Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer architecture

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 57

Full-Text Articles in Physical Sciences and Mathematics

Soci+: An Enhanced Toolkit For Secure Outsourced Computation On Integers, Bowen Zhao, Weiquan Deng, Xiaoguo Li, Ximeng Liu, Qingqi Pei, Robert H. Deng Jan 2024

Soci+: An Enhanced Toolkit For Secure Outsourced Computation On Integers, Bowen Zhao, Weiquan Deng, Xiaoguo Li, Ximeng Liu, Qingqi Pei, Robert H. Deng

Research Collection School Of Computing and Information Systems

Secure outsourced computation is critical for cloud computing to safeguard data confidentiality and ensure data usability. Recently, secure outsourced computation schemes following a twin-server architecture based on partially homomorphic cryptosystems have received increasing attention. The Secure Outsourced Computation on Integers (SOCI) [1] toolkit is the state-of-the-art among these schemes which can perform secure computation on integers without requiring the costly bootstrapping operation as in fully homomorphic encryption; however, SOCI suffers from relatively large computation and communication overhead. In this paper, we propose SOCI+ which significantly improves the performance of SOCI. Specifically, SOCI+ employs a novel (2,2)-threshold Paillier cryptosystem with fast …


Mobility Management In Tsch-Based Industrial Wireless Networks, Marco Pettorali, Francesca Righetti, Carlo Vallati, Sajal K. Das, Giuseppe Anastasi Jan 2024

Mobility Management In Tsch-Based Industrial Wireless Networks, Marco Pettorali, Francesca Righetti, Carlo Vallati, Sajal K. Das, Giuseppe Anastasi

Computer Science Faculty Research & Creative Works

Wireless Sensor and Actuator Networks (WSANs) are an effective technology for improving the efficiency and productivity in many industrial domains and are also the building blocks for the Industrial Internet of Things (IIoT). To support this trend, the IEEE has defined the 802.5.4 Time-Slotted Channel Hopping (TSCH) protocol. Unfortunately, TSCH does not provide any mechanism to manage node mobility, while many current industrial applications involve Mobile Nodes (MNs), e.g., mobile robots or wearable devices carried by workers. In this article, we present a framework to efficiently manage mobility in TSCH networks, by proposing an enhanced version of the Synchronized Single-hop …


3d-Aware Multi-Class Image-To-Image Translation With Nerfs, Senmao Li, Joost Van De Weijer, Yaxing Wang, Fahad Shahbaz Khan, Meiqin Liu, Jian Yang Aug 2023

3d-Aware Multi-Class Image-To-Image Translation With Nerfs, Senmao Li, Joost Van De Weijer, Yaxing Wang, Fahad Shahbaz Khan, Meiqin Liu, Jian Yang

Computer Vision Faculty Publications

Recent advances in 3D-aware generative models (3D-aware GANs) combined with Neural Radiance Fields (NeRF) have achieved impressive results. However no prior works investigate 3D-aware GANs for 3D consistent multiclass image-to-image (3D-aware 121) translation. Naively using 2D-121 translation methods suffers from unrealistic shape/identity change. To perform 3D-aware multiclass 121 translation, we decouple this learning process into a multiclass 3D-aware GAN step and a 3D-aware 121 translation step. In the first step, we propose two novel techniques: a new conditional architecture and an effective training strategy. In the second step, based on the well-trained multiclass 3D-aware GAN architecture, that preserves view-consistency, we …


Fine-Grained Commit-Level Vulnerability Type Prediction By Cwe Tree Structure, Shengyi Pan, Lingfeng Bao, Xin Xia, David Lo, Shanping Li May 2023

Fine-Grained Commit-Level Vulnerability Type Prediction By Cwe Tree Structure, Shengyi Pan, Lingfeng Bao, Xin Xia, David Lo, Shanping Li

Research Collection School Of Computing and Information Systems

Identifying security patches via code commits to allow early warnings and timely fixes for Open Source Software (OSS) has received increasing attention. However, the existing detection methods can only identify the presence of a patch (i.e., a binary classification) but fail to pinpoint the vulnerability type. In this work, we take the first step to categorize the security patches into fine-grained vulnerability types. Specifically, we use the Common Weakness Enumeration (CWE) as the label and perform fine-grained classification using categories at the third level of the CWE tree. We first formulate the task as a Hierarchical Multi-label Classification (HMC) problem, …


An Optimized And Scalable Blockchain-Based Distributed Learning Platform For Consumer Iot, Zhaocheng Wang, Xueying Liu, Xinming Shao, Abdullah Alghamdi, Md. Shirajum Munir, Sujit Biswas Jan 2023

An Optimized And Scalable Blockchain-Based Distributed Learning Platform For Consumer Iot, Zhaocheng Wang, Xueying Liu, Xinming Shao, Abdullah Alghamdi, Md. Shirajum Munir, Sujit Biswas

School of Cybersecurity Faculty Publications

Consumer Internet of Things (CIoT) manufacturers seek customer feedback to enhance their products and services, creating a smart ecosystem, like a smart home. Due to security and privacy concerns, blockchain-based federated learning (BCFL) ecosystems can let CIoT manufacturers update their machine learning (ML) models using end-user data. Federated learning (FL) uses privacy-preserving ML techniques to forecast customers' needs and consumption habits, and blockchain replaces the centralized aggregator to safeguard the ecosystem. However, blockchain technology (BCT) struggles with scalability and quick ledger expansion. In BCFL, local model generation and secure aggregation are other issues. This research introduces a novel architecture, emphasizing …


Model Based Systems Engineering With A Docs-As-Code Approach For The Sealion Cubesat Project, Kevin Chiu, Sean Marquez, Sharanabasaweshwara Asundi Jan 2023

Model Based Systems Engineering With A Docs-As-Code Approach For The Sealion Cubesat Project, Kevin Chiu, Sean Marquez, Sharanabasaweshwara Asundi

Mechanical & Aerospace Engineering Faculty Publications

The SeaLion mission architecture team sought to create a model-based systems engineering approach to assist improving CubeSat success rates as well as for the SeaLion CubeSat project to guide an implementation for the flight software. This is important because university CubeSat teams are growing in number but often have untrained students as their core personnel. This was done using a document-as-code, or docs-as-code, approach. With this the team created tools for the systems architecture with the Mach 30 Modeling Language to create an architecture that is easy to learn and use even for newly admitted team members with little to …


Analyzing Microarchitectural Residue In Various Privilege Strata To Identify Computing Tasks, Tor J. Langehaug Sep 2022

Analyzing Microarchitectural Residue In Various Privilege Strata To Identify Computing Tasks, Tor J. Langehaug

Theses and Dissertations

Modern multi-tasking computer systems run numerous applications simultaneously. These applications must share hardware resources including the Central Processing Unit (CPU) and memory while maximizing each application’s performance. Tasks executing in this shared environment leave residue which should not reveal information. This dissertation applies machine learning and statistical analysis to evaluate task residue as footprints which can be correlated to identify tasks. The concept of privilege strata, drawn from an analogy with physical geology, organizes the investigation into the User, Operating System, and Hardware privilege strata. In the User Stratum, an adversary perspective is taken to build an interrogator program that …


Balancing Supercapacitor Voltages In Modular Bidirectional Dc–Dc Converter Circuits, Robert Alfie S. Peña, Alaa Hijazi, Pascal Venet, Florian Errigo Jan 2022

Balancing Supercapacitor Voltages In Modular Bidirectional Dc–Dc Converter Circuits, Robert Alfie S. Peña, Alaa Hijazi, Pascal Venet, Florian Errigo

Electronics, Computer, and Communications Engineering Faculty Publications

At present, passive balancing methods dominate energy storage applications, however, they suffer from a long balancing duration. In this article, we took advantage of a modular architecture, where several modular power converters replace a central dc–dc converter for fast charging and balancing of a supercapacitor stack. A strategy has been proposed to control how power is shared among the converters during the charging period in order to balance the supercapacitors. However, some converters enter control saturation due to voltage differences between supercapacitors caused by their nonuniform conditions and characteristics. The originality of this article lies in taking into account the …


A Method For Comparative Analysis Of Trusted Execution Environments, Stephano Cetola Jun 2021

A Method For Comparative Analysis Of Trusted Execution Environments, Stephano Cetola

Dissertations and Theses

The problem of secure remote computation has become a serious concern of hardware manufacturers and software developers alike. Trusted Execution Environments (TEEs) are a solution to the problem of secure remote computation in applications ranging from "chip and pin" financial transactions to intellectual property protection in modern gaming systems. While extensive literature has been published about many of these technologies, there exists no current model for comparing TEEs. This thesis provides hardware architects and designers with a set of tools for comparing TEEs. I do so by examining several properties of a TEE and comparing their implementations in several technologies. …


U-Net And Its Variants For Medical Image Segmentation: A Review Of Theory And Applications, Nahian Siddique, Paheding Sidike, Colin P. Elkin, Vijay Devabhaktuni Jun 2021

U-Net And Its Variants For Medical Image Segmentation: A Review Of Theory And Applications, Nahian Siddique, Paheding Sidike, Colin P. Elkin, Vijay Devabhaktuni

Michigan Tech Publications

U-net is an image segmentation technique developed primarily for image segmentation tasks. These traits provide U-net with a high utility within the medical imaging community and have resulted in extensive adoption of U-net as the primary tool for segmentation tasks in medical imaging. The success of U-net is evident in its widespread use in nearly all major image modalities, from CT scans and MRI to Xrays and microscopy. Furthermore, while U-net is largely a segmentation tool, there have been instances of the use of U-net in other applications. Given that U-net’s potential is still increasing, this narrative literature review examines …


Adaptive Aggregation Networks For Class-Incremental Learning, Yaoyao Liu, Bernt Schiele, Qianru Sun Jun 2021

Adaptive Aggregation Networks For Class-Incremental Learning, Yaoyao Liu, Bernt Schiele, Qianru Sun

Research Collection School Of Computing and Information Systems

Class-Incremental Learning (CIL) aims to learn a classification model with the number of classes increasing phase-by-phase. An inherent problem in CIL is the stability-plasticity dilemma between the learning of old and new classes, i.e., high-plasticity models easily forget old classes, but high-stability models are weak to learn new classes. We alleviate this issue by proposing a novel network architecture called Adaptive Aggregation Networks (AANets) in which we explicitly build two types of residual blocks at each residual level (taking ResNet as the baseline architecture): a stable block and a plastic block. We aggregate the output feature maps from these two …


Improving Multi-Threaded Qos In Clouds, Weiwei Jia May 2021

Improving Multi-Threaded Qos In Clouds, Weiwei Jia

Dissertations

Multi-threading and resource sharing are pervasive and critical in clouds and data-centers. In order to ease management, save energy and improve resource utilization, multi-threaded applications from different tenants are often encapsulated in virtual machines (VMs) and consolidated on to the same servers. Unfortunately, despite much effort, it is still extremely challenging to maintain high quality of service (QoS) for multi-threaded applications of different tenants in clouds, and these applications often suffer severe performance degradation, poor scalability, unfair resource allocation, and so on.

The dissertation identifies the causes of the QoS problems and improves the QoS of multi-threaded execution with three …


A Golden Age For Computing Frontiers, A Dark Age For Computing Education?, Christof Teuscher May 2021

A Golden Age For Computing Frontiers, A Dark Age For Computing Education?, Christof Teuscher

Electrical and Computer Engineering Faculty Publications and Presentations

There is no doubt that the body of knowledge spanned by the computing disciplines has gone through an unprecedented expansion, both in depth and breadth, over the last century. In this position paper, we argue that this expansion has led to a crisis in computing education: quite literally the vast majority of the topics of interest of this conference are not taught at the undergraduate level and most graduate courses will only scratch the surface of a few selected topics. But alas, industry is increasingly expecting students to be familiar with emerging topics, such as neuromorphic, probabilistic, and quantum computing, …


Lecture 06: The Impact Of Computer Architectures On The Design Of Algebraic Multigrid Methods, Ulrike Yang Apr 2021

Lecture 06: The Impact Of Computer Architectures On The Design Of Algebraic Multigrid Methods, Ulrike Yang

Mathematical Sciences Spring Lecture Series

Algebraic multigrid (AMG) is a popular iterative solver and preconditioner for large sparse linear systems. When designed well, it is algorithmically scalable, enabling it to solve increasingly larger systems efficiently. While it consists of various highly parallel building blocks, the original method also consisted of various highly sequential components. A large amount of research has been performed over several decades to design new components that perform well on high performance computers. As a matter of fact, AMG has shown to scale well to more than a million processes. However, with single-core speeds plateauing, future increases in computing performance need to …


Breaking Neural Reasoning Architectures With Metamorphic Relation-Based Adversarial Examples, Alvin Chan, Lei Ma, Felix Juefei-Xu, Yew-Soon Ong, Xiaofei Xie, Minhui Xue, Yang Liu Apr 2021

Breaking Neural Reasoning Architectures With Metamorphic Relation-Based Adversarial Examples, Alvin Chan, Lei Ma, Felix Juefei-Xu, Yew-Soon Ong, Xiaofei Xie, Minhui Xue, Yang Liu

Research Collection School Of Computing and Information Systems

The ability to read, reason, and infer lies at the heart of neural reasoning architectures. After all, the ability to perform logical reasoning over language remains a coveted goal of Artificial Intelligence. To this end, models such as the Turing-complete differentiable neural computer (DNC) boast of real logical reasoning capabilities, along with the ability to reason beyond simple surface-level matching. In this brief, we propose the first probe into DNC's logical reasoning capabilities with a focus on text-based question answering (QA). More concretely, we propose a conceptually simple but effective adversarial attack based on metamorphic relations. Our proposed adversarial attack …


Processor Modules For The Classroom Development Of Physical Computers, Lakshmi Ongolu Dec 2020

Processor Modules For The Classroom Development Of Physical Computers, Lakshmi Ongolu

Master’s Theses and Projects

Processors are present in almost all the electronic components available in the market now. As they perform trillions of operations per second and are complex internally. This project is to build building modules for students, who will be able to develop their own processor. The main idea is that this will help students to experience the detailed workflow of a processor and focus on design and development instead of spending time on wiring and soldering. Different components such as Program Counter, Instruction Register, Memory, Multiplexer, Adder and transceivers are designed and printed as individual modules on printed circuit boards (PCB’s). …


A Comprehensive Survey Of The Tactile Internet: State-Of-The-Art And Research Directions, Nattakorn Promwongsa, Amin Ebrahimzadeh, Diala Naboulsi, Somayeh Kianpisheh, Fatna Belqasmi, Roch Glitho, Noel Crespi, Omar Alfandi Sep 2020

A Comprehensive Survey Of The Tactile Internet: State-Of-The-Art And Research Directions, Nattakorn Promwongsa, Amin Ebrahimzadeh, Diala Naboulsi, Somayeh Kianpisheh, Fatna Belqasmi, Roch Glitho, Noel Crespi, Omar Alfandi

All Works

The Internet has made several giant leaps over the years, from a fixed to a mobile Internet, then to the Internet of Things, and now to a Tactile Internet. The Tactile Internet goes far beyond data, audio and video delivery over fixed and mobile networks, and even beyond allowing communication and collaboration among things. It is expected to enable haptic communications and allow skill set delivery over networks. Some examples of potential applications are tele-surgery, vehicle fleets, augmented reality and industrial process automation. Several papers already cover many of the Tactile Internet-related concepts and technologies, such as haptic codecs, applications, …


Sam-Sos: A Stochastic Software Architecture Modeling And Verification Approach For Complex System-Of-Systems, Ahmad Mohsin, Naeem Khalid Janjua, Syed M. S. Islam, Muhammad Ali Babar Jan 2020

Sam-Sos: A Stochastic Software Architecture Modeling And Verification Approach For Complex System-Of-Systems, Ahmad Mohsin, Naeem Khalid Janjua, Syed M. S. Islam, Muhammad Ali Babar

Research outputs 2014 to 2021

A System-of-Systems (SoS) is a complex, dynamic system whose Constituent Systems (CSs) are not known precisely at design time, and the environment in which they operate is uncertain. SoS behavior is unpredictable due to underlying architectural characteristics such as autonomy and independence. Although the stochastic composition of CSs is vital to achieving SoS missions, their unknown behaviors and impact on system properties are unavoidable. Moreover, unknown conditions and volatility have significant effects on crucial Quality Attributes (QAs) such as performance, reliability and security. Hence, the structure and behavior of a SoS must be modeled and validated quantitatively to foresee any …


Computer Organization And Architecture (Ksu), Yong Shi, Dan Lo, Selena He, Mingon Kang, Sarah North Oct 2019

Computer Organization And Architecture (Ksu), Yong Shi, Dan Lo, Selena He, Mingon Kang, Sarah North

Computer Science and Information Technology Grants Collections

This Grants Collection for Computer Organization and Architecture was created under a Round Twelve ALG Textbook Transformation Grant.

Affordable Learning Georgia Grants Collections are intended to provide faculty with the frameworks to quickly implement or revise the same materials as a Textbook Transformation Grants team, along with the aims and lessons learned from project teams during the implementation process.

Documents are in .pdf format, with a separate .docx (Word) version available for download. Each collection contains the following materials:

  • Linked Syllabus
  • Initial Proposal
  • Final Report


Understanding And Optimizing Parallel Performance In Multi-Tenant Cloud, Yong Zhao Aug 2019

Understanding And Optimizing Parallel Performance In Multi-Tenant Cloud, Yong Zhao

Computer Science and Engineering Dissertations

As a critical component of resource management in multicore systems, fair schedulers in hypervisors and operating systems (OSes) must follow a simple invariant: guarantee that the computing resources such as CPU cycles are fairly allocated to each vCPU or thread. As simple as it may seem, we found this invariant is broken when parallel programs with blocking synchronization are colocated with CPU intensive programs in hypervisors such as Xen, KVM and OSes such as Linux CFS. On the other hand, schedulers in virtualized environment usually reside in two different layers: one is in the hypervisor which aims to schedule vCPU …


A Hybrid Cognitive Architecture With Primal Affect And Physiology, Christopher L. Dancy Jan 2019

A Hybrid Cognitive Architecture With Primal Affect And Physiology, Christopher L. Dancy

Faculty Journal Articles

Though computational cognitive architectures have been used to study several processes associated with human behavior, the study of integration of affect and emotion in these processes has been relatively sparse. Theory from affective science and affective neuroscience can be used to systematically integrate affect into cognitive architectures, particularly in areas where cognitive system behavior is known to be associated with physiological structure and behavior. I introduce a unified theory and model of human behavior that integrates physiology and primal affect with cognitive processes in a cognitive architecture. This new architecture gives a more tractable, mechanistic way to simulate affect-cognition interactions …


High Performance Cloud Computing On Multicore Computers, Jianchen Shan May 2018

High Performance Cloud Computing On Multicore Computers, Jianchen Shan

Dissertations

The cloud has become a major computing platform, with virtualization being a key to allow applications to run and share the resources in the cloud. A wide spectrum of applications need to process large amounts of data at high speeds in the cloud, e.g., analyzing customer data to find out purchase behavior, processing location data to determine geographical trends, or mining social media data to assess brand sentiment. To achieve high performance, these applications create and use multiple threads running on multicore processors. However, existing virtualization technology cannot support the efficient execution of such applications on virtual machines, making them …


Virtualization In Wireless Sensor Networks: Fault Tolerant Embedding For Internet Of Things, Omprakash Kaiwartya, Abdul Hanan Abdullah, Yue Cao, Jaime Lloret, Sushil Kumar, Rajiv Ratn Shah, Mukesh Prasad, Shiv Prakash Apr 2018

Virtualization In Wireless Sensor Networks: Fault Tolerant Embedding For Internet Of Things, Omprakash Kaiwartya, Abdul Hanan Abdullah, Yue Cao, Jaime Lloret, Sushil Kumar, Rajiv Ratn Shah, Mukesh Prasad, Shiv Prakash

Research Collection School Of Computing and Information Systems

Recently, virtualization in wireless sensor networks (WSNs) has witnessed significant attention due to the growing service domain for IoT. Related literature on virtualization in WSNs explored resource optimization without considering communication failure in WSNs environments. The failure of a communication link in WSNs impacts many virtual networks running IoT services. In this context, this paper proposes a framework for optimizing fault tolerance in virtualization in WSNs, focusing on heterogeneous networks for service-oriented IoT applications. An optimization problem is formulated considering fault tolerance and communication delay as two conflicting objectives. An adapted non-dominated sorting based genetic algorithm (A-NSGA) is developed to …


A Cloud-Based Architecture For Multimedia Conferencing Service Provisioning, Abbas Soltanian, Fatna Belqasmi, Sami Yangui, Mohammad A. Salahuddin, Roch Glitho, Halima Elbiaze Jan 2018

A Cloud-Based Architecture For Multimedia Conferencing Service Provisioning, Abbas Soltanian, Fatna Belqasmi, Sami Yangui, Mohammad A. Salahuddin, Roch Glitho, Halima Elbiaze

All Works

Multimedia conferencing is the real-time exchange of multimedia content between multiple parties. It is the basis of several interactive multiuser applications, such as distance learning and multimedia multiplayer online games. The cloud-based provisioning of the conferencing services on which these applications rely on can have several benefits, including the easy provisioning of new applications, efficient use of resources, and elastic scalability. This paper proposes a holistic cloud-based architecture for conferencing service provisioning, which covers both the infrastructure and platform layers of the cloud. The proposed infrastructure layer offers conferencing substrates-as-a-service (e.g., dial-in signaling, video mixing, and audio mixing), instead of …


Deep Learning On Lie Groups For Skeleton-Based Action Recognition, Zhiwu Huang, C. Wan, T. Probst, Gool L. Van Jul 2017

Deep Learning On Lie Groups For Skeleton-Based Action Recognition, Zhiwu Huang, C. Wan, T. Probst, Gool L. Van

Research Collection School Of Computing and Information Systems

In recent years, skeleton-based action recognition has become a popular 3D classification problem. State-of-the-art methods typically first represent each motion sequence as a high-dimensional trajectory on a Lie group with an additional dynamic time warping, and then shallowly learn favorable Lie group features. In this paper we incorporate the Lie group structure into a deep network architecture to learn more appropriate Lie group features for 3D action recognition. Within the network structure, we design rotation mapping layers to transform the input Lie group features into desirable ones, which are aligned better in the temporal domain. To reduce the high feature …


A Framework Architecture For Student Learning In Distributed Embedded Systems, William L. Honig, Konstantin Läufer, George K. Thiruvathukal Jun 2015

A Framework Architecture For Student Learning In Distributed Embedded Systems, William L. Honig, Konstantin Läufer, George K. Thiruvathukal

Computer Science: Faculty Publications and Other Works

Academic courses focused on individual microcomputers or client/server applications are no longer sufficient for students to develop knowledge in embedded systems. Current and near-term industrial systems employ multiple interacting components and new network and security approaches; hence, academic preparation requires teaching students to develop realistic projects comparable to these real-world products. However, the complexity, breadth, and technical variations of these real-world products are difficult to reproduce in the classroom. This paper outlines preliminary work on a framework architecture suitable for academic teaching of modern embedded systems including the Internet of Things. It defines four layers, two of which are at …


Fast Bitwise Pattern-Matching Algorithm For Dna Sequences On Modern Hardware, Giyasetti̇n Özcan, Osman Sabri̇ Ünsal Jan 2015

Fast Bitwise Pattern-Matching Algorithm For Dna Sequences On Modern Hardware, Giyasetti̇n Özcan, Osman Sabri̇ Ünsal

Turkish Journal of Electrical Engineering and Computer Sciences

We introduce a fast bitwise exact pattern-matching algorithm, which speeds up short-length pattern searches on large-sized DNA databases. Our contributions are two-fold. First, we introduce a novel exact matching algorithm designed specifically for modern processor architectures. Second, we conduct a detailed comparative performance analysis of bitwise exact matching algorithms by utilizing hardware counters. Our algorithmic technique is based on condensed bitwise operators and multifunction variables, which minimize register spills and instruction counts during searches. In addition, the technique aims to efficiently utilize CPU branch predictors and to ensure smooth instruction flow through the processor pipeline. Analyzing letter occurrence probability estimations …


A Provenance Methodology And Architecture For Scientific Projects Containing Automated And Manual Processes, Nicholas J. Car, Matthew Paul Stenson, Michael Hartcher Aug 2014

A Provenance Methodology And Architecture For Scientific Projects Containing Automated And Manual Processes, Nicholas J. Car, Matthew Paul Stenson, Michael Hartcher

International Conference on Hydroinformatics

The management of provenance metadata is a pressing issue for high profile, complex, science projects needing to trace their data products’ lineage in order to withstand scrutiny. To represent, capture, transfer, store and deliver provenance data from a project’s processes, specialized metadata, new IT system components and the human and automated procedures are necessary. The collection of metadata, components and procedures can be termed a provenance methodolo-gy and architecture. Through our involvement with several large Australian science projects ([4], [5], [6], [7], [11]), we have developed a methodology that provides: Use Case assessments of project clients’ requirements for provenance; team …


These Are Not The K-Mers You Are Looking For: Efficient Online K-Mer Counting Using A Probabilistic Data Structure, Qingpeng Zhang, Jason Pell, Rosangela Canino-Koning, Adina Chuang Howe, C. Titus Brown Jul 2014

These Are Not The K-Mers You Are Looking For: Efficient Online K-Mer Counting Using A Probabilistic Data Structure, Qingpeng Zhang, Jason Pell, Rosangela Canino-Koning, Adina Chuang Howe, C. Titus Brown

Adina Howe

K-mer abundance analysis is widely used for many purposes in nucleotide sequence analysis, including data preprocessing for de novo assembly, repeat detection, and sequencing coverage estimation. We present the khmer software package for fast and memory efficient online counting of k-mers in sequencing data sets. Unlike previous methods based on data structures such as hash tables, suffix arrays, and trie structures, khmer relies entirely on a simple probabilistic data structure, a Count-Min Sketch. The Count-Min Sketch permits online updating and retrieval of k-mer counts in memory which is necessary to support online k-mer analysis algorithms. On sparse data sets this …


On High-Performance Parallel Fixed-Point Decimal Multiplier Designs, Ming Zhu Dec 2013

On High-Performance Parallel Fixed-Point Decimal Multiplier Designs, Ming Zhu

UNLV Theses, Dissertations, Professional Papers, and Capstones

High-performance, area-efficient hardware implementation of decimal multiplication is preferred to slow software simulations in a number of key scientific and financial application areas, where errors caused by converting decimal numbers into their approximate binary representations are not acceptable.

Multi-digit parallel decimal multipliers involve two major stages: (i) the partial product generation (PPG) stage, where decimal partial products are determined by selecting the right versions of the pre-computed multiples of the multiplicand, followed by (ii) the partial product accumulation (PPA) stage, where all the partial products are shifted and then added together to obtain the final multiplication product. In this thesis, …