Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- Adaptive computing systems (3)
- Logic circuits -- Design and construction (3)
- Lasers (2)
- Quality of service (Computer networks) -- Management (2)
- Streaming technology (Telecommunications) (2)
-
- Ultrashort laser pulses (2)
- Beam optics (1)
- Binary control systems (1)
- Bubbles (1)
- Cavitation (1)
- Columbia River (1)
- Computer software -- Security (1)
- Computer algorithims (1)
- Computer architecture -- Design (1)
- Computer network protocols (1)
- Computer networks -- Security measures (1)
- Computer security -- Innnovations (1)
- Computer software -- Performance (1)
- Computer viruses -- Prevention (1)
- Decomposition (Mathematics) (1)
- Drug delivery systems (1)
- Electromagnetic pulse (1)
- Electromagnetic waves (1)
- Electromagnetic waves -- Mathematical models (1)
- Electromagnetic waves -- Measurement (1)
- Electromagnetic waves -- Transmission (1)
- Electronic data processing -- Distributed processing (1)
- Gaussian beams (1)
- Gaussian beams -- Propagation (1)
- Interactive computer systems (1)
Articles 1 - 16 of 16
Full-Text Articles in Engineering
Production And Propagation Of Hermite–Sinusoidal-Gaussian Laser Beams, Lee W. Casperson, Anthony A. Tovar
Production And Propagation Of Hermite–Sinusoidal-Gaussian Laser Beams, Lee W. Casperson, Anthony A. Tovar
Electrical and Computer Engineering Faculty Publications and Presentations
Hermite–sinusoidal-Gaussian solutions to the wave equation have recently been obtained. In the limit of large Hermite–Gaussian beam size, the sinusoidal factors are dominant and reduce to the conventional modes of a rectangular waveguide. In the opposite limit the beams reduce to the familiar Hermite–Gaussian form. The propagation of these beams is examined in detail, and resonators are designed that will produce them. As an example, a special resonator is designed to produce hyperbolic-sine-Gaussian beams. This ring resonator contains a hyperbolic-cosine-Gaussian apodized aperture. The beam mode has finite energy and is perturbation stable.
A Feedback-Driven Proportion Allocator For Real-Rate Scheduling, David Steere, Ashvin Goel, Joshua Gruenberg, Dylan Mcnamee, Calton Pu, Jonathan Walpole
A Feedback-Driven Proportion Allocator For Real-Rate Scheduling, David Steere, Ashvin Goel, Joshua Gruenberg, Dylan Mcnamee, Calton Pu, Jonathan Walpole
Computer Science Faculty Publications and Presentations
In this paper we propose changing the decades-old practice of allocating CPU to threads based on priority to a scheme based on proportion and period. Our scheme allocates to each thread a percentage of CPU cycles over a period of time, and uses a feedback-based adaptive scheduler to assign automatically both proportion and period. Applications with known requirements, such as isochronous software devices, can bypass the adaptive scheduler by specifying their desired proportion and/or period. As a result, our scheme provides reservations to applications that need them, and the benefits of proportion and period to those that do not. Adaptive …
An Efficient And Effective Approach To Column-Based Input/Output Encoding In Functional Decomposition, Michael Burns, Marek Perkowski, Stanislaw Grygiel, Lech Jozwiak
An Efficient And Effective Approach To Column-Based Input/Output Encoding In Functional Decomposition, Michael Burns, Marek Perkowski, Stanislaw Grygiel, Lech Jozwiak
Electrical and Computer Engineering Faculty Publications and Presentations
Encoding in Curtis-style decompositions is the process of assigning codes to groups of compatible columns (or cubes) so that the binary logic descriptions of the predecessor and successor sub-functions can be created for further decomposition. In doing so, the sub-functions created are functionally equivalent to the set of care values specified in the original function. In this paper an input/output encoding algorithm DC_ENC is presented that is designed to achieve the simplest total complexity of the predecessor and successor sub-functions, and to increase the total number of don't cares for their further utilization in subsequent decomposition steps of these sub-functions.
Synthetic Files: Enabling Low-Latency File I/O For Qos-Adaptive Applications, Dylan Mcnamee, Dan Revel, Calton Pu, David Steere, Jonathan Walpole
Synthetic Files: Enabling Low-Latency File I/O For Qos-Adaptive Applications, Dylan Mcnamee, Dan Revel, Calton Pu, David Steere, Jonathan Walpole
Computer Science Faculty Publications and Presentations
Files are a tried and true operating system abstraction. They present a simple byte-stream model of I/O that has proven intuitive for application programmers and efficient for operating system builders. However, current file systems do not provide good support for adaptive continuous media (CM) applications - an increasingly important class of applications that exhibit complex access patterns and are particularly sensitive to variations in I/O performance. To address these problems we propose synthetic files. Synthetic files are specialized views of underlying regular files, and convert complex file access patterns into simple sequential synthetic file access patterns. Synthetic file construction can …
Photographic Studies Of Laser-Induced Bubble Formation In Absorbing Liquids And On Submerged Targets: Implications For Drug Delivery With Microsecond Laser Pulses, Hanqun Shangguan, Lee W. Casperson, Dennis L. Paisley, Scott A. Prahl
Photographic Studies Of Laser-Induced Bubble Formation In Absorbing Liquids And On Submerged Targets: Implications For Drug Delivery With Microsecond Laser Pulses, Hanqun Shangguan, Lee W. Casperson, Dennis L. Paisley, Scott A. Prahl
Electrical and Computer Engineering Faculty Publications and Presentations
Pulsed laser ablation of blood clots in a fluid-filled blood vessel is accompanied by an explosive evaporation process. The resulting vapor bubble rapidly expands and collapses to disrupt the thrombus (blood clot). The hydrodynamic pressures following the bubble expansion and collapse can also be used as a driving force to deliver clot-dissolving agents into thrombus for enhancement of laser thrombolysis. Thus, the laser-induced bubble formation plays an important role in the thrombus removal process. We investigate the effects of boundary configurations and materials on bubble formation with time-resolved flash photography and high-speed photography. Potential applications in drug delivery using microsecond …
Quality Of Service Semantics For Multimedia Database Systems, Jonathan Walpole, Charles Krasic, Ling Liu, David Maier, Calton Pu, Dylan Mcnamee, David Steere
Quality Of Service Semantics For Multimedia Database Systems, Jonathan Walpole, Charles Krasic, Ling Liu, David Maier, Calton Pu, Dylan Mcnamee, David Steere
Computer Science Faculty Publications and Presentations
Quality of service (QoS) support has been a hot research topic in multimedia databases, and multimedia systems in general, for the past several years. However, there remains little consensus on how QoS support should be provided. At the resource-management level, systems designers are still debating the suitability of reservation- based versus adaptive QoS management. The design of higher system layers is less clearly understood, and the specification of QoS requirements in domain-specific terms is still an open research topic. To address these issues, we propose a QoS model for multimedia databases. The model covers the specification of user-level QoS preferences …
Location Independent Names For Nomadic Computers, David Steere, Mark Morrissey, Peter Geib, Calton Pu, Jonathan Walpole
Location Independent Names For Nomadic Computers, David Steere, Mark Morrissey, Peter Geib, Calton Pu, Jonathan Walpole
Computer Science Faculty Publications and Presentations
Recent advances in the Domain Name System (DNS) and the Dynamic Host Configuration Protocol (DHCP) have enabled a new approach to supporting mobile users: location independent naming. In this approach, machines use the same hostname from any internet location, but use an IP address that corresponds to their current location. We describe a protocol that implements location independent naming for nomadic computers, i.e., machines that do not need transparent mobility. Our protocol allows hosts to move across security domains, uses existing protocols, and preserves existing trust relationships. Therefore, it preserves the performance and security of normal IP for nomadic computers …
The Columbia River Plume Study: Subtidal Variability In The Velocity And Salinity Fields, B. M. Hickey, Leonard J. Pietrafesa, David A. Jay, William C. Boicourt
The Columbia River Plume Study: Subtidal Variability In The Velocity And Salinity Fields, B. M. Hickey, Leonard J. Pietrafesa, David A. Jay, William C. Boicourt
Civil and Environmental Engineering Faculty Publications and Presentations
A comprehensive study of the strongly wind driven midlatitude buoyant plume from the Columbia River, located on the U.S. west coast, demonstrates that the plume has two basic structures during the fall/winter season, namely, a thin (~5~15 m), strongly stratified plume tending west to northwestward during periods of southward or light northward wind stress and a thicker (~10~40 m), weakly stratified plume tending northward and hugging the coast during periods of stronger northward stress. The plume and its velocity field respond nearly instantaneously to changes in wind speed or direction, and the wind fluctuations have timescales of 2-10 days. Frictional …
Adaptation Space: Surviving Non-Maskable Failures, Crispin Cowan, Lois Delcambre, Anne-Francoise Le Meur, Ling Liu, David Maier, Dylan Mcnamee, Michael Miller, Calton Pu, Perry Wagle, Jonathan Walpole
Adaptation Space: Surviving Non-Maskable Failures, Crispin Cowan, Lois Delcambre, Anne-Francoise Le Meur, Ling Liu, David Maier, Dylan Mcnamee, Michael Miller, Calton Pu, Perry Wagle, Jonathan Walpole
Computer Science Faculty Publications and Presentations
Some failures cannot be masked by redundancies, because an unanticipated situation occurred, because fault-tolerance measures were not adequate, or because there was a security breach (which is not amenable to replication). Applications that wish to continue to offer some service despite nonmaskable failure must adapt to the loss of resources. When numerous combinations of non-maskable failure modes are considered, the set of possible adaptations becomes complex. This paper presents adaptation spaces, a formalism for navigating among combinations of adaptations. An adaptation space describes a collection of possible adaptations of a software component or system, and provides a uniform way of …
Hermite–Sinusoidal-Gaussian Beams In Complex Optical Systems, Lee W. Casperson, Anthony A. Tovar
Hermite–Sinusoidal-Gaussian Beams In Complex Optical Systems, Lee W. Casperson, Anthony A. Tovar
Electrical and Computer Engineering Faculty Publications and Presentations
Sinusoidal-Gaussian beams have recently been obtained as exact solutions of the paraxial wave equation for propagation in complex optical systems. Another useful set of beam solutions for Cartesian coordinate systems is based on Hermite–Gaussian functions. A generalization of these solution sets is developed here. The new solutions are referred to as Hermite–sinusoidal-Gaussian beams, because they are in the form of a product of Hermite-polynomial functions of either complex or real argument, sinusoidal functions of complex argument, and Gaussian functions of complex argument. These beams are valid for propagation through systems that can be represented in terms of complex beam matrices, …
Tooth Contact Sensing Apparatus And Method, John D. Summer, Edmund Pierzchala, Marek Perkowski
Tooth Contact Sensing Apparatus And Method, John D. Summer, Edmund Pierzchala, Marek Perkowski
Electrical and Computer Engineering Faculty Publications and Presentations
An apparatus and method for sensing tooth contact includes at least one, and more typically plural, vibration sensors which are coupled to the non-biting surfaces of teeth. These sensors produce output signals when the associated teeth contact one another during jaw closing, the output signals being processed to provide information concerning tooth contact. For example, information concerning the ?rst tooth which contacts may be determined, the sequence of contact by various teeth may be determined, as well as the time between contact of the various teeth. Other information concerning tooth contact may also be determined and dis played in a …
Field Solutions For Bidirectional High-Gain Laser Amplifiers And Oscillators, Lee W. Casperson, Mohammad Azadeh
Field Solutions For Bidirectional High-Gain Laser Amplifiers And Oscillators, Lee W. Casperson, Mohammad Azadeh
Electrical and Computer Engineering Faculty Publications and Presentations
General analytical solutions are obtained for the amplitude, phase, and intensity of the electromagnetic waves in bidirectional homogeneously broadened high-gain laser amplifiers and oscillators. These solutions are important as increasingly high-gain lasers are being employed in practical systems. Expressions are derived relating the output power to the input, including the effects of arbitrary mirror reflectivities and frequency detunings from the line center. For negligible reflectivities, these regenerative amplifier results reduce to earlier expressions for single-pass high-gain amplifiers. Multivalued outputs also occur, and in the limit of low gain per pass the results are consistent with earlier studies of single-frequency laser …
Few-Cycle Pulses In Two-Level Media, Lee W. Casperson
Few-Cycle Pulses In Two-Level Media, Lee W. Casperson
Electrical and Computer Engineering Faculty Publications and Presentations
Techniques for producing, measuring, and applying ever shorter electromagnetic pulses are being developed for incorporation in a variety of modern high-speed systems. In many cases these pulses are at most a few cycles in length, and so-called half-cycle electromagnetic pulses are also widely employed. The interaction of such pulses with two-level media is considered here in detail, and these media are basic to many of the absorbing and amplifying configurations of optics and laser studies. Significant delays and distortion of the resulting polarization and population pulses can occur, and nonlinear optical effects are also revealed. The limitations of the parity, …
Exact Graph Coloring For Functional Decomposition: Do We Need It?, Marek Perkowski, Rahul Malvi, Lech Jozwiak
Exact Graph Coloring For Functional Decomposition: Do We Need It?, Marek Perkowski, Rahul Malvi, Lech Jozwiak
Electrical and Computer Engineering Faculty Publications and Presentations
Finding column multiplicity index is one of important component processes in functional decomposition of discrete functions for circuit design and especially Data Mining applications. How important it is to solve this problem exactly from the point of view of the minimum complexity of decomposition, and related to it error in Machine Learning type of applications? In order to investigate this problem we wrote two graph coloring programs: exact program EXOC and approximate program DOM (DOM cab give provably exact results on some types of graphs). These programs were next incorporated into the multi-valued decomposer of functions and relations NVGUD. Extensive …
Stackguard: Automatic Adaptive Detection And Prevention Of Buffer-Overflow Attacks, Crispin Cowan, Calton Pu, David Maier, Heather Hinton, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle, Qian Zhang
Stackguard: Automatic Adaptive Detection And Prevention Of Buffer-Overflow Attacks, Crispin Cowan, Calton Pu, David Maier, Heather Hinton, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle, Qian Zhang
Computer Science Faculty Publications and Presentations
This paper presents a systematic solution to the persistent problem of buffer overflow attacks. Buffer overflow attacks gained notoriety in 1988 as part of the Morris Worm incident on the Internet. While it is fairly simple to fix individual buffer overflow vulnerabilities, buffer overflow attacks continue to this day. Hundreds of attacks have been discovered, and while most of the obvious vulnerabilities have now been patched, more sophisticated buffer overflow attacks continue to emerge.
We describe StackGuard: a simple compiler technique that virtually eliminates buffer overflow vulnerabilities with only modest performance penalties. Privileged programs that are recompiled with the StackGuard …
Multi-Level Programmable Arrays For Sub-Micron Technology Based On Symmetries, Marek Perkowski, Malgorzata Chrzanowska-Jeske, Yang Xu
Multi-Level Programmable Arrays For Sub-Micron Technology Based On Symmetries, Marek Perkowski, Malgorzata Chrzanowska-Jeske, Yang Xu
Electrical and Computer Engineering Faculty Publications and Presentations
Regular layout is a fundamental concept in VLSI design which can have application in custom design for submicron technologies, designing new architectures for fine-grain Field Programmable Gate Arrays (FPGAs) and Electrically Programmable logic Devices (EPLDs), and minimization of logic functions for existing FPGAs. PLAs are well known examples of regular layouts. Lattice diagrams are another type of regular layouts that have been recently introduced for layout-driven logic synthesis. In this paper we extend and combine theses two ideas, by introducing the multi-level PLA-like structures, composed from multi-output (pseudo) symmetrical lattice planes and other planes (multi-input, multi-output regular blocks). The main …