Open Access. Powered by Scholars. Published by Universities.®
Computer and Systems Architecture Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Digital Communications and Networking (424)
- Physical Sciences and Mathematics (413)
- Computer Sciences (385)
- Data Storage Systems (315)
- Electrical and Computer Engineering (312)
-
- Social and Behavioral Sciences (266)
- Business (230)
- Other Computer Engineering (213)
- Hardware Systems (198)
- Technology and Innovation (178)
- Management Information Systems (174)
- Library and Information Science (168)
- Operations Research, Systems Engineering and Industrial Engineering (157)
- E-Commerce (132)
- Communication (131)
- Systems and Communications (123)
- Science and Technology Studies (122)
- Communication Technology and New Media (121)
- Management Sciences and Quantitative Methods (120)
- Business Intelligence (111)
- Operational Research (105)
- Information Literacy (104)
- Systems Architecture (98)
- Social Media (97)
- Software Engineering (96)
- VLSI and Circuits, Embedded and Hardware Systems (91)
- Digital Circuits (86)
- Institution
-
- Selected Works (146)
- California State University, San Bernardino (138)
- SelectedWorks (112)
- California Polytechnic State University, San Luis Obispo (105)
- Singapore Management University (85)
-
- Portland State University (79)
- Air Force Institute of Technology (53)
- University of Arkansas, Fayetteville (49)
- University of Nebraska - Lincoln (48)
- Old Dominion University (45)
- Technological University Dublin (43)
- University of Massachusetts Amherst (43)
- University of Tennessee, Knoxville (33)
- Florida International University (31)
- University of Nevada, Las Vegas (26)
- Embry-Riddle Aeronautical University (24)
- Association of Arab Universities (23)
- Kennesaw State University (21)
- Western University (21)
- University of Kentucky (19)
- Purdue University (17)
- Syracuse University (16)
- University of Pennsylvania Carey Law School (16)
- The University of Akron (15)
- City University of New York (CUNY) (14)
- Kansas State University Libraries (13)
- Morehead State University (13)
- University of New Mexico (13)
- University of North Florida (13)
- Cleveland State University (12)
- Keyword
-
- Inventive Problem Solving (50)
- TRIZ (45)
- Software Patents (34)
- Graphical User Interface (32)
- Security (29)
-
- Software inventions (29)
- Machine learning (24)
- Computer architecture (20)
- Cybersecurity (20)
- GUI (20)
- Innovation (20)
- Computer Hardware (19)
- Computer Keyboard (19)
- Hardware Inventions (19)
- Computer science (18)
- Android (17)
- Blockchain (17)
- Deep learning (17)
- Keyboard design (17)
- Simulation (17)
- Software Inventions (17)
- Information Retrieval (16)
- Technology (16)
- Cloud computing (15)
- FPGA (15)
- Internet (15)
- Invention (15)
- Privacy (15)
- Cloud Computing (14)
- GUI design (14)
- Publication Year
- Publication
-
- Journal of International Technology and Information Management (108)
- Research Collection School Of Computing and Information Systems (79)
- Theses and Dissertations (65)
- Umakant Mishra (59)
- Computer Engineering (46)
-
- Computer Science Faculty Publications and Presentations (44)
- Master's Theses (39)
- Masters Theses (35)
- Doctoral Dissertations (31)
- FIU Electronic Theses and Dissertations (31)
- Graduate Theses and Dissertations (29)
- Electronic Theses and Dissertations (25)
- Dr Deogratias Harorimana (24)
- Electronic Theses, Projects, and Dissertations (24)
- Computational Modeling & Simulation Engineering Faculty Publications (23)
- Future Computing and Informatics Journal (22)
- Electronic Thesis and Dissertation Repository (20)
- Hong-Ning Dai (17)
- All Faculty Scholarship (16)
- Conference papers (16)
- Publications (16)
- Computer Science and Software Engineering (15)
- Williams Honors College, Honors Research Projects (15)
- Dissertations and Theses (14)
- Library Philosophy and Practice (e-journal) (14)
- Morehead State Theses and Dissertations (13)
- UNF Graduate Theses and Dissertations (13)
- Central Plains Network for Digital Asset Management (12)
- Robert A Iannucci (12)
- College of Engineering and Computing Course Catalogs (11)
- Publication Type
Articles 1531 - 1560 of 1644
Full-Text Articles in Computer and Systems Architecture
An Intelligent System For Monitoring The Microgravity Environment Quality On-Board The International Space Station, Paul P. Lin, Kenol Jules
An Intelligent System For Monitoring The Microgravity Environment Quality On-Board The International Space Station, Paul P. Lin, Kenol Jules
Mechanical Engineering Faculty Publications
An intelligent system for monitoring the microgravity environment quality on-board the International Space Station is presented. The monitoring system uses a new approach combining Kohonen's self-organizing feature map, learning vector quantization, and a back propagation neural network to recognize and classify the known and unknown patterns. Finally, fuzzy logic is used to assess the level of confidence associated with each vibrating source activation detected by the system.
A Lessons Learned Repository For Computer Forensics, Warren Harrison, George Heuston, Mark Morrissey, David Aucsmith, Sarah Mocas, Steve Russelle
A Lessons Learned Repository For Computer Forensics, Warren Harrison, George Heuston, Mark Morrissey, David Aucsmith, Sarah Mocas, Steve Russelle
Computer Science Faculty Publications and Presentations
The Law Enforcement community possesses a large, but informal, community memory with respect to digital forensics. Large, because the experiences of every forensics technician and investigator contribute to the whole. Informal because there is seldom an explicit mechanism for disseminating this wisdom except “over the water cooler”. As a consequence, the same problems and mistakes continue to resurface and the same solutions are re-invented. In order to better exploit this informal collection of wisdom, the key points of each experience can be placed into a Repository for later dissemination. We describe a web-based Lessons Learned Repository (LLR) that facilitates contribution …
Information Security System Rating And Ranking, Rayford B. Vaughn Jr., Ambareen Sira, David A. Dampier
Information Security System Rating And Ranking, Rayford B. Vaughn Jr., Ambareen Sira, David A. Dampier
Computer Sciences and Electrical Engineering Faculty Research
The term assurance has been used for decades in trusted system development to express the notion of confidence in the strength of a specific system or system of systems. The unsolved problem that security engineers must struggle with is the adoption of measures or metrics that can reliably depict the assurance associated with a specific hardware and software architecture. This article reports on a recent attempt to focus needs in this area and suggests various categories of information assurance metrics that may be helpful to an organization that is deciding which set is useful for a specific application.
Establishing A Lan Network For Designing And Analyzing Of Manufacturing Products, Yuqiu You
Establishing A Lan Network For Designing And Analyzing Of Manufacturing Products, Yuqiu You
Morehead State Theses and Dissertations
A thesis presented to the faculty of the College of Science & Technology at Morehead State University in partial fulfillment of the requirements for the Degree of Master of Science by Yuqiu You in Spring of 2002.
A Simulation Program For Electronics Skill Knowledge Instruction At A Selected Community College In Taiwan, Hung-Jen Chen
A Simulation Program For Electronics Skill Knowledge Instruction At A Selected Community College In Taiwan, Hung-Jen Chen
Dissertations and Theses @ UNI
Since computers came into existence, simulations have been associated with it as the two inseparable media, simulations and computers, have had a mutually beneficial effect. With the advent of the flexible microcomputer, simulation has been widely used. In recent years, computer technology has infiltrated every sector in society, especially the educational system and industrial operations where simulations are essential for satisfying both instructional and industrial needs. Simulation effectiveness research has been mixed in both the educational system and industries. Therefore, it is still necessary to evaluate how effective computer simulation is as an instructional method or strategy.
This study was …
Model Scheme A Good Fit For C4isr, Andreas Tolk
Model Scheme A Good Fit For C4isr, Andreas Tolk
Computational Modeling & Simulation Engineering Faculty Publications
No abstract provided.
Thread Transparency In Information Flow Middleware, Rainer Koster, Andrew P. Black, Jie Huang, Jonathan Walpole, Calton Pu
Thread Transparency In Information Flow Middleware, Rainer Koster, Andrew P. Black, Jie Huang, Jonathan Walpole, Calton Pu
Computer Science Faculty Publications and Presentations
Existing middleware is based on control-flow centric interaction models such as remote method invocations, poorly matching the structure of applications that process continuous information flows. Difficulties cultiesin building this kind of application on conventional platforms include flow-specific concurrency and timing requirements, necessitating explicit management of threads, synchronization, and timing by the application programmer. We propose Infopipes as a high-level abstraction for information flows, and we are developing a middleware framework that supports this abstraction. Infopipes transparently handle complexities associated with control flow and multi-threading. From high-level configuration descriptions the platform determines what parts of a pipeline require separate threads or …
Reifying Communication At The Application Level, Andrew P. Black, Jie Huang, Jonathan Walpole
Reifying Communication At The Application Level, Andrew P. Black, Jie Huang, Jonathan Walpole
Computer Science Faculty Publications and Presentations
Middleware, from the earliest RPC systems to recent Object-Oriented Remote Message Sending (RMS) systems such as Java RMI and CORBA, claims transparency as one of its main attributes. Coulouris et al. define transparency as “the concealment from the … application programmer of the separation of components in a distributed system.” They go on to identify eight different kinds of transparency.
We considered titling this paper “Transparency Considered Harmful”, but that title is misleading because it implies that all kinds of transparency are bad. This is not our view. Rather, we believe that the choice of which transparencies should be offered …
A Scalable Durable Grid Event Service, Geoffrey C. Fox, Shrideep Pallickara
A Scalable Durable Grid Event Service, Geoffrey C. Fox, Shrideep Pallickara
Electrical Engineering and Computer Science - All Scholarship
It is interesting to study the system and software architecture of environments, which integrate the evolving ideas of computational grids, distributed objects, web services, peer-to-peer networks and message oriented middleware. Such peer-to-peer (P2P) Grids should seamlessly integrate users to themselves and to resources, which are also linked to each other. We can abstract such environments as a distributed system of "clients" which consist either of "users" or "resources" or proxies thereto. These clients must be linked together in a flexible fault tolerant efficient high performance fashion. In this paper, we study the messaging or event system -- termed GES or …
Translucent Optical Wdm Networks For The Next-Generation Backbone Networks, Byrav Ramamurthy, Srinath Yaragorla, Xi Yang
Translucent Optical Wdm Networks For The Next-Generation Backbone Networks, Byrav Ramamurthy, Srinath Yaragorla, Xi Yang
CSE Conference and Workshop Papers
This paper proposes an alternate approach to fully transparent and fully opaque optical networks for operating a wavelength routed optical network. In this paper, the architecture of the regeneration node that performs sparse regeneration (or translucency) is discussed. The regeneration demands generated from call blocking and signal quality requirements are addressed. Two implementation strategies for incorporating sparse regeneration are introduced and their relative merits are studied.
Rate-Matching Packet Scheduler For Real-Rate Applications, Kang Li, Jonathan Walpole, Dylan Mcnamee, Calton Pu, David Steere
Rate-Matching Packet Scheduler For Real-Rate Applications, Kang Li, Jonathan Walpole, Dylan Mcnamee, Calton Pu, David Steere
Computer Science Faculty Publications and Presentations
A packet scheduler is an operating system component that controls the allocation of network interface bandwidth to outgoing network flows. By deciding which packet to send next, packet schedulers not only determine how bandwidth is shared among flows, but also play a key role in determining the rate and timing behavior of individual flows. The recent explosion of rate and timing-sensitive flows, particularly in the context of multimedia applications, has focused new interest on packet schedulers. Next generation packet schedulers must not only ensure separation among flows and meet real-time performance constraints, they must also support dynamic fine-grain reallocation of …
Configuring Client Software Using Remote Notification Us:6219698, Robert Iannucci, Chris Weikart
Configuring Client Software Using Remote Notification Us:6219698, Robert Iannucci, Chris Weikart
Robert A Iannucci
No abstract provided.
E-Commerce Technology Forsafe Money Transaction Over The Net, Noor Jahan Haque, Raman Attri
E-Commerce Technology Forsafe Money Transaction Over The Net, Noor Jahan Haque, Raman Attri
Raman K. Attri
The Buzz word E-commerce has revolutionized the way the business and money transactions used to work in the past. It is the latest impact of software arena in the field of banking, business and purchasing. The term also refers to online stock and bond transactions and buying and downloading software without ever going near a store. In addition, e-commerce includes business-to-business connections that make purchasing easier for big corporations. This paper mainly concentrates on technology revolution behind the transaction of money over the net. There are still doubts and questions from business and corporate users on the safety aspects of …
Aspects Of Information Flow, Andrew P. Black, Jonathan Walpole
Aspects Of Information Flow, Andrew P. Black, Jonathan Walpole
Computer Science Faculty Publications and Presentations
Along with our colleagues at the Oregon Graduate Institute and Georgia Institute of Technology, we have recently been experimenting with real-rate systems, that is, systems that are required to move data from one place to another at defined rates, such as 30 items per second. Audio conferencing or streaming video systems are typical: they are required to deliver video or audio frames from a source (a server or file system) in one place to a sink (a display or a sound generator) in another; the frames must arrive periodically, with constrained latency and jitter. We have successfully built such systems …
Application Of Control Theory To Modeling And Analysis Of Computer Systems, Molly H. Shor, Kang Li, Jonathan Walpole, David Steere, Calton Pu
Application Of Control Theory To Modeling And Analysis Of Computer Systems, Molly H. Shor, Kang Li, Jonathan Walpole, David Steere, Calton Pu
Computer Science Faculty Publications and Presentations
Experimentally, we show that Transmission Control Protocol (TCP)’s congestion control algorithm results in dynamic behavior similar to a stable limit cycle (attractor) when data from TCP flow into a fixed-size buffer and data is removed from the buffer at a fixed service rate. This setup represents how TCP buffers packets for transmission onto the network, with the network represented by a fixed-size buffer with a fixed service rate. The closed trajectory may vary slightly from period to period due to the discrete nature of computer systems. The size of the closed trajectory is a function of the network’s buffer size …
Supervised Adaptive Resonance Theory And Rules, Ah-Hwee Tan
Supervised Adaptive Resonance Theory And Rules, Ah-Hwee Tan
Research Collection School Of Computing and Information Systems
Supervised Adaptive Resonance Theory is a family of neural networks that performs incremental supervised learning of recognition categories (pattern classes) and multidimensional maps of both binary and analog patterns. This chapter highlights that the supervised ART architecture is compatible with IF-THEN rule-based symbolic representation. Specifically, the knowledge learned by a supervised ART system can be readily translated into rules for interpretation. Similarly, a priori domain knowledge in the form of IF-THEN rules can be converted into a supervised ART architecture. Not only does initializing networks with prior knowledge improve predictive accuracy and learning efficiency, the inserted symbolic knowledge can also …
Accessing Timesheets Via Internet Through Asp And Odbc, Varshi Challa
Accessing Timesheets Via Internet Through Asp And Odbc, Varshi Challa
Theses Digitization Project
The purpose of this project is to develop a computerized timesheet application. Using this application, an employee of a company can log onto the company's Web site and fill out a timesheet from anywhere in the world. The project involved automating timesheet data entry and approval procedures using contemporary technologies like Active Server Pages (ASP), JavaScript, VB Script, Component Object Model (COM), Components and Open Database connectivity (ODBC).
The Application Of Object-Oriented Techniques To Preliminary Design Problems, Patrick S. Mackessy
The Application Of Object-Oriented Techniques To Preliminary Design Problems, Patrick S. Mackessy
Theses: Doctorates and Masters
Preliminary structural design is an early stage in building design during which the engineer formulates and assesses a number of different structural schemes. It is conceptual in nature and involves decision making, which relies on heuristics. Whilst preliminary structural design has not been well supported by PC software, recent research has indicated the potential for knowledge-based, object-oriented systems to assist in the area. This thesis explores the issues that arise when object-oriented techniques arc used to develop knowledge-based software. lt reviews certain basic principles of structural design, methods of representing structural design knowledge and earlier approaches to the design of …
Master Of Science Degree Programs On Campus Or Online, Nova Southeastern University
Master Of Science Degree Programs On Campus Or Online, Nova Southeastern University
College of Engineering and Computing Course Catalogs
No abstract provided.
Work In Progress: Automating Proportion/Period Scheduling, David Steere, Jonathan Walpole, Calton Pu
Work In Progress: Automating Proportion/Period Scheduling, David Steere, Jonathan Walpole, Calton Pu
Computer Science Faculty Publications and Presentations
The recent effort to define middleware capable of supporting real-time applications creates the opportunity to raise the level of abstraction presented to the programmer. We propose that proportion/period is a better abstraction for specifying resource needs and allocation than priorities. We are currently investigating techniques to address some issues that are restricting use of proportion/period scheduling to research real-time prototypes. In particular, we are investigating techniques to automate the task of selecting proportion and period, and that allow proportion/period to incorporate job importance under overload conditions.
The Internet Name Game And The Nonprofit Solution, Roger A. Lohmann
The Internet Name Game And The Nonprofit Solution, Roger A. Lohmann
Faculty & Staff Scholarship
This paper is a case study of the campaign to create a new internet names authority to handle the assignment of internet domain names. Almost everyone knows by now that the Internet was originally a defense research project, which morphed into a research network for scientists and then into a tool of higher education and eventually into the commercial and general household utility we know today. In terms familiar to nonprofit research community what began in the state sector, expanded into the third sector and then into the market and household sectors and the consumer economy. There is a second …
Fine-Grain Period Adaptation In Soft Real-Time Environments, David Steere, Joshua Gruenberg, Dylan Mcnamee, Calton Pu, Jonathan Walpole
Fine-Grain Period Adaptation In Soft Real-Time Environments, David Steere, Joshua Gruenberg, Dylan Mcnamee, Calton Pu, Jonathan Walpole
Computer Science Faculty Publications and Presentations
Reservation-based scheduling delivers a proportion of the CPU to jobs over a period of time. In this paper we argue that automatically determining and assigning this period is both possible and useful in general purpose soft real-time environments such as personal computers and information appliances. The goal of period adaptation is to select the period over which a job is guaranteed to receive its portion of the CPU dynamically and automatically. The choice of period represents a trade-off between the amount of jitter observed by the job and the overall efficiency of the system. Secondary effects of period include quantization …
Qos Scalability For Streamed Media Delivery, Charles Krasic, Jonathan Walpole
Qos Scalability For Streamed Media Delivery, Charles Krasic, Jonathan Walpole
Computer Science Faculty Publications and Presentations
Applications with real-rate progress requirements, such as mediastreaming systems, are difficult to deploy in shared heterogenous environments such as the Internet. On the Internet, mediastreaming systems must be capable of trading off resource requirements against the quality of the media streams they deliver, in order to match wide-ranging dynamic variations in bandwidth between servers and clients. Since quality requirements tend to be user- and task-specific, mechanisms for capturing quality of service requirements and mapping them to appropriate resource-level adaptation policies are required. In this paper, we describe a general approach for automatically mapping user-level quality of service specifications onto resource …
An Investigation Into The Causes And Effects Of Legacy Status In A System With A View To Assessing Both Systems Currently In Use And Those Being Considered For Introduction, Patricia O'Byrne
Other resources
This dissertation analyses the area of legacy systems and determines the effects that are exhibited in legacy systems, presenting them in a legacy effect determination framework, so that management can ascertain whether the system they have is a legacy system. An analysis of legacy causal criteria is carried out, resulting in a table of legacy causes. A new definition of legacy systems is put forward, by defining legacy status as a status held by a legacy system. “A system exhibits legacy status if it is deficient in terms of its suitability to the business, its platform suitability or application software …
An Improved Asynchronous Implementation Of A Fast Fourier Transform Architecture For Space Applications, David J. Barnhart
An Improved Asynchronous Implementation Of A Fast Fourier Transform Architecture For Space Applications, David J. Barnhart
Theses and Dissertations
A second-generation fully asynchronous Fast Fourier Transform (FFT) processor for space applications is developed in this thesis. A high-performance patented FFT architecture invented by Suter and Stevens was used as the basis for a 16-point FFT (FFT-16) processor design. A brief derivation of the architecture, the asynchronous design methodologies used and space-based integrated circuit issues are presented. The Synopsys VLSI CAD system and a radiation tolerant design library developed by the Air Force Research Laboratory were used to implement the design. A critical building block of the FFT-16, the FFT-4, was fabricated as a cost-effective method to validate the cell …
A Scalable Multiprocessor, Charles Yarbrough
A Scalable Multiprocessor, Charles Yarbrough
Honors Capstone Projects and Theses
No abstract provided.
Enterprise Business Objects : Design And Implementation Of A Business Object Framework, Kai-Uwe Schafer
Enterprise Business Objects : Design And Implementation Of A Business Object Framework, Kai-Uwe Schafer
Theses
Software components representing business entities like customer or purchase order introduce a new way of Online Transaction Processing to business applications. Collaborating business objects allow to complete whole business processes as a single distributed transaction, instead of dividing it into queued steps, which sometimes even require user intervention. This IS due to the fact that business objects contain both business data and logic and that they incorporate multiple databases from different vendors and different geographic locations in a single transaction.
Business objects cannot be used as stand-alone components, but require a framework of services that manage persistence, concurrent transactions, and …
Compute As Fast As The Engineers Can Think! Utrafast Computing Team Final Report, Robert T. Biedron, P. Mehrotra, Michael L. Nelson, M. L. Preston, J. J. Rehder, J. L. Rogersm, D. H. Rudy, J. Sobieski, O. O. Storaasli
Compute As Fast As The Engineers Can Think! Utrafast Computing Team Final Report, Robert T. Biedron, P. Mehrotra, Michael L. Nelson, M. L. Preston, J. J. Rehder, J. L. Rogersm, D. H. Rudy, J. Sobieski, O. O. Storaasli
Computer Science Faculty Publications
This report documents findings and recommendations by the Ultrafast Computing Team (UCT). In the period 10-12/98, UCT reviewed design case scenarios for a supersonic transport and a reusable launch vehicle to derive computing requirements necessary for support of a design process with efficiency so radically improved that human thought rather than the computer paces the process. Assessment of the present computing capability against the above requirements indicated a need for further improvement in computing speed by several orders of magnitude to reduce time to solution from tens of hours to seconds in major applications. Evaluation of the trends in computer …
Adaptive Resource Management Via Modular Feedback Control, Ashvin Goel, David Steere, Calton Pu, Jonathan Walpole
Adaptive Resource Management Via Modular Feedback Control, Ashvin Goel, David Steere, Calton Pu, Jonathan Walpole
Computer Science Faculty Publications and Presentations
A key feature of tomorrow’s operating systems and runtime environments is their ability to adapt. Current state of the art uses an ad-hoc approach to building adaptive software, resulting in systems that can be complex, unpredictable and brittle. We advocate a modular and methodical approach for building adaptive system software based on feedback control. The use of feedback allows a system to automatically adapt to dynamically varying environments and loads, and allows the system designer to utilize the substantial body of knowledge in other engineering disciplines for building adaptive systems. We have developed a toolkit called SWiFT that embodies this …
Architectural Optimization Of Digital Libraries, Aileen O. Biser
Architectural Optimization Of Digital Libraries, Aileen O. Biser
Computer Science Theses & Dissertations
This work investigates performance and scaling issues relevant to large scale distributed digital libraries. Presently, performance and scaling studies focus on specific implementations of production or prototype digital libraries. Although useful information is gained to aid these designers and other researchers with insights to performance and scaling issues, the broader issues relevant to very large scale distributed libraries are not addressed. Specifically, no current studies look at the extreme or worst case possibilities in digital library implementations. A survey of digital library research issues is presented. Scaling and performance issues are mentioned frequently in the digital library literature but are …