Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture

2009

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 46

Full-Text Articles in Computer Engineering

Tailored Systems Architecture For Design Of Space Science And Technology Missions Using Dodaf V2.0, Nicholas J. Merski Dec 2009

Tailored Systems Architecture For Design Of Space Science And Technology Missions Using Dodaf V2.0, Nicholas J. Merski

Theses and Dissertations

The use of systems architecture, following a set of integrated descriptions from an architecture framework, has been well codified in Department of Defense acquisition and systems engineering. However, in the Space Science and Technology (S&T) community, this guidance and practice is not commonly adopted. This paper outlines an approach to leverage the changes made in DoD Architecture Framework 2.0 (DoDAF2.0), and the renewed emphasis on data and support to acquisition decision analysis. After decomposing the Space S&T design lifecycle into phases, design milestones and activities using process models, a set of DoDAF prescribed and Fit-for-Purpose views are constructed into a …


Performance Analysis Of Live-Virtual-Constructive And Distributed Virtual Simulations: Defining Requirements In Terms Of Temporal Consistency, Douglas D. Hodson Dec 2009

Performance Analysis Of Live-Virtual-Constructive And Distributed Virtual Simulations: Defining Requirements In Terms Of Temporal Consistency, Douglas D. Hodson

Theses and Dissertations

This research extends the knowledge of live-virtual-constructive (LVC) and distributed virtual simulations (DVS) through a detailed analysis and characterization of their underlying computing architecture. LVCs are characterized as a set of asynchronous simulation applications each serving as both producers and consumers of shared state data. In terms of data aging characteristics, LVCs are found to be first-order linear systems. System performance is quantified via two opposing factors; the consistency of the distributed state space, and the response time or interaction quality of the autonomous simulation applications. A framework is developed that defines temporal data consistency requirements such that the objectives …


Anaglym: A Graphics Engine Providing Secure Execution Of Applications, Josh Holtrop Dec 2009

Anaglym: A Graphics Engine Providing Secure Execution Of Applications, Josh Holtrop

Culminating Experience Projects

"The Anaglym graphics engine uses the Lua programming language as the high-level language in which to interpret Anaglym applications. Applications running inside Anaglym are Lua scripts that have a particular environment exposed to them. By default, when Lua is embedded inside a C or C++ host application, no Lua functions are available to the hosted script. Lua functions must be exported by the host environment to be callable by a Lua script."


Appraising Critical Infrastructure Systems With Visualisation, Graeme Pye, Matthew Warren Dec 2009

Appraising Critical Infrastructure Systems With Visualisation, Graeme Pye, Matthew Warren

Australian Information Warfare and Security Conference

This paper explores the use of system modelling as an approach for appraising critical infrastructure systems. It reports on focus group findings with relation to the system modelling aspects of a critical infrastructure security analysis and modelling framework. Specifically, this discussion focuses on the interpretations of a focus group in terms of the likely benefits or otherwise of system visualisation. With the group focusing on its perceived value as an educational tool in terms of providing an abstract visualisation representation of a critical infrastructure system incident.


The Convergence Of Broadcasting And Telephony: Legal And Regulatory Implications, Christopher S. Yoo Dec 2009

The Convergence Of Broadcasting And Telephony: Legal And Regulatory Implications, Christopher S. Yoo

All Faculty Scholarship

This article, written for the inaugural issue of a new journal, analyzes the extent to which the convergence of broadcasting and telephony induced by the digitization of communications technologies is forcing policymakers to rethink their basic approach to regulating these industries. Now that voice and video are becoming available through every transmission technology, policymakers can no longer define the scope of regulatory obligations in terms of the mode of transmission. In addition, jurisdictions that employ separate agencies to regulate broadcasting and telephony must reform their institutional structures to bring both within the ambit of a single regulatory agency. The emergence …


A Neural Network Approach To Border Gateway Protocol Peer Failure Detection And Prediction, Cory B. White Dec 2009

A Neural Network Approach To Border Gateway Protocol Peer Failure Detection And Prediction, Cory B. White

Master's Theses

The size and speed of computer networks continue to expand at a rapid pace, as do the corresponding errors, failures, and faults inherent within such extensive networks. This thesis introduces a novel approach to interface Border Gateway Protocol (BGP) computer networks with neural networks to learn the precursor connectivity patterns that emerge prior to a node failure. Details of the design and construction of a framework that utilizes neural networks to learn and monitor BGP connection states as a means of detecting and predicting BGP peer node failure are presented. Moreover, this framework is used to monitor a BGP network …


A Clustering Based Discretization For Supervised Learning, Ankit Gupta, Kishan Mehrotra, Chilukuri K. Mohan Nov 2009

A Clustering Based Discretization For Supervised Learning, Ankit Gupta, Kishan Mehrotra, Chilukuri K. Mohan

Electrical Engineering and Computer Science - All Scholarship

We address the problem of discretization of continuous variables for machine learning classification algorithms. Existing procedures do not use interdependence between the variables towards this goal. Our proposed method uses clustering to exploit such interdependence. Numerical results show that this improves the classification performance in almost all cases. Even if an existing algorithm can successfully operate with continuous variables, better performance is obtained if variables are first discretized. An additional advantage of discretization is that it reduces the overall time-complexity.


Analysis Of Tradeoffs Between Buffer And Qos Requirements In Wireless Networks, Raphael Rom, Hwee-Pink Tan Oct 2009

Analysis Of Tradeoffs Between Buffer And Qos Requirements In Wireless Networks, Raphael Rom, Hwee-Pink Tan

Research Collection School Of Computing and Information Systems

In this paper, we consider the scheduling problem where data packets from K input-flows need to be delivered to K corresponding wireless receivers over a heterogeneous wireless channel. Our objective is to design a wireless scheduler that achieves good throughput and fairness performance while minimizing the buffer requirement at each wireless receiver. This is a challenging problem due to the unique characteristics of the wireless channel. We propose a novel idea of exploiting both the long-term and short-term error behavior of the wireless channel in the scheduler design. In addition to typical first-order Quality of Service (QoS) metrics such as …


Binary Usenet Application, Alexander J. Patterson Sep 2009

Binary Usenet Application, Alexander J. Patterson

Culminating Experience Projects

ANZBC software was written as a prototype to download small‐encoded files form Usenet servers. This software allows anything from a text document to a HD movie to be downloaded and decoded into a single file. Often this is a single file that is split into multiple small files and then compressed.


Exploiting Set-Level Non-Uniformity Of Capacity Demand To Enhance Cmp Cooperative Caching, Dongyuan Zhan, Hong Jiang, Sharad C. Seth Sep 2009

Exploiting Set-Level Non-Uniformity Of Capacity Demand To Enhance Cmp Cooperative Caching, Dongyuan Zhan, Hong Jiang, Sharad C. Seth

CSE Technical Reports

As the Memory Wall remains a bottleneck for Chip Multiprocessors (CMP), the effective management of CMP last level caches becomes of paramount importance in minimizing expensive off-chip memory accesses. For the CMPs with private last level caches, Cooperative Caching (CC) has been proposed to enable capacity sharing among private caches by spilling an evicted block from one cache to another. But this eviction-driven CC does not necessarily promote cache performance since it implicitly favors the applications full of block evictions regardless of their real capacity demand. The recent Dynamic Spill-Receive (DSR) paradigm improves cooperative caching by prioritizing applications with higher …


Admission Control For Differentiated Services In Future Generation Cdma Networks, Hwee-Pink Tan, Rudesindo Núñez-Queija, Adriana F. Gabor, Onno J. Boxma Sep 2009

Admission Control For Differentiated Services In Future Generation Cdma Networks, Hwee-Pink Tan, Rudesindo Núñez-Queija, Adriana F. Gabor, Onno J. Boxma

Research Collection School Of Computing and Information Systems

Future Generation CDMA wireless systems, e.g., 3G, can simultaneously accommodate flow transmissions of users with widely heterogeneous applications. As radio resources are limited, we propose an admission control rule that protects users with stringent transmission bit-rate requirements (“streaming traffic”) while offering sufficient capacity over longer time intervals to delay-tolerant users (“elastic traffic”). While our strategy may not satisfy classical notions of fairness, we aim to reduce congestion and increase overall throughput of elastic users. Using time-scale decomposition, we develop approximations to evaluate the performance of our differentiated admission control strategy to support integrated services with transmission bit-rate requirements in a …


Microsoft Silverlight Photography Framework: Comparing Component Based Designs In Adobe Flex And Microsoft Silverlight, David Roossien Aug 2009

Microsoft Silverlight Photography Framework: Comparing Component Based Designs In Adobe Flex And Microsoft Silverlight, David Roossien

Culminating Experience Projects

Flex and Silverlight provide large Application Programming Interfaces (API’s). Applications can be designed using a variety of architectures. The purpose of this paper is not to perform a complete comparison between Flex and Silverlight. To do such a comparison would require massive amounts of time and research. The purpose of this paper is to describe the design and implementation of the Silverlight photography framework project. Along the way this paper compares the Silverlight project to the Adobe Flex project and discusses the goals of each product. During the comparison many important similarities and differences between Silverlight and Flex technologies are …


Program Assessment System, Dyana Polderdyk Jul 2009

Program Assessment System, Dyana Polderdyk

Culminating Experience Projects

Today’s world is experiencing constant and rapid change in all areas of life. Progress and technology are the catalysts for the change, and the result is a continuous turnover of knowledge. It is essential for educational institutions to keep pace with the changes in order to turn out students that meet local and national employment requirements. Educational institutions are in need of an assessment system to measure the ongoing effectiveness of disciplines, curricula, programs and courses. The assessment system will provide the tools to develop, implement, manage, maintain and evaluate the efficiencies of educational programs. The input will include past …


Design And Implementation Of A Byzantine Fault Tolerance Framework For Web Services, Wenbing Zhao Jun 2009

Design And Implementation Of A Byzantine Fault Tolerance Framework For Web Services, Wenbing Zhao

Electrical and Computer Engineering Faculty Publications

Many Web services are expected to run with high degree of security and dependability. To achieve this goal, it is essential to use a Web services compatible framework that tolerates not only crash faults, but Byzantine faults as well, due to the untrusted communication environment in which the Web services operate. In this paper, we describe the design and implementation of such a framework, called BFT-WS. BFT-WS is designed to operate on top of the standard SOAP messaging framework for maximum interoperability. It is implemented as a pluggable module within the Axis2 architecture, as such, it requires minimum changes …


From General Technology Familiarity To Anti-Spyware Program Adoption: Comparison Between The U.S. And South Korea, Dong-Heon Kwak Apr 2009

From General Technology Familiarity To Anti-Spyware Program Adoption: Comparison Between The U.S. And South Korea, Dong-Heon Kwak

Morehead State Theses and Dissertations

A thesis presented to the faculty of the College of Business at Morehead State University in partial fulfillment of the requirements for the Degree of Master of Science by Dong-Heon Kwak on April 7, 2009.


Proactive Service Migration For Long-Running Byzantine Fault-Tolerant Systems, Wenbing Zhao, H. Zhang Apr 2009

Proactive Service Migration For Long-Running Byzantine Fault-Tolerant Systems, Wenbing Zhao, H. Zhang

Electrical and Computer Engineering Faculty Publications

A proactive recovery scheme based on service migration for long-running Byzantine fault-tolerant systems is described. Proactive recovery is an essential method for ensuring the long-term reliability of fault-tolerant systems that are under continuous threats from malicious adversaries. The primary benefit of our proactive recovery scheme is a reduced vulnerability window under normal operation. This is achieved in two ways. First, the time-consuming reboot step is removed from the critical path of proactive recovery. Second, the response time and the service migration latency are continuously profiled and an optimal service migration interval is dynamically determined during runtime based on the observed …


Where Does Your Institution Stand?, Wendell Brase, Mark Askren Mar 2009

Where Does Your Institution Stand?, Wendell Brase, Mark Askren

Information Technology Services: Publications

Media coverage of sustainability and "green" issues is hard to ignore these days. But less clear is a specific understanding of what this agenda means within higher ed IT organizations. For starters, it's useful to self-assess whether your campus is a leading innovator on all things "green" or satisfied to remain inconspicuous in the middle of the pack. If your institution is trailing but wants to assert a leadership role in environmental stewardship, you need to get engaged to understand what it will take to catch up and how IT can be a leader, not just a contributor, to such …


Methodology For Value-Driven Enterprise Architecture Development Goals: Application To Dodaf Framework, Justin W. Osgood Mar 2009

Methodology For Value-Driven Enterprise Architecture Development Goals: Application To Dodaf Framework, Justin W. Osgood

Theses and Dissertations

The Department of Defense Architectural Framework (DoDAF) describes 29 distinct views but offers limited guidance on view selection to meet system needs. This research extends the Value-Driven Enterprise Architecture Score (VDEA-Score) from a descriptive, evaluation protocol toward a prescriptive one by evaluating each DoDAF view and its contribution to the overall objective of the completed architecture. This extension of VDEA is referred to as VDEA-Development Goals (VDEA-DG). The program manager or other decision-makers may use this insight to justify the allocation of resources to the development of specific architecture views considered to provide maximum value. This research provides insight into …


The Modular Clock Algorithm For Blind Rendezvous, Nicholas C. Theis Mar 2009

The Modular Clock Algorithm For Blind Rendezvous, Nicholas C. Theis

Theses and Dissertations

This thesis examines the problem in initializing communications whereby cognitive radios need to find common spectrum with other cognitive radios, a process known as frequency rendezvous. It examines the rendezvous problem as it exists in a dynamic spectrum access cognitive network. Specifically, it addresses the problem of rendezvous in an infrastructureless environment. A new algorithm, the modular clock algorithm, is developed and analyzed as a solution for the simple rendezvous environment model, coupled with a modified version for environment models with less information. The thesis includes a taxonomy of commonly used environment models, and analysis of previous efforts to solve …


Dynamic Interactions For Network Visualization And Simulation, Cigdem Yetisti Mar 2009

Dynamic Interactions For Network Visualization And Simulation, Cigdem Yetisti

Theses and Dissertations

Most network visualization suites do not interact with a simulator, as it executes. Nor do they provide an effective user interface that includes multiple visualization functions. The subject of this research is to improve the network visualization presented in the previous research [5] adding these capabilities to the framework. The previous network visualization did not have the capability of altering specific visualization characteristics, especially when detailed observations needed to be made for a small part of a large network. Searching for a network event in this topology might cause large delays leading to lower quality user interface. In addition to …


Enhancing The Ns-2 Network Simulator For Near Real-Time Control Feedback And Distributed Simulation Breaks, John S. Weir Mar 2009

Enhancing The Ns-2 Network Simulator For Near Real-Time Control Feedback And Distributed Simulation Breaks, John S. Weir

Theses and Dissertations

A network simulator coupled with a visualization package enables the human visual system to analyze the results of network modeling as a supplement to analytical data analysis. This research takes the next step in network simulator and visualization suite interaction. A mediator (or run-time infrastructure (RTI) in the literature) provides researchers the potential to interact with a simulation as it executes. Utilizing TCP/IP sockets, the mediator has the capability to connect multiple visualization packages to a single simulation. This new tool allows researchers to change simulation parameters on the y without restarting the network simulation.


Network Neutrality After Comcast: Toward A Case-By-Case Approach To Reasonable Network Management, Christopher S. Yoo Feb 2009

Network Neutrality After Comcast: Toward A Case-By-Case Approach To Reasonable Network Management, Christopher S. Yoo

All Faculty Scholarship

The Federal Communications Commission’s recent Comcast decision has rejected categorical, ex ante restrictions on Internet providers’ ability to manage their networks in favor of a more flexible approach that examines each dispute on a case-by-case basis, as I have long advocated. This book chapter, written for a conference held in February 2009, discusses the considerations that a case-by-case approach should take into account. First, allowing the network to evolve will promote innovation by allowing the emergence of applications that depend on a fundamentally different network architecture. Indeed, as the universe of Internet users and applications becomes more heterogeneous, it is …


Is Parallel Programming Hard, And If So, Why?, Paul E. Mckenney, Maged M. Michael, Manish Gupta, Philip William Howard, Josh Triplett, Jonathan Walpole Feb 2009

Is Parallel Programming Hard, And If So, Why?, Paul E. Mckenney, Maged M. Michael, Manish Gupta, Philip William Howard, Josh Triplett, Jonathan Walpole

Computer Science Faculty Publications and Presentations

Of the 200+ parallel-programming languages and environments created in the 1990s, almost all are now defunct. Given that parallel systems are now well within the budget of the typical hobbyist or graduate student, it is not unreasonable to expect a new cohort in excess of several thousand parallel languages and environments to appear in the 2010s. If this expected new cohort is to have more practical impact than did its 1990s counterpart, a robust and widely applicable framework will be required that encompasses exactly what, if anything, is hard about parallel programming. This paper revisits the fundamental precepts of concurrent …


Integrated Cognitive Architectures: A Survey, Hui-Qing Chong, Ah-Hwee Tan, Gee-Wah Ng Feb 2009

Integrated Cognitive Architectures: A Survey, Hui-Qing Chong, Ah-Hwee Tan, Gee-Wah Ng

Research Collection School Of Computing and Information Systems

This article aims to present an account of the state of the art research in the field of integrated cognitive architectures by providing a review of six cognitive architectures, namely Soar, ACT-R, ICARUS, BDI, the subsumption architecture and CLARION. We conduct a detailed functional comparison by looking at a wide range of cognitive components, including perception, memory, goal representation, planning, problem solving, reasoning, learning, and relevance to neurobiology. In addition, we study the range of benchmarks and applications that these architectures have been applied to. Although no single cognitive architecture has provided a full solution with the level of human …


Application Specific Customization And Scalability Of Soft Multiprocessors, Deepak C. Unnikrishnan Jan 2009

Application Specific Customization And Scalability Of Soft Multiprocessors, Deepak C. Unnikrishnan

Masters Theses 1911 - February 2014

Soft multiprocessor systems exploit the plentiful computational resources available in field programmable devices. By virtue of their adaptability and ability to support coarse grained parallelism, they serve as excellent platforms for rapid prototyping and design space exploration of embedded multiprocessor applications. As complex applications emerge, careful mapping, processor and interconnect customization are critical to the overall performance of the multiprocessor system. In this thesis, we have developed an automated scalable framework to efficiently map applications written in a high-level programmer-friendly language to customizable soft-cores. The framework allows the user to specify the application in a high-level language called Streamit. After …


Implementation Of Data Path Credentials For High-Performance Capabilities-Based Networks, Kamlesh T. Vasudevan Jan 2009

Implementation Of Data Path Credentials For High-Performance Capabilities-Based Networks, Kamlesh T. Vasudevan

Masters Theses 1911 - February 2014

Capabilities-based networks present a fundamental shift in the security design of network architectures. Instead of permitting the transmission of packets from any source to any destination, routers deny forwarding by default. For a successful transmission, packets need to positively identify themselves and their permissions to the router. A major challenge for a high performance implementation of such a network is an efficient design of the credentials that are carried in the packet and the verification procedure on the router. A network protocol that implements data path credentials based on Bloom filters is presented in this thesis. Our prototype implementation shows …


A Hardware Framework For Yield And Reliability Enhancement In Chip Multiprocessors, Abhisek Pan Jan 2009

A Hardware Framework For Yield And Reliability Enhancement In Chip Multiprocessors, Abhisek Pan

Masters Theses 1911 - February 2014

Device reliability and manufacturability have emerged as dominant concerns in end-of-road CMOS devices. Today an increasing number of hardware failures are attributed to device reliability problems that cause partial system failure or shutdown. Also maintaining an acceptable manufacturing yield is seen as challenge because of smaller feature sizes, process variation, and reduced headroom for burn-in tests. In this project we investigate a hardware-based scheme for improving yield and reliability of a homogeneous chip multiprocessor (CMP). The proposed solution involves a hardware framework that enables us to utilize the redundancies inherent in a multi-core system to keep the system operational in …


Bluetooth Hacking: A Case Study, Dennis Browning, Gary C. Kessler Jan 2009

Bluetooth Hacking: A Case Study, Dennis Browning, Gary C. Kessler

Security Studies & International Affairs - Daytona Beach

"This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communication services. Several types of attacks are described, along with a detailed example of two attack tools, Bloover II and BT Info."--from the article


Conceptual Requirements For Command And Control Languages, Andreas Tolk, Curtis L. Blais, Saikou Y. Diallo, Charles Turnitsa Jan 2009

Conceptual Requirements For Command And Control Languages, Andreas Tolk, Curtis L. Blais, Saikou Y. Diallo, Charles Turnitsa

Computational Modeling & Simulation Engineering Faculty Publications

The current Coalition Battle Management Language initiative (C-BML) will define a language to unambiguously exchange command and control information between systems. This paper introduces a categorization that may be used to guide the process of developing C-BML effectively by enumerating the conceptual requirements the authors have identified in model-based data engineering and process engineering based studies in various domains.

First, it is important to distinguish if application of the language will support the planning, execution, or observation phase of command and control. While C-BML already distinguishes between tasking and reporting, planning is a category with different requirements.

Second, the language …


Harmonizing Bml Approaches: Grammars And Data Models For A Bml Standard, Dietmar Kunde, Thomas Orichel, Andreas Tolk, Ulrich Schade, Michael R. Hieb Jan 2009

Harmonizing Bml Approaches: Grammars And Data Models For A Bml Standard, Dietmar Kunde, Thomas Orichel, Andreas Tolk, Ulrich Schade, Michael R. Hieb

Computational Modeling & Simulation Engineering Faculty Publications

Battle Management Language (BML) is being developed as an open standard that unambiguously formalizes and specifies Command and Control information, including orders and reports built upon precise representations of tasks. BML is a language specification, based on doctrine and consistent with Coalition standards. The goal of BML is to enable and improve the interoperability in the C2 area, especially by enabling also the military communication with simulation systems and future robotic forces.

Although the need for BML is well documented, a SISO standard has still not been achieved. At present, there are two recommended approaches focusing on different aspects. In …