Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 35

Full-Text Articles in Physical Sciences and Mathematics

Improving Virtual Machine I/O Performance In Cloud Environments Via I/O Functionality Offloading, Sahan Bamunavita Gamage Oct 2013

Improving Virtual Machine I/O Performance In Cloud Environments Via I/O Functionality Offloading, Sahan Bamunavita Gamage

Open Access Dissertations

In recent years there has been a rapid growth in the adoption of cloud computing. A key technology that drives cloud computing is virtualization. In addition to enabling multi-tenancy in cloud environments, virtualizing hosts in the cloud environments has made management of hardware resources increasingly flexible. An important consequence of virtualizing hosts in the cloud is the negative impact it has on the I/O performance of the applications running in the virtual machines.

In this dissertation, we address the important problem of alleviating the negative impact of virtualization on I/O of the virtual machines. First, we show that virtual machine …


Reasoning Across Language And Vision In Machines And Humans, Andrei Barbu Oct 2013

Reasoning Across Language And Vision In Machines And Humans, Andrei Barbu

Open Access Dissertations

Humans not only outperform AI and computer-vision systems, but use an unknown computational mechanism to perform tasks for which no suitable approaches exist. I present work investigating both novel tasks and how humans approach them in the context of computer vision and linguistics. I demonstrate a system which, like children, acquires high-level linguistic knowledge about the world. Robots learn to play physically-instantiated board games and use that knowledge to engage in physical play. To further integrate language and vision I develop an approach which produces rich sentential descriptions of events depicted in videos. I then show how to simultaneously detect …


Improving Reuse In Software Development For The Life Sciences, Nicholas Vincent Iannotti Oct 2013

Improving Reuse In Software Development For The Life Sciences, Nicholas Vincent Iannotti

Open Access Dissertations

The last several years have seen unprecedented advancements in the application of technology to the life sciences, particularly in the area of data generation. Novel scientific insights are now often driven primarily by software development supporting new multidisciplinary and increasingly multifaceted data analysis. However, despite the availability of tools such as best practice frameworks, the current rate of software development is not able to keep up with the needs of scientists. This bottleneck in software development is largely due to code reuse generally not being applied in practice.

This dissertation presents Legwork, a class library of reuse-optimized design pattern implementations …


Response Of Plasma Facing Components In Tokamaks Due To Intense Energy Deposition Using Particle-In-Cell(Pic) Methods, Filippo Genco Oct 2013

Response Of Plasma Facing Components In Tokamaks Due To Intense Energy Deposition Using Particle-In-Cell(Pic) Methods, Filippo Genco

Open Access Dissertations

Damage to plasma-facing components (PFC) due to various plasma instabilities is still a major concern for the successful development of fusion energy and represents a significant research obstacle in the community. It is of great importance to fully understand the behavior and lifetime expectancy of PFC under both low energy cycles during normal events and highly energetic events as disruptions, Edge-Localized Modes (ELM), Vertical Displacement Events (VDE), and Run-away electron (RE). The consequences of these high energetic dumps with energy fluxes ranging from 10 MJ/m2 up to 200 MJ/m2 applied in very short periods (0.1 to 5 ms) can be …


Mispronunciation Detection For Language Learning And Speech Recognition Adaptation, Zhenhao Ge Oct 2013

Mispronunciation Detection For Language Learning And Speech Recognition Adaptation, Zhenhao Ge

Open Access Dissertations

The areas of "mispronunciation detection" (or "accent detection" more specifically) within the speech recognition community are receiving increased attention now. Two application areas, namely language learning and speech recognition adaptation, are largely driving this research interest and are the focal points of this work.

There are a number of Computer Aided Language Learning (CALL) systems with Computer Aided Pronunciation Training (CAPT) techniques that have been developed. In this thesis, a new HMM-based text-dependent mispronunciation system is introduced using text Adaptive Frequency Cepstral Coefficients (AFCCs). It is shown that this system outperforms the conventional HMM method based on Mel Frequency Cepstral …


Enabling Richer Insight Into Runtime Executions Of Systems, Karthik Swaminathan Nagaraj Oct 2013

Enabling Richer Insight Into Runtime Executions Of Systems, Karthik Swaminathan Nagaraj

Open Access Dissertations

Systems software of very large scales are being heavily used today in various important scenarios such as online retail, banking, content services, web search and social networks. As the scale of functionality and complexity grows in these software, managing the implementations becomes a considerable challenge for developers, designers and maintainers. Software needs to be constantly monitored and tuned for optimal efficiency and user satisfaction. With large scale, these systems incorporate significant degrees of asynchrony, parallelism and distributed executions, reducing the manageability of software including performance management. Adding to the complexity, developers are under pressure between developing new functionality for customers …


Impact Of Network Protocols On Data Center Applications, Pawan Prakash Oct 2013

Impact Of Network Protocols On Data Center Applications, Pawan Prakash

Open Access Dissertations

Data centers containing hundreds of thousands of servers have become the foundation of modern computing infrastructures. Enterprises are increasingly deploying new applications and moving existing applications to these large-scale data centers. These networked applications communicate via a set of conventional network protocols, which were originally designed for wide area networks. In this dissertation, we study the impact of different networking layer protocols on the performance of data center applications.

At the transport layer, we observe that bandwidth sharing via TCP in commodity data center networks, which are organized in multi-rooted tree topologies, can lead to severe unfairness under many common …


Improved Kernel Security Through Code Validation, Diversification, And Minimization, Dannie Michael Stanley Oct 2013

Improved Kernel Security Through Code Validation, Diversification, And Minimization, Dannie Michael Stanley

Open Access Dissertations

The vast majority of hosts on the Internet, including mobile clients, are running one of three commodity, general-purpose operating system families. In such operating systems the kernel software executes at the highest processor privilege level. If an adversary is able to hijack the kernel software then by extension he has full control of the system. This control includes the ability to disable protection mechanisms and hide evidence of compromise.

The lack of diversity in commodity, general-purpose operating systems enables attackers to craft a single kernel exploit that has the potential to infect millions of hosts. If enough variants of the …


Scholarly Collaboration In Engineering Education: From Big-Data Scientometrics To User-Centered Software Design, Hanjun Xian Oct 2013

Scholarly Collaboration In Engineering Education: From Big-Data Scientometrics To User-Centered Software Design, Hanjun Xian

Open Access Dissertations

Engineering education research has grown into a flourishing community with an-ever increasing number of publications and scholars. However, recent studies show that a significant amount of engineering education knowledge retains a clear disciplinary orientation. If the gaps in scholarly collaboration continue to be prevalent within the entire community, it will become increasingly difficult to sustain community memory. This will eventually inhibit the propagation of innovations and slow the movement of research findings into practice.

This dissertation studies scholarly collaboration in the engineering education research community. It provides a clear characterization of collaboration problems and proposes potential solutions. The dissertation is …


Dependence-Based Source Level Tracing And Replay For Networked Embedded Systems, Man Wang Oct 2013

Dependence-Based Source Level Tracing And Replay For Networked Embedded Systems, Man Wang

Open Access Dissertations

Error detection and diagnosis for networked embedded systems remain challenging and tedious due to issues such as a large number of computing entities, hardware resource constraints, and non-deterministic behaviors. The run-time checking is often necessitated by the fact that the static verification fails whenever there exist conditions unknown prior to execution. Complexities in hardware, software and even the operating environments can also defeat the static analysis and simulations. Record-and-replay has long been proposed for distributed systems error diagnosis. Under this method, assertions are inserted in the target program for run-time error detection. At run-time, the violation of any asserted property …


Predictive Duty Cycling Of Radios And Cameras Using Augmented Sensing In Wireless Camera Networks, Joonhwa Shin Oct 2013

Predictive Duty Cycling Of Radios And Cameras Using Augmented Sensing In Wireless Camera Networks, Joonhwa Shin

Open Access Dissertations

Energy efficiency dominates practically every aspect of the design of wireless camera networks (WCNs), and duty cycling of radios and cameras is an important tool for achieving high energy efficiencies. However, duty cycling in WCNs is made complex by the camera nodes having to anticipate the arrival of the objects in their field-of-view. What adds to this complexity is the fact that radio duty cycling and camera duty cycling are tightly coupled notions in WCNs.

Abstract In this dissertation, we present a predictive framework to provide camera nodes with an ability to anticipate the arrival of an object in the …


Automated Failure Explanation Through Execution Comparison, William Nicholas Sumner Oct 2013

Automated Failure Explanation Through Execution Comparison, William Nicholas Sumner

Open Access Dissertations

When fixing a bug in software, developers must build an understanding or explanation of the bug and how the bug flows through a program. The effort that developers must put into building this explanation is costly and laborious. Thus, developers need tools that can assist them in explaining the behavior of bugs. Dynamic slicing is one technique that can effectively show how a bug propagates through an execution up to the point where a program fails. However, dynamic slices are large because they do not just explain the bug itself; they include extra information that explains any observed behavior that …


Control-Theoretic Decision Support For Mitigation Of Modeled Software Project Cost Overruns, Scott David Miller Oct 2013

Control-Theoretic Decision Support For Mitigation Of Modeled Software Project Cost Overruns, Scott David Miller

Open Access Dissertations

Despite sixty years of practice, the production of software remains an endeavor that is difficult to manage according to a schedule. Control theory studies the ability to influence the dynamical behavior of systems to achieve desired behaviors or eliminate undesired behaviors. In this work, the management problem of software project schedule adherence is re-cast as a problem in control theory.

Below, a modeling framework is proposed for capturing the constraints and dependencies found in the arbitrary organization specific work-flows underlying software production. Combined with proposed models for productivity, defect introduction, and defect detection, the framework completes a method for producing …


Methods For Increasing Domains Of Convergence In Iterative Linear System Solvers, David Michael Imberti Oct 2013

Methods For Increasing Domains Of Convergence In Iterative Linear System Solvers, David Michael Imberti

Open Access Dissertations

In this thesis, we introduce and improve various methods for increasing the domains of convergence for iterative linear system solvers. We rely on the following three approaches: making the iteration adaptive, or nesting an inner iteration inside of a previously determined outer iteration; using deflation and projections to manipulate the spectra inherent to the iteration; and/or focusing on reordering schemes. We will analyze a specific combination of these three strategies. In particular, we propose to examine the influence of nesting a Flexible Generalized Minimum Residual algorithm together with an inner Recursive Projection Method using a banded preconditioner resulting from the …


Ribbons: A Partially Shared Memory Programming Model, Kevin John Hoffman Oct 2013

Ribbons: A Partially Shared Memory Programming Model, Kevin John Hoffman

Open Access Dissertations

The need for programs to execute subcomponents in isolation from each other or with lower privileges is prevalent among today's systems. While modern operating systems provide mechanisms for fine-grained isolation of OS resources, only course-grained mechanisms exist for efficient isolation of heap memory. This dissertation develops a new memory programming model known as ribbons to enable fine-grained isolation of heap memory. Ribbons is a shared memory programming model that allows for more implicit sharing of memory than multiprocessing yet is more restrictive than multithreading. The ribbons model hierarchically structures the heap into protection domains. Privileges between these protection domains are …


Cloud To Cloud Registration For 3d Point Data, Darion Shawn Grant Oct 2013

Cloud To Cloud Registration For 3d Point Data, Darion Shawn Grant

Open Access Dissertations

The vast potential of digital representation of objects by large collections of 3D points is being recognized on a global scale and has given rise to the popularity of point cloud data (PCD). 3D imaging sensors provide a means for quickly capturing dense and accurate geospatial information that represent the 3D geometry of objects in a digital environment. Due to spatial and temporal constraints, it is quite common that two or more sets of PCD are obtained to provide full 3D analysis. It is therefore quite essential that all the PCD are referenced to a homogeneous coordinate frame of reference. …


Query-Time Optimization Techniques For Structured Queries In Information Retrieval, Marc-Allen Cartright Sep 2013

Query-Time Optimization Techniques For Structured Queries In Information Retrieval, Marc-Allen Cartright

Open Access Dissertations

The use of information retrieval (IR) systems is evolving towards larger, more complicated queries. Both the IR industrial and research communities have generated significant evidence indicating that in order to continue improving retrieval effectiveness, increases in retrieval model complexity may be unavoidable. From an operational perspective, this translates into an increasing computational cost to generate the final ranked list in response to a query. Therefore we encounter an increasing tension in the trade-off between retrieval effectiveness (quality of result list) and efficiency (the speed at which the list is generated). This tension creates a strong need for optimization techniques to …


The Security And Privacy Implications Of Energy-Proportional Computing, Shane S. Clark Sep 2013

The Security And Privacy Implications Of Energy-Proportional Computing, Shane S. Clark

Open Access Dissertations

The parallel trends of greater energy-efficiency and more aggressive power management are yielding computers that inch closer to energy-proportional computing with every generation. Energy-proportional computing, in which power consumption scales closely with workload, has unintended side effects for security and privacy. Saving energy is an unqualified boon for computer operators, but it is becoming easier to identify computing activities by observing power consumption because an energy-proportional computer reveals more about its workload.

This thesis demonstrates the potential for system-level power analysis---the inference of a computers internal states based on power observation at the "plug." It also examines which hardware components …


Exploring Privacy And Personalization In Information Retrieval Applications, Henry A. Feild Sep 2013

Exploring Privacy And Personalization In Information Retrieval Applications, Henry A. Feild

Open Access Dissertations

A growing number of information retrieval applications rely on search behavior aggregated over many users. If aggregated data such as search query reformulations is not handled properly, it can allow users to be identified and their privacy compromised. Besides leveraging aggregate data, it is also common for applications to make use of user-specific behavior in order to provide a personalized experience for users. Unlike aggregate data, privacy is not an issue in individual personalization since users are the only consumers of their own data.

The goal of this work is to explore the effects of personalization and privacy preservation methods …


Semantically Grounded Learning From Unstructured Demonstrations, Scott D. Niekum Sep 2013

Semantically Grounded Learning From Unstructured Demonstrations, Scott D. Niekum

Open Access Dissertations

Robots exhibit flexible behavior largely in proportion to their degree of semantic knowledge about the world. Such knowledge is often meticulously hand-coded for a narrow class of tasks, limiting the scope of possible robot competencies. Thus, the primary limiting factor of robot capabilities is often not the physical attributes of the robot, but the limited time and skill of expert programmers. One way to deal with the vast number of situations and environments that robots face outside the laboratory is to provide users with simple methods for programming robots that do not require the skill of an expert.

For this …


Optimizing Linear Queries Under Differential Privacy, Chao Li Sep 2013

Optimizing Linear Queries Under Differential Privacy, Chao Li

Open Access Dissertations

Private data analysis on statistical data has been addressed by many recent literatures. The goal of such analysis is to measure statistical properties of a database without revealing information of individuals who participate in the database. Differential privacy is a rigorous privacy definition that protects individual information using output perturbation: a differentially private algorithm produces statistically indistinguishable outputs no matter whether the database contains a tuple corresponding to an individual or not.

It is straightforward to construct differentially private algorithms for many common tasks and there are published algorithms to support various tasks under differential privacy. However methods to design …


Reconfigurable Technologies For Next Generation Internet And Cluster Computing, Deepak C. Unnikrishnan Sep 2013

Reconfigurable Technologies For Next Generation Internet And Cluster Computing, Deepak C. Unnikrishnan

Open Access Dissertations

Modern web applications are marked by distinct networking and computing characteristics. As applications evolve, they continue to operate over a large monolithic framework of networking and computing equipment built from general-purpose microprocessors and Application Specific Integrated Circuits (ASICs) that offers few architectural choices. This dissertation presents techniques to diversify the next-generation Internet infrastructure by integrating Field-programmable Gate Arrays (FPGAs), a class of reconfigurable integrated circuits, with general-purpose microprocessor-based techniques. Specifically, our solutions are demonstrated in the context of two applications - network virtualization and distributed cluster computing.

Network virtualization enables the physical network infrastructure to be shared among several …


Transiently Powered Computers, Benjamin Ransford May 2013

Transiently Powered Computers, Benjamin Ransford

Open Access Dissertations

Demand for compact, easily deployable, energy-efficient computers has driven the development of general-purpose transiently powered computers (TPCs) that lack both batteries and wired power, operating exclusively on energy harvested from their surroundings.

TPCs' dependence solely on transient, harvested power offers several important design-time benefits. For example, omitting batteries saves board space and weight while obviating the need to make devices physically accessible for maintenance. However, transient power may provide an unpredictable supply of energy that makes operation difficult. A predictable energy supply is a key abstraction underlying most electronic designs. TPCs discard this abstraction in favor of opportunistic computation that …


Elastic Resource Management In Cloud Computing Platforms, Upendra Sharma May 2013

Elastic Resource Management In Cloud Computing Platforms, Upendra Sharma

Open Access Dissertations

Large scale enterprise applications are known to observe dynamic workload; provisioning correct capacity for these applications remains an important and challenging problem. Predicting high variability fluctuations in workload or the peak workload is difficult; erroneous predictions often lead to under-utilized systems or in some situations cause temporarily outage of an otherwise well provisioned web-site. Consequently, rather than provisioning server capacity to handle infrequent peak workloads, an alternate approach of dynamically provisioning capacity on-the-fly in response to workload fluctuations has become popular.

Cloud platforms are particularly suited for such applications due to their ability to provision capacity when needed and charge …


High-Performance Processing Of Continuous Uncertain Data, Thanh Thi Lac Tran May 2013

High-Performance Processing Of Continuous Uncertain Data, Thanh Thi Lac Tran

Open Access Dissertations

Uncertain data has arisen in a growing number of applications such as sensor networks, RFID systems, weather radar networks, and digital sky surveys. The fact that the raw data in these applications is often incomplete, imprecise and even misleading has two implications: (i) the raw data is not suitable for direct querying, (ii) feeding the uncertain data into existing systems produces results of unknown quality.

This thesis presents a system for uncertain data processing that has two key functionalities, (i) capturing and transforming raw noisy data to rich queriable tuples that carry attributes needed for query processing with quantified uncertainty, …


Exploiting Domain Structure In Multiagent Decision-Theoretic Planning And Reasoning, Akshat Kumar May 2013

Exploiting Domain Structure In Multiagent Decision-Theoretic Planning And Reasoning, Akshat Kumar

Open Access Dissertations

This thesis focuses on decision-theoretic reasoning and planning problems that arise when a group of collaborative agents are tasked to achieve a goal that requires collective effort. The main contribution of this thesis is the development of effective, scalable and quality-bounded computational approaches for multiagent planning and coordination under uncertainty. This is achieved by a synthesis of techniques from multiple areas of artificial intelligence, machine learning and operations research. Empirically, each algorithmic contribution has been tested rigorously on common benchmark problems and, in many cases, real-world applications from machine learning and operations research literature.

The first part of the thesis …


A Non-Asymptotic Approach To The Analysis Of Communication Networks: From Error Correcting Codes To Network Properties, Ali Eslami May 2013

A Non-Asymptotic Approach To The Analysis Of Communication Networks: From Error Correcting Codes To Network Properties, Ali Eslami

Open Access Dissertations

This dissertation has its focus on two different topics: 1. non-asymptotic analysis of polar codes as a new paradigm in error correcting codes with very promising features, and 2. network properties for wireless networks of practical size. In its first part, we investigate properties of polar codes that can be potentially useful in real-world applications. We start with analyzing the performance of finite-length polar codes over the binary erasure channel (BEC), while assuming belief propagation (BP) as the decoding method. We provide a stopping set analysis for the factor graph of polar codes, where we find the size of the …


Evolving Expert Knowledge Bases: Applications Of Crowdsourcing And Serious Gaming To Advance Knowledge Development For Intelligent Tutoring Systems, Mark Floryan May 2013

Evolving Expert Knowledge Bases: Applications Of Crowdsourcing And Serious Gaming To Advance Knowledge Development For Intelligent Tutoring Systems, Mark Floryan

Open Access Dissertations

This dissertation presents a novel effort to develop ITS technologies that adapt by observing student behavior. In particular, we define an evolving expert knowledge base (EEKB) that structures a domain's information as a set of nodes and the relationships that exist between those nodes. The structure of this model is not the particularly novel aspect of this work, but rather the model's evolving behavior. Past efforts have shown that this model, once created, is useful for providing students with expert feedback as they work within our ITS called Rashi. We present an algorithm that observes groups of students as they …


Privacy-Aware Collaboration Among Untrusted Resource Constrained Devices, Andres David Molina-Markham Feb 2013

Privacy-Aware Collaboration Among Untrusted Resource Constrained Devices, Andres David Molina-Markham

Open Access Dissertations

Individuals are increasingly encouraged to share private information with service providers. Privacy is relaxed to increase the utility of the data for the provider. This dissertation offers an alternative approach in which raw data stay with individuals and only coarse aggregates are sent to analysts. A challenge is the reliance on constrained devices for data collection. This dissertation demonstrates the practicality of this approach by designing and implementing privacy-aware systems that collect information using low-cost or ultra-low-power microcontrollers. Smart meters can generate certified readings suitable for use in a privacy-preserving system every 10 s using a Texas Instruments MSP430 microcontroller. …


Software Techniques To Reduce The Energy Consumption Of Low-Power Devices At The Limits Of Digital Abstractions, Mastooreh Salajegheh Feb 2013

Software Techniques To Reduce The Energy Consumption Of Low-Power Devices At The Limits Of Digital Abstractions, Mastooreh Salajegheh

Open Access Dissertations

My thesis explores the effectiveness of software techniques that bend digital abstractions in order to allow embedded systems to do more with less energy. Recent years have witnessed a proliferation of low-power embedded devices with power ranges of few milliwatts to microwatts. The capabilities and size of the embedded systems continue to improve dramatically; however, improvements in battery density and energy harvesting have failed to mimic a Moore's law. Thus, energy remains a formidable bottleneck for low-power embedded systems.

Instead of trying to create hardware with ideal energy proportionality, my dissertation evaluates how to use unconventional and probabilistic computing that …