Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Mobility models, or the mobility patterns used to simulate the motion of participating nodes, play a vital role in the simulation of Vehicular Ad Hoc Networks (VANET). Even with recent research focusing on development of mobility models...
This thesis describes two algorithms for face detection that rely on a generic feature representation called spectral histogram representation. The sufficiency and generalization of this representation is demonstrated through a...
This dissertation is concerned with efficient compilation of our Java-based, high- performance, library-oriented, SPMD style, data parallel programming language: HPJava. It starts with some historical review of data-parallel languages...
The most common approaches to analyzing algorithms are worst-case analysis, average-case analysis, and experimental analysis. In most cases, until recently, experimental analysis has not been given priority. The theoretical computer...
A new generation of mobile applications requires reduced energy consumption without sacrificing execution performance. A common approach for improving performance of processors is instruction pipelining. The way pipelining is...
This thesis presents the Scalable Parallel Random Number Generators Library (SPRNG) version 4.0. SPRNG is a widely used software package for both serial and parallel pseudorandom number generation. Its generators satisfy every known...
Pattern recognition is fundamental to a variety of significant applications that includes but is not limited to medical diagnoses, speech recognition, and object recognition. The increased security concerns in the aftermath of the 9/11...
Containers such as Docker and Singularity encapsulate complex programs with their dependencies in isolated environments and offer fast, customizable, portable, and flexible deployments of applications. The containerization technology...
One of the goals of biology is to be able to understand the structure and interaction of macromolecules, to be able to better understand life at a macromolecular level. One of the most important inventions that revolutionized the study...
Research concerning optimization of reuse of software assets developed and consumed within large software enterprises is prevalent within academia and industry. Comparatively few research efforts have been devoted to exploring asset...
In this dissertation, I present a table-driven streaming XML (Extensible Markup Language) parsing and searching technique, called TDX, and investigate related techniques. TDX expedites XML parsing, validation and searching by pre...
The nature of embedded systems development places a great deal of importance on meeting strict requirements in areas such as static code size, power consumption, and execution time. Due to this, embedded developers frequently generate...
Modern day high performance computing (HPC) clusters and data centers require a large number of computing and storage elements to be interconnected. Interconnect performance is considered a major bottleneck to the overall performance of...
Internet fault diagnosis has attracted much attention in recent years. In this paper, we focus on the problem of finding the Link Pass Ratios (LPRs) when the Path Pass Ratios (PPRs) of a set of paths are given. Usually, given the PPRs of...
Malware has crippled computer systems, caused financial losses on the order of billions of dollars and denied access to services for millions of users worldwide. Detecting malware before it can cause any damage, therefore, is a...
In this thesis we adapt the concept of visual cryptography to digital projectors as opposed to over-head projectors. Digital projectors are used to project the images from the computer monitor, whereas over-head projectors display the...
The fast increasing length of random number streams, the application of more powerful cores and emerging various Random Number Generators (RNGs) lead to a revolution from traditional RNGs. The authentic RNGs are mainly based on the...
In this dissertation, I explore different types of applications in the area of applied machine learning, time series analysis, and prediction. Time series forecasting is a fundamental task in machine learning and data mining. It is an...
Universal Global Adaptive routing (UGAL) is a common routing scheme used in systems based on the Dragonfly interconnect topology. UGAL uses information about local link-loads to make adaptive routing decisions. Traffic Pattern-based...
Mobile computing is the new norm. As people feel increasingly comfortable computing in public places such as coffee shops and transportation hubs, the threat of exposing sensitive information increases. While solutions exist to guard the...
Mobile Ad Hoc Networks (MANETs) are a collection of wireless mobile nodes with links that are made and broken arbitrarily. They have limited resources in power, computation, broadcast range, and a dynamic topology with no fixed...
The most common method of preventing unauthorized access to digital information is through the use of a password-based authentication system. The strength of a password-based authentication system relies on a humans ability to generate a...
This dissertation addresses the creation of a unique, adaptable, and light-weight core methodology to address the problem of Soft Error Modeling and Simulation. This core methodology was successfully tailored, validated, and expanded to...
This research presents several important developments in pattern classification using fuzzy neural networks and BK-Square products and presents extensions to max-min fuzzy neural network research. In this research, the max and min...
The computer architecture community relies on standard benchmark suites like MiBench, NAS, PARSEC, SPEC CPU2006 (SPEC)ยฎ, and SPLASH to study different hardware designs, but such suites are insufficient for evaluating mobile platforms...
As the gap between CPU speed and memory speed widens, it is appropriate to investigate alternative storage systems. One approach is to use a large data register file. Registers, in general, offer several advantages when accessing data, ...
The Prisoners' Problem can be stated as follows: Two prisoners, Alice and Bob, want to communicate a secret escape plan under the surveillance of a warden, Wendy. To be indiscernible, the communication must appear to Wendy to be `...
The demand for high performance wireless networks and systems have become increasingly high over the last decade. This dissertation addresses three systems that were designed to improving the efficiency, reliability and security of...
I/O services provided by general-purpose operating systems and commodity hardware are designed for achieving high average-case performance without worrying about timing constraints. A common trend is to use such components to build...
Monte Carlo applications are widely perceived as computationally intensive but naturally parallel. Therefore, they can be effectively executed on the grid using the dynamic bag-of-work model. We improve the efficiency of the subtask...
Compromised machines are one of the key security threats on the Internet; they are often used to launch various security attacks such as DDoS, spamming, and identity theft. In this thesis we address this issue by investigating effective...
Graph-structured data widely exists in the real world, including biomedical, e-commerce, and social areas. The graph-structured data contains objects and relationships among them, which refer to nodes and edges in the graph, respectively...
As the world is moving towards exascale computing, interconnect networks are becoming more and more important because of their omnipresent use in high performance computing systems and in large scale data centers. The performance of an...
Diffusion Monte Carlo is the most popular Quantum Monte Carlo method used for obtaining accurate results. Unlike with simpler Monte Carlo techniques, load imbalance can be a significant factor affecting its performance on massively...
Mobile agent systems provide a new method for computer communication. A mobile agent can migrate from platform to platform, performing a task or computation for its originator. Mobile agents are a promising new technology; however, there...
In this paper we show that botnets and specifically peer-to-peer botnets, pose a considerable threat to our national security. We examine the rise of the botnet threat and the technology that makes this threat possible. We also examine...
Fuzzy relational calculi based on BK products of relations have representational and computational means for handling both concrete numerical representations of relations and symbolic manipulation of relations. BK calculus of relations...
In addition to requiring routing to be dead-lock free and deterministic, Infiniband networks adopt destination based routing, which further complicates the routing design by putting additional constraints on the paths that can be...
The computing capabilities of the high performance computing systems have increased manyfold over the span of years following Moores law and have achieved petascale recently. Following the trend, the computation cababilities are expected...
In the modern information era, graphs have been ubiquitous in numerous high-impact areas, including social media, bioinformatics, artificial intelligence, and critical infrastructures. The sets of nodes and edges within graphs can...
There are a wide variety of clustering and optimization algorithms which work in vector spaces, but relatively fewer that work on graphs. An algorithm to embed road network metrics into vector spaces is presented in this document, which...
Anonymous networks play a critical role in supporting free speech and user privacy on the Internet. Over the years, many fundamental algorithms and schemes have been proposed to facilitate the development of anonymous networks, including...
The computing power on the leadership-class supercomputers has been growing exponentially over the past few decades, and is projected to reach exascale in the near future. This trend, however, will continue to push forward the peak I/O...
Recent advances in multicasting present new opportunities for improving communication performance for clusters of workstations. The standard IP multicast, however, only supports unreliable multicast, which is diffcult to use for building...
This paper will discuss the development of a music classification system as a component in a music recommendation system. The front-end portion of the system is an Android Media Player application named SmartPlayer. The player is an...
Recently, the prevalence of WiFi devices and ubiquitous coverage of WiFi network provide us the opportunity to extend WiFi capabilities beyond communication, particularly in sensing the physical environment. Most existing systems that...
Random number generators have been studied and used for decades, and various kinds of generators have been proposed and improved to fit different types of problems. Better generators fit the problem tightly and utilize the architecture...
This thesis studies the 1-center problem on road networks, an important problem in GIS. Using Euclidean embeddings, and reduction to fast nearest neighbor search, an approximation algorithm is devised for this problem. On real world data...
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.