Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Electrical and Computer Engineering (62)
- Physical Sciences and Mathematics (61)
- Computer Sciences (57)
- Other Computer Engineering (42)
- Computer and Systems Architecture (33)
-
- Robotics (32)
- Digital Communications and Networking (27)
- Hardware Systems (17)
- Mechanical Engineering (17)
- Data Storage Systems (12)
- Electrical and Electronics (12)
- Biomedical Engineering and Bioengineering (11)
- Digital Circuits (10)
- Business (8)
- Controls and Control Theory (8)
- Operations Research, Systems Engineering and Industrial Engineering (7)
- Other Electrical and Computer Engineering (7)
- Signal Processing (7)
- VLSI and Circuits, Embedded and Hardware Systems (7)
- Aerospace Engineering (6)
- Artificial Intelligence and Robotics (6)
- Electro-Mechanical Systems (6)
- Life Sciences (6)
- Power and Energy (6)
- Systems and Communications (6)
- Acoustics, Dynamics, and Controls (5)
- Social and Behavioral Sciences (5)
- Business Administration, Management, and Operations (4)
- Institution
-
- California Polytechnic State University, San Luis Obispo (53)
- Purdue University (29)
- University of South Carolina (15)
- Santa Clara University (14)
- University of Louisville (12)
-
- University of South Florida (11)
- University of Tennessee, Knoxville (11)
- University of Arkansas, Fayetteville (10)
- University of Nevada, Las Vegas (10)
- Clemson University (9)
- Western Michigan University (9)
- University of Massachusetts Amherst (8)
- Western University (8)
- Wright State University (8)
- Old Dominion University (7)
- Missouri University of Science and Technology (6)
- University of Central Florida (6)
- Michigan Technological University (4)
- Portland State University (4)
- The University of Southern Mississippi (4)
- Universidad de La Salle (4)
- University of Kentucky (4)
- University of Texas at El Paso (4)
- Utah State University (4)
- Wayne State University (4)
- University of New Orleans (3)
- University of North Florida (3)
- Air Force Institute of Technology (2)
- Boise State University (2)
- California State University, San Bernardino (2)
- Keyword
-
- Applied sciences (18)
- Computer Science and Engineering (14)
- Department of Computer Science and Engineering (8)
- Robotics (7)
- Computer Engineering (6)
-
- Machine learning (5)
- Computer vision (4)
- Control (4)
- Diagnostic imaging (4)
- Software (4)
- Android (3)
- Big data (3)
- Biological sciences (3)
- Biometrics (3)
- CUDA (3)
- Calibration (3)
- Cloud computing (3)
- Game (3)
- Microcontroller (3)
- Robot (3)
- Security (3)
- Sensor (3)
- Simulation (3)
- Anonymity (2)
- Architecture (2)
- Arduino (2)
- Assistive Robotics (2)
- Asynchronous (2)
- Automation (2)
- Cognitive radio networks (2)
- Publication
-
- Computer Engineering (24)
- Electronic Theses and Dissertations (22)
- Open Access Theses (20)
- Theses and Dissertations (19)
- Master's Theses (16)
-
- Masters Theses (15)
- Doctoral Dissertations (12)
- USF Tampa Graduate Theses and Dissertations (11)
- Computer Science and Engineering Senior Theses (10)
- Open Access Dissertations (9)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (9)
- All Theses (8)
- Browse all Theses and Dissertations (8)
- Electronic Thesis and Dissertation Repository (8)
- Graduate Theses and Dissertations (8)
- Dissertations (6)
- Computer Science and Software Engineering (5)
- Dissertations and Theses (4)
- Dissertations, Master's Theses and Master's Reports - Open (4)
- Electrical & Computer Engineering Theses & Dissertations (4)
- Electrical Engineering (4)
- Honors Theses (4)
- Ingeniería en Automatización (4)
- Interdisciplinary Design Senior Theses (4)
- Open Access Theses & Dissertations (4)
- Wayne State University Dissertations (4)
- Theses and Dissertations--Electrical and Computer Engineering (3)
- UNF Graduate Theses and Dissertations (3)
- University of New Orleans Theses and Dissertations (3)
- All Graduate Plan B and other Reports, Spring 1920 to Spring 2023 (2)
Articles 31 - 60 of 294
Full-Text Articles in Computer Engineering
A Non-Invasive Image Based System For Early Diagnosis Of Prostate Cancer., Ahmad Abdusalam Firjani Firjani Naef
A Non-Invasive Image Based System For Early Diagnosis Of Prostate Cancer., Ahmad Abdusalam Firjani Firjani Naef
Electronic Theses and Dissertations
Prostate cancer is the second most fatal cancer experienced by American males. The average American male has a 16.15% chance of developing prostate cancer, which is 8.38% higher than lung cancer, the second most likely cancer. The current in-vitro techniques that are based on analyzing a patients blood and urine have several limitations concerning their accuracy. In addition, the prostate Specific Antigen (PSA) blood-based test, has a high chance of false positive diagnosis, ranging from 28%-58%. Yet, biopsy remains the gold standard for the assessment of prostate cancer, but only as the last resort because of its invasive nature, high …
Avatar Captcha : Telling Computers And Humans Apart Via Face Classification And Mouse Dynamics., Darryl Felix D’Souza
Avatar Captcha : Telling Computers And Humans Apart Via Face Classification And Mouse Dynamics., Darryl Felix D’Souza
Electronic Theses and Dissertations
Bots are malicious, automated computer programs that execute malicious scripts and predefined functions on an affected computer. They pose cybersecurity threats and are one of the most sophisticated and common types of cybercrime tools today. They spread viruses, generate spam, steal personal sensitive information, rig online polls and commit other types of online crime and fraud. They sneak into unprotected systems through the Internet by seeking vulnerable entry points. They access the system’s resources like a human user does. Now the question arises how do we counter this? How do we prevent bots and on the other hand allow human …
Temporal Contextual Descriptors And Applications To Emotion Analysis., Haythem Balti
Temporal Contextual Descriptors And Applications To Emotion Analysis., Haythem Balti
Electronic Theses and Dissertations
The current trends in technology suggest that the next generation of services and devices allows smarter customization and automatic context recognition. Computers learn the behavior of the users and can offer them customized services depending on the context, location, and preferences. One of the most important challenges in human-machine interaction is the proper understanding of human emotions by machines and automated systems. In the recent years, the progress made in machine learning and pattern recognition led to the development of algorithms that are able to learn the detection and identification of human emotions from experience. These algorithms use different modalities …
Sdsf : Social-Networking Trust Based Distributed Data Storage And Co-Operative Information Fusion., Phani Chakravarthy Polina
Sdsf : Social-Networking Trust Based Distributed Data Storage And Co-Operative Information Fusion., Phani Chakravarthy Polina
Electronic Theses and Dissertations
As of 2014, about 2.5 quintillion bytes of data are created each day, and 90% of the data in the world was created in the last two years alone. The storage of this data can be on external hard drives, on unused space in peer-to-peer (P2P) networks or using the more currently popular approach of storing in the Cloud. When the users store their data in the Cloud, the entire data is exposed to the administrators of the services who can view and possibly misuse the data. With the growing popularity and usage of Cloud storage services like Google Drive, …
Development Of Workforce Skills: Student Perceptions Of Mentoring In First Robotics, Katie Joan Veal Wallace
Development Of Workforce Skills: Student Perceptions Of Mentoring In First Robotics, Katie Joan Veal Wallace
Dissertations
In today’s global economy, new workforce competencies are needed for success at both individual and societal levels. The new workforce skills extend beyond basic reading, writing, and arithmetic to include higher order processes such as critical thinking and problem solving. Technical job opportunities have grown by approximately 17%, yet the United States continues to decline in science, technology, engineering and mathematics (STEM) disciplines. Further, U.S. students earn average or below average test scores when compared to other developed countries. Researchers cite the need to incorporate the learning of workplace skills into secondary education curriculum, and advocates call for new teaching …
Interactive Student Planner Application, Nii Tetteh Tackie Yarboi
Interactive Student Planner Application, Nii Tetteh Tackie Yarboi
Electronic Theses, Projects, and Dissertations
Interactive Student Planner is a web based application that will be used by students of California State University San Bernardino. The proposed system replaces the manual planner given to students by the school. This would allow a student to select courses for a quarter, keep track of homework due dates, create and manage project, create notes, create reports, prompts student for upcoming events, save and keep records of other students. A student can send project report as email to the professor, upload and download files easily. The manual way of storing information is not effective, since the student is limited …
A Collaborative Access Control Model For Shared Items In Online Social Networks, Hanaa Al Shareef
A Collaborative Access Control Model For Shared Items In Online Social Networks, Hanaa Al Shareef
Electronic Thesis and Dissertation Repository
The recent emergence of online social networks (OSNs) has changed the communication behaviors of thousand of millions of users. OSNs have become significant platforms for connecting users, sharing information, and a valuable source of private and sensitive data about individuals. While OSNs insert constantly new social features to increase the interaction between users, they, unfortunately, offer primitive access control mechanisms that place the burden of privacy policy configuration solely on the holder who has shared data in her/his profile regardless of other associated users, who may have different privacy preferences. Therefore, current OSN privacy mechanisms violate the privacy of all …
Detection Of Variable Retention Time In Dram, Neraj Kumar
Detection Of Variable Retention Time In Dram, Neraj Kumar
Dissertations and Theses
This thesis investigates a test method to detect the presence of Variable Retention Time (VRT) bits in manufactured DRAM. The VRT bits retention time is modeled as a 2-state random telegraph process that includes miscorrelation between test and use. The VRT defect is particularly sensitive to test and use conditions. A new test method is proposed to screen the VRT bits by simulating the use conditions during manufacturing test. Evaluation of the proposed test method required a bit-level VRT model to be parameterized as a function of temperature and voltage conditions. The complete 2-state VRT bit model combines models for …
Task-Based Robotic Grasp Planning, Yun Lin
Task-Based Robotic Grasp Planning, Yun Lin
USF Tampa Graduate Theses and Dissertations
Grasp should be selected intelligently to fulfill different stability properties and manipulative requirements. Currently, most grasping approaches consider only pick-and-place tasks without any physical interaction with other objects or the environment, which are common in an industry setting with limited uncertainty. When robots move to our daily-living environment and perform a broad range of tasks in an unstructured environment, all sorts of physical interactions will occur, which will result in random physical interactive wrenches: forces and torques on the tool.
In addition, for a tool to perform a required task, certain motions need to occur. We call it "functional tool …
Generalized Conditional Matching Algorithm For Ordered And Unordered Sets, Ravikiran Krishnan
Generalized Conditional Matching Algorithm For Ordered And Unordered Sets, Ravikiran Krishnan
USF Tampa Graduate Theses and Dissertations
Designing generalized data-driven distance measures for both ordered and unordered set data is the core focus of the proposed work. An ordered set is a set where time-linear property is maintained when distance between pair of temporal segments. One application in the ordered set is the human gesture analysis from RGBD data. Human gestures are fast becoming the natural form of human computer interaction. This serves as a motivation to modeling, analyzing, and recognition of gestures. The large number of gesture categories such as sign language, traffic signals, everyday actions and also subtle cultural variations in gesture classes makes gesture …
Asymptotic Analysis Of Random Wireless Networks: Broadcasting, Secrecy, And Hybrid Networks, Cagatay Capar
Asymptotic Analysis Of Random Wireless Networks: Broadcasting, Secrecy, And Hybrid Networks, Cagatay Capar
Doctoral Dissertations
This thesis work is concerned with communication in large random wireless ad hoc networks. We mathematically model the wireless network as a collection of randomly located nodes, and explore how its performance scales as the network size increases. In particular, we study three important properties: broadcasting ability, rate of information exchange, and secret communication capability. In addition, we study connectivity properties of large random graphs in a more general context, where the graph does not necessarily represent a wireless communication network. Broadcasting, i.e., delivering a message from a single node to the entire network in a wireless ad hoc network …
Ubot-7: The Design Of A Compliant Dexterous Mobile Manipulator, Jonathan Cummings
Ubot-7: The Design Of A Compliant Dexterous Mobile Manipulator, Jonathan Cummings
Masters Theses
This thesis presents the design of uBot-7, the latest version of a dexterous mobile manipulator. This platform has been iteratively developed to realize a high performance-to-cost dexterous whole body manipulator with respect to mobile manipulation. The semi-anthropomorphic design of the uBot is a demonstrated and functional research platform for developing advanced autonomous perception, manipulation, and mobility tasks. The goal of this work is to improve the uBot’s ability to sense and interact with its environment in order to increase the platforms capability to operate dexterously, through the incorporation of joint torque feedback, and safely, through the implementation of passive and …
Network-On-Chip Synchronization, Mark Buckler
Network-On-Chip Synchronization, Mark Buckler
Masters Theses
Technology scaling has enabled the number of cores within a System on Chip (SoC) to increase significantly. Globally Asynchronous Locally Synchronous (GALS) systems using Dynamic Voltage and Frequency Scaling (DVFS) operate each of these cores on distinct and dynamic clock domains. The main communication method between these cores is increasingly more likely to be a Network-on-Chip (NoC). Typically, the interfaces between these clock domains experience multi-cycle synchronization latencies due to their use of “brute-force” synchronizers. This dissertation aims to improve the performance of NoCs and thereby SoCs as a whole by reducing this synchronization latency.
First, a survey of NoC …
Gammatone And Mfcc Features In Speaker Recognition, Wison Burgos
Gammatone And Mfcc Features In Speaker Recognition, Wison Burgos
Theses and Dissertations
The feature analysis component of an Automated Speaker Recognition (ASR) system plays a crucial role in the overall performance of the system. There are many feature extraction techniques available, but ultimately we want to maximize the performance of these systems. From this point of view, the algorithms developed to compute feature components are analyzed. Current state-of-the-art ASR systems perform quite well in a controlled environment where the speech signal is noise free. The objective of this thesis investigates the results that can be obtained when you combine Mel-Frequency Cepstral Coefficients (MFCC) and Gammatone Frequency Cepstral Coefficients (GFCC) as feature components …
Using Embedded Systems To Determine The Configuration Of A Static Wheelchair Mounted Robotic Arm, Daniel Ashley
Using Embedded Systems To Determine The Configuration Of A Static Wheelchair Mounted Robotic Arm, Daniel Ashley
USF Tampa Graduate Theses and Dissertations
The calibration of a 9 degree of freedom (DOF) robotic manipulator using multiple three axis accelerometers and an embedded system will be accomplished in this work. The 9-DOF robotic system used in this study is a 7-DOF robotic arm attached to a 2-DOF power wheelchair. Combined they create a Wheelchair Mounted Robotic Arm (WMRA). The problem that will be solved by this thesis is the calibration of the robotic system during start up. The 7 DOF robotic arm is comprised of rotational joints only. These joints have dual channel encoders to determine the joint position, among other useful data. The …
Human Mirna Sequence Based Variations Database, Nadim Georges Bou Zeidan
Human Mirna Sequence Based Variations Database, Nadim Georges Bou Zeidan
USF Tampa Graduate Theses and Dissertations
MicroRNAs (miRNAs) are studied as key genetic elements that regulate the gene expression involved in different human diseases. Clinical sequence based variations like copy number variations (CNVs) affect miRNA biogenesis, dosage and target recognition that may represent potentially functional variants and relevant target bindings.
To systematically analyze miRNA-related CNVs and their effects on related genes, a user-friendly free online database was developed to provide further analysis of co-localization of miRNA loci with human genome CNV regions. Further analysis pipelines such as miRNA-target to estimate the levels or locations of variations for genetic duplications, insertions or deletions were also offered. Such …
Analysis And Prevention Of Code-Injection Attacks On Android Os, Grant Joseph Smith
Analysis And Prevention Of Code-Injection Attacks On Android Os, Grant Joseph Smith
USF Tampa Graduate Theses and Dissertations
Injection attacks are the top two causes of software errors and vulnerabilities, according to the MITRE Common Vulnerabilities list [1]. This thesis presents a threat analysis of injection attacks on applications built for Android, a popular but not rigorously studied operating system designed for mobile devices. The following thesis is argued: Injection attacks are possible on off-the-shelf Android systems, and such attacks have the capacity to compromise the device through resource denial and leaking private data. Specifically, we demonstrate that injection attacks are possible through the OS shell and through the SQLite API. To mitigate these attacks, we augment the …
Digital Provenance - Models, Systems, And Applications, Salmin Sultana
Digital Provenance - Models, Systems, And Applications, Salmin Sultana
Open Access Dissertations
Data provenance refers to the history of creation and manipulation of a data object and is being widely used in various application domains including scientific experiments, grid computing, file and storage system, streaming data etc. However, existing provenance systems operate at a single layer of abstraction (workflow/process/OS) at which they record and store provenance whereas the provenance captured from different layers provide the highest benefit when integrated through a unified provenance framework. To build such a framework, a comprehensive provenance model able to represent the provenance of data objects with various semantics and granularity is the first step. In this …
Shape From Inconsistent Silhouette: Reconstruction Of Objects In The Presence Of Segmentation And Camera Calibration Error, Amy Tabb
Open Access Dissertations
Silhouettes are useful features to reconstruct the object shape when the object is textureless or the shape classes of objects are unknown. In this dissertation, we explore the problem of reconstructing the shape of challenging objects from silhouettes under real-world conditions such as the presence of silhouette and camera calibration error. This problem is called the Shape from Inconsistent Silhouettes problem. A psuedo-Boolean cost function is formalized for this problem, which penalizes differences between the reconstruction images and the silhouette images, and the Shape from Inconsistent Silhouette problem is cast as a psuedo-Boolean minimization problem. We propose a memory and …
Image Analysis Using Visual Saliency With Applications In Hazmat Sign Detection And Recognition, Bin Zhao
Image Analysis Using Visual Saliency With Applications In Hazmat Sign Detection And Recognition, Bin Zhao
Open Access Dissertations
Visual saliency is the perceptual process that makes attractive objects "stand out" from their surroundings in the low-level human visual system. Visual saliency has been modeled as a preprocessing step of the human visual system for selecting the important visual information from a scene. We investigate bottom-up visual saliency using spectral analysis approaches. We present separate and composite model families that generalize existing frequency domain visual saliency models. We propose several frequency domain visual saliency models to generate saliency maps using new spectrum processing methods and an entropy-based saliency map selection approach. A group of saliency map candidates are then …
Functional Programming Abstractions For Weakly Consistent Systems, Sivaramakrishnan Krishnamoorthy Chandrasekaran
Functional Programming Abstractions For Weakly Consistent Systems, Sivaramakrishnan Krishnamoorthy Chandrasekaran
Open Access Dissertations
In recent years, there has been a wide-spread adoption of both multicore and cloud computing. Traditionally, concurrent programmers have relied on the underlying system providing strong memory consistency, where there is a semblance of concurrent tasks operating over a shared global address space. However, providing scalable strong consistency guarantees as the scale of the system grows is an increasingly difficult endeavor. In a multicore setting, the increasing complexity and the lack of scalability of hardware mechanisms such as cache coherence deters scalable strong consistency. In geo-distributed compute clouds, the availability concerns in the presence of partial failures prohibit strong consistency. …
Embodied Interaction With Visualization And Spatial Navigation In Time-Sensitive Scenarios, Yu-Ting Li
Embodied Interaction With Visualization And Spatial Navigation In Time-Sensitive Scenarios, Yu-Ting Li
Open Access Dissertations
Paraphrasing the theory of embodied cognition, all aspects of our cognition are determined primarily by the contextual information and the means of physical interaction with data and information. In hybrid human-machine systems involving complex decision making, continuously maintaining a high level of attention while employing a deep understanding concerning the task performed as well as its context are essential. Utilizing embodied interaction to interact with machines has the potential to promote thinking and learning according to the theory of embodied cognition proposed by Lakoff. Additionally, the hybrid human-machine system utilizing natural and intuitive communication channels (e.g., gestures, speech, and body …
Developing A Practical Wireless Monitoring Solution For A Size-Constrained, Low-Power, Biomechanical, Sports Telemetry System, Jeffery Ray King
Developing A Practical Wireless Monitoring Solution For A Size-Constrained, Low-Power, Biomechanical, Sports Telemetry System, Jeffery Ray King
Open Access Theses
As sport-related concussions become more prevalent, the ability to quickly and reliably assess brain injury risk is increasingly essential. Commercially-available systems exist with the goal of assessing the risk of traumatic brain injury in athletes in real-time. These systems utilize a pre-determined acceleration threshold, discarding all captured information below this arbitrary threshold. The use of an event-based model to assess the risk of traumatic brain injury has been shown to be inadequate. Therefore, these systems falsely promote "accurate" real-time communication of risk. Research conducted by the Purdue Neurotrauma Group (PNG) seeks to advance the field by developing a biomechanical sports …
Bio-Inspired Robotic Fish With Vision Based Target Tracking, Eric Anderson
Bio-Inspired Robotic Fish With Vision Based Target Tracking, Eric Anderson
Open Access Theses
The lionfish is an invasive species that out-competes and overcrowds native sh species along the eastern seaboard of the United States and down into the Caribbean. Lionfish populations are growing rapidly. Current methods of monitoring lionfish populations are costly and time intensive. A bio-inspired robotic fish was built to use as an autonomous lionfish tracking platform. Lionfish are tracked visually using an onboard processor. Five different computer vision methods for identification and tracking are proposed and discussed. These include: background subtraction, color tracking, mixture of Gaussian background subtraction, speeded up robust feature (SURF), and CamShift based tracking. Each of these …
Rapid Indirect Trajectory Optimization On Highly Parallel Computing Architectures, Thomas Antony
Rapid Indirect Trajectory Optimization On Highly Parallel Computing Architectures, Thomas Antony
Open Access Theses
Trajectory optimization is a field which can benefit greatly from the advantages offered by parallel computing. The current state-of-the-art in trajectory optimization focuses on the use of direct optimization methods, such as the pseudo-spectral method. These methods are favored due to their ease of implementation and large convergence regions while indirect methods have largely been ignored in the literature in the past decade except for specific applications in astrodynamics. It has been shown that the shortcomings conventionally associated with indirect methods can be overcome by the use of a continuation method in which complex trajectory solutions are obtained by solving …
Impact Of License Selection On Open Source Software Quality, Benjamin J. Cotton
Impact Of License Selection On Open Source Software Quality, Benjamin J. Cotton
Open Access Theses
Open source software plays an important part in the modern world, powering businesses large and small. However, little work has been done to evaluate the quality of open source software. Two different license paradigms exist within the open source world, and this study examines the difference in software quality between them. In this thesis, the author uses technical debt as a measure of software quality. Eighty open source projects (40 from each paradigm) were downloaded from the popular open source hosting website SourceForge. Using complexity, code duplication, comments, and unit test coverage as inputs to the SonarQube technical debt model, …
Wi-Fi Real Time Location Systems, Benjamin A. Doll
Wi-Fi Real Time Location Systems, Benjamin A. Doll
Open Access Theses
This thesis objective was to determine the viability of utilizing an untrained Wi-Fi real time location system as a GPS alternative for indoor environments. Background research showed that GPS is rarely able to penetrate buildings to provide reliable location data. The benefit of having location information in a facility and how they might be used for disaster or emergency relief personnel and their resources motivated this research. A building was selected with a well-deployed Wi-Fi infrastructure and its untrained location feature was used to determine the distance between the specified test points and the system identified location. It was found …
Principle Of Bio-Inspired Insect Wing Rotational Hinge Design, Fan Fei
Principle Of Bio-Inspired Insect Wing Rotational Hinge Design, Fan Fei
Open Access Theses
A principle for designing and fabricating bio-inspired miniature artificial insect flapping wing using flexure rotational hinge design is presented. A systematic approach of selecting rotational hinge stiffness value is proposed. Based on the understanding of flapping wing aerodynamics, a dynamic simulation is constructed using the established quasi-steady model and the wing design. Simulations were performed to gain insight on how different parameters affect the wing rotational response. Based on system resonance a model to predict the optimal rotational hinge stiffness based on given wing parameter and flapping wing kinematic is proposed. By varying different wing parameters, the proposed method is …
Effects Of Hip And Ankle Moments On Running Stability: Simulation Of A Simplified Model, Rubin C. Cholera
Effects Of Hip And Ankle Moments On Running Stability: Simulation Of A Simplified Model, Rubin C. Cholera
Open Access Theses
In human running, the ankle, knee, and hip moments are known to play different roles to influence the dynamics of locomotion. A recent study of hip moments and several hip-based legged robots have revealed that hip actuation can significantly improve the stability of locomotion, whether controlled or uncontrolled. Ankle moments are expected to also significantly affect running stability, but in a different way than hip moments. Here we seek to advance the current theory of dynamic running and associated legged robots by determining how simple open-loop ankle moments could affect running stability. We simulate a dynamical model, and compare it …
Automatic Translation Of Non-Repetitive Openmp To Mpi, Fahed Jubair
Automatic Translation Of Non-Repetitive Openmp To Mpi, Fahed Jubair
Open Access Dissertations
Cluster platforms with distributed-memory architectures are becoming increasingly available low-cost solutions for high performance computing. Delivering a productive programming environment that hides the complexity of clusters and allows writing efficient programs is urgently needed. Despite multiple efforts to provide shared memory abstraction, message-passing (MPI) is still the state-of-the-art programming model for distributed-memory architectures. ^ Writing efficient MPI programs is challenging. In contrast, OpenMP is a shared-memory programming model that is known for its programming productivity. Researchers introduced automatic source-to-source translation schemes from OpenMP to MPI so that programmers can use OpenMP while targeting clusters. Those schemes limited their focus on …