Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Physical Sciences and Mathematics

Generalized Techniques For Using System Execution Traces To Support Software Performance Analysis, Thelge Manjula Peiris Dec 2015

Generalized Techniques For Using System Execution Traces To Support Software Performance Analysis, Thelge Manjula Peiris

Open Access Dissertations

This dissertation proposes generalized techniques to support software performance analysis using system execution traces in the absence of software development artifacts such as source code. The proposed techniques do not require modifications to the source code, or to the software binaries, for the purpose of software analysis (non-intrusive). The proposed techniques are also not tightly coupled to the architecture specific details of the system being analyzed. This dissertation extends the current techniques of using system execution traces to evaluate software performance properties, such as response times, service times. The dissertation also proposes a novel technique to auto-construct a dataflow model …


Optimal "Big Data" Aggregation Systems - From Theory To Practical Application, William J. Culhane Iv May 2015

Optimal "Big Data" Aggregation Systems - From Theory To Practical Application, William J. Culhane Iv

Open Access Dissertations

The integration of computers into many facets of our lives has made the collection and storage of staggering amounts of data feasible. However, the data on its own is not so useful to us as the analysis and manipulation which allows manageable descriptive information to be extracted. New tools to extract this information from ever growing repositories of data are required.

Some of these analyses can take the form of a two phase problem which is easily distributed to take advantage of available computing power. The first phase involves computing some descriptive partial result from some subset of the original …


Overcoming Uncertainty For Within-Network Relational Machine Learning, Joseph J. Pfeiffer Apr 2015

Overcoming Uncertainty For Within-Network Relational Machine Learning, Joseph J. Pfeiffer

Open Access Dissertations

People increasingly communicate through email and social networks to maintain friendships and conduct business, as well as share online content such as pictures, videos and products. Relational machine learning (RML) utilizes a set of observed attributes and network structure to predict corresponding labels for items; for example, to predict individuals engaged in securities fraud, we can utilize phone calls and workplace information to make joint predictions over the individuals. However, in large scale and partially observed network domains, missing labels and edges can significantly impact standard relational machine learning methods by introducing bias into the learning and inference processes. In …


Architectural Techniques To Extend Multi-Core Performance Scaling, Hamza Bin Sohail Apr 2015

Architectural Techniques To Extend Multi-Core Performance Scaling, Hamza Bin Sohail

Open Access Dissertations

Multi-cores have successfully delivered performance improvements over the past decade; however, they now face problems on two fronts: power and off-chip memory bandwidth. Dennard's scaling is effectively coming to an end which has lead to a gradual increase in chip power dissipation. In addition, sustaining off-chip memory bandwidth has become harder due to the limited space for pins on the die and greater current needed to drive the increasing load . My thesis focuses on techniques to address the power and off-chip memory bandwidth challenges in order to avoid the premature end of the multi-core era. ^ In the first …


Stability Of Machine Learning Algorithms, Wei Sun Apr 2015

Stability Of Machine Learning Algorithms, Wei Sun

Open Access Dissertations

In the literature, the predictive accuracy is often the primary criterion for evaluating a learning algorithm. In this thesis, I will introduce novel concepts of stability into the machine learning community. A learning algorithm is said to be stable if it produces consistent predictions with respect to small perturbation of training samples. Stability is an important aspect of a learning procedure because unstable predictions can potentially reduce users' trust in the system and also harm the reproducibility of scientific conclusions. As a prototypical example, stability of the classification procedure will be discussed extensively. In particular, I will present two new …


Privacy-Preserving Social Network Analysis, Christine Marie Task Apr 2015

Privacy-Preserving Social Network Analysis, Christine Marie Task

Open Access Dissertations

Data privacy in social networks is a growing concern that threatens to limit access to important information contained in these data structures. Analysis of the graph structure of social networks can provide valuable information for revenue generation and social science research, but unfortunately, ensuring this analysis does not violate individual privacy is difficult. Simply removing obvious identifiers from graphs or even releasing only aggregate results of analysis may not provide sufficient protection. Differential privacy is an alternative privacy model, popular in data-mining over tabular data, that uses noise to obscure individuals' contributions to aggregate results and offers a strong mathematical …


Learning Compact Hashing Codes With Complex Objectives From Multiple Sources For Large Scale Similarity Search, Qifan Wang Apr 2015

Learning Compact Hashing Codes With Complex Objectives From Multiple Sources For Large Scale Similarity Search, Qifan Wang

Open Access Dissertations

Similarity search is a key problem in many real world applications including image and text retrieval, content reuse detection and collaborative filtering. The purpose of similarity search is to identify similar data examples given a query example. Due to the explosive growth of the Internet, a huge amount of data such as texts, images and videos has been generated, which indicates that efficient large scale similarity search becomes more important.^ Hashing methods have become popular for large scale similarity search due to their computational and memory efficiency. These hashing methods design compact binary codes to represent data examples so that …


Visibility Computation Through Image Generalization, Jian Cui Apr 2015

Visibility Computation Through Image Generalization, Jian Cui

Open Access Dissertations

This dissertation introduces the image generalization paradigm for computing visibility. The paradigm is based on the observation that an image is a powerful tool for computing visibility. An image can be rendered efficiently with the support of graphics hardware and each of the millions of pixels in the image reports a visible geometric primitive. However, the visibility solution computed by a conventional image is far from complete. A conventional image has a uniform sampling rate which can miss visible geometric primitives with a small screen footprint. A conventional image can only find geometric primitives to which there is direct line …


Parallel Symmetric Eigenvalue Problem Solvers, Alicia Marie Klinvex Apr 2015

Parallel Symmetric Eigenvalue Problem Solvers, Alicia Marie Klinvex

Open Access Dissertations

Sparse symmetric eigenvalue problems arise in many computational science and engineering applications: in structural mechanics, nanoelectronics, and spectral reordering, for example. Often, the large size of these problems requires the development of eigensolvers that scale well on parallel computing platforms. In this dissertation, we describe two such eigensolvers, TraceMin and TraceMin-Davidson. These methods are different from many other eigensolvers in that they do not require accurate linear solves to be performed at each iteration in order to find the smallest eigenvalues and their associated eigenvectors. After introducing these closely related eigensolvers, we discuss alternative methods for solving the saddle point …


On Several Problems Regarding The Application Of Opportunistic Proximate Links In Smartphone Networks, Wei Peng Apr 2015

On Several Problems Regarding The Application Of Opportunistic Proximate Links In Smartphone Networks, Wei Peng

Open Access Dissertations

A defining characteristic of smartphones is the availability of short-range radio transceivers (the proximate channel) such as Bluetooth, NFC, and Wi-Fi Direct, in addition to traditional long-range cellular telecommunication technologies (the cellular channel). Coupled with smartphones' portability and their human users' mobility, the proximate channel provides opportunistic proximate links as a supplement/alternative to the cellular channel's persistent infrastructural links for data communication.^ Opportunistic proximate links have a diverse set of applications, with each application scenario bringing a unique set of often conflicting objectives to balance. This dissertation presents a study on several problems regarding the application of opportunistic proximate links …


Dynamic Re-Optimization Techniques For Stream Processing Engines And Object Stores, Naresh Kumar Reddy Rapolu Apr 2015

Dynamic Re-Optimization Techniques For Stream Processing Engines And Object Stores, Naresh Kumar Reddy Rapolu

Open Access Dissertations

Large scale data storage and processing systems are strongly motivated by the need to store and analyze massive datasets. The complexity of a large class of these systems is rooted in their distributed nature, extreme scale, need for real-time response, and streaming nature. The use of these systems on multi-tenant, cloud environments with potential resource interference necessitates fine-grained monitoring and control. In this dissertation, we present efficient, dynamic techniques for re-optimizing stream-processing systems and transactional object-storage systems.^ In the context of stream-processing systems, we present VAYU, a per-topology controller. VAYU uses novel methods and protocols for dynamic, network-aware tuple-routing in …


Improving Capacity-Performance Tradeoffs In The Storage Tier, Eric P. Villasenor Apr 2015

Improving Capacity-Performance Tradeoffs In The Storage Tier, Eric P. Villasenor

Open Access Dissertations

Data-set sizes are growing. New techniques are emerging to organize and analyze these data-sets. There is a key access pattern emerging with these new techniques, large sequential file accesses. The trend toward bigger files exists to help amortize the cost of data accesses from the storage layer, as many workloads are recognized to be I/O bound. The storage layer is widely recognized as the slowest layer in the system. This work focuses on the tradeoff one can make with that storage capacity to improve system performance. ^ Capacity can be leveraged for improved availability or improved performance. This tradeoff is …


Assessment Of High-Fidelity Collision Models In The Direct Simulation Monte Carlo Method, Andrew Brian Weaver Apr 2015

Assessment Of High-Fidelity Collision Models In The Direct Simulation Monte Carlo Method, Andrew Brian Weaver

Open Access Dissertations

Advances in computer technology over the decades has allowed for more complex physics to be modeled in the DSMC method. Beginning with the first paper on DSMC in 1963, 30,000 collision events per hour were simulated using a simple hard sphere model. Today, more than 10 billion collision events can be simulated per hour for the same problem. Many new and more physically realistic collision models such as the Lennard-Jones potential and the forced harmonic oscillator model have been introduced into DSMC. However, the fact that computer resources are more readily available and higher-fidelity models have been developed does not …


Advanced Wireless Communications Using Large Numbers Of Transmit Antennas And Receive Nodes, Junil Choi Jan 2015

Advanced Wireless Communications Using Large Numbers Of Transmit Antennas And Receive Nodes, Junil Choi

Open Access Dissertations

The concept of deploying a large number of antennas at the base station, often called massive multiple-input multiple-output (MIMO), has drawn considerable interest because of its potential ability to revolutionize current wireless communication systems. Most literature on massive MIMO systems assumes time division duplexing (TDD), although frequency division duplexing (FDD) dominates current cellular systems. Due to the large number of transmit antennas at the base station, currently standardized approaches would require a large percentage of the precious downlink and uplink resources in FDD massive MIMO be used for training signal transmissions and channel state information (CSI) feedback. First, we propose …


Synthetic Steganography: Methods For Generating And Detecting Covert Channels In Generated Media, Philip Carson Ritchey Jan 2015

Synthetic Steganography: Methods For Generating And Detecting Covert Channels In Generated Media, Philip Carson Ritchey

Open Access Dissertations

Issues of privacy in communication are becoming increasingly important. For many people and businesses, the use of strong cryptographic protocols is sufficient to protect their communications. However, the overt use of strong cryptography may be prohibited or individual entities may be prohibited from communicating directly. In these cases, a secure alternative to the overt use of strong cryptography is required. One promising alternative is to hide the use of cryptography by transforming ciphertext into innocuous-seeming messages to be transmitted in the clear. ^ In this dissertation, we consider the problem of synthetic steganography: generating and detecting covert channels in generated …


Calculus For Decision Systems, Jorge Antonio Samayoa Ranero Jan 2015

Calculus For Decision Systems, Jorge Antonio Samayoa Ranero

Open Access Dissertations

The conceptualization of the term "system" has become highly dependent on the application domain. What a physicist means by the term system might be different than what a sociologist means by the same term. In 1956, Bertalanffy [1] defined a system as " a set of units with relationships among them". This and many other definitions of system share the idea of a system as a black box that has parts or elements interacting between each other. This means that at some level of abstraction all systems are similar, what eventually differentiates one system from another is the set of …