Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Mobile platforms have become ubiquitous in our society; however, classical benchmarks have not kept up with their growth. When not entirely incompatible, current benchmarking techniques often provide very little useful information about...
With regard to Emergency Medical Services (EMS), the response time and consistency that they can provide care to in need patients is of the upmost importance. The key aspects of achieving this efficiency lies in how the EMS vehicles are...
In recent years, studies have shown that independent/sparse components of local windows of natural images resemble the receptive fields of cells in the early stages of the mammalian visual pathway. However, the role of the independence...
With the advancement information and communication technologies, networked computing devices have been adopted to address real-world challenges due to their efficiency and programmability while maintaining scalability, sustainability, ...
Clustering is an essential data mining tool that aims to discover inherent cluster structure in data. As such, the study of clusterability, which evaluates whether data possesses such structure, is an integral part of cluster analysis....
Network of unmanned vehicles, are poised to be the next giant leap of technology. Such systems are already being used by the defense and law enforcement agencies. The US DoD and some very large private corporations are spending large...
Instruction fetch is an important pipeline stage for embedded processors, as it can consume a significant fraction of the total processor energy. This dissertation describes the design and implementation of two new fetch enhancements...
When considering computer processors, there is a trade-off between performance and power; improved performance does not typically come without an increase in power. Similarly, the reduction of power often times means a reduction in...
One of the main goals of robotics research is to give physical platforms intelligence, allowing for the platforms to act autonomously with minimal direction from humans. Motion planning is the process by which a mobile robot plans a...
In today's world, data information, exchange, and processing are sustenance to corporations, organizations, and government agencies. Communications networks are relied upon to meet the computing needs of such organizations. These groups...
Researchers agree that protecting a stand-alone autonomous mobile agent with software-only approaches remains difficult. In this thesis, we produce several results that enhance mobile agent security and provide generalized code...
Computational thinking is increasingly recognized as an important skill set to learn for people living in the 21st century, and the middle school years comprise a critical stage to introduce children to computational thinking. Video game...
In real-world mission planning, the environment can be quite complex, and a path planner has thepotential to enable an agent to fulfill its goals in spite of unanticipated events and unexpected situations. A sound path planner defines a...
This thesis presents a new architecture for improving the interactivity and responsiveness of massively multiplayer on-line games. In order to aide in the quick delivery of game updates generated by a game client, this thesis presents a...
In recent years, the need to reduce the power and energy requirements of computer microprocessors has increased dramatically. In the past, microprocessor architects succeeded in improving the performance of their designs by increasing...
Conditional branches have traditionally been a performance bottleneck for most processors. The high frequency of branches in code coupled with expensive pipeline flushes on mispredictions make branches expensive instructions worth...
Many contemporary disk drives have built-in queues and schedulers. These features can improve I/O performance, by offloading work from the system's main processor, avoiding disk idle time, and taking advantage of vendor-specific disk...
Modern power distribution grid has become very complex, especially with the integration of distributed renewable resources and many electronic power devices. Maintaining power quality is becoming incrementally challenging due to the...
Existing solutions that address data loss, theft, and corruption of information and resources in networks rely on deep content analysis, central policy management, and attempt to achieve broad content protection across multiple platforms...
Due to the large variance in the stochastic nature of evolution and DNA, it can be difficult to be sure that inferences that use genetical data are perfectly correct. However, as we incorporate more data into our analysis then the...
My thesis is that a realistic image of a human face can be generated using a computational simulation of light transport. I demonstrate this thesis by acquiring the three-dimensional geometry of a face, measuring the reflectance function...
The task of protecting software integrity can be approached with a two-part strategy that addresses threats to the static integrity of memory contents and the dynamic integrity of software memory interactions. Although their resultant...
Vehicular wireless networks are gaining commercial interest. Mobile connectivity, road safety, and traffic congestion management are some applications that have arisen with this networking paradigm. Existing research primarily focuses on...
In many Monte Carlo applications, one can substitute the use of pseudorandom numbers with quasirandom numbers and achieve improved convergence. This is because quasirandom numbers are more uniform than pseudorandom numbers. The most...
Efficient implementations of the Discrete Fourier Transform (DFT) for GPUs provide good performance with large data sizes, but are not competitive with CPU code for small data sizes. On the other hand, several applications require the...
Researchers and scientists regularly work on solving complex real-world problems in medical science, environmental science, astrophysics, etc., to achieve mission-critical research goals through scientific campaigns. These campaigns are...
This thesis presents the Sampling-Based Model Predictive Control (SBMPC) Algorithm, a novel sampling-based planning algorithm. This algorithm was originally designed for dynamic system which are described by a set of system states and a...
This research examines the development of a system architecture for collaborative learning that combines feedback, group awareness, and chat in the form of both textual and auditory input. The goals are to evaluate the capability of...
A specialized variation of associations for biodiversity data is defined and developed that makes the capture and discovery of information about biological images easier and more efficient. Biodiversity is the study of the diversity of...
Protein is a linear chain of amino acids bonded by peptide bonds. Protein plays a vital role in almost every biological process. For most proteins, they need to fold into a stable 3D structure (native state) in order to function properly...
Phishing scams have grown in frequency and developed in sophistication, and in recent years emails have been misused by scammers to frequently launch criminal attacks. By using phishing emails, scammers can make money in a very short...
Query rewriting (QR) is a critical component in dialogue systems for reducing frictions caused by systematic errors or user ambiguity. When there is an entity error, it imposes extra difficulty for a dialogue system to produce...
Statistical data models based on the deep learning paradigm have shown remarkable performance in many domains, surpassing human performance in a set of tasks under restricted settings. However, the fundamental reasons enabling these...
Over recent years, sensors have increasingly become used to improve the performance of humans. Popular sensors provide a cost efficient way to gather various inputs ranging from temperature to movements to sound. Today, smartphones are...
A significant percentage of execution cycles are devoted to performing conditional transfers of control, which occur frequently, cause pipeline flushes when mis-predicted and can prevent other code improving transformations from being...
As the rise in availability of natural language data, the underlying language structures can be better learned and play the important roles in many natural language processing tasks. Although the neural language representation models...
Simulation software is used in a multitude of industry and academic fields, in an assortment of scopes. One might be interested in gravitation of celestial bodies, or field structures of molecular interactions. The scale to which these...
Clusters of Symmetric Multiprocessing (SMP) nodes with multi-core Chip Multiprocessors (CMP), also known as SMP-CMP clusters, are ubiquitous today. Message Passing Interface (MPI) is the de facto standard for developing message passing...
Hurricane risk assessment is an important research topic: accurate estimation of the potential loss helps guide mitigation efforts to decrease the loss in the future. In the past decade, researchers working on the loss analysis tried to...
In this dissertation we design a system that allows Semantic Web agents to reason within what has come to be known as the Web of Trust. We integrated reasoning about belief and trust, so agents can reason about information from different...
The Internet provides a general communication environment for distributed resource sharing. XML has become a key technology for information representation and exchange on the Internet, increasing the opportunity for integration of the...
Near point problems are widely used in computational geometry as well as a variety of other scientific fields. This work examines four common near point problems and presents original algorithms that solve them. Planar nearest neighbor...
Energy efficiency is an important design consideration in nearly all classes of processors, but is of particular importance to mobile and embedded systems. The data cache accounts for a significant portion of processor power. We have...
The ART executes apps in the Dalvik VM. The Dalvik VM creates a Zygote instance when the device first boots which is responsible for sharing Android runtime libraries to new applications. New apps rely heavily on external libraries in...
Closed domain question answering (QA) systems achieve precision and recall at the cost of complex language processing techniques to parse the answer corpus. We propose a query-based model for indexing answers in a closed domain factoid...
Computational simulation is expected to play a vital role in the nanotechnology revolution. Molecular dynamics (MD) has been used traditionally by physicists and chemists to predict physical and chemical properties of small atomic...
Neural network based word embeddings have demonstrated outstanding results in a variety of tasks, and become a standard input for Natural Language Processing (NLP) related deep learning methods. Despite these representations are able to...
The dissertation research is concerned with enabling parallel, high-performance computationâ in particular development of scientific software in the network-aware programming language, Java. Traditionally, this kind of computing was...
The graph is a data structure that exists widely around us, including traditional fields like physics, biology, and cosmology, as well as emergent fields like social networks, software engineering, and financial trading platforms. The...
We have considered the problem of tracking and recognition using a three dimensional representation of human faces. First we present a review of the research in the tracking and recognition fields including a list of several commercially...
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.