Research from 2024
Optimization of a Quantum Subset Sum Oracle
Angelo G. Benoit, Sam Schwartz, and Ron K. Cytron
Technical Report
We investigate the implementation of an oracle for the Subset Sum problem for quantum search using Grover’s algorithm. Our work concerns reducing the number of qubits, gates, and multi-controlled gates required by the oracle.
We describe the compilation of a Subset Sum instance into a quantum oracle, using a Python library we developed for Qiskit and have published in GitHub. We then present techniques to conserve qubits and gates along with experiments showing their effectiveness on random instances of Subset Sum. These techniques include moving from fixed to varying-width arithmetic,... Read More
Improving and Modeling Heterogeneous Streaming Computation, Clayton Faber
A Distributed and Hybrid AI-Based Security Framework for 5G Real-time Applications, Ali Ghubaish
Robustness of Trajectory Prediction Neural Network Models, Guocheng He
Robust quantitative photoacoustic imaging for colorectal cancer treatment monitoring, Sitai Kou
Theses/Dissertations from 2023
Decentralized Computing for Reliable Home Automation, Rahav Dor
Targeted Adversarial Attacks against Neural Network Trajectory Predictors, Kaiyuan Tan
Adversarial Patch Attacks on Deep Reinforcement Learning Algorithms, Peizhen Tong
Real-time Analysis of Aerosol Size Distributions with the Fast Integrated Mobility Spectrometer (FIMS), Daisy Wang
Mirror Position Detection in a Catoptric Surface, Run Zhang
Theses/Dissertations from 2022
Applying HLS to FPGA Data Preprocessing in the Advanced Particle-astrophysics Telescope, Meagan Konst
Model-based Deep Learning for Computational Imaging, Xiaojian Xu
Theses/Dissertations from 2021
Machine Learning for Analog/Mixed-Signal Integrated Circuit Design Automation, Weidong Cao
Data from Virtualized Hardware Logic Computations
Michael J. Hall, Roger Chamberlain, and Neil E. Olsen
Other
A Collaborative Knowledge-Based Security Risk Assessments Solution using Blockchains, Tara Thaer Salman
Adversarial Attack and Defense on Image Classification under Physical Constraints
Tong Wu
MS Project Report
Recent work has demonstrated how adversarial attacks on neural network can cause misclassifications of given objects in physical worlds. However, despite the large amount works, there have been limited researches focusing on the security of the whole computer vision pipeline. In addition, effective defending methods against such attacks remained unexplored, raising safety and reliability concerns for deployment of machine learning applications.
In this project, we argue the recent works of directly applying perturbations to the camera lens are obvious if any testing is done on the network to check its... Read More
Effective Machine Learning Methods for Accurate Medical Image Segmentation, Zhuangzhuang Zhang
Theses/Dissertations from 2020
Domain Specific Computing in Tightly-Coupled Heterogeneous Systems, Anthony Michael Cabrera
Investigating Single Precision Floating General Matrix Multiply in Heterogeneous Hardware, Steven Harris
Elicitation and aggregation of data in knowledge intensive crowdsourcing
Dohoon Kim
MS Project Report
With the significant advance of internet and connectivity, crowdsourcing gained more popularity and various crowdsourcing platforms emerged. This project focuses on knowledge-intensive crowdsourcing, in which agents are presented with the tasks that require certain knowledge in domain. Knowledge-intensive crowdsourcing requires agents to have experiences on the specific domain. With the constraint of resources and its trait as sourcing from crowd, platform is likely to draw agents with different levels of expertise and knowledge and asking same task can result in bad performance. Some agents can give better information when they... Read More
A Virtual 4D CT Scanner
Xiwen Li
MS Project Report
4D CT scan is widely used in medical imaging. Images are acquired through phases. In this case, we can track the motion of organs such as heart. However, it also introduces motion artifacts. A lot of research focuses on remove these artifacts. It is difficult to acquire artifact data by a real CT scanner. In this project, we implement a virtual CT machine to simulate the real 4D CT scan. we also conduct experi- ments to check its clinical reality with respect to respiratory and heart motion parameters.
... Read MoreCentrality of Blockchain
Zixuan Li
MS Project Report
Decentralization is widely recognized as the property and one of most important advantage of blockchain over legacy systems. However, decentralization is often discussed on the consensus layer and recent research shows the trend of centralization on several subsystem of blockchain. In this project, we measured centralization of Bitcoin and Ethereum on source code, development eco-system, and network node levels. We found that the programming language of project is highly centralized, code clone is very common inside Bitcoin and Ethereum community, and developer contribution distribution is highly centralized. We further discuss... Read More
The Effects of Mixed-Initiative Visualization Systems on Exploratory Data Analysis
Alvitta Ottley and Adam Kern
Technical Report
The primary purpose of information visualization is to act as a window between a user and the data. Historically, this has been accomplished via a single-agent framework: the only decision-maker in the relationship between visualization system and analyst is the analyst herself. Yet this framework arose not from first principles, but a necessity. Before this decade, computers were limited in their decision-making capabilities, especially in the face of large, complex datasets and visualization systems. This paper aims to present the design and evaluation of a mixed-initiative system that aids the... Read More
Solving disappearance at GASTech with visual analytic techniques
Saulet Yskak
MS Project Report
We are living in a society, where images and charts speak louder than words. Therefore, information visualization plays a major role in solving complex problems since it provides a visual summary of data that makes it easier to identify trends and patterns.
In this master project, I propose a web – based visual analytics tool that enables to analyze complex email and time based / event series data. The visual analytics framework uses test data from IEEE VAST Challenge 2014: Mini challenge 1 that concentrated on the disappearance of employees... Read More
Investigating Patterns in Convolution Neural Network Parameters Using Probabilistic Support Vector Machines, Yuqiu Zhang
Theses/Dissertations from 2019
Decoupling Information and Connectivity via Information-Centric Transport, Hila Ben Abraham
A System for TA Checkouts
Benjamin Choi
MS Project Report
Currently, TA checkout procedures for courses like CSE 131 and 247 are handled in 1 of 2 ways: by filling out a form on the student’s browser or by filling out a Google Form. Both are bottlenecks in the checkout procedure, which the system aims to solve by allowing TAs to quickly checkout students with the help of mobile phones. For each assignment and student, a unique QR code will be used so TAs can quickly verify the identity of the student and correctly check them out for the desired... Read More
Static Taint Analysis of Binary Executables Using Architecture-Neutral Intermediate Representation
Elaine Cole
MS Project Report
Ghidra, National Security Agency’s powerful reverse engineering framework, was recently released open-source in April 2019 and is capable of lifting instructions from a wide variety of processor architectures into its own register transfer language called p-code. In this project, we present a new tool which leverages Ghidra’s specific architecture-neutral intermediate representation to construct a control flow graph modeling all program executions of a given binary and apply static taint analysis. This technique is capable of identifying the information flow of malicious input from untrusted sources that may interact with key... Read More
Management And Security Of Multi-Cloud Applications, Lav Gupta
A Survey on the Role of Individual Differences on Visual Analytics Interactions: Masters Project Report
Jesse Huang and Alvitta Ottley
MS Project Report
There is ample evidence in the visualization commu- nity that individual differences matter. These prior works high- light various traits and cognitive abilities that can modulate the use of the visualization systems and demonstrate a measurable influence on speed, accuracy, process, and attention. Perhaps the most important implication of this body of work is that we can use individual differences as a mechanism for estimating people’s potential to effectively leverage visual interfaces or to identify those people who may struggle. As visual literacy and data fluency continue to become essential... Read More
Toward Controllable and Robust Surface Reconstruction from Spatial Curves, Zhiyang Huang
Polarization Division Multiplexing for Optical Data Communications, Darko Ivanovich
Pipelined Parallelism in a Work-Stealing Scheduler
Thomas Kelly
MS Project Report
A pipeline is a particular type of parallel program structure, often used to represent loops with cross-iteration dependencies. Pipelines cannot be expressed with the typical parallel language constructs offered by most environments. Therefore, in order to run pipelines, it is necessary to write a parallel language and scheduler with specialized support for them. Some such schedulers are written exclusively for pipelines and unable to run any other type of program, which allows for certain optimizations that take advantage of the pipeline structure. Other schedulers implement support for pipelines on top... Read More
Feature Extraction form CT Scan of Plant Root
Chunyuan Li
MS Project Report
Roots are vital for plant by absorbing water and nutrients and providing anchorage from beneath the soil. These roles are closely related to the roots’ architecture, which describes the geometry of individual roots and their branching structure. We proposed a pipeline to efficiently annotate root architecture. My contribution focus on building an interactive tool to visual and annotate root architecture. Besides, we come up with heuristics to automate the annotation process.
... Read MorePoint Cloud Processing with Neural Networks
Stephanie Miller and Jiahao Li
MS Project Report
In this project, we explore new techniques and architectures for applying deep neural networks when the input is point cloud data. We first consider applying convolutions on regular pixel and voxel grids, using polynomials of point coordinates and Fourier transforms to get a rich feature representation for all points mapped to the same pixel or voxel. We also apply these ideas to generalize the recently proposed "interpolated convolution", by learning continuous-space kernels as a combination of polynomial and Fourier basis kernels. Experiments on the ModelNet40 dataset demonstrate that our methods... Read More
Challenges in Integrating IoT in Smart Home
Leiquan Pan and Chenyang Lu
MS Project Report
Wireless devices have become a major part in Smart Home industry. Almost every smart home company has its own wireless solutions and cloud services. Normally, customers can only monitor and control smart devices through applications or platforms companies provided. It causes inconveniences and problems when we have lots of smart devices. In my master project, I did two projects to implement smart home IoT applications. From a single functionality IoT application to a more complicated smart home system, there are lots of challenges and problems appeared. This article will mainly... Read More
Real-Time Reliable Middleware for Industrial Internet-of-Things, Chao Wang
Smart Home Audio Assistant
Xipeng Wang
MS Project Report
This report introduces an audio processing algorithm. It provides a way to access smart devices using audio. Although there are many audio assistants already on the market, most of them will not be able to control the smart devices. Therefore, this new system presented in this report will provide a way to analysis the customer’s questions. Then the algorithm will be able to query smart device information, modify the schedule or provide the reason for some arrangement.
... Read MoreComputational Geometry Teaching Tool
Yujie Zhou and Tao Ju
MS Project Report
When students are taking Computational Geometry course which covers many geometry algorithms, most of them are difficult to follow because these algorithms are very abstract even if authors draw pictures to illustrate. In order to help students to get a better understanding of these algorithms, we decide to design Computational Geometry Teaching Tool. This tool is a web application that covers 8 geometry algorithms : Graham Scan, Quick Hull, Line Segment Intersection, Dual, Line Arrangement, Voronoi Diagram, Incremental Delaunay Triangulation and Kd Tree. First, this tool is developed by using... Read More
Theses/Dissertations from 2018
Nanopower Analog Frontends for Cyber-Physical Systems, Kenji Aono
Development of Scalable Simulator for Spiking Neural Network, Jae Sang Ha
Modeling and Analyzing Neural Dynamics and Information Processing over Multiple Time Scales, Sensen Liu
Self-powered Time-Keeping and Time-of-Occurrence Sensing, Liang Zhou
Security Services Using Blockchains: A State of the Art Survey
Maeda Zolanvari, Aiman Erbad, Raj Jain, and Mohammed Samaka
Journal Article
This article surveys blockchain-based approaches for several security services. These services include authentication, confidentiality, privacy and access control list (ACL), data and resource provenance, and integrity assurance. All these services are critical for the current distributed applications, especially due to the large amount of data being processed over the networks and the use of cloud computing. Authentication ensures that the user is who he/she claims to be. Confidentiality guarantees that data cannot be read by unauthorized users. Privacy provides the users the ability to control who can access their data.... Read More
Research from 2017
Decoupling Information and Connectivity in Information-Centric Networking
Hila Ben Abraham, Jyoti Parwatikar, John Dehart, Adam Drescher, and Patrick Crowley
Technical Report
This paper introduces and demonstrates the concept of Information-Centric Transport as a mechanism for cleanly decoupling the information plane from the connectivity plane in Information-Centric Networking (ICN) architectures, such as NDN and CICN. These are coupled in today's incarnations of NDN and CICN through the use of forwarding strategy, which is the architectural component for deciding how to forward packets in the presence of either multiple next-hop options or dynamic feedback. As presently designed, forwarding strategy is not sustainable: application developers can only confidently specify strategy if they understand connectivity... Read More
Efficiently and Transparently Maintaining High SIMD Occupancy in the Presence of Wavefront Irregularity, Stephen V. Cole
Efficient Geometric Approaches for Mining Protein Structure from Cryo-EM Density Maps, Hang Dou
Bio-Inspired Multi-Spectral and Polarization Imaging Sensors for Image-Guided Surgery, Nimrod Missael Garcia
Parallel Real-Time Scheduling for Latency-Critical Applications, Jing Li
Underwater Celestial Navigation Using the Polarization of Light Fields, Samuel Bear Powell
Pricing and Bidding Strategies for Cloud Computing Spot Instances
Jiayi Song and Roch A. Guérin
Conference Paper
We consider a cloud service based on spot instances and explore bidding and pricing strategies aimed at optimizing users' utility and provider's revenue, respectively. Our focus is on jobs that are heterogeneous in both valuation and sensitivity to execution delay. Of particular interest is the impact of correlation in these two dimensions. We characterize optimal bidding and pricing strategies under some simplifying assumptions, and more importantly highlight the impact of correlation in determining the benefits of a spot service over an on-demand service. We also provide a preliminary assessment of... Read More
Easier Parallel Programming with Provably-Efficient Runtime Schedulers, Robert Utterback
Research from 2016
In-Network Retransmissions in Named Data Networking
Hila Ben Abraham and Patrick Crowley
Technical Report
The strategy layer is an important architectural component in both Content-Centric Networking (CCN) and Named Data Networking (NDN). This component introduces a new forwarding model that allows an application to configure its namespace with a forwarding strategy. A core mechanism in every forwarding strategy is the decision of whether to retransmit an unsatisfied Interest or to wait for an application retransmission. While some applications request control of all retransmissions, others rely on the assumption that the strategy will retransmit an Interest when it is not satisfied. Although an application can... Read More
MERCATOR (Mapping EnumeRATOR for CUDA) User's Manual
Stephen V. Cole and Jeremy Buhler
Technical Report
Welcome to the MERCATOR user's manual! MERCATOR is a CUDA/C++ system designed to assist you in writing efficient CUDA applications by automatically generating significant portions of the GPU-side application code. We hope you find it helpful; please feel free to contact the authors with any questions or feedback.
Learning in the Real World: Constraints on Cost, Space, and Privacy, Matt J. Kusner
Multipath and Rate Stability
Junjie Liu and Roch A. Guérin
Conference Paper
Originally Published In Proc. IEEE Globecom Conference - CQRM: Communication QoS, Reliability & Modeling Symposium
Locality-Aware Dynamic Task Graph Scheduling
Jordyn Maglalang, Sriram Krishnamoorthy, and Kunal Agrawal
Conference Paper
Dynamic task graph schedulers automatically balance work across processor cores by scheduling tasks among available threads while preserving dependences. In this paper, we design NabbitC, a provably efficient dynamic task graph scheduler that accounts for data locality on NUMA systems. NabbitC allows users to assign a color to each task representing the location (e.g., a processor core) that has the most efficient access to data needed during that node’s execution. NabbitC then automatically adjusts the scheduling so as to preferentially execute each node at the location that matches its color—leading... Read More
Grafalgo - A Library of Graph Algorithms and Supporting Data Structures (revised)
Jonathan Turner
Technical Report
This report provides an (updated) overview of Grafalgo, an open-source library of graph algorithms and the data structures used to implement them. The programs in this library were originally written to support a graduate class in advanced data structures and algorithms at Washington University. Because the code's primary purpose was pedagogical, it was written to be as straightforward as possible, while still being highly efficient. Grafalgo is implemented in C++ and incorporates some features of C++11. The library is available on an open-source basis and may be downloaded from https://code.google.com/p/grafalgo/.... Read More
Research from 2015
WOODSTOCC: Extracting Latent Parallelism from a DNA Sequence Aligner on a GPU
Stephen V. Cole, Jacob R. Gardner, and Jeremy D. Buhler
Technical Report
An exponential increase in the speed of DNA sequencing over the past decade has driven demand for fast, space-efficient algorithms to process the resultant data. The first step in processing is alignment of many short DNA sequences, or reads, against a large reference sequence. This work presents WOODSTOCC, an implementation of short-read alignment designed for Graphics Processing Unit (GPU) architectures. WOODSTOCC translates a novel CPU implementation of gapped short-read alignment, which has guaranteed optimal and complete results, to the GPU. Our implementation combines an irregular trie search with dynamic programming... Read More
Faster Maximium Priority Matchings in Bipartite Graphs
Jonathan Turner
Technical Report
A maximum priority matching is a matching in an undirected graph that maximizes a priority score defined with respect to given vertex priorities. An earlier paper showed how to find maximum priority matchings in unweighted graphs. This paper describes an algorithm for bipartite graphs that is faster when the number of distinct priority classes is limited. For graphs with k distinct priority classes it runs in O(kmn1/2) time, where n is the number of vertices in the graph and m is the number of edges.
... Read MoreGrafalgo - A Library of Graph Algorithms and Supporting Data Structures
Jonathan Turner
Technical Report
This report provides an overview of Grafalgo, an open-source library of graph algorithms and the data structures used to implement them. The programs in this library were originally written to support a graduate class in advanced data structures and algorithms at Washington University. Because the code's primary purpose was pedagogical, it was written to be as straightforward as possible, while still being highly efficient. Grafalgo is implemented in C++ and incorporates some features of C++11. The library is available on an open-source basis and may be downloaded from https://code.google.com/p/grafalgo/. Source... Read More
Maximum Priority Matchings
Jonathan Turner
Technical Report
Let G=(V,E) be an undirected graph with n vertices and m edges, in which each vertex u is assigned an integer priority in [1,n], with 1 being the ``highest'' priority. Let M be a matching of G. We define the priority score of M to be an n-ary integer in which the i-th most-significant digit is the number of vertices with priority i that are incident to an edge in M. We describe a variation of the augmenting path method (Edmonds' algorithm) that finds a matching with maximum priority score... Read More
The Bounded Edge Coloring Problem and Offline Crossbar Scheduling
Jonathan Turner
Technical Report
This paper introduces a variant of the classical edge coloring problem in graphs that can be applied to an offline scheduling problem for crossbar switches. We show that the problem is NP-complete, develop three lower bounds bounds on the optimal solution value and evaluate the performance of several approximation algorithms, both analytically and experimentally. We show how to approximate an optimal solution with a worst-case performance ratio of 3/2 and our experimental results demonstrate that the best algorithms produce results that very closely track a lower bound.
... Read MoreThe Edge Group Coloring Problem with Applications to Multicast Switching
Jonathan Turner
Technical Report
This paper introduces a natural generalization of the classical edge coloring problem in graphs that provides a useful abstraction for two well-known problems in multicast switching. We show that the problem is NP-hard and evaluate the performance of several approximation algorithms, both analytically and experimentally. We find that for random χ-colorable graphs, the number of colors used by the best algorithms falls within a small constant factor of χ, where the constant factor is mainly a function of the ratio of the number of outputs to inputs. When this ratio... Read More
Maximizing Network Lifetime of Wireless Sensor-Actuator Networks under Graph Routing
Chengjie Wu, Dolvara Gunatilaka, Abusayeed Saifullah, Mo Sha, Paras Tiwari, Chenyang Lu, and Yixin Chen
Technical Report
Process industries are adopting wireless sensor-actuator networks (WSANs) as the communication infrastructure. The dynamics of industrial environments and stringent reliability requirements necessitate high degrees of fault tolerance in routing. WirelessHART is an open industrial standard for WSANs that have seen world-wide deployments. WirelessHART employs graph routing schemes to achieve network reliability through multiple paths. Since many industrial devices operate on batteries in harsh environments where changing batteries are prohibitively labor-intensive, WSANs need to achieve long network lifetime. To meet industrial demand for long-term reliable communication, this paper studies the problem... Read More
Conflict-Aware Real-Time Routing for Industrial Wireless Sensor-Actuator Networks
Chengjie Wu, Dolvara Gunatilaka, Mo Sha, and Chenyang Lu
Technical Report
Process industries are adopting wireless sensor-actuator networks (WSANs) as the communication infrastructure. WirelessHART is an open industrial standard for WSANs that have seen world-wide deployments. Real-time scheduling and delay analysis have been studied for WSAN extensively. End-to-end delay in WSANs highly depends on routing, which is still open problem. This paper presents the first real-time routing design for WSAN. We first discuss end-to-end delays of WSANs, then present our real-time routing design. We have implemented and experimented our routing designs on a wireless testbed of 69 nodes. Both experimental results... Read More
Research from 2014
Exploring User-Provided Connectivity
Mohammad H. Afrasiabi and Roch Guerin
Technical Report
Network services often exhibit positive and negative externalities that affect users' adoption decisions. One such service is "user-provided connectivity" or UPC. The service offers an alternative to traditional infrastructure-based communication services by allowing users to share their "home base" connectivity with other users, thereby increasing their access to connectivity. More users mean more connectivity alternatives, i.e., a positive externality, but also greater odds of having to share one's own connectivity, i.e., a negative externality. The tug of war between positive and negative externalities together with the fact that they often... Read More
Data Transport System
Rahav Dor
MS Project Report
To facilitate the WU Smart Home research [21] we built a system that collects data from sensors and uploads the data to the cloud. The system supports data collection from multiple locations (typically apartments) that are independent from each other, endowing the system with two benefit: distributed data collection and alleviating privacy concerns. Each location is managed by a local micro-server (μServer) that is responsible for receiving data packets from sensors and managing their transient storage. Periodically the μServer triggers a data transport process that moves the data to a... Read More
CloudPowerCap: Integrating Power Budget and Resource Management across a Virtualized Server Cluster
Yong Fu, Anne Holler, and Chenyang Lu
Technical Report
In many datacenters, server racks are highly underutilized. Rack slots are left empty to keep the sum of the server nameplate maximum power below the power provisioned to the rack. And the servers that are placed in the rack cannot make full use of available rack power. The root cause of this rack underutilization is that the server nameplate power is often much higher than can be reached in practice. To address rack underutilization, server vendors are shipping support for per-host power caps, which provide a server-enforced limit on the... Read More
Performance Modeling of Virtualized Custom Logic Computations
Michael J. Hall and Roger D. Chamberlain
Technical Report
Virtualization of custom logic computations (i.e., by sharing a fixed function across distinct data streams) provides a means of reusing hardware resources, particularly when resources are limited. This is common practice in traditional processors where more than one user can share processor resources. In this paper, we virtualize a custom logic block using C-slow techniques to support fine-grain context-switching. We then develop and present an analytic model for several performance measures (throughput, latency, input queue occupancy) for both fine-grained and coarse-grained context switching (to a secondary memory). Next, we calibrate... Read More
Global EDF Scheduling for Parallel Real-Time Tasks, Jing Li
Federated Scheduling for Stochastic Parallel Real-time Tasks
Jing Li, Kunal Agrawal, Christopher Gill, and Chenyang Lu
Technical Report
Federated scheduling is a strategy to schedule parallel real-time tasks: It allocates a dedicated cluster of cores to high-utilization task (utilization >1); It uses a multiprocessor scheduling algorithm to schedule and execute all low-utilization tasks sequentially, on a shared cluster of the remaining cores. Prior work has shown that federated scheduling has the best known capacity augmentation bound of 2 for parallel tasks with implicit deadlines. In this paper, we explore the soft real-time performance of federated scheduling and address the average-case workloads instead of the worst-case values. In particular,... Read More
Capacity Augmentation Bound of Federated Scheduling for Parallel DAG Tasks
Jing Li, Abusayeed Saifullah, Kunal Agrawal, and Christopher Gill
Technical Report
We present a novel federated scheduling approach for parallel real-time tasks under a general directed acyclic graph (DAG) model. We provide a capacity augmentation bound of 2 for hard real-time scheduling; here we use the worst-case execution time and critical-path length of tasks to determine schedulability. This is the best known capacity augmentation bound for parallel tasks. By constructing example task sets, we further show that the lower bound on capacity augmentation of federated scheduling is also 2 for any m > 2. Hence, the gap is closed and bound... Read More
Streaming Computations with Precise Control
Peng Li, Kunal Agrawal, Jeremy Buhler, and Roger Chamberlain
Technical Report
Migrating to IPv6 - The Role of Basic Coordination
Mehdi Nikkhah and Roch Guerin
Conference Paper
The need for a larger Internet address space was acknowledged early on, and a solution (IPv6) standardized years ago. Its adoption has, however, been anything but easy and still faces significant challenges. The situation begs the questions of "why has it been so difficult?" and "what could have been (or still be) done to facilitate this migration?" There has been significant recent interest in those questions, and the paper builds on a line of work based on technology adoption models to explore them. The results confirm the impact of several... Read More
Software Defined Application Delivery Networking, Subharthi Paul
Real-Time Wireless Sensor-Actuator Networks for Cyber-Physical Systems, Abusayeed Saifullah
Inferring Memory Map Instructions
Paul T. Scheid, Ari J. Spilo, and Ron K. Cytron
MS Project Report
We describe the problem of inferring a set of memory map instructions from a reference trace, with the goal of minimizing the number of such instructions as well as the number of unreferenced but mapped storage locations. We prove the related decision problem NP-complete. We then present and compare the results of two heuristic approaches on some actual traces.
... Read MoreWireless Sensor Networking in Challenging Environments, Mo Sha
On the Analysis of DNA Methylation, Michael Stevens
Real-Time Virtualization and Cloud Computing, Sisu Xi
RT-OpenStack: a Real-Time Cloud Management System
Sisu Xi, Chong Li, Chenyang Lu, Christopher D. Gill, Meng Xu, Linh T.X. Phan, Insup Lee, and Oleg Sokolsky
Technical Report
Clouds have become appealing platforms for running not only general-purpose applications but also real-time applications. However, current clouds cannot provide real-time performance for virtual machines (VM) for two reasons: (1) the lack of a real-time virtual machine monitor (VMM) scheduler on a single host, and (2) the lack of a real-time aware VM placement scheme by the cloud manager. While real-time VM schedulers do exist, prior solutions employ either heuristics-based approaches that cannot always achieve predictable latency or apply real-time scheduling theory that may result in low CPU utilization. We... Read More
Supervised Machine Learning Under Test-Time Resource Constraints: A Trade-off Between Accuracy and Cost, Zhixiang Xu
Research from 2013
Simple Analytic Performance Models for Streaming Data Applications Deployed on Diverse Architectures
Jonathan C. Beard, Roger D. Chamberlain, and Mark A. Franklin
Technical Report
Modern hardware is inherently heterogeneous. With heterogeneity comes multiple abstraction layers that hide underlying complex systems. While hidden, this complexity makes quantitative performance modeling a difficult task. Designers of high-performance streaming applications for heterogeneous systems must contend with unpredictable and often non-generalizable models to predict performance of a particular application and hardware mapping. This paper outlines a computationally simple approach that can be used to model the overall throughput and buffering needs of a streaming application on heterogeneous hardware. The model presented is based upon a hybrid maximum flow and... Read More
Learning with Single View Co-training and Marginalized Dropout, Minmin Chen
Delivering Consistent Network Performance in Multi-tenant Data Centers, Mart Albert Haitjema
Kernel Density Metric Learning
Yujie He, Wenlin Chen, and Yixin Chen
Technical Report
This paper introduces a supervised metric learning algorithm, called kernel density metric learning (KDML), which is easy to use and provides nonlinear, probability-based distance measures. KDML constructs a direct nonlinear mapping from the original input space into a feature space based on kernel density estimation. The nonlinear mapping in KDML embodies established distance measures between probability density functions, and leads to correct classification on datasets for which linear metric learning methods would fail. Existing metric learning algorithms, such as large margin nearest neighbors (LMNN), can then be applied to the... Read More
Wireless Cyber-Physical Simulator and Case Studies on Structural Control, Bo Li
Adding Data Parallelism to Streaming Pipelines for Throughput Optimization
Peng Li, Kunal Agrawal, Jeremy Buhler, and Roger D. Chamberlain
Technical Report
The streaming model is a popular model for writing high-throughput parallel applications. A streaming application is represented by a graph of computation stages that communicate with each other via FIFO channels. In this report, we consider the problem of mapping streaming pipelines — streaming applications where the graph is a linear chain — in order to maximize throughput. In a parallel setting, subsets of stages, called components can be mapped onto different computing resources. The through-put of an application is determined by the throughput of the slowest component. Therefore, if... Read More
Efficient Parallel Real-Time Upsampling of Ultrasound Vectors
William D. Richard Ph.D.
Technical Report
Upsampling is required prior to the summation step in most receive digital beamforming implementations to produce an accurate summed RF line or vector. This is true in both annular and linear array systems where receive echos are digitized first and then time delayed in the digital domain to achieve proper signal alignment. The efficient, parallel, real-time upsampling circuit presented here produces M upsampled values per ADC clock, where M is the desired upsampling factor. A circuit implementation that upsamples by a factor of M=4 is presented as an example of... Read More
Parallel Real-Time Scheduling of DAGs
Abusayeed Saifullah, David Ferry, Jing Li, Kunal Agrawal, Chenyang Lu, and Christopher Gill
Technical Report
Recently, multi-core processors have become mainstream in processor design. To take full advantage of multi-core processing, computation-intensive real-time systems must exploit intra-task parallelism. In this paper, we address the open problem of real-time scheduling for a general model of deterministic parallel tasks, where each task is represented as a directed acyclic graph (DAG) with nodes having arbitrary execution requirements. We prove processor-speed augmentation bounds for both preemptive and non-preemptive real-time scheduling for general DAG tasks on multi-core processors. We first decompose each DAG into sequential tasks with their own release... Read More
Self-Adapting MAC Layer for Wireless Sensor Networks
Mo Sha, Meng Xu, Chenyang Lu, Linh T.X. Phan, Tae-Suk Kim, and Taerim Park
Technical Report
The integration of wireless sensors with mobile phones is gaining momentum as an enabling platform for numerous emerging applications. These mobile systems face dynamic environments where both application requirements and ambient wireless conditions change frequently. Despite the existence of many MAC protocols however, none can provide optimal performance along multiple dimensions, in particular when the conditions are frequently changing. Instead of pursuing a one-MAC-fit all approach we present a Self-Adapting MAC Layer (SAML) comprising (1) a Reconfigurable MAC Architecture (RMA) that can switch to different MAC protocols at run time... Read More
Automated Color Calibration of Display Devices
Andrew Shulman
Technical Report
If you compare two identical images on two different monitors, they will likely appear different. Every display device is supposed to adhere to a particular set of standards regulating the color and intensity of the image it outputs. However, in practice, very few do. Color calibration is the practice of modifying the signal path such that the colors produced more closely match reference standards. This is essential for graphics professionals who are mastering original content. They must ensure that the source material appears correct when viewed on a reference monitor.... Read More
End-to-End Delay Analysis for Wireless Control Networks under EDF Scheduling, Chengjie Wu
EWA Model with Recency Effect and Limited Memory
Hang Xie
Technical Report
Game theory is an important field in economics; it studies how people make decisions amid conflict and cooperation. Various experiments have been carried to study the way people play those games, and economists study those data for various purposes. There has been a rise of need for using artificial agents to simulate the game, since we could save the cost of hiring human subjects for the experiments, and we could gain more control over the experiment settings.
... Read MoreReal-Time Multi-Core Virtual Machine Scheduling in Xen
Sisu Xi, Meng Xu, Chenyang Lu, Linh T.X. Phan, Christopher Gill, Olga Sokolsky, and Insup Lee
Technical Report
Recent years have witnessed two major trends in the development of complex real-time systems. First, to reduce cost and enhance flexibility, multiple systems are sharing common computing platforms via virtualization technology, instead of being deployed separately on physically isolated hosts. Second, multicore processors are increasingly being used in real-time systems. The integration of real-time systems as virtual machines (VMs) atop common multicore platforms raises significant new research challenges in meeting the real-time performance requirements of multiple systems.
... Read MoreScanner: An Efficient and Accurate Trimming Tool for Illumina Next Generation Sequencing Reads
Xiang Zhou
Technical Report
Recent advances in High-Throughput Sequencing (HTS) technology have greatly facilitated the researches in bioinformatics field. With the ultra-high sequencing speed and improved base-calling accuracy, Illumina Genome Analyzer is currently the most widely used platform in the field. To use the raw reads generated from the sequencing machine, the 3’ adapter sequence attached to the real read in the process of ligation needs to be correctly trimmed. This is often done by some inhouse scripts or different packages with various parameters. They either use the Smith-Waterman algorithm or search for an... Read More
An Algorithm for Triangulating 3D Polygons, Ming Zou