Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Mobile platforms have become ubiquitous in our society; however, classical benchmarks have not kept up with their growth. When not entirely incompatible, current benchmarking techniques often provide very little useful information about...
With regard to Emergency Medical Services (EMS), the response time and consistency that they can provide care to in need patients is of the upmost importance. The key aspects of achieving this efficiency lies in how the EMS vehicles are...
In recent years, studies have shown that independent/sparse components of local windows of natural images resemble the receptive fields of cells in the early stages of the mammalian visual pathway. However, the role of the independence...
With the advancement information and communication technologies, networked computing devices have been adopted to address real-world challenges due to their efficiency and programmability while maintaining scalability, sustainability, ...
Clustering is an essential data mining tool that aims to discover inherent cluster structure in data. As such, the study of clusterability, which evaluates whether data possesses such structure, is an integral part of cluster analysis....
Network of unmanned vehicles, are poised to be the next giant leap of technology. Such systems are already being used by the defense and law enforcement agencies. The US DoD and some very large private corporations are spending large...
Instruction fetch is an important pipeline stage for embedded processors, as it can consume a significant fraction of the total processor energy. This dissertation describes the design and implementation of two new fetch enhancements...
When considering computer processors, there is a trade-off between performance and power; improved performance does not typically come without an increase in power. Similarly, the reduction of power often times means a reduction in...
In today's world, data information, exchange, and processing are sustenance to corporations, organizations, and government agencies. Communications networks are relied upon to meet the computing needs of such organizations. These groups...
Researchers agree that protecting a stand-alone autonomous mobile agent with software-only approaches remains difficult. In this thesis, we produce several results that enhance mobile agent security and provide generalized code...
In real-world mission planning, the environment can be quite complex, and a path planner has thepotential to enable an agent to fulfill its goals in spite of unanticipated events and unexpected situations. A sound path planner defines a...
This thesis presents a new architecture for improving the interactivity and responsiveness of massively multiplayer on-line games. In order to aide in the quick delivery of game updates generated by a game client, this thesis presents a...
Hurricanes cause significant property loss every year. A substantial part of that loss is due to the trees destroyed by the wind, which in turn block the roads and produce a large amount of debris. The debris not only can cause damage to...
In recent years, the need to reduce the power and energy requirements of computer microprocessors has increased dramatically. In the past, microprocessor architects succeeded in improving the performance of their designs by increasing...
Conditional branches have traditionally been a performance bottleneck for most processors. The high frequency of branches in code coupled with expensive pipeline flushes on mispredictions make branches expensive instructions worth...
Many contemporary disk drives have built-in queues and schedulers. These features can improve I/O performance, by offloading work from the system's main processor, avoiding disk idle time, and taking advantage of vendor-specific disk...
Existing solutions that address data loss, theft, and corruption of information and resources in networks rely on deep content analysis, central policy management, and attempt to achieve broad content protection across multiple platforms...
My thesis is that a realistic image of a human face can be generated using a computational simulation of light transport. I demonstrate this thesis by acquiring the three-dimensional geometry of a face, measuring the reflectance function...
The task of protecting software integrity can be approached with a two-part strategy that addresses threats to the static integrity of memory contents and the dynamic integrity of software memory interactions. Although their resultant...
Vehicular wireless networks are gaining commercial interest. Mobile connectivity, road safety, and traffic congestion management are some applications that have arisen with this networking paradigm. Existing research primarily focuses on...
In many Monte Carlo applications, one can substitute the use of pseudorandom numbers with quasirandom numbers and achieve improved convergence. This is because quasirandom numbers are more uniform than pseudorandom numbers. The most...
Efficient implementations of the Discrete Fourier Transform (DFT) for GPUs provide good performance with large data sizes, but are not competitive with CPU code for small data sizes. On the other hand, several applications require the...
Researchers and scientists regularly work on solving complex real-world problems in medical science, environmental science, astrophysics, etc., to achieve mission-critical research goals through scientific campaigns. These campaigns are...
This thesis presents the Sampling-Based Model Predictive Control (SBMPC) Algorithm, a novel sampling-based planning algorithm. This algorithm was originally designed for dynamic system which are described by a set of system states and a...
This research examines the development of a system architecture for collaborative learning that combines feedback, group awareness, and chat in the form of both textual and auditory input. The goals are to evaluate the capability of...
A specialized variation of associations for biodiversity data is defined and developed that makes the capture and discovery of information about biological images easier and more efficient. Biodiversity is the study of the diversity of...
Protein is a linear chain of amino acids bonded by peptide bonds. Protein plays a vital role in almost every biological process. For most proteins, they need to fold into a stable 3D structure (native state) in order to function properly...
Phishing scams have grown in frequency and developed in sophistication, and in recent years emails have been misused by scammers to frequently launch criminal attacks. By using phishing emails, scammers can make money in a very short...
Query rewriting (QR) is a critical component in dialogue systems for reducing frictions caused by systematic errors or user ambiguity. When there is an entity error, it imposes extra difficulty for a dialogue system to produce...
A significant percentage of execution cycles are devoted to performing conditional transfers of control, which occur frequently, cause pipeline flushes when mis-predicted and can prevent other code improving transformations from being...
Simulation software is used in a multitude of industry and academic fields, in an assortment of scopes. One might be interested in gravitation of celestial bodies, or field structures of molecular interactions. The scale to which these...
Clusters of Symmetric Multiprocessing (SMP) nodes with multi-core Chip Multiprocessors (CMP), also known as SMP-CMP clusters, are ubiquitous today. Message Passing Interface (MPI) is the de facto standard for developing message passing...
In this dissertation we design a system that allows Semantic Web agents to reason within what has come to be known as the Web of Trust. We integrated reasoning about belief and trust, so agents can reason about information from different...
The Internet provides a general communication environment for distributed resource sharing. XML has become a key technology for information representation and exchange on the Internet, increasing the opportunity for integration of the...
Near point problems are widely used in computational geometry as well as a variety of other scientific fields. This work examines four common near point problems and presents original algorithms that solve them. Planar nearest neighbor...
Energy efficiency is an important design consideration in nearly all classes of processors, but is of particular importance to mobile and embedded systems. The data cache accounts for a significant portion of processor power. We have...
The ART executes apps in the Dalvik VM. The Dalvik VM creates a Zygote instance when the device first boots which is responsible for sharing Android runtime libraries to new applications. New apps rely heavily on external libraries in...
Closed domain question answering (QA) systems achieve precision and recall at the cost of complex language processing techniques to parse the answer corpus. We propose a query-based model for indexing answers in a closed domain factoid...
Computational simulation is expected to play a vital role in the nanotechnology revolution. Molecular dynamics (MD) has been used traditionally by physicists and chemists to predict physical and chemical properties of small atomic...
Neural network based word embeddings have demonstrated outstanding results in a variety of tasks, and become a standard input for Natural Language Processing (NLP) related deep learning methods. Despite these representations are able to...
The dissertation research is concerned with enabling parallel, high-performance computationâ in particular development of scientific software in the network-aware programming language, Java. Traditionally, this kind of computing was...
The graph is a data structure that exists widely around us, including traditional fields like physics, biology, and cosmology, as well as emergent fields like social networks, software engineering, and financial trading platforms. The...
We have considered the problem of tracking and recognition using a three dimensional representation of human faces. First we present a review of the research in the tracking and recognition fields including a list of several commercially...
In wireless LANs, a packet may be received correctly for the most part but contains only a few errors. Such packets are usually referred to as partial packets. The current 802.11 standard will retransmit the entire packet even if the...
The objective of my doctoral dissertation research is to formulate, implement, and validate metrics and techniques towards perceiving some of the influences on software development, predicting the impact of user initiated changes on a...
Pseudorandom number generators (PRNGs) are an essential tool in many areas, including simulation studies of stochastic processes, modeling, randomized algorithms, and games. The performance of any PRNGs depends on the quality of the...
Many of today's underwater vehicles have a limited set of pre-planned behaviors that are of varying utility. This is due, in part, to very low underwater communication rates and difficulties observing the vehicle's underwater behavior...
In many multi-user cryptographic applications (e.g., electronic voting, digital lotteries, e-cash application, anonymous access to some resources, etc.), anonymity pops up as one of the main security objectives. Protecting private...
Soft Computing is the fusion of methodologies that were designed to model and enable solutions to real world problems, which are not modeled, or too difficult to model, mathematically. These problems are typically associated with fuzzy, ...
Biological databases are growing at an exponential rate. Designing algorithms to deal with the inherent redundancy in these databases which can cope with the overwhelming amount of data returned from similarity searches is an active area...
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.