Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

806 Full-Text Articles 955 Authors 217701 Downloads 71 Institutions

All Articles in Computer and Systems Architecture

Faceted Search

806 full-text articles. Page 1 of 29.

Gpu-Arraysort: A Parallel, In-Place Algorithm For Sorting Large Number Of Arrays, Muaaz Awan, Fahad Saeed 2016 WMU

Gpu-Arraysort: A Parallel, In-Place Algorithm For Sorting Large Number Of Arrays, Muaaz Awan, Fahad Saeed

Parallel Computing and Data Science Lab Technical Reports

Modern day analytics deals with big datasets from diverse fields. For many application the data is in the form of an array which consists of large number of smaller arrays. Existing techniques focus on sorting a single large array and cannot be used for sorting large number of smaller arrays in an efficient manner. Currently no such algorithm is available which can sort such large number of arrays utilizing the massively parallel architecture of GPU devices. In this paper we present a highly scalable parallel algorithm, called GPU-ArraySort, for sorting large number of arrays using a GPU. Our algorithm performs ...


Spice: A Software Tool For Studying End-User’S Insecure Cyber Behavior And Personality-Traits, Anjila Tamrakar, Anjila Tamrakar 2016 University of New Orleans

Spice: A Software Tool For Studying End-User’S Insecure Cyber Behavior And Personality-Traits, Anjila Tamrakar, Anjila Tamrakar

University of New Orleans Theses and Dissertations

Insecure cyber behavior of end users may expose their computers to cyber-attack. A first step to improve their cyber behavior is to identify their tendency toward insecure cyber behavior. Unfortunately, not much work has been done in this area. In particular, the relationship between end users cyber behavior and their personality traits is much less explored. This paper presents a comprehensive review of a newly developed, easily configurable, and flexible software SPICE for psychologist and cognitive scientists to study personality traits and insecure cyber behavior of end users. The software utilizes well-established cognitive methods (such as dot-probe) to identify number ...


Framework For Deploying A Virtualized Computing Environment For Collaborative And Secure Data Analytics, Adrian Meyer, Laura Green, Ciearro Faulk, Stephen Galla, Anne-Marie Meyer 2016 UNC Lineberger Comprehensive Cancer Center

Framework For Deploying A Virtualized Computing Environment For Collaborative And Secure Data Analytics, Adrian Meyer, Laura Green, Ciearro Faulk, Stephen Galla, Anne-Marie Meyer

eGEMs (Generating Evidence & Methods to improve patient outcomes)

Introduction: Large amounts of health data generated by a wide range of health care applications across a variety of systems have the potential to offer valuable insight into populations and health care systems, but robust and secure computing and analytic systems are required to leverage this information.

Framework: We discuss our experiences deploying a Secure Data Analysis Platform (SeDAP), and provide a framework to plan, build and deploy a virtual desktop infrastructure (VDI) to enable innovation, collaboration and operate within academic funding structures. It outlines 6 core components: Security, Ease of Access, Performance, Cost, Tools, and Training.

Conclusion: A platform ...


Implementing A One Address Cpu In Logisim, Charles W. Kann III 2016 Gettysburg College

Implementing A One Address Cpu In Logisim, Charles W. Kann Iii

Gettysburg College Open Educational Resources

Most computer users have an incorrect, but useful, cognitive metaphor for computers in which the user says (or types or clicks) something and a mystical, almost intelligent or magical, behavior happens. It is not a stretch to describe computer users as believing computers follow the laws of magic, where some magic incantation is entered, and the computer responds with an expected, but magical, behavior.

This magic computer does not actually exist. In reality computer are machines, and every action a computer performs reduces to a set of mechanical operations. In fact the first complete definition of a working computer was ...


Climbing Up Cloud Nine: Performance Enhancement Techniques For Cloud Computing Environments, Mohamed Abusharkh 2016 The University of Western Ontario

Climbing Up Cloud Nine: Performance Enhancement Techniques For Cloud Computing Environments, Mohamed Abusharkh

Electronic Thesis and Dissertation Repository

With the transformation of cloud computing technologies from an attractive trend to a business reality, the need is more pressing than ever for efficient cloud service management tools and techniques. As cloud technologies continue to mature, the service model, resource allocation methodologies, energy efficiency models and general service management schemes are not yet saturated. The burden of making this all tick perfectly falls on cloud providers. Surely, economy of scale revenues and leveraging existing infrastructure and giant workforce are there as positives, but it is far from straightforward operation from that point. Performance and service delivery will still depend on ...


Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown 2016 Pepperdine University

Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown

Journal of International Technology and Information Management

Assessment is now at the center of the new business education zeitgeist. This focus is the direct result of feedback from the business community regarding the growing gap between their needs and graduates from many business schools. Recently this divide has fallen under even closer scrutiny because of increasing student debt and the growing controversy over return-on- investment. Today business leaders are looking for web-savvy, problem-solving graduates. To this end, AACSB and regional accrediting bodies are calling for the adoption of comprehensive collaborative learning strategies to better align graduates’ skill sets with the real needs of business. Crowdsourcing, which is ...


Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar 2016 Robert Gordon University

Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar

Journal of International Technology and Information Management

The rapid adoption of IT governance (ITG) frameworks in organizations worldwide, along with the subsequent need to select and integrate overlapping ITG frameworks has presented practitioners with challenges in choice and integration of frameworks. In this respect, the purpose of this study was to explore the ITG frameworks integration (ITGFI) challenges faced by organizations worldwide; develop and test a theory-based integrated ITG challenges (IIC) taxonomy model created from extant literature; and validate and compare these with those empirically extracted from three case studies in the United Arab Emirates (UAE). The results present the audience with a taxonomy of a prioritized ...


Privacy And The Information Age: A Longitudinal View, Charles E. Downing 2016 Northern Illinois University

Privacy And The Information Age: A Longitudinal View, Charles E. Downing

Journal of International Technology and Information Management

As information systems and data storage capacity become increasingly sophisticated, an important ethical question for organizations is “What can/will/should be done with the personal information that has been and can be collected?” Individuals’ privacy is certainly important, but so is less costly and more targeted business processes. As this conflict intensifies, consumers, managers and policy makers are left wondering: What privacy principles are important to guide organizations in self-regulation? For example, do consumers view the five rights originally stated in the European Data Protection Directive as important? Comprehensive? Is there a product discount point where consumers would forsake ...


Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee 2016 Miami University

Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee

Journal of International Technology and Information Management

Using the data collected from several universities in China and the United States, which have drastically different piracy rates, economic development stages, income levels, and national cultures, this study aims to identify which demographic factors affect software piracy significantly. Totally, the dataset includes 600 valid responses. Multivariate data analysis, supported by Multivariate Analysis of Variance and Turkey’s test, reveals that among various factors, country difference and gender most significantly influence software piracy. In addition, this study offers recommendations on how to curb software piracy effectively.


An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong 2016 Texas State University

An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong

Journal of International Technology and Information Management

Drawn upon upper echelon theory and organizational theory, this research proposes to examine the impact of CEO turnover in IT firms on firm performance in terms of both sustainable accounting performance and market performance. We find that CEO turnover is a significant determinant of firm performance, especially in IT firms. This paper contributes to the IS literature by investigating the CEO turnover impact in IT firms compared to other industries. This study also has practical implications by providing the guideline for IT firms on the CEO turnover policy. Such firms should place additional emphasis on their succession planning efforts.


Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa 2016 Winston-Salem State University

Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa

Journal of International Technology and Information Management

Facebook is one of the world’s leading social networking sites. It is pervasive in students’ lives and can impact their academic careers in a variety of ways. However, little research exists evaluating the use of Facebook in minority academic settings. An early step in this direction is to gain an understanding of how different student demographic groups use Facebook. An interest in further assessment of Facebook’s role in diverse segments of academia motivates the collection and analysis of Facebook-related data from minority serving institutions such as Historically Black Colleges or Universities (HBCUs) and Hispanic Serving Institutions (HSIs). This ...


On Optimizations Of Virtual Machine Live Storage Migration For The Cloud, Yaodong Yang 2016 University of Nebraska-Lincoln

On Optimizations Of Virtual Machine Live Storage Migration For The Cloud, Yaodong Yang

Computer Science and Engineering: Theses, Dissertations, and Student Research

Virtual Machine (VM) live storage migration is widely performed in the data cen- ters of the Cloud, for the purposes of load balance, reliability, availability, hardware maintenance and system upgrade. It entails moving all the state information of the VM being migrated, including memory state, network state and storage state, from one physical server to another within the same data center or across different data centers. To minimize its performance impact, this migration process is required to be transparent to applications running within the migrating VM, meaning that ap- plications will keep running inside the VM as if there were ...


3 E’S Enterprise Architecture Framework (That Encompasses Business Process, Information Systems, And Information Technology), Nicholas C. Bucciarelli Mr. 2016 Rochester Institute of Technology

3 E’S Enterprise Architecture Framework (That Encompasses Business Process, Information Systems, And Information Technology), Nicholas C. Bucciarelli Mr.

Articles

No abstract provided.


Wearable Ekg, Cale Hopkins, Tanner Papenfuss, Travis E. Michael 2016 California Polytechnic State University, San Luis Obispo

Wearable Ekg, Cale Hopkins, Tanner Papenfuss, Travis E. Michael

Computer Engineering

No abstract provided.


Senior Project: Control System For An Underwater Remotely Operated Vehicle, Tyler Mau, Joseph Mahoney 2016 California Polytechnic State University, San Luis Obispo

Senior Project: Control System For An Underwater Remotely Operated Vehicle, Tyler Mau, Joseph Mahoney

Computer Engineering

No abstract provided.


Pet Food Monitor Using The Raspberry Pi, Kimberly Aguero 2016 California Polytechnic State University, San Luis Obispo

Pet Food Monitor Using The Raspberry Pi, Kimberly Aguero

Computer Engineering

Computer system built on a Raspberry Pi that will monitor the levels of food in a pet food bowl. If it detects that there is no food in the bowl, it will notify the user via email or text.


High-Low, Cameron Burwell, Bryce Cheng-Campbell 2016 California Polytechnic State University, San Luis Obispo

High-Low, Cameron Burwell, Bryce Cheng-Campbell

Computer Science

The card game High-Low is a cooperative game that provides a unique problem of where all players have partial information and build off other players guesses to win the game. This problem lends itself to creating an AI bot that can play the game with other human players. By making decisions that change as the other players make guesses through the rounds, we have created an AI bot that plays the game with a good degree of accuracy.


Micronaut: A 2d Action Side Scrolling Platformer For The Apple Tv, Christopher Michael Williams 2016 California Polytechnic State University, San Luis Obispo

Micronaut: A 2d Action Side Scrolling Platformer For The Apple Tv, Christopher Michael Williams

Computer Science

Micronaut is a 2D side scrolling platformer video game application developed for the Apple TV with the tvOS SDK version 9.1. It explores human­computer interaction of platformer video games on the Apple TV and aims to give the player the most control to maximize enjoyment. Micronaut features five engaging levels with each level designed to focus on teaching the player the mechanics one at a time. Micronaut has been submitted and is undergoing submission for the Apple TV App Store at the time of this paper. Christopher Williams managed the software development and design, and Jacob Johannesen created ...


Astro - A Low-Cost, Low-Power Cluster For Cpu-Gpu Hybrid Computing Using The Jetson Tk1, Sean Kai Sheen 2016 California Polytechnic State University, San Luis Obispo

Astro - A Low-Cost, Low-Power Cluster For Cpu-Gpu Hybrid Computing Using The Jetson Tk1, Sean Kai Sheen

Master's Theses and Project Reports

With the rising costs of large scale distributed systems many researchers have began looking at utilizing low power architectures for clusters. In this paper, we describe our Astro cluster, which consists of 46 NVIDIA Jetson TK1 nodes each equipped with an ARM Cortex A15 CPU, 192 core Kepler GPU, 2 GB of RAM, and 16 GB of flash storage. The cluster has a number of advantages when compared to conventional clusters including lower power usage, ambient cooling, shared memory between the CPU and GPU, and affordability. The cluster is built using commodity hardware and can be setup for relatively low ...


Scare Tactics, Tiago Martines, Gabriel Ortega, Karan Sahu, Lucas Pereira Vasconcelos, Henrique Silva Chaltein de Almeida 2016 Rochester Institute of Technology

Scare Tactics, Tiago Martines, Gabriel Ortega, Karan Sahu, Lucas Pereira Vasconcelos, Henrique Silva Chaltein De Almeida

Theses

It is the purpose of this document to describe the design and development processes of Scare Tactics. The game will be discussed in further detail as it relates to several areas, such as market analysis, development process, game design, technical design, and each team members’ individual area of background research. The research areas include asymmetrical game design, level design, game engine architecture, real-time graphics, user interface design, networking and artificial intelligence.

As part of the team’s market analysis, other games featuring asymmetric gameplay are discussed. The games described in this section serve as inspirations for asymmetric game design. Some ...


Digital Commons powered by bepress