Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Performance modeling and simulation of parallel applications are critical performance analysis techniques in High Performance Computing (HPC). Efficient and accurate performance modeling and simulation can aid the tuning and optimization...
The use of fat-tree topologies is a popular choice for high performance computing systems. Good routing algorithms are crucial to exploiting the high connectivity of the fat-tree topology. My research considers a family of fat-tree...
The rising number of senior citizens is approaching an all time high. With this comes a rising number of common chronic conditions where treatment is costly and time consuming. Frequently these conditions make it unsafe for older adults...
Collaborative filtering is a class of methods that analyze past user feedback to find relationship among users and items, or to predict a relationship between a user and a new item. Predicting user preferences is an important problem...
As the world is moving towards exascale computing, interconnect networks are becoming more and more important because of their omnipresent use in high performance computing systems and in large scale data centers. The performance of an...
Compromised machines are one of the key security threats on the Internet; they are often used to launch various security attacks such as DDoS, spamming, and identity theft. In this thesis we address this issue by investigating effective...
The computing capabilities of the high performance computing systems have increased manyfold over the span of years following Moores law and have achieved petascale recently. Following the trend, the computation cababilities are expected...
Anonymous networks play a critical role in supporting free speech and user privacy on the Internet. Over the years, many fundamental algorithms and schemes have been proposed to facilitate the development of anonymous networks, including...
In this paper we show that botnets and specifically peer-to-peer botnets, pose a considerable threat to our national security. We examine the rise of the botnet threat and the technology that makes this threat possible. We also examine...
Efficient implementations of the Discrete Fourier Transform (DFT) for GPUs provide good performance with large data sizes, but are not competitive with CPU code for small data sizes. On the other hand, several applications require the...
Over recent years, sensors have increasingly become used to improve the performance of humans. Popular sensors provide a cost efficient way to gather various inputs ranging from temperature to movements to sound. Today, smartphones are...
Many of today's underwater vehicles have a limited set of pre-planned behaviors that are of varying utility. This is due, in part, to very low underwater communication rates and difficulties observing the vehicle's underwater behavior...
We present two tools that utilize the end-to-end approach for topology discovery for Ethernet switched LANs. Unlike existing Ethernet topology discovery methods that rely on Simple Network Management Protocol (SNMP) queries to obtain...
InfiniBand is the de facto networking technology for commodity HPC clusters and has been widely deployed. However, most production large-scale InfiniBand clusters use simple routing schemes such as the destination-mod-k routing to route...
This paper discusses a combined and platform-independent solution to detect websites that fake their identity. The approach combines white-listing, black-listing and heuristic strategies to provide an optimal phishing detection ratio...
While social media and the internet have become popular platforms in information dissemination amid the proliferation of using social media networks, they simultaneously lead to quick spreads of fake news and misinformation. Especially, ...
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.