Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Computer Engineering

Generalized Techniques For Using System Execution Traces To Support Software Performance Analysis, Thelge Manjula Peiris Dec 2015

Generalized Techniques For Using System Execution Traces To Support Software Performance Analysis, Thelge Manjula Peiris

Open Access Dissertations

This dissertation proposes generalized techniques to support software performance analysis using system execution traces in the absence of software development artifacts such as source code. The proposed techniques do not require modifications to the source code, or to the software binaries, for the purpose of software analysis (non-intrusive). The proposed techniques are also not tightly coupled to the architecture specific details of the system being analyzed. This dissertation extends the current techniques of using system execution traces to evaluate software performance properties, such as response times, service times. The dissertation also proposes a novel technique to auto-construct a dataflow model …


Implementation Of A Speech Recognition Algorithm To Facilitate Verbal Commands For Visual Analytics Law Enforcement Toolkit, Shubham S. Rastogi, David L. Wiszowaty, Hanye Xu, Abish Malik, David S. Ebert Aug 2015

Implementation Of A Speech Recognition Algorithm To Facilitate Verbal Commands For Visual Analytics Law Enforcement Toolkit, Shubham S. Rastogi, David L. Wiszowaty, Hanye Xu, Abish Malik, David S. Ebert

The Summer Undergraduate Research Fellowship (SURF) Symposium

The VALET (Visual Analytics Law Enforcement Toolkit) system allows the user to visualize and predict crime hotspots and analyze crime data. Police officers have difficulty in using VALET in a mobile situation, since the system allows only conventional input interfaces (keyboard and mouse). This research focuses on introducing a new input interface to VALET in the form of speech recognition, which allows the user to interact with the software without losing functionality. First an Application Program Interface (API) that was compatible with the VALET system was found and initial code scripts to test its functionality were written. Next, the code …


Gpu/Cpu Performance Of Image Processing Tasks For Use In The Cam 2 System, Jonathan Cottom, Yung-Hsiang Lu, Young-Sol Koh Aug 2015

Gpu/Cpu Performance Of Image Processing Tasks For Use In The Cam 2 System, Jonathan Cottom, Yung-Hsiang Lu, Young-Sol Koh

The Summer Undergraduate Research Fellowship (SURF) Symposium

Over the past several years, graphics processing units (GPU) have increasingly been viewed as the future of image processing engines. Currently, the Continuous Analysis of Many CAMeras (CAM2) project performs its processing on CPUs, which will potentially be more costly as the system scales to service more users. This study seeks to analyze the performance gains of GPU processing and evaluate the advantage of supporting GPU-accelerated analysis for CAM2 users. The platform for comparing the CPU and GPU performance has been the NVIDIA Jetson TK1. The target hardware implementation is an Amazon cloud instance, where final cost …


Two Correspondence Problems Easier Than One, Aaron Michaux, Zygmunt Pizlo May 2015

Two Correspondence Problems Easier Than One, Aaron Michaux, Zygmunt Pizlo

MODVIS Workshop

Computer vision research rarely makes use of symmetry in stereo reconstruction despite its established importance in perceptual psychology. Such stereo reconstructions produce visually satisfying figures with precisely located points and lines, even when input images have low or moderate resolution. However, because few invariants exist, there are no known general approaches to solving symmetry correspondence on real images. The problem is significantly easier when combined with the binocular correspondence problem, because each correspondence problem provides strong non-overlapping constraints on the solution space. We demonstrate a system that leverages these constraints to produce accurate stereo models from pairs of binocular images …


Architectural Techniques To Extend Multi-Core Performance Scaling, Hamza Bin Sohail Apr 2015

Architectural Techniques To Extend Multi-Core Performance Scaling, Hamza Bin Sohail

Open Access Dissertations

Multi-cores have successfully delivered performance improvements over the past decade; however, they now face problems on two fronts: power and off-chip memory bandwidth. Dennard's scaling is effectively coming to an end which has lead to a gradual increase in chip power dissipation. In addition, sustaining off-chip memory bandwidth has become harder due to the limited space for pins on the die and greater current needed to drive the increasing load . My thesis focuses on techniques to address the power and off-chip memory bandwidth challenges in order to avoid the premature end of the multi-core era. ^ In the first …


Trajectory Generation For Lane-Change Maneuver Of Autonomous Vehicles, Ashesh Goswami Apr 2015

Trajectory Generation For Lane-Change Maneuver Of Autonomous Vehicles, Ashesh Goswami

Open Access Theses

Lane-change maneuver is one of the most thoroughly investigated automatic driving operations that can be used by an autonomous self-driving vehicle as a primitive for performing more complex operations like merging, entering/exiting highways or overtaking another vehicle. This thesis focuses on two coherent problems that are associated with the trajectory generation for lane-change maneuvers of autonomous vehicles in a highway scenario: (i) an effective velocity estimation of neighboring vehicles under different road scenarios involving linear and curvilinear motion of the vehicles, and (ii) trajectory generation based on the estimated velocities of neighboring vehicles for safe operation of self-driving cars during …


Recursive Tree Traversal Dependence Analysis, Yusheng Weijiang Apr 2015

Recursive Tree Traversal Dependence Analysis, Yusheng Weijiang

Open Access Theses

While there has been much work done on analyzing and transforming regular programs that operate over linear arrays and dense matrices, comparatively little has been done to try to carry these optimizations over to programs that operate over heap-based data structures using pointers. Previous work has shown that point blocking, a technique similar to loop tiling in regular programs, can help increase the temporal locality of repeated tree traversals. Point blocking, however, has only been shown to work on tree traversals where each traversal is fully independent and would allow parallelization, greatly limiting the types of applications that this transformation …


Improving Capacity-Performance Tradeoffs In The Storage Tier, Eric P. Villasenor Apr 2015

Improving Capacity-Performance Tradeoffs In The Storage Tier, Eric P. Villasenor

Open Access Dissertations

Data-set sizes are growing. New techniques are emerging to organize and analyze these data-sets. There is a key access pattern emerging with these new techniques, large sequential file accesses. The trend toward bigger files exists to help amortize the cost of data accesses from the storage layer, as many workloads are recognized to be I/O bound. The storage layer is widely recognized as the slowest layer in the system. This work focuses on the tradeoff one can make with that storage capacity to improve system performance. ^ Capacity can be leveraged for improved availability or improved performance. This tradeoff is …


Assessment Of High-Fidelity Collision Models In The Direct Simulation Monte Carlo Method, Andrew Brian Weaver Apr 2015

Assessment Of High-Fidelity Collision Models In The Direct Simulation Monte Carlo Method, Andrew Brian Weaver

Open Access Dissertations

Advances in computer technology over the decades has allowed for more complex physics to be modeled in the DSMC method. Beginning with the first paper on DSMC in 1963, 30,000 collision events per hour were simulated using a simple hard sphere model. Today, more than 10 billion collision events can be simulated per hour for the same problem. Many new and more physically realistic collision models such as the Lennard-Jones potential and the forced harmonic oscillator model have been introduced into DSMC. However, the fact that computer resources are more readily available and higher-fidelity models have been developed does not …