Search
Now showing items 1-10 of 37
Dynamic shared memory architecture, systems, and optimizations for high performance and secure virtualized cloud
(Georgia Institute of Technology, 2017-04-07)
Dynamic memory consolidation is an important enabler for high performance virtual
machine (VM) execution in virtualized Cloud. Efficient just-in-time memory balancing requires three core capabilities: (i) Detecting memory ...
Enabling one-handed input for wearable computing
(Georgia Institute of Technology, 2017-05-30)
A new evolution of computing is emerging around wearable technologies. Wearable computing has been a topic of research for years. However, we are beginning to see adoption by consumers and non-researchers due to advances ...
Exploiting intrinsic flash properties to enhance modern storage systems
(Georgia Institute of Technology, 2017-08-02)
The longstanding goals of storage system design have been to provide simple abstractions for applications to efficiently access data while ensuring the data durability and security on a hardware device. The traditional ...
Identifying and mitigating threats from embedding third-party content
(Georgia Institute of Technology, 2017-08-02)
Embedding content from third parties to enrich features is a common practice in the development of modern web applications and mobile applications. Such practices can pose serious security and privacy threats to an end ...
Enabling In situ & context-based motion gesture design
(Georgia Institute of Technology, 2017-04-05)
Motion gestures, detected through body-worn inertial sensors, are an expressive, fast to access input technique, which is ubiquitously supported by mobile and wearable devices. Recent work on gesture authoring tools has ...
Implicating visualization in the rationalization of algorithms
(Georgia Institute of Technology, 2017-04-28)
Once operationalized in practice, algorithms are generally understood as removed from human interpretability and control. In this thesis I examine interactive data visualizations and contend that, to the contrary, the ...
Understanding social media credibility
(Georgia Institute of Technology, 2017-07-12)
Today, social media provide the means by which billions of people experience news and events happening around the world. We hear about breaking news from people we “follow” on Twitter. We engage in discussions about unfolding ...
Simply safe lattice cryptography
(Georgia Institute of Technology, 2017-07-27)
Lattice cryptography has many compelling features, like security under worst-case hardness assumptions, apparent security against quantum attacks, efficiency and parallelism, and powerful constructions like fully homomorphic ...
Building trust in the user I/O in computer systems
(Georgia Institute of Technology, 2017-07-26)
User input plays an essential role in computer security because it can control system behavior and make security decisions in the system. System output to users, or user output, is also important because it often contains ...
Integrating reinforcement learning into a programming language
(Georgia Institute of Technology, 2017-06-26)
Reinforcement learning is a promising solution to the intelligent agent problem, namely, given the state of the world, which action should an agent take to maximize goal attainment. However, reinforcement learning algorithms ...