Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

14,715 Full-Text Articles 19,775 Authors 4,117,996 Downloads 210 Institutions

All Articles in Computer Engineering

Faceted Search

14,715 full-text articles. Page 436 of 515.

Scheduling Heuristics For Maximizing The Output Quality Of Iris Task Graphs In Multiprocessor Environment With Time And Energy Bounds, Rajeswaran Chockalingapuram Ravindran 2012 University of Massachusetts Amherst

Scheduling Heuristics For Maximizing The Output Quality Of Iris Task Graphs In Multiprocessor Environment With Time And Energy Bounds, Rajeswaran Chockalingapuram Ravindran

Masters Theses 1911 - February 2014

Embedded real time applications are often subject to time and energy constraints. Real time applications are usually characterized by logically separable set of tasks with precedence constraints. The computational effort behind each of the task in the system is responsible for a physical functionality of the embedded system. In this work we mainly define theoretical models for relating the quality of the physical func- tionality to the computational load of the tasks and develop optimization problems to maximize the quality of the system subject to various constraints like time and energy. Specifically, the novelties in this work are three fold ...


Techniques For Detection Of Malicious Packet Drops In Networks, Vikram R. Desai 2012 University of Massachusetts Amherst

Techniques For Detection Of Malicious Packet Drops In Networks, Vikram R. Desai

Masters Theses 1911 - February 2014

The introduction of programmability and dynamic protocol deployment in routers, there would be an increase in the potential vulnerabilities and attacks . The next- generation Internet promises to provide a fundamental shift in the underlying architecture to support dynamic deployment of network protocols. In this thesis, we consider the problem of detecting malicious packet drops in routers. Specifically, we focus on an attack scenario, where a router selectively drops packets destined for another node. Detecting such an attack is challenging since it requires differentiating malicious packet drops from congestion-based packet losses. We propose a controller- based malicious packet detection technique that ...


Heterogeneous Graphene Nanoribbon-Cmos Multi-State Volatile Random Access Memory Fabric, Santosh Khasanvis 2012 University of Massachusetts Amherst

Heterogeneous Graphene Nanoribbon-Cmos Multi-State Volatile Random Access Memory Fabric, Santosh Khasanvis

Masters Theses 1911 - February 2014

CMOS SRAM area scaling is slowing down due to several challenges faced by transistors at nanoscale such as increased leakage. This calls for new concepts and technologies to overcome CMOS scaling limitations. In this thesis, we propose a multi-state memory to store multiple bits in a single cell, enabled by graphene and graphene nanoribbon crossbar devices (xGNR). This could provide a new dimension for scaling. We present a new multi-state volatile memory fabric called Graphene Nanoribbon Tunneling Random Access Memory (GNTRAM) featuring a heterogeneous integration between graphene and CMOS. A latch based on the xGNR devices is used as the ...


Simultaneous Camera Pose And Correspondence Estimation With Motion Coherence, Wen-yan LIN, Loong-Fah CHEONG, Ping TAN, Guo DONG, Siying LIU 2012 Singapore Management University

Simultaneous Camera Pose And Correspondence Estimation With Motion Coherence, Wen-Yan Lin, Loong-Fah Cheong, Ping Tan, Guo Dong, Siying Liu

Research Collection School Of Information Systems

Traditionally, the camera pose recovery problem has been formulated as one of estimating the optimal camera pose given a set of point correspondences. This critically depends on the accuracy of the point correspondences and would have problems in dealing with ambiguous features such as edge contours and high visual clutter. Joint estimation of camera pose and correspondence attempts to improve performance by explicitly acknowledging the chicken and egg nature of the pose and correspondence problem. However, such joint approaches for the two-view problem are still few and even then, they face problems when scenes contain largely edge cues with few ...


Remote Software Upload Techniques In Future Vehicles And Their Performance Analysis, Irina Hossain 2012 Wayne State University

Remote Software Upload Techniques In Future Vehicles And Their Performance Analysis, Irina Hossain

Wayne State University Dissertations

Updating software in vehicle Electronic Control Units (ECUs) will become a mandatory requirement for a variety of reasons, for examples, to update/fix functionality of an existing system, add new functionality, remove software bugs and to cope up with ITS infrastructure. Software modules of advanced vehicles can be updated using Remote Software Upload (RSU) technique. The RSU employs infrastructure-based wireless communication technique where the software supplier sends the software to the targeted vehicle via a roadside Base Station (BS). However, security is critically important in RSU to avoid any disasters due to malfunctions of the vehicle or to protect the ...


Querying And Managing Opm-Compliant Scientific Workflow Provenance, Chunhyeok Lim 2012 Wayne State University

Querying And Managing Opm-Compliant Scientific Workflow Provenance, Chunhyeok Lim

Wayne State University Dissertations

Provenance, the metadata that records the derivation history of scientific results, is important in scientific workflows to interpret, validate, and analyze the result of scientific computing. Recently,

to promote and facilitate interoperability among heterogeneous provenance systems, the Open Provenance Model (OPM) has been proposed and has played an important role in the community.

In this dissertation, to efficiently query and manage OPM-compliant provenance, we first propose a provenance collection framework that collects both prospective provenance, which captures

an abstract workflow specification as a recipe for future data derivation and retrospective provenance, which captures past workflow execution and data derivation information ...


Techniques For Sensor-Integrated Robotic Systems: Raman Spectra Analysis, Image Guidance, And Kinematic Calibration, Luke Anthony Reisner 2012 Wayne State University

Techniques For Sensor-Integrated Robotic Systems: Raman Spectra Analysis, Image Guidance, And Kinematic Calibration, Luke Anthony Reisner

Wayne State University Dissertations

Robotics and sensor technology have made impressive advancements over the years. There are now robotic systems that help perform surgeries or explore the surface of Mars, and there are sensors that detect trace amounts of explosives or identify diseased human tissue. The most powerful systems integrate robots and sensors, which are natural complements to each other. Sensors can provide information that might otherwise be unavailable due to indirect robotic manipulation (e.g., images of the target environment), and robots can provide suitably precise positioning of an analytical sensor.

To have an effective sensor-integrated robotic system, multiple capabilities are needed in ...


Rethinking The Design And Implementation Of The I/O Software Stack For High-Performance Computing, Xuechen Zhang 2012 Wayne State University

Rethinking The Design And Implementation Of The I/O Software Stack For High-Performance Computing, Xuechen Zhang

Wayne State University Dissertations

Current I/O stack for high-performance computing is composed of multiple software layers in order to hide users from complexity of I/O performance optimization. However, the design and implementation of a specific layer is usually carried out separately with limited consideration of its impact on other layers, which could result in suboptimal I/O performance because data access locality is weakened, if not lost, on hard disk, a widely used storage medium in high-end storage systems.

In this dissertation, we experimentally demonstrated such issues in four different layers, including operating system process management layer and MPI-IO middleware layer on ...


Forensic Analysis Of Social Networking Applications On Mobile Devices, Noora Al Mutawa, Ibrahim Baggili, Andrew Marrington 2012 Zayed University

Forensic Analysis Of Social Networking Applications On Mobile Devices, Noora Al Mutawa, Ibrahim Baggili, Andrew Marrington

Electrical & Computer Engineering and Computer Science Faculty Publications

The increased use of social networking applications on smartphones makes these devices a goldmine for forensic investigators. Potential evidence can be held on these devices and recovered with the right tools and examination methods. This paper focuses on conducting forensic analyses on three widely used social networking applications on smartphones: Facebook, Twitter, and MySpace. The tests were conducted on three popular smartphones: BlackBerrys, iPhones, and Android phones. The tests consisted of installing the social networking applications on each device, conducting common user activities through each application, acquiring a forensically sound logical image of each device, and performing manual forensic analysis ...


An Improved Medium Access Control Protocol For Real-Time Applications In Wlans And Its Firmware Development, Sushil Dutt 2012 Edith Cowan University

An Improved Medium Access Control Protocol For Real-Time Applications In Wlans And Its Firmware Development, Sushil Dutt

Theses: Doctorates and Masters

The IEEE 802.11 Wireless Local Area Network (WLAN), commonly known as Wi-Fi, has emerged as a popular internet access technology and researchers are continuously working on improvement of the quality of service (QoS) in WLAN by proposing new and efficient schemes. Voice and video over Internet Protocol (VVoIP) applications are becoming very popular in Wi-Fi enabled portable/handheld devices because of recent technological advancements and lower service costs. Different from normal voice and video streaming, these applications demand symmetric throughput for the upstream and downstream. Existing Wi-Fi standards are optimised for generic internet applications and fail to provide symmetric ...


A Location-Aware Architecture Supporting Intelligent Real-Time Mobile Applications, Sean J. Barbeau 2012 University of South Florida

A Location-Aware Architecture Supporting Intelligent Real-Time Mobile Applications, Sean J. Barbeau

Graduate Theses and Dissertations

This dissertation presents LAISYC, a modular location-aware architecture for intelligent real-time mobile applications that is fully-implementable by third party mobile app developers and supports high-precision and high-accuracy positioning systems such as GPS. LAISYC significantly improves device battery life, provides location data authenticity, ensures security of location data, and significantly reduces the amount of data transferred between the phone and server. The design, implementation, and evaluation of LAISYC using real mobile phones include the following modules: the GPS Auto-Sleep module saves battery energy when using GPS, maintaining acceptable movement tracking (approximately 89% accuracy) with an approximate average doubling of battery life ...


Algorithms For Visual Maritime Surveillance With Rapidly Moving Camera, Sergiy Fefilatyev 2012 University of South Florida

Algorithms For Visual Maritime Surveillance With Rapidly Moving Camera, Sergiy Fefilatyev

Graduate Theses and Dissertations

Visual surveillance in the maritime domain has been explored for more than a decade. Although it has produced a number of working systems and resulted in a mature technology, surveillance has been restricted to the port facilities or areas close to the coastline assuming a fixed-camera scenario. This dissertation presents several contributions in the domain of maritime surveillance. First, a novel algorithm for open-sea visual maritime surveillance is introduced. We explore a challenging situation with a camera mounted on a buoy or other floating platform. The developed algorithm detects, localizes, and tracks ships in the field of view of the ...


Design Methodologies For Reversible Logic Based Barrel Shifters, Saurabh Kotiyal 2012 University of South Florida

Design Methodologies For Reversible Logic Based Barrel Shifters, Saurabh Kotiyal

Graduate Theses and Dissertations

The reversible logic has the promising applications in emerging computing paradigm

such as quantum computing, quantum dot cellular automata, optical computing, etc. In

reversible logic gates there is a unique one-to-one mapping between the inputs and outputs.

To generate an useful gate function the reversible gates require some constant ancillary

inputs called ancilla inputs. Also to maintain the reversibility of the circuits some additional

unused outputs are required that are referred as the garbage outputs. The number of

ancilla inputs, number of garbage outputs and quantum cost plays an important role in

the evaluation of reversible circuits. Thus minimizing these ...


Column: The Physics Of Digital Information-Part 2, Fred Cohen 2012 CEO, Fred Cohen & Associates President, California Sciences Institute

Column: The Physics Of Digital Information-Part 2, Fred Cohen

Journal of Digital Forensics, Security and Law

In part 1 of this series (Cohen, 2011a), we discussed some of the basics of building a physics of digital information. Assuming, as we have, that science is about causality and that a scientific theory should require that cause(C) produces effect (E) via mechanism M (written C→ME), we explore that general theory of digital systems from the perspective of attributing effects (i.e., traces of activities in digital systems) to their causes. Full details of the current version of this physics are available online2 , and in this article, we explore a few more of them.


An Overview Of The Jumplist Configuration File In Windows 7, Harjinder S. Lallie, Parmjit S. Bains 2012 University of Warwick, Coventry

An Overview Of The Jumplist Configuration File In Windows 7, Harjinder S. Lallie, Parmjit S. Bains

Journal of Digital Forensics, Security and Law

The introduction of Jumplists in Windows 7 was an important feature from a forensic examiners viewpoint. Jumplist configuration files can provide the examiner with a wealth of information relating to file access and in particular: dates/times, Volume GUIDs and unique file object IDs relating to those files. Some of the information in the Jumplist could be used to build a more precise timeline relating to system and file usage. In this article, we analyse the structure of a Jumplist configuration file and in particular a record from a Jumplist configuration file and highlight some of the important entries therein.


Comparing Android Applications To Find Copying, Larry Melling, Bob Zeidman 2012 Virtual System Platform Cadence Design Systems

Comparing Android Applications To Find Copying, Larry Melling, Bob Zeidman

Journal of Digital Forensics, Security and Law

The Android smartphone operating system includes a Java virtual machine that enables rapid development and deployment of a wide variety of applications. The open nature of the platform means that reverse engineering of applications is relatively easy, and many developers are concerned as applications similar to their own show up in the Android marketplace and want to know if these applications are pirated. Fortunately, the same characteristics that make an Android application easy to reverse engineer and copy also provide opportunities for Android developers to compare downloaded applications to their own. This paper describes the process for comparing a developer ...


Applying The Acpo Principles In Public Cloud Forensic Investigations, Harjinder S. Lallie, Lee Pimlott 2012 University of Warwick, Coventry

Applying The Acpo Principles In Public Cloud Forensic Investigations, Harjinder S. Lallie, Lee Pimlott

Journal of Digital Forensics, Security and Law

The numerous advantages offered by cloud computing has fuelled its growth and has made it one of the most significant of current computing trends. The same advantages have created complex issues for those conducting digital forensic investigations. Digital forensic investigators rely on the ACPO (Association of Chief Police Officers) or similar guidelines when conducting an investigation, however the guidelines make no reference to some of the issues presented by cloud investigations. This study investigates the impact of cloud computing on ACPO’s core principles and asks whether these principles can still be applied in a cloud investigation and the challenges ...


Column: Factors Affecting Data Decay, Kevin Fairbanks, Simson Garfinkel 2012 Johns Hopkins University

Column: Factors Affecting Data Decay, Kevin Fairbanks, Simson Garfinkel

Journal of Digital Forensics, Security and Law

In nuclear physics, the phrase decay rate is used to denote the rate that atoms and other particles spontaneously decompose. Uranium-235 famously decays into a variety of daughter isotopes including Thorium and Neptunium, which themselves decay to others. Decay rates are widely observed and wildly different depending on many factors, both internal and external. U-235 has a half-life of 703,800,000 years, for example, while free neutrons have a half-life of 611 seconds and neutrons in an atomic nucleus are stable.


Dns In Computer Forensics, Neil F. Wright 2012 University of Westminster

Dns In Computer Forensics, Neil F. Wright

Journal of Digital Forensics, Security and Law

The Domain Name Service (DNS) is a critical core component of the global Internet and integral to the majority of corporate intranets. It provides resolution services between the human-readable name-based system addresses and the machine operable Internet Protocol (IP) based addresses required for creating network level connections. Whilst structured as a globally dispersed resilient tree data structure, from the Global and Country Code Top Level Domains (gTLD/ccTLD) down to the individual site and system leaf nodes, it is highly resilient although vulnerable to various attacks, exploits and systematic failures.


Automated Identification And Reconstruction Of Youtube Video Access, Jonathan Patterson, Christopher Hargreaves 2012 Centre for Forensic Computing

Automated Identification And Reconstruction Of Youtube Video Access, Jonathan Patterson, Christopher Hargreaves

Journal of Digital Forensics, Security and Law

YouTube is one of the most popular video-sharing websites on the Internet, allowing users to upload, view and share videos with other users all over the world. YouTube contains many different types of videos, from homemade sketches to instructional and educational tutorials, and therefore attracts a wide variety of users with different interests. The majority of YouTube visits are perfectly innocent, but there may be circumstances where YouTube video access is related to a digital investigation, e.g. viewing instructional videos on how to perform potentially unlawful actions or how to make unlawful articles. When a user accesses a YouTube ...


Digital Commons powered by bepress