Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

1,001 Full-Text Articles 1,313 Authors 428,562 Downloads 103 Institutions

All Articles in Computer and Systems Architecture

Faceted Search

1,001 full-text articles. Page 6 of 39.

Developing A Digital Contents Valuing Model: How Users Appreciate Their Values, Changsu Kim, Jongheon Kim 2017 Yeungnam University

Developing A Digital Contents Valuing Model: How Users Appreciate Their Values, Changsu Kim, Jongheon Kim

Journal of International Technology and Information Management

The principal objective of this paper was to propose and verify a digital content valuing model, which is expected to perform a significant role in future research, and provide novel and practical implications. For the efficacy of a model for the evaluation of digital content value, this study reviewed digital content value and categorized it into intrinsic, interaction, and business value. Based on the research model, we attempted to identify and assess the effects of intrinsic digital content value on digital content interaction value, and to characterize the relationship between digital content interaction value and digital content business value. Consequently ...


Table Of Contents Jitim Vol 26 Issue 4, 2017, 2017 California State University, San Bernardino

Table Of Contents Jitim Vol 26 Issue 4, 2017

Journal of International Technology and Information Management

Table of Contents


Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr 2017 University of East London

Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr

Journal of International Technology and Information Management

The discovery of useful or worthwhile process models must be performed with due regards to the transformation that needs to be achieved. The blend of the data representations (i.e data mining) and process modelling methods, often allied to the field of Process Mining (PM), has proven to be effective in the process analysis of the event logs readily available in many organisations information systems. Moreover, the Process Discovery has been lately seen as the most important and most visible intellectual challenge related to the process mining. The method involves automatic construction of process models from event logs about any ...


Automated Program Profiling And Analysis For Managing Heterogeneous Memory Systems, Adam Palmer Howard 2017 University of Tennessee, Knoxville

Automated Program Profiling And Analysis For Managing Heterogeneous Memory Systems, Adam Palmer Howard

Masters Theses

Many promising memory technologies, such as non-volatile, storage-class memories and high-bandwidth, on-chip RAMs, are beginning to emerge. Since each of these new technologies present tradeoffs distinct from conventional DRAMs, next-generation systems are likely to include multiple tiers of memory storage, each with their own type of devices. To efficiently utilize the available hardware, such systems will need to alter their data management strategies to consider the performance and capabilities provided by each tier.

This work explores a variety of cross-layer strategies for managing application data in heterogeneous memory systems. We propose different program profiling-based techniques to automatically partition program allocation ...


Reengineering A 2-Tier Database Application With Software Architecture, Hong G. Jung 2017 Southern Illinois University Carbondale

Reengineering A 2-Tier Database Application With Software Architecture, Hong G. Jung

ASA Multidisciplinary Research Symposium

The purpose of this research is to demonstrate how to reengineer a legacy Database Application using to a target system with MVC and 3-layered architecture. A Coffee Inventory Management database application is used for legacy application. The benefits of the reengineering are discussed.


A Study Of Very Short Intermittent Ddos Attacks On The Performance Of Web Services In Clouds, Huasong Shan 2017 Louisiana State University and Agricultural and Mechanical College

A Study Of Very Short Intermittent Ddos Attacks On The Performance Of Web Services In Clouds, Huasong Shan

LSU Doctoral Dissertations

Distributed Denial-of-Service (DDoS) attacks for web applications such as e-commerce are increasing in size, scale, and frequency. The emerging elastic cloud computing cannot defend against ever-evolving new types of DDoS attacks, since they exploit various newly discovered network or system vulnerabilities even in the cloud platform, bypassing not only the state-of-the-art defense mechanisms but also the elasticity mechanisms of cloud computing.

In this dissertation, we focus on a new type of low-volume DDoS attack, Very Short Intermittent DDoS Attacks, which can hurt the performance of web applications deployed in the cloud via transiently saturating the critical bottleneck resource of the ...


Improving Large Scale Application Performance Via Data Movement Reduction, Dewan M. Ibtesham 2017 University of New Mexico

Improving Large Scale Application Performance Via Data Movement Reduction, Dewan M. Ibtesham

Computer Science ETDs

The compute capacity growth in high performance computing (HPC) systems is outperforming improvements in other areas of the system for example, memory capacity, network bandwidth and I/O bandwidth. Therefore, the cost of executing a floating point operation is decreasing at a faster rate than moving that data. This increasing performance gap causes wasted CPU cycles while waiting for slower I/O operations to complete in the memory hierarchy, network, and storage. These bottlenecks decrease application time to solution performance, and increase energy consumption, resulting in system under utilization. In other words, data movement is becoming a key concern for ...


A Study Of Application-Awareness In Software-Defined Data Center Networks, Chui-Hui Chiu 2017 Louisiana State University and Agricultural and Mechanical College

A Study Of Application-Awareness In Software-Defined Data Center Networks, Chui-Hui Chiu

LSU Doctoral Dissertations

A data center (DC) has been a fundamental infrastructure for academia and industry for many years. Applications in DC have diverse requirements on communication. There are huge demands on data center network (DCN) control frameworks (CFs) for coordinating communication traffic. Simultaneously satisfying all demands is difficult and inefficient using existing traditional network devices and protocols. Recently, the agile software-defined Networking (SDN) is introduced to DCN for speeding up the development of the DCNCF. Application-awareness preserves the application semantics including the collective goals of communications. Previous works have illustrated that application-aware DCNCFs can much more efficiently allocate network resources by explicitly ...


Answering Food Insecurity: Serving The Community With Food And Knowledge Using Technology, Courtney Simpson 2017 Purdue University

Answering Food Insecurity: Serving The Community With Food And Knowledge Using Technology, Courtney Simpson

Purdue Journal of Service-Learning and International Engagement

The courses of Tech120, CGT110, and ENGT 180/181 and Red Gold at Purdue collaborated to design a robot that would plant and water a garden for a local community charter school. The students centered the project on the users’ needs for fresh food, nutrition education, and early exposure to STEM for children. The school, Anderson Preparatory Academy (APA), is comprised of many children who come from low-income families and are in the free or reduced lunch program. Inspired from “Farm Bot,” a similar system that allows for almost hands-free gardening, the “Boiler Bot” is designed to be scalable so ...


Access Update For Gvsu, Matt Schultz, Kyle Felker 2017 Grand Valley State University

Access Update For Gvsu, Matt Schultz, Kyle Felker

Matt Schultz

By Fall 2016, GVSU Libraries began making a major strategic and technology shift toward the use of open source technologies versus commercial vendor solutions for digital preservation and access. In this presentation to the Mid-Michigan Digital Practitioners (MMDP) community, Matt Schultz (Metadata & Digital Curation Librarian) and Kyle Felker (Digital Initiatives Librarian) provide updates on these new directions.


Power-Efficient And Highly Scalable Parallel Graph Sampling Using Fpgas, Usman Tariq, Umer Cheema, Fahad Saeed 2017 WMU

Power-Efficient And Highly Scalable Parallel Graph Sampling Using Fpgas, Usman Tariq, Umer Cheema, Fahad Saeed

Parallel Computing and Data Science Lab Technical Reports

Energy efficiency is a crucial problem in data centers where big data is generally represented by directed or undirected graphs. Analysis of this big data graph is challenging due to volume and velocity of the data as well as irregular memory access patterns. Graph sampling is one of the most effective ways to reduce the size of graph while maintaining crucial characteristics. In this paper we present design and implementation of an FPGA based graph sampling method which is both time- and energy-efficient. This is in contrast to existing parallel approaches which include memory-distributed clusters, multicore and GPUs. Our ...


Understanding The Determinants Affecting The Continuance Intention To Use Cloud Computing, Shailja Tripathi Dr. 2017 IFHE University, IBS Hyderabad

Understanding The Determinants Affecting The Continuance Intention To Use Cloud Computing, Shailja Tripathi Dr.

Journal of International Technology and Information Management

Cloud computing has been progressively implemented in the organizations. The purpose of the paper is to understand the fundamental factors influencing the senior manager’s continuance intention to use cloud computing in organizations. A conceptual framework was developed by using the Technology Acceptance Model (TAM) as a base theoretical model. A questionnaire was used to collect the data from several companies in IT, manufacturing, finance, pharmaceutical and retail sectors in India. The data analysis was done using structural equation modeling technique. Perceived usefulness and perceived ubiquity are identified as important factors that affect continuance intention to use cloud computing. In ...


Table Of Contents Jitim Vol 26 Issue 3, 2017, 2017 California State University, San Bernardino

Table Of Contents Jitim Vol 26 Issue 3, 2017

Journal of International Technology and Information Management

Table of Contents


Poster Abstract- Mitigating Multi-Tenant Interference On Mobile Offloading Servers, Zhou Fang, Mulong Luo, Tong Yu, Ole J. Mengshoel, Mani B. Srivastava, Rajesh K. Gupta 2017 Carnegie Mellon University

Poster Abstract- Mitigating Multi-Tenant Interference On Mobile Offloading Servers, Zhou Fang, Mulong Luo, Tong Yu, Ole J. Mengshoel, Mani B. Srivastava, Rajesh K. Gupta

Ole J Mengshoel

This work considers that multiple mobile clients offload various continuous sensing applications with end-to-end delay constraints, to a cluster of machines as the server. Contention for shared computing resources on a server can result in delay degradation and application malfunction. We present ATOMS (Accurate Timing prediction and Offloading for Mobile Systems), a framework to mitigate multi-tenant resource contention and to improve delay using a two-phase Plan-Schedule approach. The planning phase includes methods to predict future workloads from all clients, to estimate contention, and to devise offloading schedule to reduce contention. The scheduling phase dispatches arriving offloaded workload to the server ...


Audiosense: Sound-Based Shopper Behavior Analysis System, Amit SHARMA, Youngki LEE 2017 Singapore Management University

Audiosense: Sound-Based Shopper Behavior Analysis System, Amit Sharma, Youngki Lee

Research Collection School Of Information Systems

This paper presents AudioSense, the system to monitor user-item interactions inside a store hence enabling precisely customized promotions. A shopper's smartwatch emits sound every time the shopper picks up or touches an item inside a store. This sound is then localized, in 2D space, by calculating the angles of arrival captured by multiple microphones deployed on the racks. Lastly, the 2D location is mapped to specific items on the rack based on the rack layout information. In our initial experiments conducted with a single rack with 16 compartments, we could localize the shopper's smartwatch with a median estimation ...


Feature Extraction And Parallel Visualization For Large-Scale Scientific Data, Lina Yu 2017 University of Nebraska - Lincoln

Feature Extraction And Parallel Visualization For Large-Scale Scientific Data, Lina Yu

Computer Science and Engineering: Theses, Dissertations, and Student Research

Advanced computing and sensing technologies enable scientists to study natural and physical phenomena with unprecedented precision, resulting in an explosive growth of data. The unprecedented amounts of data generated from large scientific simulations impose a grand challenge in data analytics and visualization due to the fact that data are too massive for transferring, storing, and processing.

This dissertation makes the first contribution to the design of novel transfer functions and application-aware data replacement policy to facilitate feature classification on highly parallel distributed systems. We design novel transfer functions that advance the classification of continuously changed volume data by combining the ...


Bim+Blockchain: A Solution To The Trust Problem In Collaboration?, Malachy Mathews, Dan Robles, Brian Bowe 2017 Dublin Institute of Technology

Bim+Blockchain: A Solution To The Trust Problem In Collaboration?, Malachy Mathews, Dan Robles, Brian Bowe

Conference papers

This paper provides an overview of historic and current organizational limitations emerging in the Architecture, Engineering, Construction, Building Owner / Operations (AECOO) Industry. It then provides an overview of new technologies that attempt to mitigate these limitations. However, these technologies, taken together, appear to be converging and creating entirely new organizational structures in the AEC industries. This may be characterized by the emergence of what is called the Network Effect and it’s related calculus. This paper culminates with an introduction to Blockchain Technology (BT) and it’s integration with the emergence of groundbreaking technologies such as Internet of Things (IoT ...


Lmproving Microcontroller And Computer Architecture Education Through Software Simulation, Kevin Brightwell 2017 The University of Western Ontario

Lmproving Microcontroller And Computer Architecture Education Through Software Simulation, Kevin Brightwell

Electronic Thesis and Dissertation Repository

In this thesis, we aim to improve the outcomes of students learning Computer Architecture and Embedded Systems topics within Software and Computer Engineering programs. We develop a simulation of processors that attempts to improve the visibility of hardware within the simulation environment and replace existing solutions in use within the classroom. We designate a series of requirements of a successful simulation suite based on current state-of-the-art simulations within literature. Provided these requirements, we build a quantitative rating of the same set of simulations. Additionally, we rate our previously implemented tool, hc12sim, with current solutions. Using the gaps in implementations from ...


Resource Estimation For Large Scale, Real-Time Image Analysis On Live Video Cameras Worldwide, Caleb Tung, Yung-Hsiang Lu, Anup Mohan 2017 Purdue University

Resource Estimation For Large Scale, Real-Time Image Analysis On Live Video Cameras Worldwide, Caleb Tung, Yung-Hsiang Lu, Anup Mohan

The Summer Undergraduate Research Fellowship (SURF) Symposium

Thousands of public cameras live-stream an abundance of data to the Internet every day. If analyzed in real-time by computer programs, these cameras could provide unprecedented utility as a global sensory tool. For example, if cameras capture the scene of a fire, a system running image analysis software on their footage in real-time could be programmed to react appropriately (perhaps call firefighters). No such technology has been deployed at large scale because the sheer computing resources needed have yet to be determined. In order to help us build computer systems powerful enough to achieve such lifesaving feats, we developed a ...


An Interactive Interface For Nursing Robots., Ankita Sahu 2017 University of Louisville

An Interactive Interface For Nursing Robots., Ankita Sahu

Electronic Theses and Dissertations

Physical Human-Robot Interaction (pHRI) is inevitable for a human user while working with assistive robots. There are various aspects of pHRI, such as choosing the interface, type of control schemes implemented and the modes of interaction. The research work presented in this thesis concentrates on a health-care assistive robot called Adaptive Robot Nursing Assistant (ARNA). An assistive robot in a health-care environment has to be able to perform routine tasks and be aware of the surrounding environment at the same time. In order to operate the robot, a teleoperation based interaction would be tedious for some patients as it would ...


Digital Commons powered by bepress