Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
With the advancement information and communication technologies, networked computing devices have been adopted to address real-world challenges due to their efficiency and programmability while maintaining scalability, sustainability, ...
This thesis presents a new architecture for improving the interactivity and responsiveness of massively multiplayer on-line games. In order to aide in the quick delivery of game updates generated by a game client, this thesis presents a...
Vehicular wireless networks are gaining commercial interest. Mobile connectivity, road safety, and traffic congestion management are some applications that have arisen with this networking paradigm. Existing research primarily focuses on...
Phishing scams have grown in frequency and developed in sophistication, and in recent years emails have been misused by scammers to frequently launch criminal attacks. By using phishing emails, scammers can make money in a very short...
In wireless LANs, a packet may be received correctly for the most part but contains only a few errors. Such packets are usually referred to as partial packets. The current 802.11 standard will retransmit the entire packet even if the...
Similarity join has been widely studied and used in various scientific and commercial applications. Given two datasets, similarity join finds all pairs of similar objects (one from each input dataset), subject to a distance metric and a...
The Internet email system as a popular online communication tool has been increasingly misused by ill-willed users to carry out malicious activities including spamming and phishing. Alarmingly, in recent years the nature of the email...
Traditionally, if two files are considered identical, they are understood to be byte-by-byte equivalent. However, many files are semantically identical without being byte-to-byte identical. We assert that by using a contextual or...
Supercomputers play an essential role in performing computationally intensive tasks in various scientific fields. As supercomputers move toward the next milestone in computing power, exascale computing, interconnection networks become a...
This thesis presents the efforts made to develop new tools for non-technical law enforcement agents to effectively respond to electronic crimes. We present two tools: one that combats online predators and cyber-stalking; and a second...
The use of fat-tree topologies is a popular choice for high performance computing systems. Good routing algorithms are crucial to exploiting the high connectivity of the fat-tree topology. My research considers a family of fat-tree...
The rising number of senior citizens is approaching an all time high. With this comes a rising number of common chronic conditions where treatment is costly and time consuming. Frequently these conditions make it unsafe for older adults...
With the popularity of microprocessors and scale-out system architectures, many large-scale high-performance computing (HPC) systems are built from a collection of compute servers, with an identical set of resources such as CPU, memory, ...
In this dissertation we study the security and survivability of wireless mobile network systems in two distinct threat models: the Byzantine threat model and the selยฏsh node threat model. Wireless mobile networks are collections of self...
There is a growing demand for technology that can sense people and objects without imposing excessive overhead. Traditional solutions usually require people to wear additional devices on their bodies and install cumbersome sensors on...
Software tools designed for disk analysis play a critical role today in digital forensics investigations. However, these digital forensics tools are often difficult to use, usually task specific, and generally require professionally...
We present two tools that utilize the end-to-end approach for topology discovery for Ethernet switched LANs. Unlike existing Ethernet topology discovery methods that rely on Simple Network Management Protocol (SNMP) queries to obtain...
This thesis presents a novel interface for collaborative Digital Forensics. The improvement in the process management and remote access apropos of the use of current Digital Forensic tools in the area of Digital Forensics is described in...
Adversarial yet interacting interdependent relationships in information sharing and service provisioning have been a pressing issue of the Internet. Such relationships exist among autonomous software agents, in networking system peers, ...
Phishing scams which use emails to trick users into revealing personal data have become pandemic in the world. Analyzing such emails to extract maximum information about them and make intelligent forensic decisions based on such an...
Memory hungry applications consistently keep their memory requirement curves ahead of the growth of DRAM capacity in modern computer systems. Such applications quickly start paging to swap space on the local disk, which brings down their...
The legacy storage data path is largely structured in black-box layers and has four major limitations: (1) functional redundancies across layers, (2) poor cross-layer coordination and data tracking, (3) presupposition of high-latency...
Existing wireless ad hoc routing protocols, such as DSDV, AODV, DSR, TORA and GPSR, rely heavily upon the use of a large number of control messages to build and maintain routes between communicating mobile end-points. In this thesis, we...
Distributed real-time multiplayer games are played over a network among a set of players competing against each other and/or against Artificial Intelligence (AI). A latency hiding and bandwidth reduction technique known as 'Dead...
The winding number has proven to be a very simple and robust approach for inside-outside segmentation that can be applied both in the 2D and 3D realms for multiple purposes, including mesh cleaning, CAD design, 3D printing, among others....
Mobility models, or the mobility patterns used to simulate the motion of participating nodes, play a vital role in the simulation of Vehicular Ad Hoc Networks (VANET). Even with recent research focusing on development of mobility models...
Containers such as Docker and Singularity encapsulate complex programs with their dependencies in isolated environments and offer fast, customizable, portable, and flexible deployments of applications. The containerization technology...
In this dissertation, I present a table-driven streaming XML (Extensible Markup Language) parsing and searching technique, called TDX, and investigate related techniques. TDX expedites XML parsing, validation and searching by pre...
Internet fault diagnosis has attracted much attention in recent years. In this paper, we focus on the problem of finding the Link Pass Ratios (LPRs) when the Path Pass Ratios (PPRs) of a set of paths are given. Usually, given the PPRs of...
The most common method of preventing unauthorized access to digital information is through the use of a password-based authentication system. The strength of a password-based authentication system relies on a humans ability to generate a...
In addition to requiring routing to be dead-lock free and deterministic, Infiniband networks adopt destination based routing, which further complicates the routing design by putting additional constraints on the paths that can be...
This paper will discuss the development of a music classification system as a component in a music recommendation system. The front-end portion of the system is an Android Media Player application named SmartPlayer. The player is an...
The adoption of quantum computing presents a considerable risk to the security of traditionalcryptographic methods, including those used in current blockchain technologies. Quantum algorithms, especially Shor's and Grover's, can...
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.