Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

Series

2016

Institution
Keyword
Publication
File Type

Articles 241 - 270 of 285

Full-Text Articles in Engineering

High-Performance Computing For Drought Prediction, Henry Cooney Jan 2016

High-Performance Computing For Drought Prediction, Henry Cooney

Undergraduate Research & Mentoring Program

In recent decades, there has been considerable interest in using satellite soil moisture data to examine the global water-energy cycle and manage water resources. Current satellites are limited in their sensing depth, and can only directly measure top soil layers. Using a particle filter, this data may be fused with the output of a hydrologic simulation to improve simulation results, and characterize a hydrologic system at the watershed level. However, this approach increases computational requirements dramatically, and requires rethinking to accommodate data scaling and achieve good performance.

We present a detailed performance study of several alternative implementations of the hybrid …


A High Performance Ceramic-Polymer Separator For Lithium Batteries, Jitendra Kumar, Padmakar Kichambare, Amarendra K. Rai, Rabi Bhattacharya, Stanley J. Rodrigues, Guru Subramanyam Jan 2016

A High Performance Ceramic-Polymer Separator For Lithium Batteries, Jitendra Kumar, Padmakar Kichambare, Amarendra K. Rai, Rabi Bhattacharya, Stanley J. Rodrigues, Guru Subramanyam

Electrical and Computer Engineering Faculty Publications

A three-layered (ceramic-polymer-ceramic) hybrid separator was prepared by coating ceramic electrolyte [lithium aluminum germanium phosphate (LAGP)] over both sides of polyethylene (PE) polymer membrane using electron beam physical vapor deposition (EB-PVD) technique. Ionic conductivities of membranes were evaluated after soaking PE and LAGP/PE/LAGP membranes in a 1 Molar (1M) lithium hexafluroarsenate (LiAsF6) electrolyte in ethylene carbonate (EC), dimethyl carbonate (DMC) and ethylmethyl carbonate (EMC) in volume ratio (1:1:1). Scanning electron microscopy (SEM) and X-ray diffraction (XRD) techniques were employed to evaluate morphology and structure of the separators before and after cycling performance tests to better understand structure-property correlation. …


Modularity Theory And Internet Regulation, Christopher S. Yoo Jan 2016

Modularity Theory And Internet Regulation, Christopher S. Yoo

All Faculty Scholarship

Modularity is often cited as one of the foundations for the Internet’s success. Unfortunately, academic discussions about modularity appearing in the literature on Internet policy are undertheorized. The persistence of nonmodular architectures for some technologies underscores the need for some theoretical basis for determining when modularity is the preferred approach. Even when modularity is desirable, theory must provide some basis for making key design decisions, such as the number of modules, the location of the interfaces between the modules, and the information included in those interfaces.

The literature on innovation indicates that modules should be determined by the nature of …


Robots As Legal Metaphors, Ryan Calo Jan 2016

Robots As Legal Metaphors, Ryan Calo

Articles

This Article looks at the specific role robots play in the judicial imagination. The law and technology literature is replete with examples of how the metaphors and analogies that courts select for emerging technology can be outcome determinative. Privacy law scholar Professor Daniel Solove argues convincingly, for instance, that George Orwell's Big Brother metaphor has come to dominate, and in ways limit, privacy law and policy in the United States. Even at a more specific, practical level, whether a judge sees email as more like a letter or a postcard will dictate the level of Fourth Amendment protection she is …


Establishing Performance Guarantees For Behavior-Based Robot Missions Using An Smt Solver, Feng Tang, Damian M. Lyons, Ronald Arkin Jan 2016

Establishing Performance Guarantees For Behavior-Based Robot Missions Using An Smt Solver, Feng Tang, Damian M. Lyons, Ronald Arkin

Faculty Publications

In prior work we developed an approach to formally representing behavior-based multi-robot programs, and the uncertain environments in which they operate, as process networks. We automatically extract a set of probabilistic equations governing program execution in that environment using a static analysis module called VIPARS, and solve these using a Dynamic Bayesian Network (DBN) to establish whether stated performance guarantees hold for the program in that environment. In this paper we address the challenge of expanding the range of performance guarantees that are possible by using an SMT-solver instead of a DBN. We translate flow functions, which are recursive probabilistic …


Transformation Model With Constraints For High Accuracy Of 2d-3d Building Registration In Aerial Imagery, Guoqing Zhou, Qingli Luo, Wenhan Xie, Tao Yue, Jingjin Huang, Yuzhong Shen Jan 2016

Transformation Model With Constraints For High Accuracy Of 2d-3d Building Registration In Aerial Imagery, Guoqing Zhou, Qingli Luo, Wenhan Xie, Tao Yue, Jingjin Huang, Yuzhong Shen

Computational Modeling & Simulation Engineering Faculty Publications

This paper proposes a novel rigorous transformation model for 2D-3D registration to address the difficult problem of obtaining a sufficient number of well-distributed ground control points (GCPs) in urban areas with tall buildings. The proposed model applies two types of geometric constraints, co-planarity and perpendicularity, to the conventional photogrammetric collinearity model. Both types of geometric information are directly obtained from geometric building structures, with which the geometric constraints are automatically created and combined into the conventional transformation model. A test field located in downtown Denver, Colorado, is used to evaluate the accuracy and reliability of the proposed method. The comparison …


Stability And Sensitivity Measures For Solutions In Complex, Intelligent, Adaptive And Autonomous Systems, Andreas Tolk Jan 2016

Stability And Sensitivity Measures For Solutions In Complex, Intelligent, Adaptive And Autonomous Systems, Andreas Tolk

Computational Modeling & Simulation Engineering Faculty Publications

Simulation has become a pivotal tool for the design, analysis, and control of complex, intelligent, adaptive and autonomous systems and its components. However, due to the nature of these systems, traditional evaluation practices are often not sufficient. As the components follow adaptive rules, the cumulative events often exploit bifurcation enabling events, leading to clusters of solutions that do not follow the usual rules for standard distributed events. When using simulation for design, analysis, and control of such systems, the evaluation needs to be richer, applying bifurcation and cluster analysis to understand the distribution, applying factor analysis to understand the important …


Leveraging Heritrix And The Wayback Machine On A Corporate Intranet: A Case Study On Improving Corporate Archives, Justin F. Brunelle, Krista Ferrante, Eliot Wilczek, Michele C. Weigle, Michael L. Nelson Jan 2016

Leveraging Heritrix And The Wayback Machine On A Corporate Intranet: A Case Study On Improving Corporate Archives, Justin F. Brunelle, Krista Ferrante, Eliot Wilczek, Michele C. Weigle, Michael L. Nelson

Computer Science Faculty Publications

In this work, we present a case study in which we investigate using open-source, web-scale web archiving tools (i.e., Heritrix and the Wayback Machine installed on the MITRE Intranet) to automatically archive a corporate Intranet. We use this case study to outline the challenges of Intranet web archiving, identify situations in which the open source tools are not well suited for the needs of the corporate archivists, and make recommendations for future corporate archivists wishing to use such tools. We performed a crawl of 143,268 URIs (125 GB and 25 hours) to demonstrate that the crawlers are easy to set …


Monitoring Voip Speech Quality For Chopped And Clipped Speech, Andrew Hines, Jan Skoglund, Anil C. Kokaram, Naomi Harte Jan 2016

Monitoring Voip Speech Quality For Chopped And Clipped Speech, Andrew Hines, Jan Skoglund, Anil C. Kokaram, Naomi Harte

Articles

No abstract provided.


Pro-Fit: Exercise With Friends, Saumil Dharia, Vijesh Jain, Jvalant Patel, Jainikkumar Vora, Rizen Yamauchi, Magdalini Eirinaki, Iraklis Varlamis Jan 2016

Pro-Fit: Exercise With Friends, Saumil Dharia, Vijesh Jain, Jvalant Patel, Jainikkumar Vora, Rizen Yamauchi, Magdalini Eirinaki, Iraklis Varlamis

Faculty Publications

The advancements in wearable technology, where embedded accelerometers, gyroscopes and other sensors enable the users to actively monitor their activity have made it easier for individuals to pursue a healthy lifestyle. However, most of the existing applications expect continuous commitment from the end users, who need to proactively interact with the application in order to connect with friends and attain their goals. These applications fail to engage and motivate users who have busy schedules, or are not as committed and self-motivated. In this work, we present PRO-Fit, a personalized fitness assistant application that employs machine learning and recommendation algorithms in …


Impacts Of Soil Type And Moisture On The Capacity Of Multi-Carrier Modulation In Internet Of Underground Things, Abdul Salam, Mehmet C. Vuran Jan 2016

Impacts Of Soil Type And Moisture On The Capacity Of Multi-Carrier Modulation In Internet Of Underground Things, Abdul Salam, Mehmet C. Vuran

CSE Conference and Workshop Papers

Unique interactions between soil and communication components in wireless underground communications necessitate revisiting fundamental communication concepts from a different perspective. In this paper, capacity profile of wireless underground (UG) channel for multi-carrier transmission techniques is analyzed based on empirical antenna return loss and channel frequency response models in different soil types and moisture values. It is shown that data rates in excess of 124 Mbps are possible for distances up to 12 m. For shorter distances and lower soil moisture conditions, data rates of 362 Mbps can be achieved. It is also shown that due to soil moisture variations, UG …


Learning Hierarchically Decomposable Concepts With Active Over-Labeling, Yuji Mo, Stephen Scott, Doug Downey Jan 2016

Learning Hierarchically Decomposable Concepts With Active Over-Labeling, Yuji Mo, Stephen Scott, Doug Downey

CSE Conference and Workshop Papers

Many classification tasks target high-level concepts that can be decomposed into a hierarchy of finer-grained subconcepts. For example, some string entities that are Locations are also Attractions, some Attractions are Museums, etc. Such hierarchies are common in named entity recognition (NER), document classification, and biological sequence analysis. We present a new approach for learning hierarchically decomposable concepts. The approach learns a high-level classifier (e.g., location vs. non-location) by seperately learning multiple finer-grained classifiers (e.g., museum vs. non-museum), and then combining the results. Soliciting labels at a finer level of granularity than that of the target concept is a new approach …


A New Educational Mobile Devices Platform For Social Inclusion In Tanzania, Fredrick Mtenzi Jan 2016

A New Educational Mobile Devices Platform For Social Inclusion In Tanzania, Fredrick Mtenzi

Articles

Abstract— It is evident that advances in technology has led to improvement in societal wellbeing. In this paper we demonstrate how mobile phones are used in providing reliable and quality education to students in disadvantaged areas of Tanzania. The main contribution is on leveraging on the success that Tanzania has had on using mobile banking to the un-banked population. These lessons are adapted to the education sector, where clever/smart integration of existing disruptive technologies such as mobile phones and social networks are be used to provide access to high quality educational contents. Further, the paper shows how educational content can …


Kicm: A Knowledge-Intensive Context Model, Fredrick Mtenzi, Denis Lupiana Jan 2016

Kicm: A Knowledge-Intensive Context Model, Fredrick Mtenzi, Denis Lupiana

Conference papers

A context model plays a significant role in developing context-aware architectures and consequently on realizing context-awareness, which is important in today's dynamic computing environments. These architectures monitor and analyse their environments to enable context-aware applications to effortlessly and appropriately respond to users' computing needs. These applications make the use of computing devices intuitive and less intrusive. A context model is an abstract and simplified representation of the real world, where the users and their computing devices interact. It is through a context model that knowledge about the real world can be represented in and reasoned by a context-aware architecture. This …


Detecting And Tracing Slow Attacks On Mobile Phone User Service, Brian Cusack, Zhuang Tian Jan 2016

Detecting And Tracing Slow Attacks On Mobile Phone User Service, Brian Cusack, Zhuang Tian

Australian Digital Forensics Conference

The lower bandwidth of mobile devices has until recently filtered the range of attacks on the Internet. However, recent research shows that DOS and DDOS attacks, worms and viruses, and a whole range of social engineering attacks are impacting on broadband smartphone users. In our research we have developed a metric-based system to detect the traditional slow attacks that can be effective using limited resources, and then employed combinations of Internet trace back techniques to identify sources of attacks. Our research question asked: What defence mechanisms are effective? We critically evaluate the available literature to appraise the current state of …


The Proceedings Of 14th Australian Digital Forensics Conference, 5-6 December 2016, Edith Cowan University, Perth, Australia, Craig Valli Jan 2016

The Proceedings Of 14th Australian Digital Forensics Conference, 5-6 December 2016, Edith Cowan University, Perth, Australia, Craig Valli

Australian Digital Forensics Conference

Conference Foreword

This is the fifth year that the Australian Digital Forensics Conference has been held under the banner of the Security Research Institute, which is in part due to the success of the security conference program at ECU. As with previous years, the conference continues to see a quality papers with a number from local and international authors. 11 papers were submitted and following a double blind peer review process, 8 were accepted for final presentation and publication. Conferences such as these are simply not possible without willing volunteers who follow through with the commitment they have initially made, …


Salient Pairwise Spatio-Temporal Interest Points For Real-Time Activity Recognition, Mengyuan Liu, Hong Liu, Qianru Sun, Tianwei Zhang, Runwei Ding Jan 2016

Salient Pairwise Spatio-Temporal Interest Points For Real-Time Activity Recognition, Mengyuan Liu, Hong Liu, Qianru Sun, Tianwei Zhang, Runwei Ding

Research Collection School Of Computing and Information Systems

Real-time Human action classification in complex scenes has applications in various domains such as visual surveillance, video retrieval and human robot interaction. While, the task is challenging due to computation efficiency, cluttered backgrounds and intro-variability among same type of actions. Spatio-temporal interest point (STIP) based methods have shown promising results to tackle human action classification in complex scenes efficiently. However, the state-of-the-art works typically utilize bag-of-visual words (BoVW) model which only focuses on the word distribution of STIPs and ignore the distinctive character of word structure. In this paper, the distribution of STIPs is organized into a salient directed graph, …


We Can Hear You With Wi-Fi!, Guanhua Wang, Yongpan Zou, Zimu Zhou, Kaishun Wu, Lionel M. Ni Jan 2016

We Can Hear You With Wi-Fi!, Guanhua Wang, Yongpan Zou, Zimu Zhou, Kaishun Wu, Lionel M. Ni

Research Collection School Of Computing and Information Systems

Recent literature advances Wi-Fi signals to “see” people’s motions and locations. This paper asks the following question: Can Wi-Fi “hear” our talks? We present WiHear, which enables Wi-Fi signals to “hear” our talks without deploying any devices. To achieve this, WiHear needs to detect and analyze fine-grained radio reflections from mouth movements. WiHear solves this micro-movement detection problem by introducing Mouth Motion Profile that leverages partial multipath effects and wavelet packet transformation. Since Wi-Fi signals do not require line-of-sight, WiHear can “hear” people talks within the radio range. Further, WiHear can simultaneously “hear” multiple people’s talks leveraging MIMO technology. We …


Sensor-Based Estimation Of Btex Concentrations In Water Samples Using Recursive Least Squares And Kalman Filter Techniques, Karthick Sothivelr, Florian Bender, Fabien Josse, Edwin E. Yaz, Antonio J. Ricco Jan 2016

Sensor-Based Estimation Of Btex Concentrations In Water Samples Using Recursive Least Squares And Kalman Filter Techniques, Karthick Sothivelr, Florian Bender, Fabien Josse, Edwin E. Yaz, Antonio J. Ricco

Electrical and Computer Engineering Faculty Research and Publications

This work investigates sensor signal processing approaches that can be used with a sensor system for direct on-site monitoring of groundwater, enabling detection and quantification of BTEX (benzene, toluene, ethylbenzene and xylene) compounds at μg/L (ppb) concentrations in the presence of interferents commonly found in groundwater. A model for the sensor response to water samples containing multiple analytes was first formulated based on experimental results. The first signal processing approach utilizes only RLSE (recursive least squares estimation) whereas the second, a two-step processing technique, utilizes both RLSE and bank of Kalman filters for the estimation process. The estimation techniques were …


Integrating A Simple Traffic Incident Model For Rapid Evacuation Analysis, Andrew J. Collins, R. Michael Robinson, Peter Foytik, Craig Jordan, Barry C. Ezell Jan 2016

Integrating A Simple Traffic Incident Model For Rapid Evacuation Analysis, Andrew J. Collins, R. Michael Robinson, Peter Foytik, Craig Jordan, Barry C. Ezell

VMASC Publications

Road transportation networks are a segment of society's critical infrastructure particularly susceptible to service disruptions. Traffic incidents disrupt road networks by producing blockages and increasing travel times, creating significant impacts during emergency events such as evacuations. For this reason, it is extremely important to incorporate traffic incidents in evacuation planning models. Emergency managers and decision makers need tools that enable rapid assessment of multiple, varied scenarios. Many evacuation simulations require high-fidelity data input making them impractical for rapid deployment by practitioners. Since there is such variation in evacuation types and the method of disruption, evacuation models do not require the …


Predicting Intake Of Applications For First Registration In The Property Registration Authority, Orlaith Mernagh Jan 2016

Predicting Intake Of Applications For First Registration In The Property Registration Authority, Orlaith Mernagh

Dissertations

The motivation for this dissertation is rooted in a real business need. The Property Registration Authority is the state organisation tasked with maintaining a register of land ownership on the island of Ireland. The PRA currently faces a series of challenges; a high level of staff retiring and the inherent loss of knowledge associated with this trend, a lack of recruitment in recent years and a large increase in lodgement of applications for first registration as a result of legislation. The organisation therefore requires a reliable system for predicting future intake. Prior to this project, there has also been a …


Identifying Market Indicators And Content Quality From A Financial Micro-Blog Platform, Siobhán Mcnamara Jan 2016

Identifying Market Indicators And Content Quality From A Financial Micro-Blog Platform, Siobhán Mcnamara

Dissertations

Investment platforms and discussion platforms have come to change the face of finance. The stock market is open to both professional and non-professional investors via online financial channels. Information too comes via a shared domain as both professionals and non-professionals log onto online communication platforms to share, search and discuss market trends. Due to their growing role in finance, understanding online communities has become the focus of much stock market research. Determining who is influential in a network, how information spreads and what translates to buy or sell decision is potentially very lucrative. In this research paper a dataset from …


Anisotropy, Band-To-Band Transitions, Phonon Modes, And Oxidation Properties Of Cobalt-Oxide Core-Shell Slanted Columnar Thin Films, Alyssa Mock, Rafał Korlacki, Chad Briley, Derek Sekora, Tino Hofmann, Peter M. Wilson, Alexander Sinitskii, Eva Schubert, Mathias Schubert Jan 2016

Anisotropy, Band-To-Band Transitions, Phonon Modes, And Oxidation Properties Of Cobalt-Oxide Core-Shell Slanted Columnar Thin Films, Alyssa Mock, Rafał Korlacki, Chad Briley, Derek Sekora, Tino Hofmann, Peter M. Wilson, Alexander Sinitskii, Eva Schubert, Mathias Schubert

Department of Electrical and Computer Engineering: Faculty Publications

Highly ordered and spatially coherent cobalt slanted columnar thin films (SCTFs) were deposited by glancing angle deposition onto silicon substrates, and subsequently oxidized by annealing at 475°C. Scanning electron microscopy, Raman scattering, generalized ellipsometry, and density functional theory investigations reveal shape-invariant transformation of the slanted nanocolumns from metallic to transparent metal-oxide core-shell structures with properties characteristic of spinel cobalt oxide. We find passivation of Co-SCTFs yielding Co-Al2O3core-shell structures produced by conformal deposition of a few nanometers of alumina using atomic layer deposition fully prevents cobalt oxidation in ambient and from annealing up to 475°C.


Anisotropy, Phonon Modes, And Free Charge Carrier Parameters In Monoclinic Β-Gallium Oxide Single Crystals, Mathias Schubert Jan 2016

Anisotropy, Phonon Modes, And Free Charge Carrier Parameters In Monoclinic Β-Gallium Oxide Single Crystals, Mathias Schubert

Department of Electrical and Computer Engineering: Faculty Publications

We derive a dielectric function tensor model approach to render the optical response of monoclinic and triclinic symmetrymaterials with multiple uncoupled infrared and far-infrared active modes.We apply our model approach to monoclinic β-Ga2O3 single-crystal samples. Surfaces cut under different angles from a bulk crystal, (010) and (201), are investigated by generalized spectroscopic ellipsometry within infrared and far-infrared spectral regions. We determine the frequency dependence of 4 independent β-Ga2O3 Cartesian dielectric function tensor elements by matching large sets of experimental data using a point-by-point data inversion approach. From matching our monoclinic model to …


In-Field Fuel Use And Load States Of Agricultural Field Machinery, Santosh Pitla, Joe D. Luck, Jared Werner, Nannan Lin, Scott A. Shearer Jan 2016

In-Field Fuel Use And Load States Of Agricultural Field Machinery, Santosh Pitla, Joe D. Luck, Jared Werner, Nannan Lin, Scott A. Shearer

Department of Biological Systems Engineering: Papers and Publications

The ability to define in-field tractor load states offers the potential to better specify and characterize fuel consumption rate for various field operations. For the same field operation, the tractor experiences diverse load demands and corresponding fuel use rates as it maneuvers through straight passes, turns, suspended operation for adjustments, repair and maintenance, and biomass or other material transfer operations. It is challenging to determine the actual fuel rate and load states of agricultural machinery using force prediction models, and hence, some form of in-field data acquisition capability is required. Controller Area Networks (CAN) available on the current model tractors …


Internet Of Things To Smart Iot Through Semantic, Cognitive, And Perceptual Computing, Amit P. Sheth Jan 2016

Internet Of Things To Smart Iot Through Semantic, Cognitive, And Perceptual Computing, Amit P. Sheth

Publications

Rapid growth in the Internet of Things (IoT) has resulted in a massive growth of data generated by these devices and sensors put on the Internet. Physical-cyber-social (PCS) big data consist of this IoT data, complemented by relevant Web-based and social data of various modalities. Smart data is about exploiting this PCS big data to get deep insights and make it actionable, and making it possible to facilitate building intelligent systems and applications. This article discusses key AI research in semantic computing, cognitive computing, and perceptual computing. Their synergistic use is expected to power future progress in building intelligent systems …


Detection And Quantification Of Aromatic Hydrocarbon Compounds In Water Using Sh-Saw Sensors And Estimation-Theory-Based Signal Processing, Karthick Sothivelr, Florian Bender, Fabien Josse, Antonio J. Ricco, Edwin E. Yaz, Rachel E. Mohler, Ravi Kolhatkar Jan 2016

Detection And Quantification Of Aromatic Hydrocarbon Compounds In Water Using Sh-Saw Sensors And Estimation-Theory-Based Signal Processing, Karthick Sothivelr, Florian Bender, Fabien Josse, Antonio J. Ricco, Edwin E. Yaz, Rachel E. Mohler, Ravi Kolhatkar

Electrical and Computer Engineering Faculty Research and Publications

This work investigates a sensor system for direct groundwater monitoring, capable of aqueous-phase measurement of aromatic hydrocarbons at low concentrations (about 100 parts per billion (ppb)). The system is designed to speciate and quantify benzene, toluene, and ethylbenzene/xylenes (BTEX) in the presence of potential interferents. The system makes use of polymer-coated shear-horizontal surface acoustic wave devices and a signal processing method based on estimation theory, specifically a bank of extended Kalman filters (EKFs). This approach permits estimation of BTEX concentrations even from noisy data, well before the sensor response reaches equilibrium. To utilize estimation theory, an analytical model for the …


Proactive Biometric-Enabled Forensic Imprinting, Abdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven M. Furnell Jan 2016

Proactive Biometric-Enabled Forensic Imprinting, Abdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven M. Furnell

Research outputs 2014 to 2021

Threats to enterprises have become widespread in the last decade. A major source of such threats originates from insiders who have legitimate access to the organization's internal systems and databases. Therefore, preventing or responding to such incidents has become a challenging task. Digital forensics has grown into a de-facto standard in the examination of electronic evidence; however, a key barrier is often being able to associate an individual to the stolen data. Stolen credentials and the Trojan defense are two commonly cited arguments used. This paper proposes a model that can more inextricably links the use of information (e.g. images, …


Optical Fiber Sensors In Physical Intrusion Detection Systems: A Review, Gary Andrew Allwood, Graham Wild, Steven Hinkley Jan 2016

Optical Fiber Sensors In Physical Intrusion Detection Systems: A Review, Gary Andrew Allwood, Graham Wild, Steven Hinkley

Research outputs 2014 to 2021

Fiber optic sensors have become a mainstream sensing technology within a large array of applications due to their inherent benefits. They are now used significantly in structural health monitoring, and are an essential solution for monitoring harsh environments. Since their first development over 30 years ago, they have also found promise in security applications. This paper reviews all of the optical fiber-based techniques used in physical intrusion detection systems. It details the different approaches used for sensing, interrogation, and networking, by research groups, attempting to secure both commercial and residential premises from physical security breaches. The advantages and the disadvantages …


Locality-Aware Dynamic Task Graph Scheduling, Jordyn Maglalang, Sriram Krishnamoorthy, Kunal Agrawal Jan 2016

Locality-Aware Dynamic Task Graph Scheduling, Jordyn Maglalang, Sriram Krishnamoorthy, Kunal Agrawal

All Computer Science and Engineering Research

Dynamic task graph schedulers automatically balance work across processor cores by scheduling tasks among available threads while preserving dependences. In this paper, we design NabbitC, a provably efficient dynamic task graph scheduler that accounts for data locality on NUMA systems. NabbitC allows users to assign a color to each task representing the location (e.g., a processor core) that has the most efficient access to data needed during that node’s execution. NabbitC then automatically adjusts the scheduling so as to preferentially execute each node at the location that matches its color—leading to better locality because the node is likely to make …