Recent Submissions

  • A multi-level code comprehension model for large scale software 

    Contributor:Vans, A. Marie;
    Date Submitted:1996
    For the past 20 years researchers have studied how programmers understand code they did not write. Most of this research has concentrated on small-scale code understanding. We consider it necessary to design studies that ...
  • A locality-aware scientific workflow engine for fast-evolving spatiotemporal sensor data 

    Contributor:Kachikaran Arulswamy, Johnson Charles;
    Date Submitted:2017
    Discerning knowledge from voluminous data involves a series of data manipulation steps. Scientists typically compose and execute workflows for these steps using scientific workflow management systems (SWfMSs). SWfMSs have ...
  • Detecting advanced botnets in enterprise networks 

    Contributor:Zhang, Han;
    Date Submitted:2017
    A botnet is a network composed of compromised computers that are controlled by a botmaster through command and control (C&C) channel. Botnets are more destructive compared to common virus and malware, because they control ...
  • Searching over encrypted data 

    Contributor:Moataz, Tarik;
    Date Submitted:2017
    Cloud services offer reduced costs, elasticity and a promised unlimited managed storage space that attract many end-users. File sharing, collaborative platforms, email platforms, back-up servers and file storage are some ...
  • Preservation of low latency service request processing in dockerized microservice architectures 

    Contributor:Sudalaikkan, Leo Vigneshwaran;
    Date Submitted:2016
    Organizations are increasingly transitioning from monolithic architectures to microservices based architectures. Software built as microservices can be broken into multiple components that are easily deployable and scalable ...
  • Horizontal scaling of video conferencing applications in virtualized environments 

    Contributor:Luo, Mante;
    Date Submitted:2016
    Video conferencing is one of the most widely used services in the world. However, it usually requires dedicated hardware and expensive licenses. Cloud computing has helped many companies achieve lower operation costs, and ...
  • Identification and characterization of super-spreaders from voluminous epidemiology data 

    Contributor:Shah, Harshil;
    Date Submitted:2016
    Planning for large-scale epidemiological outbreaks often involves executing compute-intensive disease spread simulations. To capture the probabilities of various outcomes, these simulations are executed several times over ...
  • Detection of linear algebra operations in polyhedral programs 

    Contributor:Iooss, Guillaume;
    Date Submitted:2016
    Writing a code which uses an architecture at its full capability has become an increasingly difficult problem over the last years. For some key operations, a dedicated accelerator or a finely tuned implementation exists ...
  • Towards a secure and efficient search over encrypted cloud data 

    Contributor:Strizhov, Mikhail;
    Date Submitted:2016
    Cloud computing enables new types of services where the computational and network resources are available online through the Internet. One of the most popular services of cloud computing is data outsourcing. For reasons ...
  • Error correcting Optical Mapping data 

    Contributor:Washimkar, Darshan;
    Date Submitted:2016
    Optical Mapping is a unique system that is capable of producing high-resolution, high-throughput genomic map data that gives information about the structure of a genome (Schwartz et al., Science 1993). Recently it has been ...
  • Towards automatic compilation for energy efficient iterative stencil computations 

    Contributor:Zou, Yun;
    Date Submitted:2016
    Today, energy has become a critical concern in all aspects of computing. In this thesis, we address the energy efficiency of an important class of programs called "Stencil Computations", which occur frequently in a wide ...
  • Quantifying the security risk of discovering and exploiting software vulnerabilities 

    Contributor:Mussa, Awad A. Younis;
    Date Submitted:2016
    Most of the attacks on computer systems and networks are enabled by vulnerabilities in a software. Assessing the security risk associated with those vulnerabilities is important. Risk mod- els such as the Common Vulnerability ...
  • Large-scale automated protein function prediction 

    Contributor:Kahanda, Indika;
    Date Submitted:2016
    Proteins are the workhorses of life, and identifying their functions is a very important biological problem. The function of a protein can be loosely defined as everything it performs or happens to it. The Gene Ontology ...
  • Quantitative economics of security : software vulnerabilities and data breaches 

    Contributor:Algarni, Abdullah Mahdi;
    Date Submitted:2016
    Security vulnerabilities can represent enormous risks to society and business organizations. A large percentage of vulnerabilities in software are discovered by individuals external to the developing organization. These ...
  • On approximating transitivity and tractability of graphs 

    Contributor:Manchanda, Saksham;
    Date Submitted:2016
    In the general case, in a simple, undirected graph, the problems of finding the largest clique, minimum colouring, maximum independent set and minimum vertex cover are NP-hard. But, there exists some families of graphs, ...
  • RIDMBC for object recognition using Convolutional Neural Networks 

    Contributor:Agnihotri, Nikhil;
    Date Submitted:2016
    Two trending techniques that are making advances in computer vision research are Convolutional Neural Networks and Visual Hashing. The goal of this paper is to analyze how these two interact in the broad domain of objects. ...
  • Exploring user-defined gestures for alternate interaction space for smartphones and smartwatches 

    Contributor:Arefin Shimon, Shaikh Shawon;
    Date Submitted:2016
    In smartphones and smartwatches, the input space is limited due to their small form factor. Although many studies have highlighted the possibility of expanding the interaction space for these devices, limited work has been ...
  • Tutorial on Minimum Output Sum of Squared Error filter 

    Contributor:Sidhu, Rumpal Kaur;
    Date Submitted:2016
    One of the major challenges in computer vision is visual tracking. Many different techniques have been developed for visual tracking over time. Visual tracking using correlation filters is faster than other techniques. A ...
  • Unsupervised binary code learning for approximate nearest neighbor search in large-scale datasets 

    Contributor:Zhang, Hao;
    Date Submitted:2016
    Nearest neighbor search is an important operation whose goal is to find items in the dataset that are similar to a given query. It has a number of applications such as content based image retrieval (CBIR), near duplicate ...
  • Hierarchical cluster guided labeling : efficient label collection for visual classification 

    Contributor:Wigness, Maggie;
    Date Submitted:2015
    Visual classification is a core component in many visually intelligent systems. For example, recognition of objects and terrains provides perception during path planning and navigation tasks performed by autonomous agents. ...

View more