Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Physical Sciences and Mathematics (34)
- Computer Sciences (17)
- Education (12)
- Mathematics (12)
- Library and Information Science (7)
-
- Social and Behavioral Sciences (7)
- Data Science (6)
- Collection Development and Management (4)
- Engineering (4)
- Computer Engineering (3)
- Curriculum and Instruction (3)
- Arts and Humanities (2)
- Educational Methods (2)
- Higher Education (2)
- Science and Mathematics Education (2)
- Theory and Algorithms (2)
- Archival Science (1)
- Art and Design (1)
- Artificial Intelligence and Robotics (1)
- Biology (1)
- Biomedical Engineering and Bioengineering (1)
- Computer Law (1)
- Disability and Equity in Education (1)
- Educational Administration and Supervision (1)
- Educational Technology (1)
- Gender Equity in Education (1)
- Graphics and Human Computer Interfaces (1)
- Higher Education Administration (1)
- Information Security (1)
- Law (1)
- Institution
-
- Indian Statistical Institute (10)
- University of Rhode Island (6)
- Yale University (5)
- Boise State University (2)
- Loyola University Chicago (2)
-
- University of Nebraska at Omaha (2)
- University of South Carolina (2)
- Bethel University (1)
- Boston University School of Law (1)
- Cedarville University (1)
- Claremont Colleges (1)
- Clemson University (1)
- Design Research Society (1)
- East Tennessee State University (1)
- Florida International University (1)
- Liberty University (1)
- Marquette University (1)
- Michigan Technological University (1)
- Ministry of Higher and Secondary Specialized Education of the Republic of Uzbekistan (1)
- Northwestern College, Iowa (1)
- Old Dominion University (1)
- Providence College (1)
- The Texas Medical Center Library (1)
- University of Mississippi (1)
- University of Texas at Arlington (1)
- University of the Pacific (1)
- Utah State University (1)
- Virginia Commonwealth University (1)
- Western University (1)
- Publication
-
- Doctoral Theses (10)
- Collection Development Reports and Documents (5)
- Yale Graduate School of Arts and Sciences Dissertations (5)
- Computer Science Faculty Publications (2)
- Computer Science: Faculty Publications and Other Works (2)
-
- 2022 Spring Honors Capstone Projects (1)
- All Electronic Theses and Dissertations (1)
- All Theses (1)
- Boise State University Theses and Dissertations (1)
- DRS Biennial Conference Series (1)
- Dissertations (1934 -) (1)
- Doctoral Dissertations and Projects (1)
- Electronic Thesis and Dissertation Repository (1)
- Engineering and Computer Science Academic Celebrations (1)
- FIU Electronic Theses and Dissertations (1)
- Faculty Scholarship (1)
- Honors Theses (1)
- Journal of Humanistic Mathematics (1)
- Library Impact Statements (1)
- Master's Theses & Capstone Projects (1)
- Mathematics & Computer Science Faculty Scholarship (1)
- Mechanical and Biomedical Engineering Faculty Publications and Presentations (1)
- Mental Enlightenment Scientific-Methodological Journal (1)
- Michigan Tech Publications (1)
- Publications (1)
- Senior Theses (1)
- Student and Faculty Publications (1)
- Summer REU Program (1)
- Theses and Dissertations (1)
- Theses/Capstones/Creative Projects (1)
- Publication Type
Articles 1 - 30 of 51
Full-Text Articles in Entire DC Network
Randomized Algorithms For Resource Allocation In Device To Device Communication., Subhankar Ghosal Dr.
Randomized Algorithms For Resource Allocation In Device To Device Communication., Subhankar Ghosal Dr.
Doctoral Theses
In device to device (D2D) communication, two users residing in close proximity can directly communicate between them, through a common channel, without the need of a base station. A pair of D2D users forms a link and a channel needs to be allocated to it. The interference relationship among the active links at time t is modelled as an interference graph g(t). To establish interference-free communication, we have to assign a channel vector C(t) and a power vector corresponding to the active links such that the required signal to interference plus noise ratio (SINR) is satisfied for each link. Since …
Obstacles In Learning Algorithm Run-Time Complexity Analysis, Bailey Licht
Obstacles In Learning Algorithm Run-Time Complexity Analysis, Bailey Licht
Theses/Capstones/Creative Projects
Algorithm run-time complexity analysis is an important topic in data structures and algorithms courses, but it is also a topic that many students struggle with. Commonly cited difficulties include the necessary mathematical background knowledge, the abstract nature of the topic, and the presentation style of the material. Analyzing the subject of algorithm analysis using multiple learning theories shows that course materials often leave out key steps in the learning process and neglect certain learning styles. Students can be more successful at learning algorithm run-time complexity analysis if these missing stages and learning styles are addressed.
Chicago Alliance For Equity In Computer Science, Steven Mcgee, Lucia Dettori, Ronald I. Greenberg, Andrew M. Rasmussen, Dale F. Reed, Don Yanek
Chicago Alliance For Equity In Computer Science, Steven Mcgee, Lucia Dettori, Ronald I. Greenberg, Andrew M. Rasmussen, Dale F. Reed, Don Yanek
Computer Science: Faculty Publications and Other Works
Each year, about 14,000 Chicago Public Schools (CPS) students graduate with one year of high school computer science (CS) in fulfillment of the district’s CS graduation requirement. This accomplishment was the culmination of a decade of work by the Chicago Alliance for Equity in Computer Science (CAFÉCS), which includes CPS teachers and administrators, university CS faculty, and educational researchers. CAFÉCS research indicates that CPS significantly increased the capacity of schools to offer the Exploring Computer Science (ECS) introductory course, resulting in a rapid, equitable increase in students’ participation in CS. Making CS mandatory did not negatively impact performance in ECS. …
The Minority In The Minority, Black Women In Computer Science Fields: A Phenomenological Study, Blanche' D. Anderson
The Minority In The Minority, Black Women In Computer Science Fields: A Phenomenological Study, Blanche' D. Anderson
Doctoral Dissertations and Projects
The purpose of this transcendental phenomenological study was to describe the lived experiences of Black women with a bachelor’s, master’s, or doctoral degree in computer science, currently employed in the United States. The theory guiding this study was Krumboltz’s social learning theory of career decision-making, as it provides a foundation for understanding how a combination of factors leads to an individual’s educational and occupational preferences and skills. This qualitative study answered the following central research question: What are the lived experiences of Black women with a bachelor’s, master’s, or doctoral degree in computer science, currently employed in the United States? …
Serverless Enabled Framework For Machine Learning Applications: Architecture, Solutions, And Evaluations, Boyuan Guan
Serverless Enabled Framework For Machine Learning Applications: Architecture, Solutions, And Evaluations, Boyuan Guan
FIU Electronic Theses and Dissertations
Over the past decade, the popularity of machine learning applications such as recommendation systems, image recognition, real-time alerts, event detection, natural language processing, and online streaming analytics has increased dramatically. However, there is a long-tail problem has been identified for the ML application. The majority of ML applications are concentrated in high-tech and high-profit areas while ML applications are still difficult to reach for local and low-profit businesses. The two factors that cause this slow growth are the domain problem barrier and the rigid infrastructure environment. Since ML application development is different than the traditional software application which consists of …
Bridging The Computer Science – Law Divide, Azer Bestavros, Stacey Dogan, Paul Ohm, Andrew Sellars
Bridging The Computer Science – Law Divide, Azer Bestavros, Stacey Dogan, Paul Ohm, Andrew Sellars
Faculty Scholarship
Many pressing societal questions can be answered only by bringing experts from different disciplines together. Questions around misinformation and disinformation, platform power, surveillance capitalism, information privacy, and algorithmic bias, among many others, reside at the intersection of computer science and law. We need to develop institutions that bring together computer scientists and legal scholars to work together on issues like these, and to train new innovators, thought leaders, counselors, and policymakers with hybrid training in both disciplines. In Universities, the disciplines of Computer Science (CS) and Law are separated by many wide chasms. Differences in standards, language, methods, and culture …
Promoting Computational Thinking To Impact The Implementation Of Computer Science, Mikayla Westhoff
Promoting Computational Thinking To Impact The Implementation Of Computer Science, Mikayla Westhoff
Master's Theses & Capstone Projects
The researchers drove this action research project to integrate Computer Science into the classroom and the effect it can have on computational thinking. The researcher, a fifth-grade teacher in her third year of teaching, utilized Computer Science activities in a science class of 24 students for two weeks while monitoring their progress through Code.org. The study analyzed the correlation between Computer Science and computational thinking. The findings revealed no correlation between the two variables among students with or without a Computer Science background. This project conducted this research to impact the future classroom practices that may implement Computer Science into …
The Effects Of Project-Based Game Development On Student Learning And Attitudes: Action Research In An 8Th Grade Introductory Computer Science Course, Theodore G. Jenks
The Effects Of Project-Based Game Development On Student Learning And Attitudes: Action Research In An 8Th Grade Introductory Computer Science Course, Theodore G. Jenks
Theses and Dissertations
The purpose of this action research was to implement a digital game development project and describe its effects on the performance and attitudes of eighth-grade students in a required computer science course at South Carolina School District Alpha. The following research questions were explored: (1) How does the game development project impact participants’ ability to analyze and develop algorithms? (2) What is the effect of the game development project on participants’ attitudes toward computer science? and (3) What is the relationship between participants’ attitudes toward computer science and their performance?
There were 28 participants composed of students in a science, …
Morphological Network: Network With Morphological Neurons., Ranjan Mondal Dr.
Morphological Network: Network With Morphological Neurons., Ranjan Mondal Dr.
Doctoral Theses
Image processing with traditional approaches mainly use the tools of linear systems. However, linear approaches are not well suited and may even fail to solve problems involving geometrical aspects of the image. Thus, nonlinear geometric approaches like morphological operations are very popular in those cases. Morphological operations are nonlinear operations based on a set and lattice-theoretic methodology for image analysis that are capable of describing the geometrical structure of image objects quantitatively. It is suitable for various problems in image processing, computer vision, and pattern recognition. While solving problems with morphology, a particular structuring element is defined. Structuring elements have …
Constructions And Analyses Of Efficient Symmetric-Key Primitives For Authentication And Encryption., Sebati Ghosh Dr.
Constructions And Analyses Of Efficient Symmetric-Key Primitives For Authentication And Encryption., Sebati Ghosh Dr.
Doctoral Theses
In symmetric key cryptography there are two fundamental objectives, viz. 1. confidentiality or secrecy of message from unexpected party and 2. authentication of message which includes authenticating the source of the message as well as integrity of the message against any unwanted modification. Let us first concentrate on confidentiality. In classical symmetric key cryptography two parties, say Alice and Bob, first secretly exchange a key-pair (e, d). Later, if Alice wishes to send a secret message m ∈ M to Bob, she computes c = Ee(m) and transmits c to Bob. Upon receiving c, Bob computes Dd(c) = m and …
Generalization In Quantum Machine Learning From Few Training Data, Matthias C Caro, Hsin-Yuan Huang, M Cerezo, Kunal Sharma, Andrew Sornborger, Lukasz Cincio, Patrick J Coles
Generalization In Quantum Machine Learning From Few Training Data, Matthias C Caro, Hsin-Yuan Huang, M Cerezo, Kunal Sharma, Andrew Sornborger, Lukasz Cincio, Patrick J Coles
Student and Faculty Publications
Modern quantum machine learning (QML) methods involve variationally optimizing a parameterized quantum circuit on a training data set, and subsequently making predictions on a testing data set (i.e., generalizing). In this work, we provide a comprehensive study of generalization performance in QML after training on a limited number N of training data points. We show that the generalization error of a quantum machine learning model with T trainable gates scales at worst as [Formula: see text]. When only K ≪ T gates have undergone substantial change in the optimization process, we prove that the generalization error improves to [Formula: see …
"Design For Co-Design" In A Computer Science Curriculum Research-Practice Partnership, Victor R. Lee, Jody Clarke-Midura, Jessica F. Shumway, Mimi Recker
"Design For Co-Design" In A Computer Science Curriculum Research-Practice Partnership, Victor R. Lee, Jody Clarke-Midura, Jessica F. Shumway, Mimi Recker
Publications
This paper reports on a study of the dynamics of a Research-Practice Partnership (RPP) oriented around design, specifically the co-design model. The RPP is focused on supporting elementary school computer science (CS) instruction by involving paraprofessional educators and teachers in curricular co-design. A problem of practice addressed is that few elementary educators have backgrounds in teaching CS and have limited available instructional time and budget for CS. The co-design strategy entailed highlighting CS concepts in the mathematics curriculum during classroom instruction and designing computer lab lessons that explored related ideas through programming. Analyses focused on tensions within RPP interaction dynamics …
Ontology-Based Formal Approach For Safety And Security Verification Of Industrial Control Systems, Ramesh Neupane
Ontology-Based Formal Approach For Safety And Security Verification Of Industrial Control Systems, Ramesh Neupane
Boise State University Theses and Dissertations
Control logics, as part of the Industrial Control Systems (ICS), are used to control the physical processes of the critical infrastructures such as power plants, water, and gas distribution, etc. Most commonly, the Programmable Logic Controller (PLC) manages these processes through actuators based on information received from sensor readings. Any safety issues or cyberattacks on these systems may have catastrophic consequences on human lives and the environment. In an effort to improve the resilience and security of control logics, this thesis provides algorithms and tools to formally define the safety and security requirements w.r.t. the physical processes, and the industrial …
Mining The Soma Cube For Gems: Isomorphic Subgraphs Reveal Equivalence Classes, Edward Vogel, My Tram
Mining The Soma Cube For Gems: Isomorphic Subgraphs Reveal Equivalence Classes, Edward Vogel, My Tram
Journal of Humanistic Mathematics
Soma cubes are an example of a dissection puzzle, where an object is broken down into pieces, which must then be reassembled to form either the original shape or some new design. In this paper, we present some interesting discoveries regarding the Soma Cube. Equivalence classes form aesthetically pleasing shapes in the solution set of the puzzle. These gems are identified by subgraph isomorphisms using SNAP!/Edgy, a simple block-based computer programming language. Our preliminary findings offer several opportunities for researchers from middle school to undergraduate to utilize graphs, group theory, topology, and computer science to discover connections between computation and …
Computing Well-Structured Subgraphs In Geometric Intersection Graphs., Satyabrata Jana Dr.
Computing Well-Structured Subgraphs In Geometric Intersection Graphs., Satyabrata Jana Dr.
Doctoral Theses
For a set of geometric objects, the associative geometric intersection graph is the graph with a vertex for each object and an edge between two vertices if and only if the corresponding objects intersect. Geometric intersection graphs are very important due to their theoretical properties and applicability. Based on the different geometric objects, several types of geometric intersection graphs are defined. Given a graph G, an induced (either vertex or edge) subgraph H ⊆ G is said to be an well-structured subgraph if H satisfies certain properties among the vertices in H. This thesis studies some well-structured subgraphs finding problems …
Temporal Sentiment Mapping System For Time-Synchronized Data, Jiachen Ma
Temporal Sentiment Mapping System For Time-Synchronized Data, Jiachen Ma
Dissertations (1934 -)
Temporal sentiment labels are used in various multimedia studies. They are useful for numerous classification and detection tasks such as video tagging, segmentation, and labeling. However, generating a large-scale sentiment dataset through manual labeling is usually expensive and challenging. Some recent studies explored the possibility of using online Time-Sync Comments (TSCs) as the primary source of their sentiment maps. Although the approach has positive results, existing TSCs datasets are limited in scale and content categories. Guidelines for generating such data within a constrained budget are yet to be developed and discussed. This dissertation tries to address the above issues by …
Augmented: Design And Ethnography In/Of An Architecture, Computer Science, And Textile Research-Creative Collective, Claire Nicholas, James Forren, Derek Reilly
Augmented: Design And Ethnography In/Of An Architecture, Computer Science, And Textile Research-Creative Collective, Claire Nicholas, James Forren, Derek Reilly
DRS Biennial Conference Series
This paper introduces a multi-disciplinary research-creation project that examines the embodied and social nature of textile design and making at different structural scales – from beaded accessories to architectural components. Bringing together anthropology, architecture, computer science, and textile craft, “Gesture and Form” seeks to develop effective and ethical pedagogies for teaching design and handcraft with new materials and technologies. Specifically, the project explores the potentialities and limitations of a head-worn augmented reality (AR) system that documents, encodes, and later guides making practices. The discussion first introduces different disciplinary frameworks for understanding and researching embodied knowledge, before sketching the multi-disciplinary research …
Innovations In The Educational Process And Its Criteria Of Efficiency, Utkir Mirzaqobilovich Farmonov, Nizom Abdurazzakovich Taylanov
Innovations In The Educational Process And Its Criteria Of Efficiency, Utkir Mirzaqobilovich Farmonov, Nizom Abdurazzakovich Taylanov
Mental Enlightenment Scientific-Methodological Journal
Today, innovative pedagogical processes are becoming one of the important components of the educational activity. Because innovative pedagogical processes not only create the basis for the competitiveness of any educational institution in the market of educational services, but also the intensive development of teacher and student personality, democratization of teacher-student interaction and communication, humanization of the educational process, orientation of students to active learning and self-formation, modernization of educational technologies, methods and tools, as well as the material and technical base of education, professionalism of teachers, their creativity determines the direction of development of their quest, plays an important role …
Comparative Analysis Of Imputation Methods In Real Estate Data, Connor Donlen
Comparative Analysis Of Imputation Methods In Real Estate Data, Connor Donlen
Honors Theses
This project involves comparing different methods of missing data imputation in the context of predicting real estate listing prices. These methods are compared against each other in both their ability to recreate the original data and their effects on a final predictive model. In order to evaluate their effectiveness, first, a predictive model is made using the complete dataset to use as a benchmark for the imputed datasets. Then, a complete dataset is split into 80% training and 20% testing datasets, and missing values are created in the training data using two different missing data mechanisms, missing completely at random …
The School Of Engineering And Computer Science Class Of 2022 Academic Celebration Program, Cedarville University
The School Of Engineering And Computer Science Class Of 2022 Academic Celebration Program, Cedarville University
Engineering and Computer Science Academic Celebrations
No abstract provided.
Simulating Polistes Dominulus Nest-Building Heuristics With Deterministic And Markovian Properties, Benjamin Pottinger
Simulating Polistes Dominulus Nest-Building Heuristics With Deterministic And Markovian Properties, Benjamin Pottinger
Undergraduate Honors Theses
European Paper Wasps (Polistes dominula) are social insects that build round, symmetrical nests. Current models indicate that these wasps develop colonies by following simple heuristics based on nest stimuli. Computer simulations can model wasp behavior to imitate natural nest building. This research investigated various building heuristics through a novel Markov-based simulation. The simulation used a hexagonal grid to build cells based on the building rule supplied to the agent. Nest data was compared with natural data and through visual inspection. Larger nests were found to be less compact for the rules simulated.
Insurance Fraud Detection, Senior Design Enhanced Project, Nischal Rana
Insurance Fraud Detection, Senior Design Enhanced Project, Nischal Rana
2022 Spring Honors Capstone Projects
Insurance is a major service provided to consumers that provides some relief concerning their valuable assets in the modern world. With so many valuable objects on the market, insurance claims are at an all-time peak, and with this comes attention, both wanted and unwanted. Insurance Fraud Detection is a sophisticated web application integrated with various modules that help insurance agents determine whether a claim by a client is fraudulent or not. Insurance agents can utilize this application to web scrape the internet for clues about the item in question to determine if it is still in the original owner's possession. …
Understanding User Perceptions Of Voice Personal Assistants, Ha Young Kim
Understanding User Perceptions Of Voice Personal Assistants, Ha Young Kim
All Theses
As the artificial intelligence (AI) technique improves, voice assistant (smart speaker) such as Amazon Alexa and Google Assistant are quickly, surely permeating into people's daily lives. With its powerful and convenient benefits and the circumstances that people started to stay at their home longer due to the pandemic, reliance on smart speakers has increased rapidly. But at the same time, concerns of security on smart speakers have increased.
In this thesis, we conducted an online user survey of smart speaker users with five different perspectives – 1) Users’ engagement with privacy policy; 2) Awareness of different policy requirements defined by …
Efficient Handover Mechanisms For Heterogeneous Networks., Shankar Kumar Ghosh Dr.
Efficient Handover Mechanisms For Heterogeneous Networks., Shankar Kumar Ghosh Dr.
Doctoral Theses
In this thesis, some analytical frameworks have been developed to analyze the effect of different system parameters on handover performances in heterogeneous network (HetNet) and based on such frameworks, some efficient handover algorithms have been proposed. The study starts with an analytical framework to investigate the effect of resource allocation mechanisms, upper layer mobility management protocols (MMPs) and handover decision metrics on user perceived throughput. This analysis reveals that among other factors, handover decision metric plays a crucial role in determining user perceived throughput in HetNet. Subsequently, we develop two handover decision metrics for ultra dense networks (UDN) and unlicensed …
Einstein-Roscoe Regression For The Slag Viscosity Prediction Problem In Steelmaking, Hiroto Saigo, Dukka Kc, Noritaka Saito
Einstein-Roscoe Regression For The Slag Viscosity Prediction Problem In Steelmaking, Hiroto Saigo, Dukka Kc, Noritaka Saito
Michigan Tech Publications
In classical machine learning, regressors are trained without attempting to gain insight into the mechanism connecting inputs and outputs. Natural sciences, however, are interested in finding a robust interpretable function for the target phenomenon, that can return predictions even outside of the training domains. This paper focuses on viscosity prediction problem in steelmaking, and proposes Einstein-Roscoe regression (ERR), which learns the coefficients of the Einstein-Roscoe equation, and is able to extrapolate to unseen domains. Besides, it is often the case in the natural sciences that some measurements are unavailable or expensive than the others due to physical constraints. To this …
The Past, Present, And Future Direction Of Computer Science Curriculum In K-12 Education, Steven Floyd
The Past, Present, And Future Direction Of Computer Science Curriculum In K-12 Education, Steven Floyd
Electronic Thesis and Dissertation Repository
This integrated article thesis provides an analysis of the past, present, and potential future state of Computer Science (CS) in K-12 education. Once implemented in optional courses at the secondary level, CS concepts and skills are now being integrated into other subject areas such as mathematics, science, and technology and other grades including K-8. This new state of K-12 CS education is explored through an analysis of 1) related theory reflected in the literature, 2) historical secondary school CS curriculum, 3) enrolment data and important issues related to equity, diversity, and inclusion, and 4) K-8 CS-related curriculum approaches currently being …
Deep Learning For Embedding And Integrating Multimodal Biomedical Data, Matthew Amodio
Deep Learning For Embedding And Integrating Multimodal Biomedical Data, Matthew Amodio
Yale Graduate School of Arts and Sciences Dissertations
Biomedical data is being generated in extremely high throughput and high dimension by technologies in areas ranging from single-cell genomics, proteomics, and transcriptomics (cytometry, single-cell RNA and ATAC sequencing) to neuroscience and cognition (fMRI and PET) to pharmaceuticals (drug perturbations and interactions). These new and emerging technologies and the datasets they create give an unprecedented view into the workings of their respective biological entities. However, there is a large gap between the information contained in these datasets and the insights that current machine learning methods can extract from them. This is especially the case when multiple technologies can measure the …
Automated Approaches For Program Verification And Repair, William Triest Hallahan
Automated Approaches For Program Verification And Repair, William Triest Hallahan
Yale Graduate School of Arts and Sciences Dissertations
Formal methods techniques, such as verification, analysis, and synthesis,allow programmers to prove properties of their programs, or automatically derive programs from specifications. Making such techniques usable requires care: they must provide useful debugging information, be scalable, and enable automation. This dissertation presents automated analysis and synthesis techniques to ease the debugging of modular verification systems and allow easy access to constraint solvers from functional code. Further, it introduces machine learning based techniques to improve the scalability of off-the-shelf syntax-guided synthesis solvers and techniques to reduce the burden of network administrators writing and analyzing firewalls. We describe the design and implementationof …
Neural Graph Transfer Learning In Natural Language Processing Tasks, Irene Li
Neural Graph Transfer Learning In Natural Language Processing Tasks, Irene Li
Yale Graduate School of Arts and Sciences Dissertations
Natural language is essential in our daily lives as we rely on languages to communicate and exchange information. A fundamental goal for natural language processing (NLP) is to let the machine understand natural language to help or replace human experts to mine knowledge and complete tasks. Many NLP tasks deal with sequential data. For example, a sentence is considered as a sequence of works. Very recently, deep learning-based language models (i.e.,BERT \citep{devlin2018bert}) achieved significant improvement in many existing tasks, including text classification and natural language inference. However, not all tasks can be formulated using sequence models. Specifically, graph-structured data is …
System Abstractions For Scalable Application Development At The Edge, Bo Hu
System Abstractions For Scalable Application Development At The Edge, Bo Hu
Yale Graduate School of Arts and Sciences Dissertations
Recent years have witnessed an explosive growth of Internet of Things (IoT) devices, which collect or generate huge amounts of data. Given diverse device capabilities and application requirements, data processing takes place across a range of settings, from on-device to a nearby edge server/cloud and remote cloud. Consequently, edge-cloud coordination has been studied extensively from the perspectives of job placement, scheduling and joint optimization. Typical approaches focus on performance optimization for individual applications. This often requires domain knowledge of the applications, but also leads to application-specific solutions. Application development and deployment over diverse scenarios thus incur repetitive manual efforts. There …