Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
High performance computing(HPC) and data center systems have undergone rapid growth in recent years. To meet the current and future demand of compute- and data-intensive applications, these systems require the integration of a large...
Temporal and spatial localities are basic concepts in operating systems, and storage systems rely on localities to perform well. Surprisingly, it is difficult to quantify the localities present in workloads and how localities are...
This thesis presents and evaluates a generic algorithm for incrementally computing the dominant singular subspaces of a matrix. The relationship between the generality of the results and the necessary computation is explored. The...
Selection of a suitable Ph.D. supervisor is a very important step in a student's career. This dissertation presents a multi-criteria decision support system to assist students in making this choice. The system employs a hybrid method...
Digital image steganography is the art and science of hidden information. Currently, steganographic (stego) algorithms are rapidly evolving and reducing their artifacts. There-fore, detecting of altered cover images, i.e. steganalysis, ...
Software tools designed for disk analysis play a critical role today in digital forensics investigations. However, these digital forensics tools are often difficult to use, usually task specific, and generally require professionally...
An Analysis of the Secure Routing Protocol for Mobile Ad Hoc Network Route Discovery: Using Intuitive Reasoning and Formal Verification to Identify Flaws
With this work we analyze the Secure Routing Protocol (SRP) proposed by Papadimitratos and Haas as a means for securing source-driven route discovery in ad hoc networks. We discuss aws in SRP's design and expose SRP's shortcomings with...
Adversarial yet interacting interdependent relationships in information sharing and service provisioning have been a pressing issue of the Internet. Such relationships exist among autonomous software agents, in networking system peers, ...
We present two tools that utilize the end-to-end approach for topology discovery for Ethernet switched LANs. Unlike existing Ethernet topology discovery methods that rely on Simple Network Management Protocol (SNMP) queries to obtain...
The current Internet architecture reveals its chronic limitations against the new paradigms of networking. The advancement of technology has changed the network use from communication to content distribution. Unfortunately, the IP-based...
The problems inherent to providing security for network systems are relative to the openness and design of network architecture. Typically network security is achieved through the use of monitoring tools based on pattern recognition or...
The main task of a Lexical Analyzer such as Lex [20], Flex [26] and RE/Flex [34], is to perform tokenization of a given input file within reasonable time and with limited storage requirements. Hence, most lexical analyzers use...
The Distributed Oceanographic Match-Up Service (DOMS) currently under development is a centralized service that allows researchers to easily match in situ and satellite oceanographic data from distributed sources to facilitate satellite...
Recent surveys have shown that over 6.8 billion mobile phones are in use today where roughly 50% are running the Android Operating System. This large population of devices can be utilized for message-passing interface (MPI) computing....
The purpose of this project is to create MATLAB applications that use the capabilities of the World Wide Web to send data to a remote server for computation and to display the results in on a local MATLAB® application. The data is sent...
Routing in mobile ad hoc networks presents many challenging problems not faced when routing in static networks with infrastructure. While much research has been done in this area, there is still much progress left to make before routing...
InfiniBand is the de facto networking technology for commodity HPC clusters and has been widely deployed. However, most production large-scale InfiniBand clusters use simple routing schemes such as the destination-mod-k routing to route...
Sustainability research of the environment depends on accurate land cover information over large areas. Even with the increased number of satellite systems and sensors acquiring data with improved spectral, spatial, radiometric and...
The amount of sensitive data stored on electronic media increases as the use of computers and mobile devices becomes more prevalent. For example, home computers and devices may store financial information (e.g., Quicken files or tax...
DAGDA exposes some of the hidden operations that the hardware uses when performing loads and stores to the compiler to save energy and increase performance. We decouple the micro-operations for loads and stores into two operations: the...
We propose the use of randomized (scrambled) quasirandom sequences for the purpose of providing practical error estimates for quasi-Monte Carlo (QMC) applications. One popular quasirandom sequence among practitioners is the Halton...
The OpenSPARC T1 is a multithreading processor developed and open sourced by Sun Microsystems (now Oracle). This paper presents an implementation of the low-power Tagless-Hit Instruction Cache (TH-IC) for the T1, after adapting it to the...
Instant messaging has been and still is a revolutionary technology, bringing people in communication with each other faster and easier. Its characteristic as sending messaging in real-time make it even more appealing than e-mail itself....
This work will examine enhancements to the library for scalable, parallel pseudorandom number generation (SPRNG). SPRNG uses parameterization to produce many streams of random numbers with emphasis on parallel Monte Carlo methods. We...
This paper discusses a combined and platform-independent solution to detect websites that fake their identity. The approach combines white-listing, black-listing and heuristic strategies to provide an optimal phishing detection ratio...
Since the number of digital images is growing explosively, content based image retrieval becomes an active research area to automatically index and retrieve images based on their semantic features and visual appearance. Content based...
The Internet is an excellent source of information and entertainment. Children reap numerous benefits using the Internet for educational purposes, playing games and communicating with people all over the world. But along with these...
This thesis presents a novel interface for collaborative Digital Forensics. The improvement in the process management and remote access apropos of the use of current Digital Forensic tools in the area of Digital Forensics is described in...
The Cryptographic Protocol Analysis Language Evaluation System (CPAL-ES) is a tool used to analyze protocols with formal methods. In this thesis, we exercise CPAL-ES against two security protocols, the Secure Protocol of Aziz & Diffie, ...
For decades, augmented reality has been used to allow a person to visualize an overlay of annotations, videos, and images on physical objects using a camera. Due to the high computational processing cost that is required to match an...
Tropical cyclone intensity prediction is an issue at the forefront of mesoscale numerical weather prediction efforts because it is an area where historically there have been only small improvements, and yet much more progress is needed...
Memory system hierarchy has remained unchanged for many years, leading to a growing gap between main memory access times and a local disk's paging latencies. This trend has especially become a performance bottleneck for memory intensive...
While social media and the internet have become popular platforms in information dissemination amid the proliferation of using social media networks, they simultaneously lead to quick spreads of fake news and misinformation. Especially, ...
The rising cost of energy is becoming a concern beyond mobile computing platforms. Server-class computers cannot simply consume more power, since increased energy consumption translates into more heat dissipations, more cooling...
The primary contribution of this research is to define and evaluate a general multi-agent distributed architecture, in which software agents utilize fuzzy knowledge structures to support agent socialization, collaboration, and...
Aerial imagery of geographic regions in the form of Lidar and RGB images aids different tasks like survey, urban-planning, mapping, surveillance, navigation, localization and others. Most of the applications, in general, require accurate...
The purpose of computer simulation is to utilize a mathematical model to recreate a real world situation such that the behavior and interactions of the entities involved can more easily be understood. By varying initial conditions and...
As storage device performance increases, the lifespan of an I/O request becomes throttled more-so by data path traversal than physical disk access. Even though many computer performance analysis tools exist, a surprisingly small amount...
Many applications are featured with both text and location information, which leads to a novel type of search: spatial approximate string search (Sas). The Sas is gaining attention from the database community only recently. A large...
Recognizing and representing objects of certain categories become increasingly important due to the availability of high-resolution imaging technologies and the explosive amount of digital data. In particular, semantic segmentation of...
Statistical data models based on the deep learning paradigm have shown remarkable performance in many domains, surpassing human performance in a set of tasks under restricted settings. However, the fundamental reasons enabling these...
As the standard formalism and powerful abstraction of networked data, graphs have been used to model and interpret structured information from protein interaction and program dependence, to business coordination and Internet topology....
Occupying a significant share of the urban landscape in Latin America and the Caribbean (LAC), informal settlements are the home to nearly one-quarter of the urban population in this region. Mapping land cover and informal settlement...
The winding number has proven to be a very simple and robust approach for inside-outside segmentation that can be applied both in the 2D and 3D realms for multiple purposes, including mesh cleaning, CAD design, 3D printing, among others....
Monte Carlo methods are often used to efficiently estimate partial differential equations. In this document, I will look at a few methods that have been developed into the backbone of the algorithm for estimating the electrostatic free...
With the popularity of microprocessors and scale-out system architectures, many large-scale high-performance computing (HPC) systems are built from a collection of compute servers, with an identical set of resources such as CPU, memory, ...
A medium voltage DC (MVDC) shipboard power system (SPS) architecture is a notional candidate design for future “all-electric” ships, as it is expected to increase power density and distribution efficiency. However, the lack of experience...
Developers often need additional knowledge to complete some programming tasks, and they oftenseek information online to solve the problem at hand. Fortunately, online resources contain a vast amount of information at the developers’...
Traditionally, if two files are considered identical, they are understood to be byte-by-byte equivalent. However, many files are semantically identical without being byte-to-byte identical. We assert that by using a contextual or...
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.