Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication Year
- Publication
- Publication Type
Articles 1 - 15 of 15
Full-Text Articles in Physical Sciences and Mathematics
Power-Aware Datacenter Networking And Optimization, Qing Yi
Power-Aware Datacenter Networking And Optimization, Qing Yi
Dissertations and Theses
Present-day datacenter networks (DCNs) are designed to achieve full bisection bandwidth in order to provide high network throughput and server agility. However, the average utilization of typical DCN infrastructure is below 10% for significant time intervals. As a result, energy is wasted during these periods. In this thesis we analyze traffic behavior of datacenter networks using traces as well as simulated models. Based on the insight developed, we present techniques to reduce energy waste by making energy use scale linearly with load. The solutions developed are analyzed via simulations, formal analysis, and prototyping. The impact of our work is significant …
Towards A Framework For Maintaining Defensibility In Encrypted Network Environments, John Prewett
Towards A Framework For Maintaining Defensibility In Encrypted Network Environments, John Prewett
Regis University Student Publications (comprehensive collection)
Network security professionals improve confidentiality and integrity of information technology resources when they incorporate encryption schemes into the transmission of network packets across their respective infrastructures. Ironically, network engineers and administrators that incorporate encryption strategies across their infrastructures must simultaneously confront the limitations of end-to-end encrypted network packets inasmuch as they severely impair visible, defensible network architectures. This project demonstrates how security professionals charged with maintaining network visibility can deploy encryption across their topologies without fear of compromising their ability to capture – then fully analyze – network traffic. In so doing, information technology industry practitioners and researchers may confidently …
The Value Proposition Of Service-Oriented Architecture, David Norman
The Value Proposition Of Service-Oriented Architecture, David Norman
Regis University Student Publications (comprehensive collection)
The author of this thesis evaluates Service-Oriented Architecture (SOA) design and implementation strategies. The purpose is to provide the reader with the definition of Service-Oriented Architecture. This report discusses: (1) The definition of Service-Oriented Architecture, (2) The problems solved by Service-Oriented Architecture, (3) Application of design principles to achieve Service-Oriented Architecture. As a result of this investigation, Service-Oriented Architecture is a design style that is fundamentally about sharing and reuse of functionality across diverse applications, so that organizations can quickly adapt to changing business requirements while increasing IT asset reuse and minimizing integration and development costs.
Network Access Control: Disruptive Technology?, Craig Fisher
Network Access Control: Disruptive Technology?, Craig Fisher
Regis University Student Publications (comprehensive collection)
Network Access Control (NAC) implements policy-based access control to the trusted network. It regulates entry to the network by the use of health verifiers and policy control points to mitigate the introduction of malicious software. However the current versions of NAC may not be the universal remedy to endpoint security that many vendors tout. Many organizations that are evaluating the technology, but that have not yet deployed a solution, believe that NAC presents an opportunity for severe disruption of their networks. A cursory examination of the technologies used and how they are deployed in the network appears to support this …
Vacation System, Min-Wei Lee
Vacation System, Min-Wei Lee
Theses Digitization Project
The purpose of this project was to explore the use of Web services to solve enterprise computing problems. XML-based Web services allow complex information systems to be subdivided. In order to explore this architectural paradigm, two systems were built: an employee records sytem, and a vacation system.
Depth-First Search Embedded Wavelet Algorithm For Hardware Implementation, Li-Minn Ang
Depth-First Search Embedded Wavelet Algorithm For Hardware Implementation, Li-Minn Ang
Theses: Doctorates and Masters
The emerging technology of image communication over wireless transmission channels requires several new challenges to be simultaneously met at the algorithm and architecture levels. At the algorithm level, desirable features include high coding performance, bit stream scalability, robustness to transmission errors and suitability for content-based coding schemes. At the architecture level, we require efficient architectures for construction of portable devices with small size and low power consumption. An important question is to ask if a single coding algorithm can be designed to meet the diverse requirements. Recently, researchers working on improving different features have converged on a set of coding …
Qos Scalability For Streamed Media Delivery, Charles Krasic, Jonathan Walpole
Qos Scalability For Streamed Media Delivery, Charles Krasic, Jonathan Walpole
Computer Science Faculty Publications and Presentations
Applications with real-rate progress requirements, such as mediastreaming systems, are difficult to deploy in shared heterogenous environments such as the Internet. On the Internet, mediastreaming systems must be capable of trading off resource requirements against the quality of the media streams they deliver, in order to match wide-ranging dynamic variations in bandwidth between servers and clients. Since quality requirements tend to be user- and task-specific, mechanisms for capturing quality of service requirements and mapping them to appropriate resource-level adaptation policies are required. In this paper, we describe a general approach for automatically mapping user-level quality of service specifications onto resource …
Device And Physical Data Independence For Multimedia Presentations, Richard Staehli, Jonathan Walpole, David Maier
Device And Physical Data Independence For Multimedia Presentations, Richard Staehli, Jonathan Walpole, David Maier
Computer Science Faculty Publications and Presentations
Multimedia computing promises access to any type of visual or aural medium on the desktop. But in this networked future, will every type of media be accessible from every terminal device? Current multimedia standards do not allow content that is authored for high-bandwidth workstations to scale down for low-bandwidth applications. The problem is that application requests are commonly interpreted as requests for the highest possible quality and resource overloads are handled by ad hoc methods. We can begin to solve this problem by specifying Quality of Service (QOS) requirements based on functionality rather than on content encoding and device capabilities.
Scheduling Of Parallel Jobs On Dynamic, Heterogenous Networks, Dan Clark, Jeremy Casas, Steve Otto, Robert Prouty, Jonathan Walpole
Scheduling Of Parallel Jobs On Dynamic, Heterogenous Networks, Dan Clark, Jeremy Casas, Steve Otto, Robert Prouty, Jonathan Walpole
Computer Science Faculty Publications and Presentations
In using a shared network of workstations for parallel processing, it is not only important to consider heterogeneity and differences in processing power between the workstations but also the dynamics of the system as a whole. In such a computing environment where the use of resources vary as other applications consume and release resources, intelligent scheduling of the parallel jobs onto the available resources is essential to maximize resource utilization. Despite this realization, however, there are few systems available that provide an infrastructure for the easy development and testing of these intelligent schedulers. In this paper, an infrastructure is presented …
Comet: A Synthetic Benchmark For Message-Passing Architectures, Nalini Ganapati, Steve Otto, Jonathan Walpole
Comet: A Synthetic Benchmark For Message-Passing Architectures, Nalini Ganapati, Steve Otto, Jonathan Walpole
Computer Science Faculty Publications and Presentations
Rapid advances in hardware technology have led to wide diversity in parallel computer architectures. This diversity makes it difficult to evaluate or compare the performance of different parallel computers. Existing benchmarks tend either to be too architecture-specific, or too high-level. Both problems can result in benchmarks that not only provide insufficient information on the performance characteristics of the computer being tested, but are also difficult to port. New benchmarking approaches are needed for new architectural classes, particularly distributed-memory, message-passing computers. This paper focuses on benchmarking distributed-memory message-passing computers. A synthetic benchmark called CoMet (COmmunication METrics), is presented. CoMet is based …
Classification Of Patterns In Eeg Recordings : A Comparison Of Back-Propagation Networks Vs. Predictive Autoencoder Networks, Brian Armieri
Classification Of Patterns In Eeg Recordings : A Comparison Of Back-Propagation Networks Vs. Predictive Autoencoder Networks, Brian Armieri
Theses
Recent research exploring the use of neural networks for electro-encephalogram (EEG) pattern classification has found that a three-layer back-propagation network could be successfully trained to identify high voltage spike-and-wave spindle (HVS) patterns caused by epileptic seizures (Jando et. al., in press). However, there is no reason to predict that back-propagation is the best possible network architecture for EEG classification. A back-propagation neural network and a predictive autoencoder neural network were compared to determine which network was better at correct classifying both HVS and non-HVS patterns.
Both networks were able to classify 88%-89% of all patterns using a limited set of …
An Implementation And Evaluation Of Distributed Information System Based On The Osca Architecture Guidelines, Babita Masand
An Implementation And Evaluation Of Distributed Information System Based On The Osca Architecture Guidelines, Babita Masand
Theses
The concepts in this thesis discuss and evaluate the need for systems integration. As a conceptual architecture, the OSCATM architecture is investigated. A prototype of the CS Department distributed information system is built following the guidelines and standards of this conceptual architecture. This prototype is implemented in 'C'. RPC (remote procedure call) is used for the communication channel to implement the distributed environment. Conclusions and results that were achieved by implementing this prototype are presented. The main outcome of this thesis is the introduction of the infrastructure to the GenSIF framework.
A Study In Systems Integration Architecture, Sashidhar M. Prasad
A Study In Systems Integration Architecture, Sashidhar M. Prasad
Theses
This Thesis studies the two architectures OSCA and ANSA which support the ODPSE principle in the first two parts. In the third part the framework for integrating these two architectures is described. The idea of integration architectures in relation to open architectures is studied using the enabling technologies.
Work-Preserving Real-Time Emulation Of Meshes On Butterfly Networks, Alf-Christian Achilles
Work-Preserving Real-Time Emulation Of Meshes On Butterfly Networks, Alf-Christian Achilles
Theses
The emulation of a guest network G on a host network H is work-preserving and real-time if the inefficiency, that is the ratio WG/WH of the amounts of work done in both networks, and the slowdown of the emulation are O(1).
In this thesis we show that an infinite number of meshes can be emulated on a butterfly in a work-preserving real-time manner, despite the fact that any emulation of an s x s-node mesh in a butterfly with load 1 has a dilation of Ω(logs).
The recursive embedding of a mesh in a butterfly presented by …
A Novel Method Of Constructing Sorting Networks, Robert M. Keller
A Novel Method Of Constructing Sorting Networks, Robert M. Keller
All HMC Faculty Publications and Research
The construction of sorting networks has been a topic of much recent discussion. In view of the apparent difficulty of verifying whether a reasonably large proposed sorting network actually does sort, the most useful approach for constructing large networks seems to be to devise a recursive scheme which constructs a network which is guaranteed to sort, obviating the verification phase. In this note, another such approach is presented.