Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Purdue University

Other Computer Engineering

Articles 1 - 29 of 29

Full-Text Articles in Computer Engineering

Improving Developers' Understanding Of Regex Denial Of Service Tools Through Anti-Patterns And Fix Strategies, Sk Adnan Hassan, Zainab Aamir, Dongyoon Lee, James C. Davis, Francisco Servant Jan 2023

Improving Developers' Understanding Of Regex Denial Of Service Tools Through Anti-Patterns And Fix Strategies, Sk Adnan Hassan, Zainab Aamir, Dongyoon Lee, James C. Davis, Francisco Servant

Department of Electrical and Computer Engineering Faculty Publications

Regular expressions are used for diverse purposes, including input validation and firewalls. Unfortunately, they can also lead to a security vulnerability called ReDoS (Regular Expression Denial of Service), caused by a super-linear worst-case execution time during regex matching. Due to the severity and prevalence of ReDoS, past work proposed automatic tools to detect and fix regexes. Although these tools were evaluated in automatic experiments, their usability has not yet been studied; usability has not been a focus of prior work. Our insight is that the usability of existing tools to detect and fix regexes will improve if we complement them …


An Empirical Study Of Pre-Trained Model Reuse In The Hugging Face Deep Learning Model Registry, Wenxin Jiang, Nicholas Synovic, Matt Hyatt, Taylor R. Schorlemmer, Rohan Sethi, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis Jan 2023

An Empirical Study Of Pre-Trained Model Reuse In The Hugging Face Deep Learning Model Registry, Wenxin Jiang, Nicholas Synovic, Matt Hyatt, Taylor R. Schorlemmer, Rohan Sethi, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis

Department of Electrical and Computer Engineering Faculty Publications

Deep Neural Networks (DNNs) are being adopted as components in software systems. Creating and specializing DNNs from scratch has grown increasingly difficult as state-of-the-art architectures grow more complex. Following the path of traditional software engineering, machine learning engineers have begun to reuse large-scale pre-trained models (PTMs) and fine-tune these models for downstream tasks. Prior works have studied reuse practices for traditional software packages to guide software engineers towards better package maintenance and dependency management. We lack a similar foundation of knowledge to guide behaviors in pre-trained model ecosystems.

In this work, we present the first empirical investigation of PTM reuse. …


Eye-Gaze-Controlled Hmds And Mfd For Military Aircraft, Lrd Murthy, Abhishek Mukhopadhyay, Somnath Arjun, Varshith Yelleti, Peter Thomas, Dilli Babu Mohan, Pradipta Biswas Jan 2022

Eye-Gaze-Controlled Hmds And Mfd For Military Aircraft, Lrd Murthy, Abhishek Mukhopadhyay, Somnath Arjun, Varshith Yelleti, Peter Thomas, Dilli Babu Mohan, Pradipta Biswas

Journal of Aviation Technology and Engineering

Eye-gaze-controlled interfaces allow the direct manipulation of a graphical user interface by looking at it. This technology has great potential in military aviation, in particular, operating different displays in situations where pilots’ hands are occupied with flying the aircraft. This paper reports studies on analyzing the accuracy of eye-gaze-controlled interfaces inside aircraft undertaking representative flying missions. We report that using eye-gaze-controlled interfaces, pilots can undertake representative pointing and selection tasks at less than two seconds on average in a transport aircraft. Further, we analyzed the accuracy of eye-gaze-tracking glasses under various G load factors and analyzed the failure modes. We …


Sok: Analysis Of Software Supply Chain Security By Establishing Secure Design Properties, Chinenye Okafor, Taylor R. Schorlemmer, Santiao Torres-Arias, James C. Davis Jan 2022

Sok: Analysis Of Software Supply Chain Security By Establishing Secure Design Properties, Chinenye Okafor, Taylor R. Schorlemmer, Santiao Torres-Arias, James C. Davis

Department of Electrical and Computer Engineering Faculty Publications

This paper systematizes knowledge about secure software supply chain patterns. It identifies four stages of a software supply chain attack and proposes three security properties crucial for a secured supply chain: transparency, validity, and separation. The paper describes current security approaches and maps them to the proposed security properties, including research ideas and case studies of supply chains in practice. It discusses the strengths and weaknesses of current approaches relative to known attacks and details the various security frameworks put out to ensure the security of the software supply chain. Finally, the paper highlights potential gaps in actor and operation-centered …


Reflecting On Recurring Failures In Iot Development, Dharun Anandayuvaraj, James C. Davis Jan 2022

Reflecting On Recurring Failures In Iot Development, Dharun Anandayuvaraj, James C. Davis

Department of Electrical and Computer Engineering Faculty Publications

As IoT systems are given more responsibility and autonomy, they offer greater benefits, but also carry greater risks. We believe this trend invigorates an old challenge of software engineering: how to develop high-risk software-intensive systems safely and securely under market pressures? As a first step, we conducted a systematic analysis of recent IoT failures to identify engineering challenges. We collected and analyzed 22 news reports and studied the sources, impacts, and repair strategies of failures in IoT systems. We observed failure trends both within and across application domains. We also observed that failure themes have persisted over time. To alleviate …


Exploiting Input Sanitization For Regex Denial Of Service, Efe Barlas, Xin Du, James C. Davis Jan 2022

Exploiting Input Sanitization For Regex Denial Of Service, Efe Barlas, Xin Du, James C. Davis

Department of Electrical and Computer Engineering Faculty Publications

Web services use server-side input sanitization to guard against harmful input. Some web services publish their sanitization logic to make their client interface more usable, e.g., allowing clients to debug invalid requests locally. However, this usability practice poses a security risk. Specifically, services may share the regexes they use to sanitize input strings — and regex-based denial of service (ReDoS) is an emerging threat. Although prominent service outages caused by ReDoS have spurred interest in this topic, we know little about the degree to which live web services are vulnerable to ReDoS.

In this paper, we conduct the first black-box …


Discrepancies Among Pre-Trained Deep Neural Networks: A New Threat To Model Zoo Reliability, Diego Montes, Pongpatapee Peerapatanapokin, Jeff Schultz, Chengjun Guo, Wenxin Jiang, James C. Davis Jan 2022

Discrepancies Among Pre-Trained Deep Neural Networks: A New Threat To Model Zoo Reliability, Diego Montes, Pongpatapee Peerapatanapokin, Jeff Schultz, Chengjun Guo, Wenxin Jiang, James C. Davis

Department of Electrical and Computer Engineering Faculty Publications

Training deep neural networks (DNNs) takes significant time and resources. A practice for expedited deployment is to use pre-trained deep neural networks (PTNNs), often from model zoos.collections of PTNNs; yet, the reliability of model zoos remains unexamined. In the absence of an industry standard for the implementation and performance of PTNNs, engineers cannot confidently incorporate them into production systems. As a first step, discovering potential discrepancies between PTNNs across model zoos would reveal a threat to model zoo reliability. Prior works indicated existing variances in deep learning systems in terms of accuracy. However, broader measures of reliability for PTNNs from …


An Empirical Study On The Impact Of Deep Parameters On Mobile App Energy Usage, Qiang Xu, James C. Davis, Y Charlie Hu, Abhilash Jindal Jan 2022

An Empirical Study On The Impact Of Deep Parameters On Mobile App Energy Usage, Qiang Xu, James C. Davis, Y Charlie Hu, Abhilash Jindal

Department of Electrical and Computer Engineering Faculty Publications

Improving software performance through configuration parameter tuning is a common activity during software maintenance. Beyond traditional performance metrics like latency, mobile app developers are interested in reducing app energy usage. Some mobile apps have centralized locations for parameter tuning, similar to databases and operating systems, but it is common for mobile apps to have hundreds of parameters scattered around the source code. The correlation between these "deep" parameters and app energy usage is unclear. Researchers have studied the energy effects of deep parameters in specific modules, but we lack a systematic understanding of the energy impact of mobile deep parameters. …


Reflections On Software Failure Analysis, Paschal C. Amusuo, Aishwarya Sharma, Siddharth R. Rao, Abbey Vincent, James C. Davis Jan 2022

Reflections On Software Failure Analysis, Paschal C. Amusuo, Aishwarya Sharma, Siddharth R. Rao, Abbey Vincent, James C. Davis

Department of Electrical and Computer Engineering Faculty Publications

Failure studies are important in revealing the root causes, behaviors, and life cycle of defects in software systems. These studies either focus on understanding the characteristics of defects in specific classes of systems or the characteristics of a specific type of defect in the systems it manifests in. Failure studies have influenced various software engineering research directions, especially in the area of software evolution, defect detection, and program repair.

In this paper, we reflect on the conduct of failure studies in software engineering. We reviewed a sample of 52 failure study papers. We identified several recurring problems in these studies, …


Quantified Measurement Of The Tilt Effect In A Family Of Café Wall Illusions, Nasim Nematzadeh Dr., David Martin Powers Prof. May 2019

Quantified Measurement Of The Tilt Effect In A Family Of Café Wall Illusions, Nasim Nematzadeh Dr., David Martin Powers Prof.

MODVIS Workshop

This abstract explores the tilt effect in a family of Café Wall illusions using a Classical Gaussian Receptive Field model (CRF). Our model constructs an intermediate representation called edge map at multiple scales (Fig. 1) that reveals tilt cues and clues involved in the illusory perception of the Café Wall pattern. We investigate a wide range of parameters of the stimulus including mortar width, luminance, tiles contrast, and phase of the tile displacement (the stimuli in Fig. 2). We show that this simple bioplausible model, simulating the contrast sensitivity of the retinal ganglion cells, can not only detect the tilts …


Investigating Dataset Distinctiveness, Andrew Ulmer, Kent W. Gauen, Yung-Hsiang Lu, Zohar R. Kapach, Daniel P. Merrick Aug 2018

Investigating Dataset Distinctiveness, Andrew Ulmer, Kent W. Gauen, Yung-Hsiang Lu, Zohar R. Kapach, Daniel P. Merrick

The Summer Undergraduate Research Fellowship (SURF) Symposium

Just as a human might struggle to interpret another human’s handwriting, a computer vision program might fail when asked to perform one task in two different domains. To be more specific, visualize a self-driving car as a human driver who had only ever driven on clear, sunny days, during daylight hours. This driver – the self-driving car – would inevitably face a significant challenge when asked to drive when it is violently raining or foggy during the night, putting the safety of its passengers in danger. An extensive understanding of the data we use to teach computer vision models – …


Employing A User-Centered Design Process For Cybersecurity Awareness In The Power Grid, Jean C. Scholtz, Lyndsey Franklin, Aditya Ashok, Katya Leblanc, Christopher Bonebrake, Eric Andersen, Michael Cassiadoro Jan 2018

Employing A User-Centered Design Process For Cybersecurity Awareness In The Power Grid, Jean C. Scholtz, Lyndsey Franklin, Aditya Ashok, Katya Leblanc, Christopher Bonebrake, Eric Andersen, Michael Cassiadoro

Journal of Human Performance in Extreme Environments

In this paper, we discuss the process we are using in the design and implementation of a tool to improve the situation awareness of cyberattacks in the power grid. We provide details of the steps we have taken to date and describe the steps that still need to be accomplished. The focus of this work is to provide situation awareness of the power grid to staff from different, non-overlapping roles in an electrical transmission organization in order to facilitate an understanding of a possible occurrence of a cyberattack. Our approach follows a user-centered design process and includes determining the types …


Real Time Learning Level Assessment Using Eye Tracking, Saurin S. Parikh, Hari Kalva May 2017

Real Time Learning Level Assessment Using Eye Tracking, Saurin S. Parikh, Hari Kalva

MODVIS Workshop

E-Learning is emerging as a convenient and effective learning tool. However, the challenge with eLearning is the lack of effective tools to assess levels of learning. Ability to predict difficult content in real time enables eLearning systems to dynamically provide supplementary content to meet learners’ needs. Recent developments have made possible low-cost eye trackers, which enables a new class of applications based on eye response. In comparison to past attempts using bio-metrics in learning assessments, with eye tracking, we can have access to the exact stimulus that is causing the response. A key aspect of the proposed approach is the …


A Coupled Curvature-Driven Mechanism For Both 2d And 3d Simulation For High Temperature Austenite Grain Growth Based On Cellular Automata, Min Wang, Jian Xin Zhou, Ya Jun Yin, Hai Nan, Wen Li, Tong Wang, Dongqiao Zhang Oct 2016

A Coupled Curvature-Driven Mechanism For Both 2d And 3d Simulation For High Temperature Austenite Grain Growth Based On Cellular Automata, Min Wang, Jian Xin Zhou, Ya Jun Yin, Hai Nan, Wen Li, Tong Wang, Dongqiao Zhang

The 8th International Conference on Physical and Numerical Simulation of Materials Processing

No abstract provided.


Molecular Dynamics Studies Of The Adsorption Behavior Of Methyl 3-((2-Mercaptophenyl)Imino)Butanoate As Corrosion Inhibitors On Copper Surface, Jianlin Sun, Sang Xiong, Xudong Yan, Yang Xu Oct 2016

Molecular Dynamics Studies Of The Adsorption Behavior Of Methyl 3-((2-Mercaptophenyl)Imino)Butanoate As Corrosion Inhibitors On Copper Surface, Jianlin Sun, Sang Xiong, Xudong Yan, Yang Xu

The 8th International Conference on Physical and Numerical Simulation of Materials Processing

No abstract provided.


Optimization In The Simulation Of Jammed Polyhedral Particles, Joseph W. Mynhier, Ishan Srivastava, Timothy S. Fisher Aug 2015

Optimization In The Simulation Of Jammed Polyhedral Particles, Joseph W. Mynhier, Ishan Srivastava, Timothy S. Fisher

The Summer Undergraduate Research Fellowship (SURF) Symposium

Energy loss due to poor transport properties in electrically and thermally conducting materials, such as battery electrodes and thermoelectric composites, contributes to the energy inefficiency of electronic devices. For conductive materials composed of granular materials, particle-particle contact topology strongly governs the efficiency of energy transfer. Although there is a large body of existing work on the arrangements made by granular materials comprised of spherical particles, less is known about the mechanically stable arrangements of granular materials made of convex polyhedra. This project seeks to create a computer simulation of the solidification of convex polyhedra from a diffuse state into a …


Image Segmentation Using Fuzzy-Spatial Taxon Cut, Lauren Barghout May 2015

Image Segmentation Using Fuzzy-Spatial Taxon Cut, Lauren Barghout

MODVIS Workshop

Images convey multiple meanings that depend on the context in which the viewer perceptually organizes the scene. This presents a problem for automated image segmentation, because it adds uncertainty to the process of selecting which objects to include or not include within a segment. I’ll discuss the implementation of a fuzzy-logic-natural-vision-processing engine that solves this problem by assuming the scene architecture prior to processing. The scene architecture, a standardized natural-scene-perception-taxonomy comprised of a hierarchy of nested spatial-taxons. Spatial-taxons are regions (pixel-sets) that are figure-like, in that they are perceived as having a contour, are either `thing-like', or a `group of …


Two Correspondence Problems Easier Than One, Aaron Michaux, Zygmunt Pizlo May 2015

Two Correspondence Problems Easier Than One, Aaron Michaux, Zygmunt Pizlo

MODVIS Workshop

Computer vision research rarely makes use of symmetry in stereo reconstruction despite its established importance in perceptual psychology. Such stereo reconstructions produce visually satisfying figures with precisely located points and lines, even when input images have low or moderate resolution. However, because few invariants exist, there are no known general approaches to solving symmetry correspondence on real images. The problem is significantly easier when combined with the binocular correspondence problem, because each correspondence problem provides strong non-overlapping constraints on the solution space. We demonstrate a system that leverages these constraints to produce accurate stereo models from pairs of binocular images …


Cloud Enabled Attack Vectors, Ryan Jasper Apr 2015

Cloud Enabled Attack Vectors, Ryan Jasper

Purdue Polytechnic Directed Projects

The purpose of this directed project and related research was to demonstrate and catalog a new attack vector that utilizes cloud managed infrastructure. Cloud computing is a recent trend that is creating significant hype in the IT sector. Being that cloud computing is a new theme in the computing world, there are many security concerns that remain unknown and unexplored. The product of this directed project provides a documented taxonomy of the new attack vector and how to mitigate risk from this kind of attack.

The new attack vector creates efficiencies throughout the lifecycle of an attack and greatly reduces …


Model-Free Method Of Reinforcement Learning For Visual Tasks, Jeff S. Soldate, Jonghoon Jin, Eugenio Culurciello Aug 2014

Model-Free Method Of Reinforcement Learning For Visual Tasks, Jeff S. Soldate, Jonghoon Jin, Eugenio Culurciello

The Summer Undergraduate Research Fellowship (SURF) Symposium

There has been success in recent years for neural networks in applications requiring high level intelligence such as categorization and assessment. In this work, we present a neural network model to learn control policies using reinforcement learning. It takes a raw pixel representation of the current state and outputs an approximation of a Q value function made with a neural network that represents the expected reward for each possible state-action pair. The action is chosen an \epsilon-greedy policy, choosing the highest expected reward with a small chance of random action. We used gradient descent to update the weights and biases …


Social Media Analytics Reporting Toolkit, Yuchen Cui, Junghoon Chae, David Ebert Aug 2014

Social Media Analytics Reporting Toolkit, Yuchen Cui, Junghoon Chae, David Ebert

The Summer Undergraduate Research Fellowship (SURF) Symposium

With the fast growth of social media services, vast amount of user-generated content with time-space stamps are produced everyday. Considerable amount of these data are publicly available online, some of which collectively convey information that are of interest to data analysts. Social media data are dynamic and unstructured by nature, which makes it very hard for analysts to efficiently and effectively retrieve useful information. Social Media Analytics Reporting Toolkit (SMART), a system developed at Purdue VACCINE lab, aims to support such analyzing. The current framework collects real-time Twitter messages and visualizes volume densities on a map. It uses Latent Dirichilet …


Cis Map Drawer Visualization System, Hanye Xu, David Ebert Oct 2013

Cis Map Drawer Visualization System, Hanye Xu, David Ebert

The Summer Undergraduate Research Fellowship (SURF) Symposium

U.S. Citizenship and Immigration Services (USCIS) is the government agency that manages immigration to the United States. They are not only working on filing documents, but also analyzing those data they have. They require help from a visualization system to know the trend of immigration among offices across the country over time. We developed a project called CIS Map Drawer that is used to help build a visualization system for USCIS in order to analyze immigration data easily. This system makes use of a map view, a calendar visual representation, line charts, pixel drawing and other analysis tools to improve …


Is Real-Time Mobile Content-Based Image Retrieval Feasible?, Colin G. Graber, Anup Mohan, Yung-Hsiang Lu Oct 2013

Is Real-Time Mobile Content-Based Image Retrieval Feasible?, Colin G. Graber, Anup Mohan, Yung-Hsiang Lu

The Summer Undergraduate Research Fellowship (SURF) Symposium

Content-based image retrieval (CBIR) is a method of searching through a database of images by using another image as a query instead of text. Recent advances in the processing power of smart phones and tablets, collectively known as mobile devices, have prompted researchers to attempt to construct mobile CBIR systems. Most of the research that has been conducted on mobile CBIR has focused on improving either its accuracy or its run-time, but not both simultaneously. We set out to answer the question: is real-time CBIR with manageable accuracy possible on current mobile devices? To find the answer to this question, …


Absorption Simulation ( Absim ) Software Development, Vipul Vishnu Bhat, Ming Qu Oct 2013

Absorption Simulation ( Absim ) Software Development, Vipul Vishnu Bhat, Ming Qu

The Summer Undergraduate Research Fellowship (SURF) Symposium

Researchers working on air conditioning systems currently use a software called ABSIM ( Absorption Simulation ) to evaluate current absorption systems or simulate new system designs. ABSIM was developed at Oak Ridge National Labs in the 1980s and the latest platform it is compatible with is Windows XP. ABSIM is not compatible on newer platforms and is not very user friendly. A lot of the actions involved in using ABSIM aren’t very intuitive. The goal is to develop a more user friendly simulation program that is based off of ABSIM and see to it that the program can be deployed …


A Comparative Study Of User Preferences Of A Personalized Academic Website, Dipti U. Desai Jul 2012

A Comparative Study Of User Preferences Of A Personalized Academic Website, Dipti U. Desai

Purdue Polytechnic Masters Theses

ABSTRACT

There has been a growing concern over the enrollment by American students into Science, Technology, Engineering and Mathematic (STEM) fields of study. Following globalization there is a direct competition for jobs in the United States with lower-wage workers around the globe and the US, thereby, is on the verge of losing its global technological competitiveness (Committee on Prospering in the Global Economy of the 21st Century: An Agenda for American Science and Technology, National Academy of Sciences, National Academy of Engineering, Institute of Medicine, 2007). Governmental as well as non-profit organizations are constantly searching for ideas, programs and initiatives …


Virtualization In High-Performance Computing: An Analysis Of Physical And Virtual Node Performance, Glendon M. Jungels Apr 2012

Virtualization In High-Performance Computing: An Analysis Of Physical And Virtual Node Performance, Glendon M. Jungels

Purdue Polytechnic Masters Theses

The process of virtualizing computing resources allows an organization to make more efficient use of it's resources. In addtion, this process enables flexibility that deployment on raw hardware does not. Virtualization, however, comes with a performance penalty. This study examines the performance of utilizing virtualization technology for use in high performance computing to determine the suitibility of using this technology. It makes use of a small (4 node) virtual cluster as well as a 4 node physical cluster. The impacts on input/output operation are examined as well as performance of each cluster using two widely utilized tools, NAS Parallel Benchmarks …


Sketching 3d Animation, Innfarn Yoo Apr 2012

Sketching 3d Animation, Innfarn Yoo

Department of Computer Graphics Technology Degree Theses

This thesis presents a method for creating natural 3D animation based on sketches. Our method provides novice and professional sketchers an easy, fast, and intuitive way to create three dimensional animations by drawing sketches, enhanced by strokes, and joint trajectory or rotation curves. It also allows searching massive databases of 3D animation as an application for motion capture system and major animation software. We extract 2D skeletons from strokes and find similar motion sequences by comparing all the important pre-generated key poses in database. To give the system more hints, users can draw joint trajectory and rotations curves that are …


Gpu-Based Global Illumination Using Lightcuts, Tong Zhang Apr 2011

Gpu-Based Global Illumination Using Lightcuts, Tong Zhang

Department of Computer Graphics Technology Degree Theses

Global Illumination aims to generate high quality images. But due to its high
requirements, it is usually quite slow. Research documented in this thesis was
intended to offer a hardware and software combined acceleration solution to
global illumination. The GPU (using CUDA) was the hardware part of the whole
method that applied parallelism to increase performance; the “Lightcuts”
algorithm proposed by Walter (2005) at SIGGRAPH 2005 acted as the software
method. As the results demonstrated in this thesis, this combined method offers
a satisfactory performance boost effect for relatively complex scenes.


Using Smartphones For Indoor Navigation, Benjamin Thomas Loulier Jan 2011

Using Smartphones For Indoor Navigation, Benjamin Thomas Loulier

Purdue Polytechnic Masters Theses

This directed projet is about the use of smartphones for indoor navigation.

Nowadays, indoor navigation is a real challenge, we are all familiar with the multiple applications of GPS based navigation but all these applications cannot be transfered in an indoor environment as we cannot receive a GPS signal inside.

The document is composed of three different parts related to indoor navigation using smartphones. The first part presents an inertial positioning system for pedestrians walking in an indoor environment, this system is implemented on an iPhone 4. In the second part we introduce a positioning system using RFID tags scattered …