Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Engineering (12)
- Computer Sciences (4)
- Digital Communications and Networking (4)
- Physical Sciences and Mathematics (4)
- Computer and Systems Architecture (3)
-
- Robotics (3)
- Computational Engineering (2)
- Other Computer Engineering (2)
- Other Computer Sciences (2)
- Other Engineering (2)
- Civil Engineering (1)
- Civil and Environmental Engineering (1)
- Data Storage Systems (1)
- Hardware Systems (1)
- Numerical Analysis and Scientific Computing (1)
- OS and Networks (1)
- Software Engineering (1)
- Systems Architecture (1)
- Theory and Algorithms (1)
- Keyword
-
- Distributed computing (2)
- Machine Learning (2)
- Ant (1)
- Artificial Intelligence (1)
- Autonomous Robot (1)
-
- Big data (1)
- Bio-Inspired Robot Swarm (1)
- Biomedical Engineering (1)
- Computational Biology (1)
- Connected Home (1)
- Criticality (1)
- DIFT (1)
- Data Discovery (1)
- Data Integration (1)
- Data Science (1)
- Data mining (1)
- Data movement (1)
- Diabetic Retinopathy (1)
- Fabrication (1)
- Failure Interface (1)
- Failure Shaping (1)
- Fault Tolerance (1)
- Fault tolerance (1)
- Foraging Robots (1)
- HCI (1)
- High Performance Computing (1)
- High performance computing (1)
- High-performance computing (1)
- Human Computer Interaction (1)
- ISN study (1)
Articles 1 - 16 of 16
Full-Text Articles in Engineering
Systems And Methods For Scalable Retinal Screening Programs, Jeremy Richard Benson
Systems And Methods For Scalable Retinal Screening Programs, Jeremy Richard Benson
Computer Science ETDs
This dissertation addresses gaps in artificial intelligence-based computer vision tasks in the medical image processing field. We demonstrate effective methods for standardizing and augmenting digital fundus photographs so that robust convolutional neural network-based systems can perform high-throughput disease classification and generalize to never-before-seen data from novel camera technologies, scaling with the changing hardware landscape, as well as keeping up with vast amount of incoming data from the ever-increasing population. We also tackle the problem of discovering relevant samples in an unlabeled cohort of image data, thus widening the bottleneck to all downstream supervised machine learning tasks.
Cognizant Composites: Seamless Integration Of Circuitry And Sensors Into Structural Composites, Reuben Fresquez
Cognizant Composites: Seamless Integration Of Circuitry And Sensors Into Structural Composites, Reuben Fresquez
Computer Science ETDs
This thesis describes a set of novel techniques for embedding sensors, circuitry, and electronics into structural composites. I leverage recent developments in human computer interaction to create sensors and circuitry that are seamlessly incorporated into structural composites. I fabricate bend and compression sensors, along with circuitry, from textiles, which enables me to add electronic capabilities without impacting the composite’s structural integrity. I describe the construction of these “cognizant composites” and demonstrate their functionality. I also explore techniques for embedding standard electronic components, including microcontrollers, into structural composites. Potential applications of this technology include buildings that can warn occupants if load-bearing …
Intelligent Networks For High Performance Computing, William Whitney Schonbein
Intelligent Networks For High Performance Computing, William Whitney Schonbein
Computer Science ETDs
There exists a resurgence of interest in `smart' network interfaces that can operate on data as it flows through a network. However, while smart capabilities have been expanding, what they can do for high-performance computing (HPC) is not well-understood. In this work, we advance our understanding of the capabilities and contributions of smart network interfaces to HPC. First, we show current offloaded message demultiplexing can mitigate (but not eliminate) overheads incurred by multithreaded communication. Second, we demonstrate current offloaded capabilities can be leveraged to provide Turing complete program execution on the interface. We elaborate with a framework for offloading arbitrary …
Blockchain Based Communication Architectures With Applications To Private Security Networks, Ashley N. Mayle
Blockchain Based Communication Architectures With Applications To Private Security Networks, Ashley N. Mayle
Computer Science ETDs
Existing communication protocols in security networks are highly centralized. While this naively makes the controls easier to physically secure, external actors require fewer resources to disrupt the system because there are fewer points in the system can be interrupted without the entire system failing. We present a solution to this problem using a proof-of-work-based blockchain implementation built on MultiChain. We construct a test-bed network containing visual imagers and microwave sensor information. These data types are ubiquitous in perimeter security systems and allow a realistic representation of a real-world network architecture. The cameras in this system use an object detection algorithm …
Non-Trivial Off-Path Network Measurements Without Shared Side-Channel Resource Exhaustion, Geoffrey I. Alexander
Non-Trivial Off-Path Network Measurements Without Shared Side-Channel Resource Exhaustion, Geoffrey I. Alexander
Computer Science ETDs
Most traditional network measurement scans and attacks are carried out through the use of direct, on-path network packet transmission. This requires that a machine be on-path (i.e, involved in the packet transmission process) and as a result have direct access to the data packets being transmitted. This limits network scans and attacks to situations where access can be gained to an on-path machine. If, for example, a researcher wanted to measure the round trip time between two machines they did not have access to, traditional scans would be of little help as they require access to an on-path machine to …
Robot Motion Planning In Dynamic Environments, Hao-Tien Lewis Chiang
Robot Motion Planning In Dynamic Environments, Hao-Tien Lewis Chiang
Computer Science ETDs
Robot motion planning in dynamic environments is critical for many robotic applications, such as self-driving cars, UAVs and service robots operating in changing environments. However, motion planning in dynamic environments is very challenging as this problem has been shown to be NP-Hard and in PSPACE, even in the simplest case. As a result, the lack of safe, efficient planning solutions for real-world robots is one of the biggest obstacles for ubiquitous adoption of robots in everyday life. Specifically, there are four main challenges facing motion planning in dynamic environments: obstacle motion uncertainty, obstacle interaction, complex robot dynamics and noise, and …
Thwarting Adversaries With Randomness And Irrationality, Abhinav Aggarwal
Thwarting Adversaries With Randomness And Irrationality, Abhinav Aggarwal
Computer Science ETDs
Distributed systems are ubiquitous today: from the Internet used by billions of people around the world to the small scale IoT devices. With this rapidly increasing need to perform computation at scales larger than ever before, comes the need to ensure resilience to adversarial failures so that these systems can continue to behave as intended even when some malicious tampering happens.
In this dissertation, we explore the power of randomness and the difficulty of rationally approximating the Golden Ratio to thwart adversarial behavior in two different problems in distributed computing: interactive communication and robust collaborative search. While randomness helps with …
An Efficient Multiple-Place Foraging Algorithm For Scalable Robot Swarms, Qi Lu
An Efficient Multiple-Place Foraging Algorithm For Scalable Robot Swarms, Qi Lu
Computer Science ETDs
Searching and collecting multiple resources from large unmapped environments is an important challenge. It is particularly difficult given limited time, a large search area and incomplete data about the environment. This search task is an abstraction of many real-world applications such as search and rescue, hazardous material clean-up, and space exploration. The collective foraging behavior of robot swarms is an effective approach for this task. In our work, individual robots have limited sensing and communication range (like ants), but they are organized and work together to complete foraging tasks collectively. An efficient foraging algorithm coordinates robots to search and collect …
The Nature Of Ephemeral Secrets In Reverse Engineering Tasks, Antonio Miguel Espinoza
The Nature Of Ephemeral Secrets In Reverse Engineering Tasks, Antonio Miguel Espinoza
Computer Science ETDs
Reverse engineering is typically carried out on static binary objects, such as files or compiled programs. Often the goal of reverse engineering is to extract a secret that is ephemeral and only exists while the system is running. Automation and dynamic analysis enable reverse engineers to extract ephemeral secrets from dynamic systems, obviating the need for analyzing static artifacts such as executable binaries.
I support this thesis through four automated reverse engineering efforts: (1) named entity extraction to track Chinese Internet censorship based on keywords; (2) dynamic information flow tracking to locate secret keys in memory for a live program; …
Criticality Assessments For Improving Algorithmic Robustness, Thomas B. Jones
Criticality Assessments For Improving Algorithmic Robustness, Thomas B. Jones
Computer Science ETDs
Though computational models typically assume all program steps execute flawlessly, that does not imply all steps are equally important if a failure should occur. In the "Constrained Reliability Allocation" problem, sufficient resources are guaranteed for operations that prompt eventual program termination on failure, but those operations that only cause output errors are given a limited budget of some vital resource, insufficient to ensure correct operation for each of them.
In this dissertation, I present a novel representation of failures based on a combination of their timing and location combined with criticality assessments---a method used to predict the behavior of systems …
Data-Driven Uncertainty Quantification Interpretation With High Density Regions, Matthew Gregor Peterson
Data-Driven Uncertainty Quantification Interpretation With High Density Regions, Matthew Gregor Peterson
Computer Science ETDs
In a time when data is being constantly generated by phones, vehicles, sensor net- works, social media, etc. detecting anomalies with in the data can be very crucial. In cases where we know little prior knowledge about the data, it becomes difficult to extract uncertainty about our results. In this thesis, we will propose a framework in which we can extract uncertainty distributions from data-driven modeling prob- lems. We will show some concrete examples of how to apply framework and provide some insight into what the uncertainty distributions are telling us using High Density Regions (HDRs).
Automated Development Of Semantic Data Models Using Scientific Publications, Martha O. Perez-Arriaga
Automated Development Of Semantic Data Models Using Scientific Publications, Martha O. Perez-Arriaga
Computer Science ETDs
The traditional methods for analyzing information in digital documents have evolved with the ever-increasing volume of data. Some challenges in analyzing scientific publications include the lack of a unified vocabulary and a defined context, different standards and formats in presenting information, various types of data, and diverse areas of knowledge. These challenges hinder detecting, understanding, comparing, sharing, and querying information rapidly.
I design a dynamic conceptual data model with common elements in publications from any domain, such as context, metadata, and tables. To enhance the models, I use related definitions contained in ontologies and the Internet. Therefore, this dissertation generates …
Improving Large Scale Application Performance Via Data Movement Reduction, Dewan M. Ibtesham
Improving Large Scale Application Performance Via Data Movement Reduction, Dewan M. Ibtesham
Computer Science ETDs
The compute capacity growth in high performance computing (HPC) systems is outperforming improvements in other areas of the system for example, memory capacity, network bandwidth and I/O bandwidth. Therefore, the cost of executing a floating point operation is decreasing at a faster rate than moving that data. This increasing performance gap causes wasted CPU cycles while waiting for slower I/O operations to complete in the memory hierarchy, network, and storage. These bottlenecks decrease application time to solution performance, and increase energy consumption, resulting in system under utilization. In other words, data movement is becoming a key concern for future HPC …
Improving Hpc Communication Library Performance On Modern Architectures, Matthew G. F. Dosanjh
Improving Hpc Communication Library Performance On Modern Architectures, Matthew G. F. Dosanjh
Computer Science ETDs
As high-performance computing (HPC) systems advance towards exascale (10^18 operations per second), they must leverage increasing levels of parallelism to achieve their performance goals. In addition to increased parallelism, machines of that scale will have strict power limitations placed on them. One direction currently being explored to alleviate those issues are many-core processors such as Intel’s Xeon Phi line. Many-core processors sacrifice clock speed and core complexity, such as out of order pipelining, to increase the number of cores on a die. While this increases floating point throughput, it can reduce the performance of serialized, synchronized, and latency sensitive code …
Distributed Knowledge Discovery For Diverse Data, Hossein Hamooni
Distributed Knowledge Discovery For Diverse Data, Hossein Hamooni
Computer Science ETDs
In the era of new technologies, computer scientists deal with massive data of size hundreds of terabytes. Smart cities, social networks, health care systems, large sensor networks, etc. are constantly generating new data. It is non-trivial to extract knowledge from big datasets because traditional data mining algorithms run impractically on such big datasets. However, distributed systems have come to aid this problem while introducing new challenges in designing scalable algorithms. The transition from traditional algorithms to the ones that can be run on a distributed platform should be done carefully. Researchers should design the modern distributed algorithms based on the …
Detection Of Pheromone Laying Event In Foraging Data Of Harvester Ants Using Change Point Analysis Method, Safeeul Bashir Safee
Detection Of Pheromone Laying Event In Foraging Data Of Harvester Ants Using Change Point Analysis Method, Safeeul Bashir Safee
Computer Science ETDs
Communication is an important factor in the foraging performance of social insects, such as ants. During foraging, ants keep track of food sources by using memory (site fidelity) or by communicating through pheromones. Previous field experiments showed that the rate of seed collection depends on the distribution of food in the environment. If food is spatially clustered, then it is beneficial for ants recruit nest mates to collect seeds from large clusters. However, we do not know when the recruitment occurs in natural ant population. To explore this question, we used a power law distribution to arrange seeds in piles …