Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Discriminatory terminology has been identified as a potential contributing factor to low diversity in the software developer population. Terms including whitelist, slave, and dummy value have been commonplace in the technical vernacular...
Deep learning models have shown remarkable performance across various applications. However, their resilience to hardware faults, particularly the loss of neurons, is a critical aspect that needs to be addressed. In this paper, we...
Vector-borne diseases account for more than 17% of infectious diseases, causing more than 1 million deaths annually from malaria, dengue fever, yellow fever, etc. Diseases once thought to be controlled, have experienced a resurgence. For...
There has been a great deal of research devoted to computer vision related assistive technologies. Unfortunately, this area of research has not produced many usable solutions. The long cane and the guard dog are still far more useful...
Many applications are featured with both text and location information, which leads to a novel type of search: spatial approximate string search (Sas). The Sas is gaining attention from the database community only recently. A large...
Random numbers are used in a variety of applications including simulation, sampling, and cryptography. Fortunately, there exist many well-established methods of random number generation. An example of a well-known pseudorandom number...
Recognizing and representing objects of certain categories become increasingly important due to the availability of high-resolution imaging technologies and the explosive amount of digital data. In particular, semantic segmentation of...
Three dimensional scalar heightfields, also known as volumetric datasets, abound in science and medicine. Viewing the isosurfaces, or level sets, is one of the two main ways to display these datasets, the other being volume visualization...
Memory hungry applications consistently keep their memory requirement curves ahead of the growth of DRAM capacity in modern computer systems. Such applications quickly start paging to swap space on the local disk, which brings down their...
InfiniBand is the de facto networking technology for commodity HPC clusters and has been widely deployed. However, most production large-scale InfiniBand clusters use simple routing schemes such as the destination-mod-k routing to route...
The amount of sensitive data stored on electronic media increases as the use of computers and mobile devices becomes more prevalent. For example, home computers and devices may store financial information (e.g., Quicken files or tax...
The Distributed Oceanographic Match-Up Service (DOMS) currently under development is a centralized service that allows researchers to easily match in situ and satellite oceanographic data from distributed sources to facilitate satellite...
Routing in mobile ad hoc networks presents many challenging problems not faced when routing in static networks with infrastructure. While much research has been done in this area, there is still much progress left to make before routing...
The purpose of this project is to create MATLAB applications that use the capabilities of the World Wide Web to send data to a remote server for computation and to display the results in on a local MATLAB® application. The data is sent...
Recent surveys have shown that over 6.8 billion mobile phones are in use today where roughly 50% are running the Android Operating System. This large population of devices can be utilized for message-passing interface (MPI) computing....
The current Internet architecture reveals its chronic limitations against the new paradigms of networking. The advancement of technology has changed the network use from communication to content distribution. Unfortunately, the IP-based...
DAGDA exposes some of the hidden operations that the hardware uses when performing loads and stores to the compiler to save energy and increase performance. We decouple the micro-operations for loads and stores into two operations: the...
The problems inherent to providing security for network systems are relative to the openness and design of network architecture. Typically network security is achieved through the use of monitoring tools based on pattern recognition or...
As storage device performance increases, the lifespan of an I/O request becomes throttled more-so by data path traversal than physical disk access. Even though many computer performance analysis tools exist, a surprisingly small amount...
Wireless mesh network is usually used to provide Internet access to communities or citywide. Opportunistic Routing (OR) exploits overheard packets in a wireless network and has been proven to be effective for wireless mesh networks....
Building more intelligent and more resourceful dialogue systems has been a long sought-after goal in Artificial Intelligence and Natural Language Processing. In this dissertation, we investigate two topics in deep learning based dialogue...
The Internet is composed of tens of thousands of network domains or Autonomous Systems (ASes), and Border Gateway Protocol (BGP) is the current de facto inter-domain routing protocol used by network domains to exchange reach ability of...
As the standard formalism and powerful abstraction of networked data, graphs have been used to model and interpret structured information from protein interaction and program dependence, to business coordination and Internet topology....
Using traditional methodologies and tools, the problem of keeping performance-critical kernels at high efficiency on hardware evolving at the incredible rates dictated by Moore's Law is almost intractable. On product lines where ISA...
This thesis is intended to cover two of the most basic, important and highly applied multiple access communication techniques in modern age. It will provide an in-depth literature on the history, evolution, present and future of FDMA ...
We are currently in the era of big data, where data of enormous volume and variety is generated continuously, and they need to be captured, processed, and analyzed at a high velocity. Many users have increasingly adopted big data...
This research provides theoretical and computational developments in statistical shape analysis of shape graphs, and demonstrates them using analysis of complex network-type object data such as retinal blood-vessel (RBV) networks. The...
In all areas of research, finding the correct limiting factor able to provide the largest gains can often be the critical path of the research itself. In our work, focusing on branch prediction, we attempt to discover in what ways did...
Low-rank matrix approximation is extremely useful in the analysis of data that arises in scientific computing, engineering applications, and data science. However, as data sizes grow, traditional low-rank matrix approximation methods, ...
The digital revolution, fired by the development of the information and communication technologies, has fundamentally changed the way we think, behave, communicate, work and earn livelihood (the World Summit on the Information Society)....
This thesis presents and evaluates a new algorithm which generates random numbers. The algorithm uses a Number Theory class of numbers called Normal Numbers. Normal Numbers consist of an infinite sequence of digits which are uniformly...
Loop unrolling is a compiler optimization that can improve the performance of applications without explicit intervention from programmers. In this study, we analyze how traditional loop unrolling techniques attempt to improve performance...
With the recent advances in using nonlocal approaches to approximate traditional partial differential equations(PDEs), a number of new research avenues have been opened that warrant further study. One such path, that has yet to be...
This thesis describes the implementation of a fast, dynamic, approximate, nearest-neighbor search algorithm that works well in fixed dimensions (d The implementation is competitive with the best approximate nearest neighbor searching...
The enormous growth in wireless communications and miniaturized handheld devices in the last few years, have given rise to a vast range of new services for heterogeneous user environments. The concept of a Peer-to-Peer (P2P) Grid has...
Graph drawing is widely used in many fields. Good visualization in graph drawing makes it easier for humans to understand the concepts being represented. This thesis deals with what is known as a hierarchical graph and concerns one of...
This thesis develops and studies a traffic-aware inter-domain routing (TIDR) protocol, which drastically improves the convergence and stability of the BGP-based inter-domain routing system. TIDR is designed based on two important...
Performance counters are becoming more complex as multi-core systems are becoming more wide spread. Consequently, evaluating these counters has become more complex as well. We propose providing hardware that monitors performance counters...
Every day, computer software becomes more important for the functioning of the world. The expectation causes increasing code size and complex logic. These factors unavoidably lead to more and more vulnerabilities, many of which can be...
Software systems contain an immense amount of information captured in a variety of documents such as source code files, user documentation, use and test cases, bug reports, and system requirements among others. Relationships between...
The legacy storage data path is largely structured in black-box layers and has four major limitations: (1) functional redundancies across layers, (2) poor cross-layer coordination and data tracking, (3) presupposition of high-latency...
Since the explosion of computer systems and computer networks within the past decade, e-commerce, online banking, and other "internet" oriented applications have risen exponentially. According to Forrester Research Group, online shopping...
Digital signatures are essential to Internet applications and more generally electronic commerce. However, they are subject to various attacks that lend them impractical for some legal applications. In this thesis we consider...
Alzheimer's disease (AD) is one of the top 10 leading causes of death in the US; it debilitates memory and impairs cognition. The current core clinical criteria for diagnosis of AD are based on functional deficits and cognitive...
Processors that employ instruction fusion can improve performance and energy usage beyond traditional processors by collapsing and simultaneously executing dependent instruction chains on the critical path. This paper describes compiler...
Though there are many feature selection methods for learning, they might not scale well to very large datasets, such as those generated in computer vision data. Furthermore, it can be beneficial to capture and model the variability...
Applications in embedded systems often need to meet specified timing constraints. It is advantageous to not only calculate the Worst-Case Execution Time (WCET) of an application, but to also perform transformations that attempt to reduce...
At its heart, a password cracking attack is just a guessing attack. An attacker makes guesses about a user's password until they guess correctly or they give up. While the defender may limit the number of guesses an attacker is allowed, ...
Finite element methods are a common tool to solve problems in computational fluid dynamics (CFD). This thesis explores the finite element package deal.ii and specific applications to incompressible CFD. Some notation and results from...
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.