Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Computer Engineering

Intelligent Networks For High Performance Computing, William Whitney Schonbein Dec 2020

Intelligent Networks For High Performance Computing, William Whitney Schonbein

Computer Science ETDs

There exists a resurgence of interest in `smart' network interfaces that can operate on data as it flows through a network. However, while smart capabilities have been expanding, what they can do for high-performance computing (HPC) is not well-understood. In this work, we advance our understanding of the capabilities and contributions of smart network interfaces to HPC. First, we show current offloaded message demultiplexing can mitigate (but not eliminate) overheads incurred by multithreaded communication. Second, we demonstrate current offloaded capabilities can be leveraged to provide Turing complete program execution on the interface. We elaborate with a framework for offloading arbitrary …


Blockchain Based Communication Architectures With Applications To Private Security Networks, Ashley N. Mayle Nov 2020

Blockchain Based Communication Architectures With Applications To Private Security Networks, Ashley N. Mayle

Computer Science ETDs

Existing communication protocols in security networks are highly centralized. While this naively makes the controls easier to physically secure, external actors require fewer resources to disrupt the system because there are fewer points in the system can be interrupted without the entire system failing. We present a solution to this problem using a proof-of-work-based blockchain implementation built on MultiChain. We construct a test-bed network containing visual imagers and microwave sensor information. These data types are ubiquitous in perimeter security systems and allow a realistic representation of a real-world network architecture. The cameras in this system use an object detection algorithm …


Non-Trivial Off-Path Network Measurements Without Shared Side-Channel Resource Exhaustion, Geoffrey I. Alexander Dec 2019

Non-Trivial Off-Path Network Measurements Without Shared Side-Channel Resource Exhaustion, Geoffrey I. Alexander

Computer Science ETDs

Most traditional network measurement scans and attacks are carried out through the use of direct, on-path network packet transmission. This requires that a machine be on-path (i.e, involved in the packet transmission process) and as a result have direct access to the data packets being transmitted. This limits network scans and attacks to situations where access can be gained to an on-path machine. If, for example, a researcher wanted to measure the round trip time between two machines they did not have access to, traditional scans would be of little help as they require access to an on-path machine to …


Robot Motion Planning In Dynamic Environments, Hao-Tien Lewis Chiang Dec 2019

Robot Motion Planning In Dynamic Environments, Hao-Tien Lewis Chiang

Computer Science ETDs

Robot motion planning in dynamic environments is critical for many robotic applications, such as self-driving cars, UAVs and service robots operating in changing environments. However, motion planning in dynamic environments is very challenging as this problem has been shown to be NP-Hard and in PSPACE, even in the simplest case. As a result, the lack of safe, efficient planning solutions for real-world robots is one of the biggest obstacles for ubiquitous adoption of robots in everyday life. Specifically, there are four main challenges facing motion planning in dynamic environments: obstacle motion uncertainty, obstacle interaction, complex robot dynamics and noise, and …


Thwarting Adversaries With Randomness And Irrationality, Abhinav Aggarwal Sep 2019

Thwarting Adversaries With Randomness And Irrationality, Abhinav Aggarwal

Computer Science ETDs

Distributed systems are ubiquitous today: from the Internet used by billions of people around the world to the small scale IoT devices. With this rapidly increasing need to perform computation at scales larger than ever before, comes the need to ensure resilience to adversarial failures so that these systems can continue to behave as intended even when some malicious tampering happens.

In this dissertation, we explore the power of randomness and the difficulty of rationally approximating the Golden Ratio to thwart adversarial behavior in two different problems in distributed computing: interactive communication and robust collaborative search. While randomness helps with …


An Efficient Multiple-Place Foraging Algorithm For Scalable Robot Swarms, Qi Lu Jul 2019

An Efficient Multiple-Place Foraging Algorithm For Scalable Robot Swarms, Qi Lu

Computer Science ETDs

Searching and collecting multiple resources from large unmapped environments is an important challenge. It is particularly difficult given limited time, a large search area and incomplete data about the environment. This search task is an abstraction of many real-world applications such as search and rescue, hazardous material clean-up, and space exploration. The collective foraging behavior of robot swarms is an effective approach for this task. In our work, individual robots have limited sensing and communication range (like ants), but they are organized and work together to complete foraging tasks collectively. An efficient foraging algorithm coordinates robots to search and collect …


Criticality Assessments For Improving Algorithmic Robustness, Thomas B. Jones Nov 2018

Criticality Assessments For Improving Algorithmic Robustness, Thomas B. Jones

Computer Science ETDs

Though computational models typically assume all program steps execute flawlessly, that does not imply all steps are equally important if a failure should occur. In the "Constrained Reliability Allocation" problem, sufficient resources are guaranteed for operations that prompt eventual program termination on failure, but those operations that only cause output errors are given a limited budget of some vital resource, insufficient to ensure correct operation for each of them.

In this dissertation, I present a novel representation of failures based on a combination of their timing and location combined with criticality assessments---a method used to predict the behavior of systems …


Automated Development Of Semantic Data Models Using Scientific Publications, Martha O. Perez-Arriaga May 2018

Automated Development Of Semantic Data Models Using Scientific Publications, Martha O. Perez-Arriaga

Computer Science ETDs

The traditional methods for analyzing information in digital documents have evolved with the ever-increasing volume of data. Some challenges in analyzing scientific publications include the lack of a unified vocabulary and a defined context, different standards and formats in presenting information, various types of data, and diverse areas of knowledge. These challenges hinder detecting, understanding, comparing, sharing, and querying information rapidly.

I design a dynamic conceptual data model with common elements in publications from any domain, such as context, metadata, and tables. To enhance the models, I use related definitions contained in ontologies and the Internet. Therefore, this dissertation generates …


Improving Large Scale Application Performance Via Data Movement Reduction, Dewan M. Ibtesham Nov 2017

Improving Large Scale Application Performance Via Data Movement Reduction, Dewan M. Ibtesham

Computer Science ETDs

The compute capacity growth in high performance computing (HPC) systems is outperforming improvements in other areas of the system for example, memory capacity, network bandwidth and I/O bandwidth. Therefore, the cost of executing a floating point operation is decreasing at a faster rate than moving that data. This increasing performance gap causes wasted CPU cycles while waiting for slower I/O operations to complete in the memory hierarchy, network, and storage. These bottlenecks decrease application time to solution performance, and increase energy consumption, resulting in system under utilization. In other words, data movement is becoming a key concern for future HPC …


Improving Hpc Communication Library Performance On Modern Architectures, Matthew G. F. Dosanjh Oct 2017

Improving Hpc Communication Library Performance On Modern Architectures, Matthew G. F. Dosanjh

Computer Science ETDs

As high-performance computing (HPC) systems advance towards exascale (10^18 operations per second), they must leverage increasing levels of parallelism to achieve their performance goals. In addition to increased parallelism, machines of that scale will have strict power limitations placed on them. One direction currently being explored to alleviate those issues are many-core processors such as Intel’s Xeon Phi line. Many-core processors sacrifice clock speed and core complexity, such as out of order pipelining, to increase the number of cores on a die. While this increases floating point throughput, it can reduce the performance of serialized, synchronized, and latency sensitive code …


Distributed Knowledge Discovery For Diverse Data, Hossein Hamooni Jul 2017

Distributed Knowledge Discovery For Diverse Data, Hossein Hamooni

Computer Science ETDs

In the era of new technologies, computer scientists deal with massive data of size hundreds of terabytes. Smart cities, social networks, health care systems, large sensor networks, etc. are constantly generating new data. It is non-trivial to extract knowledge from big datasets because traditional data mining algorithms run impractically on such big datasets. However, distributed systems have come to aid this problem while introducing new challenges in designing scalable algorithms. The transition from traditional algorithms to the ones that can be run on a distributed platform should be done carefully. Researchers should design the modern distributed algorithms based on the …


Detection Of Pheromone Laying Event In Foraging Data Of Harvester Ants Using Change Point Analysis Method, Safeeul Bashir Safee Apr 2017

Detection Of Pheromone Laying Event In Foraging Data Of Harvester Ants Using Change Point Analysis Method, Safeeul Bashir Safee

Computer Science ETDs

Communication is an important factor in the foraging performance of social insects, such as ants. During foraging, ants keep track of food sources by using memory (site fidelity) or by communicating through pheromones. Previous field experiments showed that the rate of seed collection depends on the distribution of food in the environment. If food is spatially clustered, then it is beneficial for ants recruit nest mates to collect seeds from large clusters. However, we do not know when the recruitment occurs in natural ant population. To explore this question, we used a power law distribution to arrange seeds in piles …