Now showing items 39-56 of 56

  • [2011-08-31] Parallel network protocol stacks using replication 

    Sizemore, Charles Donour
    Computing applications demand good performance from networking systems. This includes high-bandwidth communication using protocols with sophisticated features such as ordering, reliability, and congestion control. Much of ...
  • [2014-02-14] A Pointillism Approach for Natural Language Processing of Social Media 

    Song, Piyou
    Natural language processing tasks typically start with the basic unit of words, and then from words and their meanings a big picture is constructed about what the meanings of documents or other larger constructs are in ...
  • [2012-02-01] Practical, scalable algorithms for Byzantine agreement 

    Oluwasanmi, Olumuyiwa
    With the growth of the Internet, there has been a push toward designing reliable algorithms that scale effectively in terms of latency, bandwidth and other computational resources. Scalability has been a serious problem ...
  • [2012-07-05] Privacy-preserving techniques for computer and network forensics 

    Shebaro, Bilal
    Clients, administrators, and law enforcement personnel have many privacy concerns when it comes to network forensics. Clients would like to use network services in a freedom-friendly environment that protects their privacy ...
  • [2010-06-28] A protocol reconfiguration and optimization system for MPI 

    Gorentla Venkata, Manjunath
    Modern high performance computing (HPC) applications, for example adaptive mesh refinement and multi-physics codes, have dynamic communication characteristics which result in poor performance on current Message Passing ...
  • [2014-07-12] Proxy-Based Acceleration for Combinatorial Optimization Problems 

    Yackley, Benjamin
    Combinatorial optimization problems occur in a wide range of domains, from Bayesian network structure search to questions in neuroscience and biochemistry. However, all of these problems have in common the need to optimize ...
  • [2014-09-19] Reconfigurable middleware architectures for large scale sensor networks 

    Brennan, Sean M.
    Wireless sensor networks, in an effort to be energy efficient, typically lack the high-level abstractions of advanced programming languages. Though strong, the dichotomy between these two paradigms can be overcome. ...
  • [2014-09-12] Reinforcement Learning and Planning for Preference Balancing Tasks 

    Faust, Aleksandra
    Robots are often highly non-linear dynamical systems with many degrees of freedom, making solving motion problems computationally challenging. One solution has been reinforcement learning (RL), which learns through ...
  • [2016-06-09] Resource-Efficient and Robust Distributed Computing 

    Movahedi Meimandi, Mahnush
    There has been a tremendous growth in the size of distributed systems in the past three decades. Today, distributed systems, such as the Internet, have become so large that they require highly scalable algorithms; algorithms ...
  • [2016-06-09] Scalable and Robust Distributed Algorithms for Privacy-Preserving Applications 

    Zamani, Mahdi
    We live in an era when political and commercial entities are increasingly engaging in sophisticated cyber attacks to damage, disrupt, or censor information content and to conduct mass surveillance. By compiling various ...
  • [2013-07-02] Scaling in the immune system 

    Banerjee, Soumya
    How different is the immune system in a human from that of a mouse? Do pathogens replicate at the same rate in different species? Answers to these questions have impact on human health since multi-host pathogens that jump ...
  • [2016-08-25] Scheduling Heterogeneous HPC Applications in Next-Generation Exascale Systems 

    Mondragon Martinez, Oscar Hernan
    Next generation HPC applications will increasingly time-share system resources with emerging workloads such as in-situ analytics, resilience tasks, runtime adaptation services and power management activities. HPC systems ...
  • [2010-09-09] Security in network games 

    Navin, Rustagi
    Attacks on the Internet are characterized by several alarming trends: 1) increases in frequency; 2) increases in speed; and 3) increases in severity. Modern computer worms simply propagate too quickly for human detection. ...
  • [2015-06-26] Selfishness and Malice in Distributed Systems 

    Saad, George
    Large-scale distributed systems are increasingly prevalent. Two issues can impact the performance of such systems: selfishness and malice. Selfish players can reduce social welfare of games, and malicious nodes can disrupt ...
  • [2016-02-01] Stella: A Python-based Domain-Specific Language for Simulations 

    Mohr, David
    Stella is a domain-specific language that (1) has single thread performance competitive with low-level languages, (2) supports object-oriented programming (OOP) to properly structure the code, and (3) is very easy to ...
  • [2010-02-09] Term rewriting with built-in numbers and collection data structures 

    Falke, Stephan
    Term rewrite systems have been extensively used in order to model computer programs for the purpose of formal verification. This is in particular true if the termination behavior of computer programs is investigated, and ...
  • [2011-02-09] Three algorithms for causal learning 

    Rammohan, Roshan Ram
    The field of causal learning has grown in the past decade, establishing itself as a major focus in artificial intelligence research. Traditionally, approaches to causal learning are split into two areas. One area involves ...
  • [2016-06-09] Using Rollback Avoidance to Mitigate Failures in Next-Generation Extreme-Scale Systems 

    Levy, Scott
    High-performance computing (HPC) systems enable scientists to numerically model complex phenomena in many important physical systems. The next major milestone in the development of HPC systems is the construction of the ...