Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Information Security (11)
- OS and Networks (10)
- Software Engineering (10)
- Engineering (8)
- Computer Engineering (7)
-
- Computer and Systems Architecture (6)
- Databases and Information Systems (6)
- Graphics and Human Computer Interfaces (5)
- Other Computer Sciences (5)
- Artificial Intelligence and Robotics (4)
- Electrical and Computer Engineering (3)
- Numerical Analysis and Scientific Computing (3)
- Power and Energy (3)
- Data Science (2)
- Digital Communications and Networking (2)
- Programming Languages and Compilers (2)
- Systems and Communications (2)
- Agricultural Science (1)
- Applied Mathematics (1)
- Arts and Humanities (1)
- Climate (1)
- Composition (1)
- Controls and Control Theory (1)
- Data Storage Systems (1)
- Dynamic Systems (1)
- Environmental Education (1)
- Environmental Health and Protection (1)
- Institution
-
- Dakota State University (7)
- California Polytechnic State University, San Luis Obispo (2)
- Dartmouth College (2)
- Michigan Technological University (2)
- University of Arkansas, Fayetteville (2)
-
- Western University (2)
- Air Force Institute of Technology (1)
- Bard College (1)
- Clemson University (1)
- Colby College (1)
- East Tennessee State University (1)
- Grand Valley State University (1)
- Louisiana State University (1)
- Mississippi State University (1)
- San Jose State University (1)
- University of Kentucky (1)
- University of Massachusetts Amherst (1)
- University of New Orleans (1)
- University of South Alabama (1)
- Keyword
-
- Blockchain (2)
- GPU (2)
- Performance (2)
- Privacy (2)
- RISC-V (2)
-
- Security (2)
- 3D Printer (1)
- API (1)
- Abusive Language (1)
- Activity inference (1)
- Artificial intelligence (1)
- Audio (1)
- BERT (1)
- Big Data (1)
- Boat (1)
- Community Detection (1)
- Comparison (1)
- Compilers (1)
- Computational Design (1)
- Computer Science (1)
- Computer architecture (1)
- Computer security (1)
- DSP (1)
- Data Parallelism (1)
- Data Synchronization (1)
- Distributed Systems (1)
- Distribution Grids (1)
- Edge computing (1)
- Edge intelligence (1)
- Electrical Grids (1)
- Publication
-
- Masters Theses & Doctoral Dissertations (7)
- Computer Science and Computer Engineering Undergraduate Honors Theses (2)
- Dissertations, Master's Theses and Master's Reports (2)
- Electronic Thesis and Dissertation Repository (2)
- Theses and Dissertations (2)
-
- <strong> Theses and Dissertations </strong> (1)
- All Dissertations (1)
- Computer Engineering (1)
- Culminating Experience Projects (1)
- Dartmouth College Ph.D Dissertations (1)
- Dartmouth College Undergraduate Theses (1)
- Doctoral Dissertations (1)
- Honors Theses (1)
- LSU Master's Theses (1)
- Master's Projects (1)
- Master's Theses (1)
- Senior Projects Spring 2022 (1)
- Theses and Dissertations--Computer Science (1)
- Undergraduate Honors Theses (1)
- University of New Orleans Theses and Dissertations (1)
Articles 1 - 30 of 30
Full-Text Articles in Systems Architecture
Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn
Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn
Culminating Experience Projects
This project applied software specification gathering, architecture, work planning, and development to a real-world development effort for a local business. This project began with a feasibility meeting with the owner of Zeal Aerial Fitness. After feasibility was assessed the intended users, needed functionality, and expected user restrictions were identified with the stakeholders. A hybrid software lifecycle was selected to allow a focus on base functionality up front followed by an iterative development of expectations of the stakeholders. I was able to create various specification diagrams that express the end projects goals to both developers and non-tech individuals using a standard …
Detecting Selfish Mining Attacks Against A Blockchain Using Machine Learing, Matthew A. Peterson
Detecting Selfish Mining Attacks Against A Blockchain Using Machine Learing, Matthew A. Peterson
<strong> Theses and Dissertations </strong>
Selfish mining is an attack against a blockchain where miners hide newly discovered blocks instead of publishing them to the rest of the network. Selfish mining has been a potential issue for blockchains since it was first discovered by Eyal and Sirer. It can be used by malicious miners to earn a disproportionate share of the mining rewards or in conjunction with other attacks to steal money from network users. Several of these attacks were launched in 2018, 2019, and 2020 with the attackers stealing as much as $18 Million. Developers made several different attempts to fix this issue, but …
Analyzing Microarchitectural Residue In Various Privilege Strata To Identify Computing Tasks, Tor J. Langehaug
Analyzing Microarchitectural Residue In Various Privilege Strata To Identify Computing Tasks, Tor J. Langehaug
Theses and Dissertations
Modern multi-tasking computer systems run numerous applications simultaneously. These applications must share hardware resources including the Central Processing Unit (CPU) and memory while maximizing each application’s performance. Tasks executing in this shared environment leave residue which should not reveal information. This dissertation applies machine learning and statistical analysis to evaluate task residue as footprints which can be correlated to identify tasks. The concept of privilege strata, drawn from an analogy with physical geology, organizes the investigation into the User, Operating System, and Hardware privilege strata. In the User Stratum, an adversary perspective is taken to build an interrogator program that …
Gpgpu Microbenchmarking For Irregular Application Optimization, Dalton R. Winans-Pruitt
Gpgpu Microbenchmarking For Irregular Application Optimization, Dalton R. Winans-Pruitt
Theses and Dissertations
Irregular applications, such as unstructured mesh operations, do not easily map onto the typical GPU programming paradigms endorsed by GPU manufacturers, which mostly focus on maximizing concurrency for latency hiding. In this work, we show how alternative techniques focused on latency amortization can be used to control overall latency while requiring less concurrency. We used a custom-built microbenchmarking framework to test several GPU kernels and show how the GPU behaves under relevant workloads. We demonstrate that coalescing is not required for efficacious performance; an uncoalesced access pattern can achieve high bandwidth - even over 80% of the theoretical global memory …
Holistic Performance Analysis And Optimization Of Unified Virtual Memory, Tyler Allen
Holistic Performance Analysis And Optimization Of Unified Virtual Memory, Tyler Allen
All Dissertations
The programming difficulty of creating GPU-accelerated high performance computing (HPC) codes has been greatly reduced by the advent of Unified Memory technologies that abstract the management of physical memory away from the developer. However, these systems incur substantial overhead that paradoxically grows for codes where these technologies are most useful. While these technologies are increasingly adopted for use in modern HPC frameworks and applications, the performance cost reduces the efficiency of these systems and turns away some developers from adoption entirely. These systems are naturally difficult to optimize due to the large number of interconnected hardware and software components that …
Parallel Algorithms For Scalable Graph Mining: Applications On Big Data And Machine Learning, Naw Safrin Sattar
Parallel Algorithms For Scalable Graph Mining: Applications On Big Data And Machine Learning, Naw Safrin Sattar
University of New Orleans Theses and Dissertations
Parallel computing plays a crucial role in processing large-scale graph data. Complex network analysis is an exciting area of research for many applications in different scientific domains e.g., sociology, biology, online media, recommendation systems and many more. Graph mining is an area of interest with diverse problems from different domains of our daily life. Due to the advancement of data and computing technologies, graph data is growing at an enormous rate, for example, the number of links in social networks is growing every millisecond. Machine/Deep learning plays a significant role for technological accomplishments to work with big data in modern …
Improving The Programmability Of Networked Energy Systems, Noman Bashir
Improving The Programmability Of Networked Energy Systems, Noman Bashir
Doctoral Dissertations
Global warming and climate change have underscored the need for designing sustainable energy systems. Sustainable energy systems, e.g., smart grids, green data centers, differ from the traditional systems in significant ways and present unique challenges to system designers and operators. First, intermittent renewable energy resources power these systems, which break the notion of infinite, reliable, and controllable power supply. Second, these systems come in varying sizes, spanning over large geographical regions. The control of these dispersed and diverse systems raises scalability challenges. Third, the performance modeling and fault detection in sustainable energy systems is still an active research area. Finally, …
Developing A Miniature Smart Boat For Marine Research, Michael Isaac Eirinberg
Developing A Miniature Smart Boat For Marine Research, Michael Isaac Eirinberg
Computer Engineering
This project examines the development of a smart boat which could serve as a possible marine research apparatus. The smart boat consists of a miniature vessel containing a low-cost microcontroller to live stream a camera feed, GPS telemetry, and compass data through its own WiFi access point. The smart boat also has the potential for autonomous navigation. My project captivated the interest of several members of California Polytechnic State University, San Luis Obispo’s (Cal Poly SLO) Marine Science Department faculty, who proposed a variety of fascinating and valuable smart boat applications.
Torsh: Obfuscating Consumer Internet-Of-Things Traffic With A Collaborative Smart-Home Router Network, Adam Vandenbussche
Torsh: Obfuscating Consumer Internet-Of-Things Traffic With A Collaborative Smart-Home Router Network, Adam Vandenbussche
Dartmouth College Undergraduate Theses
When consumers install Internet-connected "smart devices" in their homes, metadata arising from the communications between these devices and their cloud-based service providers enables adversaries privy to this traffic to profile users, even when adequate encryption is used. Internet service providers (ISPs) are one potential adversary privy to users’ incom- ing and outgoing Internet traffic and either currently use this insight to assemble and sell consumer advertising profiles or may in the future do so. With existing defenses against such profiling falling short of meeting user preferences and abilities, there is a need for a novel solution that empowers consumers to …
Out-Of-Core Gpu Path Tracing On Large Instanced Scenes Via Geometry Streaming, Jeremy Berchtold
Out-Of-Core Gpu Path Tracing On Large Instanced Scenes Via Geometry Streaming, Jeremy Berchtold
Master's Theses
We present a technique for out-of-core GPU path tracing of arbitrarily large scenes that is compatible with hardware-accelerated ray-tracing. Our technique improves upon previous works by subdividing the scene spatially into streamable chunks that are loaded using a priority system that maximizes ray throughput and minimizes GPU memory usage. This allows for arbitrarily large scaling of scene complexity. Our system required under 19 minutes to render a solid color version of Disney's Moana Island scene (39.3 million instances, 261.1 million unique quads, and 82.4 billion instanced quads at a resolution of 1024x429 and 1024spp on an RTX 5000 (24GB memory …
Information Provenance For Mobile Health Data, Taylor A. Hardin
Information Provenance For Mobile Health Data, Taylor A. Hardin
Dartmouth College Ph.D Dissertations
Mobile health (mHealth) apps and devices are increasingly popular for health research, clinical treatment and personal wellness, as they offer the ability to continuously monitor aspects of individuals' health as they go about their everyday activities. Many believe that combining the data produced by these mHealth apps and devices may give healthcare-related service providers and researchers a more holistic view of an individual's health, increase the quality of service, and reduce operating costs. For such mHealth data to be considered useful though, data consumers need to be assured that the authenticity and the integrity of the data has remained intact---especially …
Privacy Assessment Breakthrough: A Design Science Approach To Creating A Unified Methodology, Lisa Mckee
Privacy Assessment Breakthrough: A Design Science Approach To Creating A Unified Methodology, Lisa Mckee
Masters Theses & Doctoral Dissertations
Recent changes have increased the need for and awareness of privacy assessments. Organizations focus primarily on Privacy Impact Assessments (PIA) and Data Protection Impact Assessments (DPIA) but rarely take a comprehensive approach to assessments or integrate the results into a privacy risk program. There are numerous industry standards and regulations for privacy assessments, but the industry lacks a simple unified methodology with steps to perform privacy assessments. The objectives of this research project are to create a new privacy assessment methodology model using the design science methodology, update industry standards and present training for conducting privacy assessments that can be …
Two Project On Information Systems Capabilities And Organizational Performance, Giridhar Reddy Bojja
Two Project On Information Systems Capabilities And Organizational Performance, Giridhar Reddy Bojja
Masters Theses & Doctoral Dissertations
Information systems (IS), as a multi-disciplinary research area, emphasizes the complementary relationship between people, organizations, and technology and has evolved dramatically over the years. IS and the underlying Information Technology (IT) application and research play a crucial role in transforming the business world and research within the management domain. Consistent with this evolution and transformation, I develop a two-project dissertation on Information systems capabilities and organizational outcomes.
Project 1 examines the role of hospital operational effectiveness on the link between information systems capabilities and hospital performance. This project examines the cross-lagged effects on a sample of 217 hospitals measured over …
Comparative Study Of Snort 3 And Suricata Intrusion Detection Systems, Cole Hoover
Comparative Study Of Snort 3 And Suricata Intrusion Detection Systems, Cole Hoover
Computer Science and Computer Engineering Undergraduate Honors Theses
Network Intrusion Detection Systems (NIDS) are one layer of defense that can be used to protect a network from cyber-attacks. They monitor a network for any malicious activity and send alerts if suspicious traffic is detected. Two of the most common open-source NIDS are Snort and Suricata. Snort was first released in 1999 and became the industry standard. The one major drawback of Snort has been its single-threaded architecture. Because of this, Suricata was released in 2009 and uses a multithreaded architecture. Snort released Snort 3 last year with major improvements from earlier versions, including implementing a new multithreaded architecture …
Development Of Classroom Tools For A Risc-V Embedded System, Lucas Phillips
Development Of Classroom Tools For A Risc-V Embedded System, Lucas Phillips
Undergraduate Honors Theses
RISC-V is an open-source instruction set that has been gaining popularity in recent years, and, with support from large chip manufacturers like Intel and the benefits of its open-source nature, RISC-V devices are likely to continue gaining momentum. Many courses in a computer science program involve development on an embedded device. Usually, this device is of the ARM architecture, like a Raspberry Pi. With the increasing use of RISC-V, it may be beneficial to use a RISC-V embedded device in one of these classroom environments. This research intends to assist development on the SiFive HiFive1 RevB, which is a RISC-V …
Using A Bert-Based Ensemble Network For Abusive Language Detection, Noah Ballinger
Using A Bert-Based Ensemble Network For Abusive Language Detection, Noah Ballinger
Computer Science and Computer Engineering Undergraduate Honors Theses
Over the past two decades, online discussion has skyrocketed in scope and scale. However, so has the amount of toxicity and offensive posts on social media and other discussion sites. Despite this rise in prevalence, the ability to automatically moderate online discussion platforms has seen minimal development. Recently, though, as the capabilities of artificial intelligence (AI) continue to improve, the potential of AI-based detection of harmful internet content has become a real possibility. In the past couple years, there has been a surge in performance on tasks in the field of natural language processing, mainly due to the development of …
Rethinking The Design Of Online Professor Reputation Systems, Haley Tatum
Rethinking The Design Of Online Professor Reputation Systems, Haley Tatum
LSU Master's Theses
Online Professor Reputation (OPR) systems, such as RateMyProfessors.com (RMP), are frequently used by college students to post and access peer evaluations of their pro- fessors. However, recent evidence has shown that these platforms suffer from major bias problems. Failing to address bias in online professor ratings not only leads to negative expectations and experiences in class, but also poor performance on exams. To address these concerns, in this thesis, we study bias in OPR systems from a software design point of view. At the first phase of our analysis, we conduct a systematic literature review of 23 interdisciplinary studies on …
Multi-Device Data Analysis For Fault Localization In Electrical Distribution Grids, Jacob D L Hunte
Multi-Device Data Analysis For Fault Localization In Electrical Distribution Grids, Jacob D L Hunte
Electronic Thesis and Dissertation Repository
The work presented in this dissertation represents work which addresses some of the main challenges of fault localization methods in electrical distribution grids. The methods developed largely assume access to sophisticated data sources that may not be available and that any data sets recorded by devices are synchronized. These issues have created a barrier to the adoption of many solutions by industry. The goal of the research presented in this dissertation is to address these challenges through the development of three elements. These elements are a synchronization protocol, a fault localization technique, and a sensor placement algorithm.
The synchronization protocol …
A False Sense Of Security - Organizations Need A Paradigm Shift On Protecting Themselves Against Apts, Srinivasulu R. Vuggumudi
A False Sense Of Security - Organizations Need A Paradigm Shift On Protecting Themselves Against Apts, Srinivasulu R. Vuggumudi
Masters Theses & Doctoral Dissertations
Organizations Advanced persistent threats (APTs) are the most complex cyberattacks and are generally executed by cyber attackers linked to nation-states. The motivation behind APT attacks is political intelligence and cyber espionage. Despite all the awareness, technological advancements, and massive investment, the fight against APTs is a losing battle for organizations. An organization may implement a security strategy to prevent APTs. However, the benefits to the security posture might be negligible if the measurement of the strategy’s effectiveness is not part of the plan. A false sense of security exists when the focus is on implementing a security strategy but not …
Leaderboard Design Principles Influencing User Engagement In An Online Discussion, Brian S. Bovee
Leaderboard Design Principles Influencing User Engagement In An Online Discussion, Brian S. Bovee
Masters Theses & Doctoral Dissertations
Along with the popularity of gamification, there has been increased interest in using leaderboards to promote engagement with online learning systems. The existing literature suggests that when leaderboards are designed well they have the potential to improve learning, but qualitative investigations are required in order to reveal design principles that will improve engagement. In order to address this gap, this qualitative study aims to explore students' overall perceptions of popular leaderboard designs in a gamified, online discussion. Using two leaderboards reflecting performance in an online discussion, this study evaluated multiple leaderboard designs from student interviews and other data sources regarding …
Improving Adversarial Attacks Against Malconv, Justin Burr
Improving Adversarial Attacks Against Malconv, Justin Burr
Masters Theses & Doctoral Dissertations
This dissertation proposes several improvements to existing adversarial attacks against MalConv, a raw-byte malware classifier for Windows PE files. The included contributions greatly improve the success rates and performance of gradient-based file overlay attacks. All improvements are included in a new open-source attack utility called BitCamo.
Several new payload initialization strategies for use with gradient-based attacks are proposed and evaluated as potential replacements for the randomized initialization method used by current attacks. An algorithm for determining the optimal payload size is also proposed. The resulting improvements achieve a 100% evasion rate against eligible target executables using an average payload size …
Aligning Recovery Objectives With Organizational Capabilities, Jude C. Ejiobi
Aligning Recovery Objectives With Organizational Capabilities, Jude C. Ejiobi
Masters Theses & Doctoral Dissertations
To reduce or eliminate the impact of a cyber-attack on an organization, preparations to recover a failed system and/or data are usually made in anticipation of such an attack. To avoid a false sense of security, these preparations should, as closely as possible, reflect the organization’s capabilities, in order to inform future improvement and avoid unattainable goals. There is an absence of a strong basis for the selection of the metrics that are used to measure preparation. Informal and unreliable processes are widely used, and they often result in metrics that conflict with the organization’s capabilities and interests. The goal …
Defining Service Level Agreements In Serverless Computing, Mohamed Elsakhawy
Defining Service Level Agreements In Serverless Computing, Mohamed Elsakhawy
Electronic Thesis and Dissertation Repository
The emergence of serverless computing has brought significant advancements to the delivery of computing resources to cloud users. With the abstraction of infrastructure, ecosystem, and execution environments, users could focus on their code while relying on the cloud provider to manage the abstracted layers. In addition, desirable features such as autoscaling and high availability became a provider’s responsibility and can be adopted by the user's application at no extra overhead.
Despite such advancements, significant challenges must be overcome as applications transition from monolithic stand-alone deployments to the ephemeral and stateless microservice model of serverless computing. These challenges pertain to the …
A Metric For Machine Learning Vulnerability To Adversarial Examples, Matt Bradley
A Metric For Machine Learning Vulnerability To Adversarial Examples, Matt Bradley
Masters Theses & Doctoral Dissertations
Machine learning is used in myriad aspects, both in academic research and in everyday life, including safety-critical applications such as robust robotics, cybersecurity products, medial testing and diagnosis where a false positive or negative could have catastrophic results. Despite the increasing prevalence of machine learning applications and their role in critical systems we rely on daily, the security and robustness of machine learning models is still a relatively young field of research with many open questions, particularly on the defensive side of adversarial machine learning. Chief among these open questions is how best to quantify a model’s attack surface against …
Nft Sneaker Marketplace Design, Testing, And Challenges, Chris Zhu
Nft Sneaker Marketplace Design, Testing, And Challenges, Chris Zhu
Honors Theses
This paper introduces the preliminary background and implementation of the NFT sneaker marketplace. Specifically, we build sneaker NFTs on top of ERC-20 within the Ethereum network and use a top-to-bottom design mechanism. Our website performs well in its functionality, compatibility, and performance. We discuss possible future steps for security implementation. In particular, we recommend using a cold wallet for clients' transactions and implementing multi-signature contracts to avoid spoofing and repudiation. Introducing the sneaker NFT marketplace will vastly reduce the costs of transactions and delivery time in the physical sneaker marketplace. We hope investors in the physical asset space can find …
A New Way To Make Music: Processing Digital Audio In Virtual Reality, Gavin E. Payne
A New Way To Make Music: Processing Digital Audio In Virtual Reality, Gavin E. Payne
Senior Projects Spring 2022
The work of this project attempts to provide new methods of creating music with technology. The product, Fields, is a functional piece of virtual reality software, providing users an immersive and interactive set of tools used to build and design instruments in a modular manner. Each virtual tool is analogous to musical hardware such as guitar pedals, synthesizers, or samplers, and can be thought of as an effect or instrument on its own. Specific configurations of these virtual audio effects can then be played to produce music, and then even saved by the user to load up and play with …
Virtual Machine Introspection Tool Design Analysis, Justin Martin
Virtual Machine Introspection Tool Design Analysis, Justin Martin
Dissertations, Master's Theses and Master's Reports
Virtual machines are an integral part of today’s computing world. Their use is widespread and applicable in many different computing fields. With virtual machines, the ability to introspect and monitor is often overlooked or left unimplemented. Introspection is used to gather information about the state of virtual machines as they operate. Without introspection, verbose log data and state information is unavailable after unexpected errors or crashes occur. With introspection, this data can be analyzed further to determine the true cause of the unexpected crash or error. Therefore, introspection plays a critical role in portraying accurate historical information regarding the operating …
Poor Man’S Trace Cache: A Variable Delay Slot Architecture, Tino C. Moore
Poor Man’S Trace Cache: A Variable Delay Slot Architecture, Tino C. Moore
Dissertations, Master's Theses and Master's Reports
We introduce a novel fetch architecture called Poor Man’s Trace Cache (PMTC). PMTC constructs taken-path instruction traces via instruction replication in static code and inserts them after unconditional direct and select conditional direct control transfer instructions. These traces extend to the end of the cache line. Since available space for trace insertion may vary by the position of the control transfer instruction within the line, we refer to these fetch slots as variable delay slots. This approach ensures traces are fetched along with the control transfer instruction that initiated the trace. Branch, jump and return instruction semantics as well as …
Hard Real-Time Linux On A Raspberry Pi For 3d Printing, Alvin Nguyen
Hard Real-Time Linux On A Raspberry Pi For 3d Printing, Alvin Nguyen
Master's Projects
The project presents how a Raspberry Pi with hard real-time enabled Linux can control stepper motors to operate the kinematics of a 3D (three-dimensional) printer. The consistent performance of the Raspberry Pi with the PREEMPT-RT (real-time) patch can satisfy real hard-time requirements for 3D printing kinematics, without introducing dedicated microcontrollers. The Klipper 3D printer firmware enables one of the Raspberry Pi processors to act as the Klipper MCU, the primary controller for the hardware components. This project introduces a software implementation of the control logic for controlling the stepper motors, which utilizes the PCA9685 pwm driver and TB6612 motor drivers …
Smart Decision-Making Via Edge Intelligence For Smart Cities, Nathaniel Hudson
Smart Decision-Making Via Edge Intelligence For Smart Cities, Nathaniel Hudson
Theses and Dissertations--Computer Science
Smart cities are an ambitious vision for future urban environments. The ultimate aim of smart cities is to use modern technology to optimize city resources and operations while improving overall quality-of-life of its citizens. Realizing this ambitious vision will require embracing advancements in information communication technology, data analysis, and other technologies. Because smart cities naturally produce vast amounts of data, recent artificial intelligence (AI) techniques are of interest due to their ability to transform raw data into insightful knowledge to inform decisions (e.g., using live road traffic data to control traffic lights based on current traffic conditions). However, training and …