Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (4)
- Other Computer Engineering (4)
- Physical Sciences and Mathematics (4)
- Computer and Systems Architecture (3)
- Software Engineering (2)
-
- Artificial Intelligence and Robotics (1)
- Data Storage Systems (1)
- Digital Communications and Networking (1)
- Electrical and Computer Engineering (1)
- Electrical and Electronics (1)
- Hardware Systems (1)
- Numerical Analysis and Scientific Computing (1)
- OS and Networks (1)
- Other Statistics and Probability (1)
- Statistics and Probability (1)
- VLSI and Circuits, Embedded and Hardware Systems (1)
- Keyword
-
- Machine learning (2)
- Artificial Intelligence (1)
- Bridge (1)
- Catastrophic interference (1)
- Cholesky (1)
-
- Clustering (1)
- Concept drift (1)
- Deep learning (1)
- Distribution (1)
- EMR (1)
- Feature pooling (1)
- Guitar Tablature Generation (1)
- High-dimensional features (1)
- Hybrid Automata (1)
- IPad application (1)
- Image Processing (1)
- Image recognition (1)
- Linear Algebra (1)
- MATLAB (1)
- MIC (1)
- Matrix Multiply (1)
- Middleware (1)
- Neural network (1)
- Non-stationary (1)
- Privacy (1)
- RSA (1)
- Replication (1)
- Secure embedded reconfigurable trusted cryptology FPGA (1)
- Simulink (1)
- Smartphone (1)
Articles 1 - 9 of 9
Full-Text Articles in Computer Engineering
A Privacy-Aware Distributed Storage And Replication Middleware For Heterogeneous Computing Platform, Jilong Liao
A Privacy-Aware Distributed Storage And Replication Middleware For Heterogeneous Computing Platform, Jilong Liao
Masters Theses
Cloud computing is an emerging research area that has drawn considerable interest in recent years. However, the current infrastructure raises significant concerns about how to protect users' privacy, in part due to that users are storing their data in the cloud vendors' servers. In this paper, we address this challenge by proposing and implementing a novel middleware, called Uno, which separates the storage of physical data and their associated metadata. In our design, users' physical data are stored locally on those devices under a user's full control, while their metadata can be uploaded to the commercial cloud. To ensure the …
Mitigation Of Catastrophic Interference In Neural Networks And Ensembles Using A Fixed Expansion Layer, Robert Austin Coop
Mitigation Of Catastrophic Interference In Neural Networks And Ensembles Using A Fixed Expansion Layer, Robert Austin Coop
Doctoral Dissertations
Catastrophic forgetting (also known in the literature as catastrophic interference) is the phenomenon by which learning systems exhibit a severe exponential loss of learned information when exposed to relatively small amounts of new training data. This loss of information is not caused by constraints due to the lack of resources available to the learning system, but rather is caused by representational overlap within the learning system and by side-effects of the training methods used. Catastrophic forgetting in auto-associative pattern recognition is a well-studied attribute of most parameterized supervised learning systems. A variation of this phenomenon, in the context of feedforward …
Online Multi-Stage Deep Architectures For Feature Extraction And Object Recognition, Derek Christopher Rose
Online Multi-Stage Deep Architectures For Feature Extraction And Object Recognition, Derek Christopher Rose
Doctoral Dissertations
Multi-stage visual architectures have recently found success in achieving high classification accuracies over image datasets with large variations in pose, lighting, and scale. Inspired by techniques currently at the forefront of deep learning, such architectures are typically composed of one or more layers of preprocessing, feature encoding, and pooling to extract features from raw images. Training these components traditionally relies on large sets of patches that are extracted from a potentially large image dataset. In this context, high-dimensional feature space representations are often helpful for obtaining the best classification performances and providing a higher degree of invariance to object transformations. …
A Secure Reconfigurable System-On-Programmable-Chip Computer System, William Herbert Collins
A Secure Reconfigurable System-On-Programmable-Chip Computer System, William Herbert Collins
Masters Theses
A System-on-Programmable-Chip (SoPC) architecture is designed to meet two goals: to provide a role-based secure computing environment and to allow for user reconfiguration. To accomplish this, a secure root of trust is derived from a fixed architectural subsystem, known as the Security Controller. It additionally provides a dynamically configurable single point of access between applications developed by users and the objects those applications use. The platform provides a model for secrecy such that physical recovery of any one component in isolation does not compromise the system. Dual-factor authentication is used to verify users. A model is also provided for tamper …
Automated Generation Of Simulink Models For Enumeration Hybrid Automata, David Aaron Heise
Automated Generation Of Simulink Models For Enumeration Hybrid Automata, David Aaron Heise
Masters Theses
An enumeration hybrid automaton has been shown in principle to be ready for automated transformation into a Simulink implementation. This paper describes a strategy for and a demonstration of automated construction. This is accomplished by designing a data model which represents EHA data and providing a mapping from EHA data points to Simulink blocks.
An Expert System For Guitar Sheet Music To Guitar Tablature, Chuanjun He
An Expert System For Guitar Sheet Music To Guitar Tablature, Chuanjun He
Doctoral Dissertations
This project applies analysis, design and implementation of the Optical Music Recognition (OMR) to an expert system for transforming guitar sheet music to guitar tablature. The first part includes image processing and music semantic interpretation to interpret and transform sheet music or printed scores into editable and playable electronic form. Then after importing the electronic form of music into internal data structures, our application uses effective pruning to explore the entire search space to find the best guitar tablature. Also considered are alternate guitar tunings and transposition of the music to improve the resulting tablature.
Tor Bridge Distribution Powered By Threshold Rsa, Jordan Hunter Deyton
Tor Bridge Distribution Powered By Threshold Rsa, Jordan Hunter Deyton
Masters Theses
Since its inception, Tor has offered anonymity for internet users around the world. Tor now offers bridges to help users evade internet censorship, but the primary distribution schemes that provide bridges to users in need have come under attack. This thesis explores how threshold RSA can help strengthen Tor's infrastructure while also enabling more powerful bridge distribution schemes. We implement a basic threshold RSA signature system for the bridge authority and a reputation-based social network design for bridge distribution. Experimental results are obtained showing the possibility of quick responses to requests from honest users while maintaining both the secrecy and …
Programming Dense Linear Algebra Kernels On Vectorized Architectures, Jonathan Lawrence Peyton
Programming Dense Linear Algebra Kernels On Vectorized Architectures, Jonathan Lawrence Peyton
Masters Theses
The high performance computing (HPC) community is obsessed over the general matrix-matrix multiply (GEMM) routine. This obsession is not without reason. Most, if not all, Level 3 Basic Linear Algebra Subroutines (BLAS) can be written in terms of GEMM, and many of the higher level linear algebra solvers' (i.e., LU, Cholesky) performance depend on GEMM's performance. Getting high performance on GEMM is highly architecture dependent, and so for each new architecture that comes out, GEMM has to be programmed and tested to achieve maximal performance. Also, with emergent computer architectures featuring more vector-based and multi to many-core processors, GEMM performance …
Electronic Medical Record Ipad Application, Mischa Symmone Buckler, Dwayne Wiliam Flaherty, John Thomas Cotham, Mark Bellott
Electronic Medical Record Ipad Application, Mischa Symmone Buckler, Dwayne Wiliam Flaherty, John Thomas Cotham, Mark Bellott
Chancellor’s Honors Program Projects
No abstract provided.