Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Mobile platforms have become ubiquitous in our society; however, classical benchmarks have not kept up with their growth. When not entirely incompatible, current benchmarking techniques often provide very little useful information about...
Instruction fetch is an important pipeline stage for embedded processors, as it can consume a significant fraction of the total processor energy. This dissertation describes the design and implementation of two new fetch enhancements...
When considering computer processors, there is a trade-off between performance and power; improved performance does not typically come without an increase in power. Similarly, the reduction of power often times means a reduction in...
This thesis presents a new architecture for improving the interactivity and responsiveness of massively multiplayer on-line games. In order to aide in the quick delivery of game updates generated by a game client, this thesis presents a...
Many contemporary disk drives have built-in queues and schedulers. These features can improve I/O performance, by offloading work from the system's main processor, avoiding disk idle time, and taking advantage of vendor-specific disk...
In many Monte Carlo applications, one can substitute the use of pseudorandom numbers with quasirandom numbers and achieve improved convergence. This is because quasirandom numbers are more uniform than pseudorandom numbers. The most...
Protein is a linear chain of amino acids bonded by peptide bonds. Protein plays a vital role in almost every biological process. For most proteins, they need to fold into a stable 3D structure (native state) in order to function properly...
The amount of data stored on smart phones and other mobile devices has increased phenomenally over the last decade. As a result there has been a spike in the use of these devices for documenting different scenarios that are encountered...
Similarity join has been widely studied and used in various scientific and commercial applications. Given two datasets, similarity join finds all pairs of similar objects (one from each input dataset), subject to a distance metric and a...
This research explores the idea of extracting three-dimensional features from video clips, in order to aid various video analysis and mining tasks. Although video analysis problems are well-established in the literature, the use of three...
DNA is the fundamental storage for the genetic "blueprints" of all living organisms. It provides the information used to create the functional proteins in an organism. One of the key factors regulating the use of this blueprint is the...
Passwords are critical for security in many different domains such as social networks, emails, encryption of sensitive data and online banking. Human memorable passwords are thus a key element in the security of such systems. It is...
Passwords are still one of the most common means of securing computer systems. Most organizations rely on password authentication systems, and therefore, it is very important for them to enforce their users to have strong passwords. They...
Many scientific problems are posed as Ordinary differential Equations (ODEs). A large subset of these are initial value problems, which are typically solved numerically. The solution starts by using a known state-space of the ODE system...
Since the number of digital images is growing explosively, content based image retrieval becomes an active research area to automatically index and retrieve images based on their semantic features and visual appearance. Content based...
Phishing scams which use emails to trick users into revealing personal data have become pandemic in the world. Analyzing such emails to extract maximum information about them and make intelligent forensic decisions based on such an...
Many applications are featured with both text and location information, which leads to a novel type of search: spatial approximate string search (Sas). The Sas is gaining attention from the database community only recently. A large...
Random numbers are used in a variety of applications including simulation, sampling, and cryptography. Fortunately, there exist many well-established methods of random number generation. An example of a well-known pseudorandom number...
Recognizing and representing objects of certain categories become increasingly important due to the availability of high-resolution imaging technologies and the explosive amount of digital data. In particular, semantic segmentation of...
As the standard formalism and powerful abstraction of networked data, graphs have been used to model and interpret structured information from protein interaction and program dependence, to business coordination and Internet topology....
In all areas of research, finding the correct limiting factor able to provide the largest gains can often be the critical path of the research itself. In our work, focusing on branch prediction, we attempt to discover in what ways did...
Alzheimer's disease (AD) is one of the top 10 leading causes of death in the US; it debilitates memory and impairs cognition. The current core clinical criteria for diagnosis of AD are based on functional deficits and cognitive...
The dissertation research is focused on improving performance on genome wide nucleosome positioning. Nucleosome is the basic structural unit of DNA in eukaryotic cells. As nucleosomes limit the accessibility of the wrapped DNA to...
The rapidly expanding capabilities of modern smartphones now enable the creation of new classes of applications for health, wellness, and entertainment. Data collected from on-board sensors, web services, social media and external...
Modern science and technology have witnessed in the past decade a proliferation of complex data that can be naturally modeled and interpreted as graphs. In real-world networked applications, the underlying graphs oftentimes exhibit...
This dissertation is centered on indexing, searching, and mining methods for large-scale and high-dimensional visual data. While the processing to such data has been widely acknowledged to be difficult, the problem becomes more serious...
In many pattern classification problems, efficiently learning a suitable low-dimensional representation of high dimensional data is essential. The advantages of linear dimension reduction methods are their simplicity and efficiency....
This thesis presents the Scalable Parallel Random Number Generators Library (SPRNG) version 4.0. SPRNG is a widely used software package for both serial and parallel pseudorandom number generation. Its generators satisfy every known...
One of the goals of biology is to be able to understand the structure and interaction of macromolecules, to be able to better understand life at a macromolecular level. One of the most important inventions that revolutionized the study...
This dissertation addresses the creation of a unique, adaptable, and light-weight core methodology to address the problem of Soft Error Modeling and Simulation. This core methodology was successfully tailored, validated, and expanded to...
The demand for high performance wireless networks and systems have become increasingly high over the last decade. This dissertation addresses three systems that were designed to improving the efficiency, reliability and security of...
I/O services provided by general-purpose operating systems and commodity hardware are designed for achieving high average-case performance without worrying about timing constraints. A common trend is to use such components to build...
Diffusion Monte Carlo is the most popular Quantum Monte Carlo method used for obtaining accurate results. Unlike with simpler Monte Carlo techniques, load imbalance can be a significant factor affecting its performance on massively...
Random number generators have been studied and used for decades, and various kinds of generators have been proposed and improved to fit different types of problems. Better generators fit the problem tightly and utilize the architecture...
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.