Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 31

Full-Text Articles in Computer Engineering

What Broke Where For Distributed And Parallel Applications — A Whodunit Story, Subrata Mitra Dec 2016

What Broke Where For Distributed And Parallel Applications — A Whodunit Story, Subrata Mitra

Open Access Dissertations

Detection, diagnosis and mitigation of performance problems in today's large-scale distributed and parallel systems is a difficult task. These large distributed and parallel systems are composed of various complex software and hardware components. When the system experiences some performance or correctness problem, developers struggle to understand the root cause of the problem and fix in a timely manner. In my thesis, I address these three components of the performance problems in computer systems. First, we focus on diagnosing performance problems in large-scale parallel applications running on supercomputers. We developed techniques to localize the performance problem for root-cause analysis. Parallel applications, …


Tangible Interaction As An Aid For Object Navigation In 3d Modeling, Sanmathi Dangeti Dec 2016

Tangible Interaction As An Aid For Object Navigation In 3d Modeling, Sanmathi Dangeti

Open Access Theses

This study introduced an interaction technique that used tangible interaction for 3D modeling. A hybrid interaction technique using a Kinect camera and a smartphone with a gyroscope was developed for the navigating objects in a 3D modeling software. It was then tested on 20 participants categorized as amateurs who had basic 3D/ CAD modeling experience and 20 participants categorized as the experts who had extensive experience working with the modeling software. This research study presents the need for existence of such interaction technique, gaps from the related previous studies, statistical findings from the current study and possible reasons for the …


Video Annotation By Crowd Workers With Privacy-Preserving Local Disclosure, Apeksha Dipak Kumavat Dec 2016

Video Annotation By Crowd Workers With Privacy-Preserving Local Disclosure, Apeksha Dipak Kumavat

Open Access Theses

Advancements in computer vision are still not reliable enough for detecting video content including humans and their actions. Microtask crowdsourcing on task markets such as Amazon Mechnical Turk and Upwork can bring humans into the loop. However, engaging crowd workers to annotate non-public video footage risks revealing the identities of people in the video who may have a right to anonymity.

This thesis demonstrates how we can engage untrusted crowd workers to detect behaviors and objects, while robustly concealing the identities of all faces. We developed a web-based system that presents obfuscated videos to crowd workers, and provides them with …


Interactive Logical Analysis Of Planning Domains, Rajesh Kalyanam Aug 2016

Interactive Logical Analysis Of Planning Domains, Rajesh Kalyanam

Open Access Dissertations

Humans exhibit a significant ability to answer a wide range of questions about previously unencountered planning domains, and leverage this ability to construct “general-purpose'' solution plans for the domain.

The long term vision of this research is to automate this ability, constructing a system that utilizes reasoning to automatically verify claims about a planning domain. The system would use this ability to automatically construct and verify a generalized plan to solve any planning problem in the domain. The goal of this thesis is to start with baseline results from the interactive verification of claims about planning domains and develop the …


Using Ubiquitous Data To Improve Smartwatches' Context Awareness, Yuankun Song Aug 2016

Using Ubiquitous Data To Improve Smartwatches' Context Awareness, Yuankun Song

Open Access Theses

Nowadays, more and more data is being generated by various software applications, services and smart devices every second. The data contains abundant information about people’s daily lives. This research explored the possibility of improving smartwatches’ context awareness by using common ubiquitous data. The researcher developed a prototype system consisting of an Android application and a web application, and conducted an experiment where 10 participants performed several tasks with the help of a smartwatch. The result showed a significant improvement of the smartwatch’s context awareness running the prototype application, which used ubiquitous data to automatically execute proper actions according to contexts. …


Monitoring Dbms Activity To Detect Insider Threat Using Query Selectivity, Prajwal B. Hegde Aug 2016

Monitoring Dbms Activity To Detect Insider Threat Using Query Selectivity, Prajwal B. Hegde

Open Access Theses

The objective of the research presented in this thesis is to evaluate the importance of query selectivity for monitoring DBMS activity and detect insider threat. We propose query selectivity as an additional component to an existing anomaly detection system (ADS). We first look at the advantages of working with this particular ADS. This is followed by a discussion about some existing limitations in the anomaly detection system (ADS) and how it affects its overall performance. We look at what query selectivity is and how it can help improve upon the existing limitations of the ADS. The system is then implemented …


Energy Efficiency In Data Collection Wireless Sensor Networks, Miquel Andres Navarro Patino Apr 2016

Energy Efficiency In Data Collection Wireless Sensor Networks, Miquel Andres Navarro Patino

Open Access Dissertations

This dissertation studies the problem of energy efficiency in resource constrained and heterogeneous wireless sensor networks (WSNs) for data collection applications in real-world scenarios. The problem is addressed from three different perspectives: network routing, node energy profiles, and network management. First, the energy efficiency in a WSN is formulated as a load balancing problem, where the routing layer can diagnose and exploit the WSN topology redundancy to reduce the data traffic processed in critical nodes, independent of their hardware platform, improving their energy consumption and extending the network lifetime. We propose a new routing strategy that extends traditional cost-based routing …


User-Centric Workload Analytics: Towards Better Cluster Management, Suhas Raveesh Javagal Apr 2016

User-Centric Workload Analytics: Towards Better Cluster Management, Suhas Raveesh Javagal

Open Access Theses

Effective management of computing clusters and providing a high quality customer support is not a trivial task. Due to rise of community clusters there is an increase in the diversity of workloads and the user demographic. Owing to this and privacy concerns of the user, it is difficult to identify performance issues, reduce resource wastage and understand implicit user demands. In this thesis, we perform in-depth analysis of user behavior, performance issues, resource usage patterns and failures in the workloads collected from a university-wide community cluster and two clusters maintained by a government lab. We also introduce a set of …


Learning In Vision And Robotics, Daniel P. Barrett Apr 2016

Learning In Vision And Robotics, Daniel P. Barrett

Open Access Dissertations

I present my work on learning from video and robotic input. This is an important problem, with numerous potential applications. The use of machine learning makes it possible to obtain models which can handle noise and variation without explicitly programming them. It also raises the possibility of robots which can interact more seamlessly with humans rather than only exhibiting hard-coded behaviors. I will present my work in two areas: video action recognition, and robot navigation. First, I present a video action recognition method which represents actions in video by sequences of retinotopic appearance and motion detectors, learns such models automatically …


Grounding Robot Motion In Natural Language And Visual Perception, Scott Alan Bronikowski Apr 2016

Grounding Robot Motion In Natural Language And Visual Perception, Scott Alan Bronikowski

Open Access Dissertations

The current state of the art in military and first responder ground robots involves heavy physical and cognitive burdens on the human operator while taking little to no advantage of the potential autonomy of robotic technology. The robots currently in use are rugged remote-controlled vehicles. Their interaction modalities, usually utilizing a game controller connected to a computer, require a dedicated operator who has limited capacity for other tasks.

I present research which aims to ease these burdens by incorporating multiple modes of robotic sensing into a system which allows humans to interact with robots through a natural-language interface. I conduct …


A Faster Version Of Louvain Method For Community Detection For Efficient Modeling And Analytics Of Cyber Systems, Sunanda Vivek Shanbhaq Apr 2016

A Faster Version Of Louvain Method For Community Detection For Efficient Modeling And Analytics Of Cyber Systems, Sunanda Vivek Shanbhaq

Open Access Theses

Cyber networks are complex networks with various hosts forming the entities of the network and the communication between them forming the edges of the network. Most cyber networks exhibit a community structure. A community is a group of nodes that are densely connected with each other as compared to other nodes in the network. Representing an IP network in the form of communities helps in viewing the network from different levels of granularity and makes the visualization of the network cleaner and more pleasing to the eye. This will help significantly in cyber attack detection in large scale cyber networks. …


Generalized Techniques For Using System Execution Traces To Support Software Performance Analysis, Thelge Manjula Peiris Dec 2015

Generalized Techniques For Using System Execution Traces To Support Software Performance Analysis, Thelge Manjula Peiris

Open Access Dissertations

This dissertation proposes generalized techniques to support software performance analysis using system execution traces in the absence of software development artifacts such as source code. The proposed techniques do not require modifications to the source code, or to the software binaries, for the purpose of software analysis (non-intrusive). The proposed techniques are also not tightly coupled to the architecture specific details of the system being analyzed. This dissertation extends the current techniques of using system execution traces to evaluate software performance properties, such as response times, service times. The dissertation also proposes a novel technique to auto-construct a dataflow model …


Architectural Techniques To Extend Multi-Core Performance Scaling, Hamza Bin Sohail Apr 2015

Architectural Techniques To Extend Multi-Core Performance Scaling, Hamza Bin Sohail

Open Access Dissertations

Multi-cores have successfully delivered performance improvements over the past decade; however, they now face problems on two fronts: power and off-chip memory bandwidth. Dennard's scaling is effectively coming to an end which has lead to a gradual increase in chip power dissipation. In addition, sustaining off-chip memory bandwidth has become harder due to the limited space for pins on the die and greater current needed to drive the increasing load . My thesis focuses on techniques to address the power and off-chip memory bandwidth challenges in order to avoid the premature end of the multi-core era. ^ In the first …


Trajectory Generation For Lane-Change Maneuver Of Autonomous Vehicles, Ashesh Goswami Apr 2015

Trajectory Generation For Lane-Change Maneuver Of Autonomous Vehicles, Ashesh Goswami

Open Access Theses

Lane-change maneuver is one of the most thoroughly investigated automatic driving operations that can be used by an autonomous self-driving vehicle as a primitive for performing more complex operations like merging, entering/exiting highways or overtaking another vehicle. This thesis focuses on two coherent problems that are associated with the trajectory generation for lane-change maneuvers of autonomous vehicles in a highway scenario: (i) an effective velocity estimation of neighboring vehicles under different road scenarios involving linear and curvilinear motion of the vehicles, and (ii) trajectory generation based on the estimated velocities of neighboring vehicles for safe operation of self-driving cars during …


Recursive Tree Traversal Dependence Analysis, Yusheng Weijiang Apr 2015

Recursive Tree Traversal Dependence Analysis, Yusheng Weijiang

Open Access Theses

While there has been much work done on analyzing and transforming regular programs that operate over linear arrays and dense matrices, comparatively little has been done to try to carry these optimizations over to programs that operate over heap-based data structures using pointers. Previous work has shown that point blocking, a technique similar to loop tiling in regular programs, can help increase the temporal locality of repeated tree traversals. Point blocking, however, has only been shown to work on tree traversals where each traversal is fully independent and would allow parallelization, greatly limiting the types of applications that this transformation …


Improving Capacity-Performance Tradeoffs In The Storage Tier, Eric P. Villasenor Apr 2015

Improving Capacity-Performance Tradeoffs In The Storage Tier, Eric P. Villasenor

Open Access Dissertations

Data-set sizes are growing. New techniques are emerging to organize and analyze these data-sets. There is a key access pattern emerging with these new techniques, large sequential file accesses. The trend toward bigger files exists to help amortize the cost of data accesses from the storage layer, as many workloads are recognized to be I/O bound. The storage layer is widely recognized as the slowest layer in the system. This work focuses on the tradeoff one can make with that storage capacity to improve system performance. ^ Capacity can be leveraged for improved availability or improved performance. This tradeoff is …


Assessment Of High-Fidelity Collision Models In The Direct Simulation Monte Carlo Method, Andrew Brian Weaver Apr 2015

Assessment Of High-Fidelity Collision Models In The Direct Simulation Monte Carlo Method, Andrew Brian Weaver

Open Access Dissertations

Advances in computer technology over the decades has allowed for more complex physics to be modeled in the DSMC method. Beginning with the first paper on DSMC in 1963, 30,000 collision events per hour were simulated using a simple hard sphere model. Today, more than 10 billion collision events can be simulated per hour for the same problem. Many new and more physically realistic collision models such as the Lennard-Jones potential and the forced harmonic oscillator model have been introduced into DSMC. However, the fact that computer resources are more readily available and higher-fidelity models have been developed does not …


Digital Provenance - Models, Systems, And Applications, Salmin Sultana Oct 2014

Digital Provenance - Models, Systems, And Applications, Salmin Sultana

Open Access Dissertations

Data provenance refers to the history of creation and manipulation of a data object and is being widely used in various application domains including scientific experiments, grid computing, file and storage system, streaming data etc. However, existing provenance systems operate at a single layer of abstraction (workflow/process/OS) at which they record and store provenance whereas the provenance captured from different layers provide the highest benefit when integrated through a unified provenance framework. To build such a framework, a comprehensive provenance model able to represent the provenance of data objects with various semantics and granularity is the first step. In this …


Image Analysis Using Visual Saliency With Applications In Hazmat Sign Detection And Recognition, Bin Zhao Oct 2014

Image Analysis Using Visual Saliency With Applications In Hazmat Sign Detection And Recognition, Bin Zhao

Open Access Dissertations

Visual saliency is the perceptual process that makes attractive objects "stand out" from their surroundings in the low-level human visual system. Visual saliency has been modeled as a preprocessing step of the human visual system for selecting the important visual information from a scene. We investigate bottom-up visual saliency using spectral analysis approaches. We present separate and composite model families that generalize existing frequency domain visual saliency models. We propose several frequency domain visual saliency models to generate saliency maps using new spectrum processing methods and an entropy-based saliency map selection approach. A group of saliency map candidates are then …


Functional Programming Abstractions For Weakly Consistent Systems, Sivaramakrishnan Krishnamoorthy Chandrasekaran Oct 2014

Functional Programming Abstractions For Weakly Consistent Systems, Sivaramakrishnan Krishnamoorthy Chandrasekaran

Open Access Dissertations

In recent years, there has been a wide-spread adoption of both multicore and cloud computing. Traditionally, concurrent programmers have relied on the underlying system providing strong memory consistency, where there is a semblance of concurrent tasks operating over a shared global address space. However, providing scalable strong consistency guarantees as the scale of the system grows is an increasingly difficult endeavor. In a multicore setting, the increasing complexity and the lack of scalability of hardware mechanisms such as cache coherence deters scalable strong consistency. In geo-distributed compute clouds, the availability concerns in the presence of partial failures prohibit strong consistency. …


Rapid Indirect Trajectory Optimization On Highly Parallel Computing Architectures, Thomas Antony Oct 2014

Rapid Indirect Trajectory Optimization On Highly Parallel Computing Architectures, Thomas Antony

Open Access Theses

Trajectory optimization is a field which can benefit greatly from the advantages offered by parallel computing. The current state-of-the-art in trajectory optimization focuses on the use of direct optimization methods, such as the pseudo-spectral method. These methods are favored due to their ease of implementation and large convergence regions while indirect methods have largely been ignored in the literature in the past decade except for specific applications in astrodynamics. It has been shown that the shortcomings conventionally associated with indirect methods can be overcome by the use of a continuation method in which complex trajectory solutions are obtained by solving …


Impact Of License Selection On Open Source Software Quality, Benjamin J. Cotton Oct 2014

Impact Of License Selection On Open Source Software Quality, Benjamin J. Cotton

Open Access Theses

Open source software plays an important part in the modern world, powering businesses large and small. However, little work has been done to evaluate the quality of open source software. Two different license paradigms exist within the open source world, and this study examines the difference in software quality between them. In this thesis, the author uses technical debt as a measure of software quality. Eighty open source projects (40 from each paradigm) were downloaded from the popular open source hosting website SourceForge. Using complexity, code duplication, comments, and unit test coverage as inputs to the SonarQube technical debt model, …


Wi-Fi Real Time Location Systems, Benjamin A. Doll Oct 2014

Wi-Fi Real Time Location Systems, Benjamin A. Doll

Open Access Theses

This thesis objective was to determine the viability of utilizing an untrained Wi-Fi real time location system as a GPS alternative for indoor environments. Background research showed that GPS is rarely able to penetrate buildings to provide reliable location data. The benefit of having location information in a facility and how they might be used for disaster or emergency relief personnel and their resources motivated this research. A building was selected with a well-deployed Wi-Fi infrastructure and its untrained location feature was used to determine the distance between the specified test points and the system identified location. It was found …


Usability Of Immersive Virtual Reality Input Devices, Christopher G. Mankey Oct 2014

Usability Of Immersive Virtual Reality Input Devices, Christopher G. Mankey

Open Access Dissertations

This research conducts a usability analysis of human interface devices within an Immersive Virtual Reality Environment. The analysis is carried out for two different interface devices, a commercially available Intersense © Wand and a home built pinch glove and wireless receiver. Users were asked to carry out a series of minor tasks involving placement of shaped blocks into corresponding holes within an Immersive Virtual Reality Environment. Performance was evaluated in terms of speed, accuracy and precision via the collection of completion times, errors made and the precision of motion during the experiment.


Paxos Based Directory Updates For Geo-Replicated Cloud Storage, Srivathsava Rangarajan Jul 2014

Paxos Based Directory Updates For Geo-Replicated Cloud Storage, Srivathsava Rangarajan

Open Access Theses

Modern cloud data stores (e.g., Spanner, Cassandra) replicate data across geographically distributed data centers for availability, redundancy and optimized latencies.^ An important class of cloud data stores involves the use of directories to track the location of individual data objects. Directory-based datastores allow flexible data placement, and the ability to adapt placement in response to changing workload dynamics. However, a key challenge is maintaining and updating the directory state when replica placement changes.^ In this thesis, we present the design and implementation of a system to address the problem of correctly updating these directories. Our system is built around JPaxos, …


Software Architecture And Development For Controlling A Hubo Humanoid Robot, Manas Ajit Paldhe Apr 2014

Software Architecture And Development For Controlling A Hubo Humanoid Robot, Manas Ajit Paldhe

Open Access Theses

Due to their human-like structure, humanoid robots are capable of doing some complex tasks. Since a humanoid robot has a large number of actuators and sensors, controlling it is a difficult task. For various tasks like balancing, driving a car, and interacting with humans, real-time response of the robot is essential. Efficiently controlling a humanoid robot requires a software that guarantees real-time interface and control mechanism so that real-time response of the robot is possible. Addition- ally, to reduce the development effort and time, the software should be open-source, multi-lingual and should have high-level constructs inbuilt in it.

Currently Robot …


Analysis Of Eye Tracking Data Obtained By Customers’ Product Evaluations, Shweta Sanjay Sareen Apr 2014

Analysis Of Eye Tracking Data Obtained By Customers’ Product Evaluations, Shweta Sanjay Sareen

Open Access Theses

Within the mechanical engineering discipline, product representational studies have been used to inform engineers on the suitability of their product designs for prospective customers. Mainly based in customers' oral responses, engineers would modify the product design accordingly. The incorporation of eye tracking data, in addition to the oral responses, in these product representational studies is a recent addition. This case study performs data analysis of a product representational study conducted by Reid, MacDonald and Du (2012), which considers the impact of 2D and 3D product representation on customer judgments with associated eye gaze patterns. The aim of this thesis is …


Reliability Guided Resource Allocation For Large-Scale Supercomputing Systems, Shruti Umamaheshwaran Apr 2014

Reliability Guided Resource Allocation For Large-Scale Supercomputing Systems, Shruti Umamaheshwaran

Open Access Theses

In high performance computing systems, parallel applications request a large number of resources for long time periods. In this scenario, if a resource fails during the application runtime, it would cause all applications using this resource to fail. The probability of application failure is tied to the inherent reliability of resources used by the application. Our investigation of high performance computing systems operating in the field has revealed a significant difference in the measured operational reliability of individual computing nodes. By adding awareness of the individual system nodes' reliability to the scheduler along with the predicted reliability needs of parallel …


Reasoning Across Language And Vision In Machines And Humans, Andrei Barbu Oct 2013

Reasoning Across Language And Vision In Machines And Humans, Andrei Barbu

Open Access Dissertations

Humans not only outperform AI and computer-vision systems, but use an unknown computational mechanism to perform tasks for which no suitable approaches exist. I present work investigating both novel tasks and how humans approach them in the context of computer vision and linguistics. I demonstrate a system which, like children, acquires high-level linguistic knowledge about the world. Robots learn to play physically-instantiated board games and use that knowledge to engage in physical play. To further integrate language and vision I develop an approach which produces rich sentential descriptions of events depicted in videos. I then show how to simultaneously detect …


Predictive Duty Cycling Of Radios And Cameras Using Augmented Sensing In Wireless Camera Networks, Joonhwa Shin Oct 2013

Predictive Duty Cycling Of Radios And Cameras Using Augmented Sensing In Wireless Camera Networks, Joonhwa Shin

Open Access Dissertations

Energy efficiency dominates practically every aspect of the design of wireless camera networks (WCNs), and duty cycling of radios and cameras is an important tool for achieving high energy efficiencies. However, duty cycling in WCNs is made complex by the camera nodes having to anticipate the arrival of the objects in their field-of-view. What adds to this complexity is the fact that radio duty cycling and camera duty cycling are tightly coupled notions in WCNs.

Abstract In this dissertation, we present a predictive framework to provide camera nodes with an ability to anticipate the arrival of an object in the …