Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Information Technology (3)
- Computer vision (2)
- Pure sciences (2)
- 3d modeling (1)
- Android (1)
-
- Android wear (1)
- Anomaly detection mechanism (1)
- Autodesk maya (1)
- Automated planning (1)
- Automated reasoning (1)
- Automatic differentiation (1)
- Community (1)
- Community detection (1)
- Context awareness (1)
- Crowdsourcing (1)
- Energy efficiency (1)
- Exploring (1)
- High performance computing (1)
- Image processing (1)
- Information security (1)
- Insider threat (1)
- Kinect camera (1)
- Logic (1)
- Memory (1)
- Memristors (1)
- Modularity (1)
- Natural language processing (1)
- Network management (1)
- Network routing (1)
- Publication
Articles 1 - 12 of 12
Full-Text Articles in Physical Sciences and Mathematics
What Broke Where For Distributed And Parallel Applications — A Whodunit Story, Subrata Mitra
What Broke Where For Distributed And Parallel Applications — A Whodunit Story, Subrata Mitra
Open Access Dissertations
Detection, diagnosis and mitigation of performance problems in today's large-scale distributed and parallel systems is a difficult task. These large distributed and parallel systems are composed of various complex software and hardware components. When the system experiences some performance or correctness problem, developers struggle to understand the root cause of the problem and fix in a timely manner. In my thesis, I address these three components of the performance problems in computer systems. First, we focus on diagnosing performance problems in large-scale parallel applications running on supercomputers. We developed techniques to localize the performance problem for root-cause analysis. Parallel applications, …
Tangible Interaction As An Aid For Object Navigation In 3d Modeling, Sanmathi Dangeti
Tangible Interaction As An Aid For Object Navigation In 3d Modeling, Sanmathi Dangeti
Open Access Theses
This study introduced an interaction technique that used tangible interaction for 3D modeling. A hybrid interaction technique using a Kinect camera and a smartphone with a gyroscope was developed for the navigating objects in a 3D modeling software. It was then tested on 20 participants categorized as amateurs who had basic 3D/ CAD modeling experience and 20 participants categorized as the experts who had extensive experience working with the modeling software. This research study presents the need for existence of such interaction technique, gaps from the related previous studies, statistical findings from the current study and possible reasons for the …
Video Annotation By Crowd Workers With Privacy-Preserving Local Disclosure, Apeksha Dipak Kumavat
Video Annotation By Crowd Workers With Privacy-Preserving Local Disclosure, Apeksha Dipak Kumavat
Open Access Theses
Advancements in computer vision are still not reliable enough for detecting video content including humans and their actions. Microtask crowdsourcing on task markets such as Amazon Mechnical Turk and Upwork can bring humans into the loop. However, engaging crowd workers to annotate non-public video footage risks revealing the identities of people in the video who may have a right to anonymity.
This thesis demonstrates how we can engage untrusted crowd workers to detect behaviors and objects, while robustly concealing the identities of all faces. We developed a web-based system that presents obfuscated videos to crowd workers, and provides them with …
Interactive Logical Analysis Of Planning Domains, Rajesh Kalyanam
Interactive Logical Analysis Of Planning Domains, Rajesh Kalyanam
Open Access Dissertations
Humans exhibit a significant ability to answer a wide range of questions about previously unencountered planning domains, and leverage this ability to construct “general-purpose'' solution plans for the domain.
The long term vision of this research is to automate this ability, constructing a system that utilizes reasoning to automatically verify claims about a planning domain. The system would use this ability to automatically construct and verify a generalized plan to solve any planning problem in the domain. The goal of this thesis is to start with baseline results from the interactive verification of claims about planning domains and develop the …
Exploring Spin-Transfer-Torque Devices And Memristors For Logic And Memory Applications, Zoha Pajouhi
Exploring Spin-Transfer-Torque Devices And Memristors For Logic And Memory Applications, Zoha Pajouhi
Open Access Dissertations
As scaling CMOS devices is approaching its physical limits, researchers have begun exploring newer devices and architectures to replace CMOS.
Due to their non-volatility and high density, Spin Transfer Torque (STT) devices are among the most prominent candidates for logic and memory applications. In this research, we first considered a new logic style called All Spin Logic (ASL). Despite its advantages, ASL consumes a large amount of static power; thus, several optimizations can be performed to address this issue. We developed a systematic methodology to perform the optimizations to ensure stable operation of ASL.
Second, we investigated reliable design of …
Using Ubiquitous Data To Improve Smartwatches' Context Awareness, Yuankun Song
Using Ubiquitous Data To Improve Smartwatches' Context Awareness, Yuankun Song
Open Access Theses
Nowadays, more and more data is being generated by various software applications, services and smart devices every second. The data contains abundant information about people’s daily lives. This research explored the possibility of improving smartwatches’ context awareness by using common ubiquitous data. The researcher developed a prototype system consisting of an Android application and a web application, and conducted an experiment where 10 participants performed several tasks with the help of a smartwatch. The result showed a significant improvement of the smartwatch’s context awareness running the prototype application, which used ubiquitous data to automatically execute proper actions according to contexts. …
Monitoring Dbms Activity To Detect Insider Threat Using Query Selectivity, Prajwal B. Hegde
Monitoring Dbms Activity To Detect Insider Threat Using Query Selectivity, Prajwal B. Hegde
Open Access Theses
The objective of the research presented in this thesis is to evaluate the importance of query selectivity for monitoring DBMS activity and detect insider threat. We propose query selectivity as an additional component to an existing anomaly detection system (ADS). We first look at the advantages of working with this particular ADS. This is followed by a discussion about some existing limitations in the anomaly detection system (ADS) and how it affects its overall performance. We look at what query selectivity is and how it can help improve upon the existing limitations of the ADS. The system is then implemented …
Energy Efficiency In Data Collection Wireless Sensor Networks, Miquel Andres Navarro Patino
Energy Efficiency In Data Collection Wireless Sensor Networks, Miquel Andres Navarro Patino
Open Access Dissertations
This dissertation studies the problem of energy efficiency in resource constrained and heterogeneous wireless sensor networks (WSNs) for data collection applications in real-world scenarios. The problem is addressed from three different perspectives: network routing, node energy profiles, and network management. First, the energy efficiency in a WSN is formulated as a load balancing problem, where the routing layer can diagnose and exploit the WSN topology redundancy to reduce the data traffic processed in critical nodes, independent of their hardware platform, improving their energy consumption and extending the network lifetime. We propose a new routing strategy that extends traditional cost-based routing …
User-Centric Workload Analytics: Towards Better Cluster Management, Suhas Raveesh Javagal
User-Centric Workload Analytics: Towards Better Cluster Management, Suhas Raveesh Javagal
Open Access Theses
Effective management of computing clusters and providing a high quality customer support is not a trivial task. Due to rise of community clusters there is an increase in the diversity of workloads and the user demographic. Owing to this and privacy concerns of the user, it is difficult to identify performance issues, reduce resource wastage and understand implicit user demands. In this thesis, we perform in-depth analysis of user behavior, performance issues, resource usage patterns and failures in the workloads collected from a university-wide community cluster and two clusters maintained by a government lab. We also introduce a set of …
Learning In Vision And Robotics, Daniel P. Barrett
Learning In Vision And Robotics, Daniel P. Barrett
Open Access Dissertations
I present my work on learning from video and robotic input. This is an important problem, with numerous potential applications. The use of machine learning makes it possible to obtain models which can handle noise and variation without explicitly programming them. It also raises the possibility of robots which can interact more seamlessly with humans rather than only exhibiting hard-coded behaviors. I will present my work in two areas: video action recognition, and robot navigation. First, I present a video action recognition method which represents actions in video by sequences of retinotopic appearance and motion detectors, learns such models automatically …
Grounding Robot Motion In Natural Language And Visual Perception, Scott Alan Bronikowski
Grounding Robot Motion In Natural Language And Visual Perception, Scott Alan Bronikowski
Open Access Dissertations
The current state of the art in military and first responder ground robots involves heavy physical and cognitive burdens on the human operator while taking little to no advantage of the potential autonomy of robotic technology. The robots currently in use are rugged remote-controlled vehicles. Their interaction modalities, usually utilizing a game controller connected to a computer, require a dedicated operator who has limited capacity for other tasks.
I present research which aims to ease these burdens by incorporating multiple modes of robotic sensing into a system which allows humans to interact with robots through a natural-language interface. I conduct …
A Faster Version Of Louvain Method For Community Detection For Efficient Modeling And Analytics Of Cyber Systems, Sunanda Vivek Shanbhaq
A Faster Version Of Louvain Method For Community Detection For Efficient Modeling And Analytics Of Cyber Systems, Sunanda Vivek Shanbhaq
Open Access Theses
Cyber networks are complex networks with various hosts forming the entities of the network and the communication between them forming the edges of the network. Most cyber networks exhibit a community structure. A community is a group of nodes that are densely connected with each other as compared to other nodes in the network. Representing an IP network in the form of communities helps in viewing the network from different levels of granularity and makes the visualization of the network cleaner and more pleasing to the eye. This will help significantly in cyber attack detection in large scale cyber networks. …