Browsing by Author "Da Silva, Dilma"
Now showing items 1-20 of 34
-
Fletcher, Shawna L (2022-04-21)The purpose of this study was to evaluate undergraduate women participating on collegiate extracurricular competitive project teams (PT) in comparison to non-project team (non-PT) female students. The study determined ...
-
Kang, ZengxiaoranThe drastic emergence of dynamic, heterogeneous, and shared cloud computing clusters has impacted corporations, researchers, and software developers for the past decade. With the aim to improve further the field of cloud ...
-
Anyiam, Nkemdi FortuneCertain algorithms (such as those for dynamic programming (DP)) lack visualizations that can exhaustively explain each step while delivering intuitive animations, in part due to rigid layouts in the designs. In this paper, ...
-
Mirbagher Ajorpaz, Samira (2019-10-18)Modern processors rely heavily on speculation to provide performance. Techniques such as branch prediction, caching, prefetching, memory dependence prediction etc. use features from recent program behavior to predict the ...
-
Keim, Logan AlexanderServerless computing is a way in which users or companies can build and run applications and services without having to worry about acquiring or maintaining servers and their software stacks. This new technology is a ...
-
Bailey, Kalista KimbriCloud computing technology has enabled enterprises in all societal domains to achieve remarkable growth by harnessing data and computation power without an upfront investment in computer infrastructure or any expense in ...
-
Ramezani Foukolayi, Mahin (2021-04-28)Record linkage, often called entity resolution or de-duplication, refers to identifying the same entities across one or more databases. As the amount of data that is generated grows at an exponential rate, it becomes ...
-
Wu, Chih-Peng (2019-11-08)Under the serverless paradigm, containers may serve as the runtime execution environments for processing clients’ service requests. For service providers aiming at broad customer bases, the portfolio of containers to be ...
-
Liu, Bozhen (2023-05-15)Nowadays, the number of code bases are growing explosively together with their size and complexity, where million lines of code become common to see. To guarantee the correctness and quality of software applications, program ...
-
Liu, Bozhen (2023-05-15)Nowadays, the number of code bases are growing explosively together with their size and complexity, where million lines of code become common to see. To guarantee the correctness and quality of software applications, program ...
-
Liu, Bozhen (2023-05-15)Nowadays, the number of code bases are growing explosively together with their size and complexity, where million lines of code become common to see. To guarantee the correctness and quality of software applications, program ...
-
Miner, Nina Elise (2022-04-20)The cybersecurity field has grown exponentially in recent history with little to no general understanding of the requirements for professionals in the field. Our research question is: how can the perception of the cybersecurity ...
-
Sumen, Mulkiye (2022-05-25)Cybersecurity has the utmost importance for nuclear power plants (NPPs). Demand for clean and constant energy has increased the need and use of NPPs. Countries want to have and maintain secure NPPs both physically (well-studied ...
-
LaCroix, David (2015-11-24)The factors involved in choosing between storing data repositories at locally-hosted infrastructures or at (remote) public clouds are well understood for many enterprise application domains. The proliferation of ...
-
Huang, Jiayi (2020-07-22)The onset of big data and deep learning applications, mixed with conventional general-purpose programs, have driven computer architecture to embrace heterogeneity with specialization. With the ever-increasing interconnected ...
-
Zeng, Yukun (2018-08-15)Numerous recent research efforts have been devoted to edge computing due to its key role in enabling emerging IoT applications. Prior to deploying edge technologies to real world environments, they need to be adequately ...
-
Kim, Kyung Hoon (2021-03-11)Today, hardware accelerators are widely accepted as a cost-effective solution for emerging applications in computing platforms from servers to mobile devices. Servers often leverage manycore accelerators such as Graphics ...
-
Backes Drault, Luna B (2017-08-08)Processor speed has been increasing at a higher rate than the speed of memories over the last years. Caches were designed to mitigate this gap and, ever since, several cache management techniques have been designed to ...
-
Huang, Shiyou (2019-11-20)Concurrent programs are ubiquitous, from the high-end servers to personal machines, due to the fact of multi-core hardware. Unfortunately, it is difficult to write correct concurrent programs. Stateless Model Checking (SMT) ...
-
Lansford, Joellen S (2021-04-16)There are several applications in modern society that require two parties or systems to trust each other before exchanging sensitive information or allowing access (such as a smart locks and keys or a private email account). ...