Vsfs: A Versatile Searchable File System For Hpc Analytics, 2013 University of Nebraska-Lincoln
Vsfs: A Versatile Searchable File System For Hpc Analytics, Lei Xu, Ziling Huang, Hong Jiang, Lei Tian, David Swanson
CSE Technical Reports
Big-data/HPC analytics applications have urgent needs for file-search services to drastically reduce the scale of the input data to accelerate analytics. Unfortunately, the existing solutions either are poorly scalable for large-scale systems, or lack well-integrated interface to allow applications to easily use them. We propose a distributed searchable file system, VSFS, which provide a novel and flexible POSIX-compatible searchable file system namespace that can be seamlessly integrate with any legacy code without modification. Additionally, to provide real-time indexing and searching performance, VSFS uses DRAM-based distributed consistent hashing ring to manages all file-index. The results of our evaluation show that VSFS …
Predicting Sql Injection And Cross Site Scripting Vulnerabilities Through Mining Input Sanitization Patterns, 2013 Singapore Management University
Predicting Sql Injection And Cross Site Scripting Vulnerabilities Through Mining Input Sanitization Patterns, Lwin Khin Shar, Hee Beng Kuan Tan
Research Collection School Of Computing and Information Systems
ContextSQL injection (SQLI) and cross site scripting (XSS) are the two most common and serious web application vulnerabilities for the past decade. To mitigate these two security threats, many vulnerability detection approaches based on static and dynamic taint analysis techniques have been proposed. Alternatively, there are also vulnerability prediction approaches based on machine learning techniques, which showed that static code attributes such as code complexity measures are cheap and useful predictors. However, current prediction approaches target general vulnerabilities. And most of these approaches locate vulnerable code only at software component or file levels. Some approaches also involve process attributes that …
Circular Reranking For Visual Search, 2013 Singapore Management University
Circular Reranking For Visual Search, Ting Yao, Chong-Wah Ngo
Research Collection School Of Computing and Information Systems
Search reranking is regarded as a common way to boost retrieval precision. The problem nevertheless is not trivial especially when there are multiple features or modalities to be considered for search, which often happens in image and video retrieval. This paper proposes a new reranking algorithm, named circular reranking, that reinforces the mutual exchange of information across multiple modalities for improving search performance, following the philosophy that strong performing modality could learn from weaker ones, while weak modality does benefit from interacting with stronger ones. Technically, circular reranking conducts multiple runs of random walks through exchanging the ranking scores among …
Searching Visual Instances With Topology Checking And Context Modeling, 2013 Singapore Management University
Searching Visual Instances With Topology Checking And Context Modeling, Wei Zhang, Chong-Wah Ngo
Research Collection School Of Computing and Information Systems
Instance Search (INS) is a realistic problem initiated by TRECVID, which is to retrieve all occurrences of the querying object, location, or person from a large video collection. It is a fundamental problem with many applications, and also a challenging problem different from the traditional concept or near-duplicate (ND) search, since the relevancy is defined at instance level. True responses could exhibit various visual variations, such as being small on the image with different background, or showing a non-homography spatial configuration. Based on the Bag-of-Words model, we propose two techniques tailored for Instance Search. Specifically, we explore the use of …
Maximize Your Decision-Making: A Review Of Emerging Technology Trends, 2013 University of Georgia School of Law Library
Maximize Your Decision-Making: A Review Of Emerging Technology Trends, Carol Watson
Continuing Legal Education Presentations
Provides overview of new technologies (both software and hardware) that could become the "next big thing."
Cloud Computing Trace Characterization And Synthetic Workload Generation, 2013 Air Force Institute of Technology
Cloud Computing Trace Characterization And Synthetic Workload Generation, Salvatore Capra
Theses and Dissertations
This thesis researches cloud computing workload characteristics and synthetic workload generation. A heuristic presented in the work guides the process of workload trace characterization and synthetic workload generation. Analysis of a cloud trace provides insight into client request behaviors and statistical parameters. A versatile workload generation tool creates client connections, controls request rates, defines number of jobs, produces tasks within each job, and manages task durations. The test system consists of multiple clients creating workloads and a server receiving request, all contained within a virtual machine environment. Statistical analysis verifies the synthetic workload experimental results are consistent with real workload …
Semi-Supervised Heterogeneous Fusion For Multimedia Data Co-Clustering, 2013 Singapore Management University
Semi-Supervised Heterogeneous Fusion For Multimedia Data Co-Clustering, Lei Meng, Ah-Hwee Tan, Dong Xu
Research Collection School Of Computing and Information Systems
Co-clustering is a commonly used technique for tapping the rich meta-information of multimedia web documents, including category, annotation, and description, for associative discovery. However, most co-clustering methods proposed for heterogeneous data do not consider the representation problem of short and noisy text and their performance is limited by the empirical weighting of the multi-modal features. In this paper, we propose a generalized form of Heterogeneous Fusion Adaptive Resonance Theory, called GHF-ART, for co-clustering of large-scale web multimedia documents. By extending the two-channel Heterogeneous Fusion ART (HF-ART) to multiple channels, GHF-ART is designed to handle multimedia data with an arbitrarily rich …
A Quantitative Analysis Of Memory Controller Page Policies, 2013 Portland State University
A Quantitative Analysis Of Memory Controller Page Policies, Matthew Blackmore
Dissertations and Theses
Two common goals in computing system design are increasing performance and decreasing power consumption. DRAM-based memory subsystems are a major component of both system performance and power consumption. Memory controllers employ strategies to efficiently schedule DRAM operations to reduce latency and to utilize DRAM low power modes when possible. One of the most important of these is the page policy, which determines when to close pages in DRAM. An effective DRAM memory controller page policy is important to minimizing power consumption and increasing system performance. This thesis explores the impact memory controller page policy has on performance as measured by …
Using Plankton Imaging Technology And Computer Science For Biological Oceanographic Advancement And Education, 2013 University of Miami
Using Plankton Imaging Technology And Computer Science For Biological Oceanographic Advancement And Education, Adam T. Greer
Adam T. Greer
Oceanography is an inherently interdisciplinary subject that combines observations of physics, biology, chemistry, and their interactions. While most physical and chemical measurements can be made on small scales (cm to m) through the use of sensors (temperature, salinity, pH, etc.), traditional tools to understand the biology of the ocean have only allowed for coarse sampling resolution (i.e., plankton nets sample large portions of the water column). New imaging technology enables the biological component of the ocean to be sampled on the same scale as the physical and chemical, allowing scientists to finally address the interactions among different oceanographic processes. Image …
Greek Patent Protection System And The Impacts Of Information Technology Industry, 2013 Seoul National University
Greek Patent Protection System And The Impacts Of Information Technology Industry, Emmanouil Alexander Zografakis Ez
Emmanouil Alexander Zografakis EZ
Our era can be characterized as the era of knowledge proliferation and bountifulness. That has marked our era as the era following the pace of the Information Society Development. Information Society has also brought about a remarkable IT development pace over countries. Thereby, it is greatly important all that raw knowledge to become mind figments, ideas and even inventions and innovations. It is also essential to highlight that such a beneficial process will ensure the continuity of the IT development. The only way to achieve that goal is to find a way to secure all that aforementioned knowledge which is …
Design Of An Open-Source Sata Core For Virtex-4 Fpgas, 2013 University of Massachusetts Amherst
Design Of An Open-Source Sata Core For Virtex-4 Fpgas, Cory Gorman
Masters Theses 1911 - February 2014
Many hard drives manufactured today use the Serial ATA (SATA) protocol to communicate with the host machine, typically a PC. SATA is a much faster and much more robust protocol than its predecessor, ATA (also referred to as Parallel ATA or IDE). Many hardware designs, including those using Field-Programmable Gate Arrays (FPGAs), have a need for a long-term storage solution, and a hard drive would be ideal. One such design is the high-speed Data Acquisition System (DAS) created for the NASA Surface Water and Ocean Topography mission. This system utilizes a Xilinx Virtex-4 FPGA. Although the DAS includes a SATA …
A Brief Look At Computer Data Backup, 2013 Drexel University
A Brief Look At Computer Data Backup, James Gross
James Gross
Article discusses the advantages of periodically backing up your computer files.
Exploring Spatial Business Data: A Roa Based Ecampus Application, 2013 Technological University Dublin
Exploring Spatial Business Data: A Roa Based Ecampus Application, Thanh Thoa Pham Thi, Linh Truong- Hong, Junjun Yin, James Carswell
Conference papers
In "Smart" environments development, providing users with search utilities for interacting efficiently with web and wireless devices is a key goal. At smaller scales, Google Maps and Google Earth with satellite and street views have helped users for querying general information at specific locations. However, at larger local scales, where detailed 3D geometries linked to business data are needed, there is a recognized lack of related information and functionality for in depth exploration of an area. Linking spatial data and business data helps to enrich the user experience by fulfilling more task specific user needs. This paper presents an eCampus …
An Efficient Algorithm To Solve High-Dimensional Data Clustering: Candidate Subspace Clustering Algorithm, 2013 California State University, San Bernardino
An Efficient Algorithm To Solve High-Dimensional Data Clustering: Candidate Subspace Clustering Algorithm, Chin-Chieh Kao
Theses Digitization Project
For this project, a comprehensive literature review on high dimensional data clustering is conducted and a novel density-algorithm to perform high dimensional data clustering is developed.
Dependence On Cyberscribes - Issues In E-Security, 2013 University of Maryland Francis King Carey School of Law
Dependence On Cyberscribes - Issues In E-Security, Thomas R. Mclean, Alexander B. Mclean
Journal of Business & Technology Law
No abstract provided.
A New Simplified Federated Single Sign-On System, 2013 Technological University Dublin
A New Simplified Federated Single Sign-On System, Chen Liang
Masters
The work presented in this MPhil thesis addresses this challenge by developing a new simplified FSSO system that allows end-users to access desktop systems, web-based services/applications and non-web based services/applications using one authentication process. This new system achieves this using two major components: an “Authentication Infrastructure Integration Program (AIIP)" and an “Integration of Desktop Authentication and Web-based Authentication (IDAWA)." The AIIP acquires Kerberos tickets (for end-users who have been authenticated by a Kerberos single sign-on system in one net- work domain) from Kerberos single sign-on systems in different network domains without establishing trust between these Kerberos single sign-on systems. The …
Accelerated Data Delivery Architecture, 2013 Georgia Southern University
Accelerated Data Delivery Architecture, Michael L. Grecol
Electronic Theses and Dissertations
This paper introduces the Accelerated Data Delivery Architecture (ADDA). ADDA establishes a framework to distribute transactional data and control consistency to achieve fast access to data, distributed scalability and non-blocking concurrency control by using a clean declarative interface. It is designed to be used with web-based business applications. This framework uses a combination of traditional Relational Database Management System (RDBMS) combined with a distributed Not Only SQL (NoSQL) database and a browser-based database. It uses a single physical and conceptual database schema designed for a standard RDBMS driven application. The design allows the architect to assign consistency levels to entities …
Application Of Self-Monitoring For Situational Awareness, 2013 Georgia Southern University
Application Of Self-Monitoring For Situational Awareness, Christopher Trickler
Electronic Theses and Dissertations
Self-monitoring devices and services are used for physical wellness, personal tracking and self-improvement. These individual devices and services can only provide information based on what they can measure directly or historically without an intermediate system. This paper proposes a self-monitoring system to perform situational awareness which may extend into providing insight into predictable behaviors. Knowing an individual’s current state and likelihood of particular behaviors occurring is a general solution. This knowledge-based solution derived from sensory data has many applications. The proposed system could monitor current individual situational status, automatically provide personal status as it changes, aid personal improvement, contribute to …
Performance Evaluation Of Linq To Hpc And Hadoop For Big Data, 2013 University of North Florida
Performance Evaluation Of Linq To Hpc And Hadoop For Big Data, Ravishankar Sivasubramaniam
UNF Graduate Theses and Dissertations
There is currently considerable enthusiasm around the MapReduce paradigm, and the distributed computing paradigm for analysis of large volumes of data. The Apache Hadoop is the most popular open source implementation of MapReduce model and LINQ to HPC is Microsoft's alternative to open source Hadoop. In this thesis, the performance of LINQ to HPC and Hadoop are compared using different benchmarks.
To this end, we identified four benchmarks (Grep, Word Count, Read and Write) that we have run on LINQ to HPC as well as on Hadoop. For each benchmark, we measured each system’s performance metrics (Execution Time, Average CPU …
Amaethon – A Web Application For Farm Management And An Assessment Of Its Utility, 2012 California Polytechnic State University, San Luis Obispo
Amaethon – A Web Application For Farm Management And An Assessment Of Its Utility, Tyler Yero
Master's Theses
Amaethon is a web application that is designed for enterprise farm management. It takes a job typically performed with spreadsheets, paper, or custom software and puts it on the web. Farm administration personnel may use it to schedule farm operations and manage their resources and equipment. A survey was con- ducted to assess Amaethon’s user interface design. Participants in the survey were two groups of students and a small group of agriculture professionals. Among other results, the survey indicated that a calendar interface inside Amaethon was preferred, and statistically no less effective, than a map interface. This is despite the …