Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

824 Full-Text Articles 983 Authors 250496 Downloads 77 Institutions

All Articles in Computer and Systems Architecture

Faceted Search

824 full-text articles. Page 1 of 30.

Coyotelab - Linux Containers For Educational Use, Michael D. Korcha 2016 California State University - San Bernardino

Coyotelab - Linux Containers For Educational Use, Michael D. Korcha

Electronic Theses, Projects, and Dissertations

CoyoteLab is an exploration in the use of Linux container technology as a means to simplify the way students in computing fields access and complete laboratory work in their educational career. This project provides two main benefits: creating a simple way for students to log in and access their coursework without anything more than their web browser, and providing course instructors a way to verify that assigned work is completed successfully. Thanks to advances in container technology and the advent of WebSockets, this becomes a middle layer between a WebSocket opened up on the client’s browser and the SSH ...


Workflow Management System: A Customized Solution For Project Automation And Tracking, Amanda Harlan, Dhanushka Samarakoon 2016 Kansas State University

Workflow Management System: A Customized Solution For Project Automation And Tracking, Amanda Harlan, Dhanushka Samarakoon

Kansas Library Association College and University Libraries Section Proceedings

K-State Libraries have many complex digital workflows that involve multiple people and departments. One, in particular, had the ongoing issues of tracking different stages, individual responsibilities, information gathering, notifications, and uploads done manually. Due to the inefficiency that this caused, it led to the development of an open source workflow management system (WMS)


Open Source, Modular Platforms, And The Challenge Of Fragmentation, Christopher S. Yoo 2016 University of Pennsylvania Law School

Open Source, Modular Platforms, And The Challenge Of Fragmentation, Christopher S. Yoo

Faculty Scholarship

Open source and modular platforms represent two powerful conceptual paradigms that have fundamentally transformed the software industry. While generally regarded complementary, the freedom inherent in open source rests in uneasy tension with the strict structural requirements required by modularity theory. In particular, third party providers can produce noncompliant components, and excessive experimentation can fragment the platform in ways that reduce its economic benefits for end users and app providers and force app providers to spend resources customizing their code for each variant. The classic solutions to these problems are to rely on some form of testing to ensure that the ...


An Application Of Plausible Reasoning To Information Retrieval, Farhad Oroumchian, Robert N. Oddy 2016 Syracuse University

An Application Of Plausible Reasoning To Information Retrieval, Farhad Oroumchian, Robert N. Oddy

Farhad Oroumchian

This work explores the use of plausible inferences as a means of retrieving relevant documents. Collins and Michalski’s theory of plausible reasoning has been modified to accommodate information retrieval. Methods are proposed to represent document contents by logical terms and statements, and queries by incomplete logical statements. Extensions to plausible inferences are discussed. Two versions of the extended plausible reasoning system were implemented, one using dominance weights (described in the paper) and the other using tf. Idf (Term Frequency Inverse Document Frequency) weights. Experiments were conducted using the titles and abstracts of the CACM collection and it was found ...


Learning And Practicing Data Analytics Using Sap In-Memory Computing, Hong G. Jung, Vincent L. Mitchell, Jihoon Park, Sam Chung 2016 Southern Illinois University Carbondale

Learning And Practicing Data Analytics Using Sap In-Memory Computing, Hong G. Jung, Vincent L. Mitchell, Jihoon Park, Sam Chung

ASA Multidisciplinary Research Symposium

The analysis and organization of Big Data is becoming important in the business industry. Using and understanding ERP (Enterprise Resource Planning) software to interpret Big Data is essential to the evolution of Information System Technology. This research on SAP HANA and SAP Lumira allows us the opportunity to explore.


Levitating Libraries To The Clouds: A Strategy For Academic Libraries, Mark Dehmlow 2016 University of Notre Dame

Levitating Libraries To The Clouds: A Strategy For Academic Libraries, Mark Dehmlow

Charleston Library Conference

The University of Notre Dame’s Office of Information Technology is in the process of implementing a “Cloud First” strategy through which it intends to move 80% of its core technical infrastructure into the cloud by the end of 2017. The strategy advocates a tiered prioritization structure that recommends the hosting (SaaS) model for most services, the AWS (IaaS) model for fewer services, and finally on premises for a handful of the remaining services. As a campus technology partner, the Hesburgh Libraries has begun planning for moving many of our services and infrastructure into the cloud. This initiative represents a ...


Assisting Children Action Association Through Visual Queues And Wearable Technology, Anthony Young 2016 Chapman University

Assisting Children Action Association Through Visual Queues And Wearable Technology, Anthony Young

Computational and Data Sciences Theses

Autism Spectrum Disorder makes it difficult to for a child communicate, have social interactions and go through daily life. Visual cues are often used to help a child associate an image with an event. With technology becoming more and more advanced, we now have a way to remind a child of an event with wearable technology, such as a watch. This new technology can help a child directly with the Visual Scheduling Application and various other applications. These applications allow children and their families to be easily able to keep track of the events on their schedule and notify them ...


A Comparison Of X86 Computer Architecture Simulators, Ayaz Akram, Lina Sawalha 2016 Western Michigan University

A Comparison Of X86 Computer Architecture Simulators, Ayaz Akram, Lina Sawalha

Computer Architecture and Systems Research Laboratory (CASRL)

The significance of computer architecture simulators in advancing computer architecture research is widely acknowledged. Computer architects have developed numerous simulators in the past few decades and their number continues to rise. This paper explores different simulation techniques and surveys many simulators. Comparing simulators with each other and validating their correctness has been a challenging task. In this paper, we compare and contrast x86 simulators in terms of flexibility, level of details, user friendliness and simulation models. In addition, we measure the experimental error and compare the speed of four contemporary x86 simulators: gem5, Sniper, Multi2sim and PTLsim. We also discuss ...


Gpu-Arraysort: A Parallel, In-Place Algorithm For Sorting Large Number Of Arrays, Muaaz Awan, Fahad Saeed 2016 WMU

Gpu-Arraysort: A Parallel, In-Place Algorithm For Sorting Large Number Of Arrays, Muaaz Awan, Fahad Saeed

Parallel Computing and Data Science Lab Technical Reports

Modern day analytics deals with big datasets from diverse fields. For many application the data is in the form of an array which consists of large number of smaller arrays. Existing techniques focus on sorting a single large array and cannot be used for sorting large number of smaller arrays in an efficient manner. Currently no such algorithm is available which can sort such large number of arrays utilizing the massively parallel architecture of GPU devices. In this paper we present a highly scalable parallel algorithm, called GPU-ArraySort, for sorting large number of arrays using a GPU. Our algorithm performs ...


Spice: A Software Tool For Studying End-User’S Insecure Cyber Behavior And Personality-Traits, Anjila Tamrakar, Anjila Tamrakar 2016 University of New Orleans

Spice: A Software Tool For Studying End-User’S Insecure Cyber Behavior And Personality-Traits, Anjila Tamrakar, Anjila Tamrakar

University of New Orleans Theses and Dissertations

Insecure cyber behavior of end users may expose their computers to cyber-attack. A first step to improve their cyber behavior is to identify their tendency toward insecure cyber behavior. Unfortunately, not much work has been done in this area. In particular, the relationship between end users cyber behavior and their personality traits is much less explored. This paper presents a comprehensive review of a newly developed, easily configurable, and flexible software SPICE for psychologist and cognitive scientists to study personality traits and insecure cyber behavior of end users. The software utilizes well-established cognitive methods (such as dot-probe) to identify number ...


Framework For Deploying A Virtualized Computing Environment For Collaborative And Secure Data Analytics, Adrian Meyer, Laura Green, Ciearro Faulk, Stephen Galla, Anne-Marie Meyer 2016 UNC Lineberger Comprehensive Cancer Center

Framework For Deploying A Virtualized Computing Environment For Collaborative And Secure Data Analytics, Adrian Meyer, Laura Green, Ciearro Faulk, Stephen Galla, Anne-Marie Meyer

eGEMs (Generating Evidence & Methods to improve patient outcomes)

Introduction: Large amounts of health data generated by a wide range of health care applications across a variety of systems have the potential to offer valuable insight into populations and health care systems, but robust and secure computing and analytic systems are required to leverage this information.

Framework: We discuss our experiences deploying a Secure Data Analysis Platform (SeDAP), and provide a framework to plan, build and deploy a virtual desktop infrastructure (VDI) to enable innovation, collaboration and operate within academic funding structures. It outlines 6 core components: Security, Ease of Access, Performance, Cost, Tools, and Training.

Conclusion: A platform ...


Decelerating I/O Power Management, Shuang Zhai, Felix Xiaozhu Lin 2016 Purdue University

Decelerating I/O Power Management, Shuang Zhai, Felix Xiaozhu Lin

The Summer Undergraduate Research Fellowship (SURF) Symposium

System suspend/resume is crucial to energy proportionality of modern computers, from wearable to cloud servers. Ironically, this OS mechanism itself is slow and energy hungry. Through characterizing the Linux kernel on a variety of modern system-on-chips (SoCs), we show the major reason as slow power state transitions of IO, which keeps CPU waiting. Furthermore, we argue that the IO wait can hardly be reduced to a satisfactory level, because most of slow transitions of IO are bounded by peripherals, low-speed buses, or physical factors. Therefore, the kernel execution for suspend/resume should be offloaded to a miniature core that ...


Achieving High Reliability And Efficiency In Maintaining Large-Scale Storage Systems Through Optimal Resource Provisioning And Data Placement, Lipeng Wan 2016 University of Tennessee, Knoxville

Achieving High Reliability And Efficiency In Maintaining Large-Scale Storage Systems Through Optimal Resource Provisioning And Data Placement, Lipeng Wan

Doctoral Dissertations

With the explosive increase in the amount of data being generated by various applications, large-scale distributed and parallel storage systems have become common data storage solutions and been widely deployed and utilized in both industry and academia. While these high performance storage systems significantly accelerate the data storage and retrieval, they also bring some critical issues in system maintenance and management. In this dissertation, I propose three methodologies to address three of these critical issues.

First, I develop an optimal resource management and spare provisioning model to minimize the impact brought by component failures and ensure a highly operational experience ...


An Application Of The Universal Verification Methodology, Rui Ma 2016 University of Tennessee, Knoxville

An Application Of The Universal Verification Methodology, Rui Ma

Masters Theses

The Universal Verification Methodology (UVM) package is an open-source SystemVerilog library, which is used to set up a class-based hierarchical testbench. UVM testbenches improve the reusability of Verilog testbenches. Direct Memory Access (DMA) plays an important role in modern computer architecture. When using DMA to transfer data between a host machine and field-programmable gate array (FPGA) accelerator, a modularized DMA core on the FPGA frees the host side Central Processing Unit(CPU) during the transfer, helps to save FPGA resources, and enhances performance. Verifying the functionality of a DMA core is essential before mapping it to the FPGA. In this ...


The Design And Validation Of A Wireless Bat-Mounted Sonar Recording System, Jeremy Joseph Langford 2016 University of Tennessee, Knoxville

The Design And Validation Of A Wireless Bat-Mounted Sonar Recording System, Jeremy Joseph Langford

Masters Theses

Scientists studying the behavior of bats monitor their echolocation calls, as their calls are important for navigation and feeding, but scientist are typically restricted to ground-based recording. Recording bat calls used for echolocation from the back of the bat as opposed to the ground offers the opportunity to study bat echolocation from a vantage otherwise only offered to the bats themselves. However, designing a bat mounted in-flight audio recording system, (bat-tag), capable of recording the ultra-sound used in bat echolocation presents a unique set of challenges. Chiefly, the bat-tag must be sufficiently light weight as to not overburden the bat ...


Climbing Up Cloud Nine: Performance Enhancement Techniques For Cloud Computing Environments, Mohamed Abusharkh 2016 The University of Western Ontario

Climbing Up Cloud Nine: Performance Enhancement Techniques For Cloud Computing Environments, Mohamed Abusharkh

Electronic Thesis and Dissertation Repository

With the transformation of cloud computing technologies from an attractive trend to a business reality, the need is more pressing than ever for efficient cloud service management tools and techniques. As cloud technologies continue to mature, the service model, resource allocation methodologies, energy efficiency models and general service management schemes are not yet saturated. The burden of making this all tick perfectly falls on cloud providers. Surely, economy of scale revenues and leveraging existing infrastructure and giant workforce are there as positives, but it is far from straightforward operation from that point. Performance and service delivery will still depend on ...


Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown 2016 Pepperdine University

Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown

Journal of International Technology and Information Management

Assessment is now at the center of the new business education zeitgeist. This focus is the direct result of feedback from the business community regarding the growing gap between their needs and graduates from many business schools. Recently this divide has fallen under even closer scrutiny because of increasing student debt and the growing controversy over return-on- investment. Today business leaders are looking for web-savvy, problem-solving graduates. To this end, AACSB and regional accrediting bodies are calling for the adoption of comprehensive collaborative learning strategies to better align graduates’ skill sets with the real needs of business. Crowdsourcing, which is ...


Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar 2016 Robert Gordon University

Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar

Journal of International Technology and Information Management

The rapid adoption of IT governance (ITG) frameworks in organizations worldwide, along with the subsequent need to select and integrate overlapping ITG frameworks has presented practitioners with challenges in choice and integration of frameworks. In this respect, the purpose of this study was to explore the ITG frameworks integration (ITGFI) challenges faced by organizations worldwide; develop and test a theory-based integrated ITG challenges (IIC) taxonomy model created from extant literature; and validate and compare these with those empirically extracted from three case studies in the United Arab Emirates (UAE). The results present the audience with a taxonomy of a prioritized ...


Privacy And The Information Age: A Longitudinal View, Charles E. Downing 2016 Northern Illinois University

Privacy And The Information Age: A Longitudinal View, Charles E. Downing

Journal of International Technology and Information Management

As information systems and data storage capacity become increasingly sophisticated, an important ethical question for organizations is “What can/will/should be done with the personal information that has been and can be collected?” Individuals’ privacy is certainly important, but so is less costly and more targeted business processes. As this conflict intensifies, consumers, managers and policy makers are left wondering: What privacy principles are important to guide organizations in self-regulation? For example, do consumers view the five rights originally stated in the European Data Protection Directive as important? Comprehensive? Is there a product discount point where consumers would forsake ...


Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee 2016 Miami University

Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee

Journal of International Technology and Information Management

Using the data collected from several universities in China and the United States, which have drastically different piracy rates, economic development stages, income levels, and national cultures, this study aims to identify which demographic factors affect software piracy significantly. Totally, the dataset includes 600 valid responses. Multivariate data analysis, supported by Multivariate Analysis of Variance and Turkey’s test, reveals that among various factors, country difference and gender most significantly influence software piracy. In addition, this study offers recommendations on how to curb software piracy effectively.


Digital Commons powered by bepress