is of particular importance to mobile and embedded systems. The data cache accounts for a significant portion of processor power. We have...
The Internet provides a general communication environment for distributed resource sharing. XML has become a key technology for information representation and exchange on the Internet, increasing the opportunity for integration of the...
Most algorithms for Group Key distribution were not created with ad hoc networks in mind. In a wired network with a distinct infrastructure, generating a key distribution algorithm is based on a static environment and, therefore, more...
Wireless networks have been widely adopted in homes, offices and public hot spots. Two problems with wireless networks are the limited range and unavoidable packet loss. Much effort has been investigated in these problems, such as packet...
As distance learning becomes increasingly prevalent in higher education in the 21st century, students and educators alike face new challenges to achieving key learning objectives, such as the attainment of critical thinking skills....
This research explores the idea of extracting three-dimensional features from video clips, in order to aid various video analysis and mining tasks. Although video analysis problems are well-established in the literature, the use of three...
The research goal of this dissertation is to point the way towards a better understanding for the hidden complexities of knowledge communication and content markup, with a view to cleaner, more principled designs. The following four...
Since the growth of electronic voting systems in the United States after the year 2000, electronic voting products have received significant scrutiny and examination. Subsequently, studies and reports have identified vulnerabilities as...
Research into routing protocol development for mobile ad hoc networks has been a significant undertaking since the late 1990's. Secure routing protocols for mobile ad hoc networks provide the necessary functionality for proper network...
Similarity join has been widely studied and used in various scientific and commercial applications. Given two datasets, similarity join finds all pairs of similar objects (one from each input dataset), subject to a distance metric and a...
Python Package Index (PyPI) is a repository that hosts all the packages ever developed for the Python community. It hosts thousands of packages from different developers and for the Python community, it is the primary source for...
Teachers are expected to plan the daily learning environment in the classroom, and incorporate technology effectively in the curriculum and instruction. They need to provide information to parents and educational materials to students in...
Soft Computing is the fusion of methodologies that were designed to model and enable solutions to real world problems, which are not modeled, or too difficult to model, mathematically. These problems are typically associated with fuzzy, ...
Message Passing Interface (MPI) is broadly used in parallel applications. As High Performance Computing (HPC) systems become massively parallel, the efficiency of communication among processes has become more critical. Since the birth of...
Managing the effects of changing requirements remains one of the greatest challenges of enterprise software development. The iterative and incremental model provides an expedient framework for addressing such concerns. This thesis...
Over the years, the storage substrate of operating systems has evolved with changing storage devices and workloads [2, 6, 7, 8, 12, 15, 18, 26, 29, 33, 34, 35, 39, 41, 42, 44, 47, 48, 54]. Both academia and industry have devoted...
Biological databases are growing at an exponential rate. Designing algorithms to deal with the inherent redundancy in these databases which can cope with the overwhelming amount of data returned from similarity searches is an active area...
Neural network based word embeddings have demonstrated outstanding results in a variety of tasks, and become a standard input for Natural Language Processing (NLP) related deep learning methods. Despite these representations are able to...
Many of today's underwater vehicles have a limited set of pre-planned behaviors that are of varying utility. This is due, in part, to very low underwater communication rates and difficulties observing the vehicle's underwater behavior...
The objective of my doctoral dissertation research is to formulate, implement, and validate metrics and techniques towards perceiving some of the influences on software development, predicting the impact of user initiated changes on a...
Speech-to-text technologies continues to become more accessible and more accurate. But while automated personal assistants and transcription software is improving, it still falters in many cases that involve domain-specific terminology, ...
Computational simulation is expected to play a vital role in the nanotechnology revolution. Molecular dynamics (MD) has been used traditionally by physicists and chemists to predict physical and chemical properties of small atomic...
The dissertation research is concerned with enabling parallel, high-performance computationâ in particular development of scientific software in the network-aware programming language, Java. Traditionally, this kind of computing was...
This thesis presents the Sampling-Based Model Predictive Control (SBMPC) Algorithm, a novel sampling-based planning algorithm. This algorithm was originally designed for dynamic system which are described by a set of system states and a...
Phishing scams have grown in frequency and developed in sophistication, and in recent years emails have been misused by scammers to frequently launch criminal attacks. By using phishing emails, scammers can make money in a very short...
Protein is a linear chain of amino acids bonded by peptide bonds. Protein plays a vital role in almost every biological process. For most proteins, they need to fold into a stable 3D structure (native state) in order to function properly...
Within the last decade, commodity Graphics Processing Units (GPUs) specialized for 2D and 3D scene rendering have seen an explosive growth in processing power compared to their general purpose counterpart, the CPU. Currently capable of...
Topology Aggregation is concerned about summarizing a network domain in a concise manner. This thesis deals with topology aggregation for networks with two additive metrics. Summarizing such a network domain is difficult for a number of...
The performance of a content-based image retrieval system depends on the representation of images. As a typical image consists of different objects, an image segmentation is needed for more accurate representations of contents. The first...
In this dissertation a unified compiler framework for program analysis, optimization, and automatic vectorization with techniques based on the Chains of Recurrences (CR) algebra is proposed. The root theoretical foundations of the CR...
As we reach the limits of single-core computing, we are promised more and more cores in our systems. Modern architectures include many performance counters per core, but few or no inter-core counters. In fact, performance counters were...
The phase ordering problem has been a long-standing problem in compiler optimizations. Different orderings of applying optimization phases by a compiler can result in different code generated, with potentially significant performance...
Many scientific problems are posed as Ordinary differential Equations (ODEs). A large subset of these are initial value problems, which are typically solved numerically. The solution starts by using a known state-space of the ODE system...
Statically pipelined processors offer a new way to improve the performance beyond that of a traditional in-order pipeline while simultaneously reducing energy usage by enabling the compiler to control more fine-grained details of the...
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.