Search
Now showing items 1-10 of 28
Evolutionary Markov chains, potential games and optimization under the lens of dynamical systems
(Georgia Institute of Technology, 2016-07-22)
The aim of this thesis is the analysis of complex systems that appear in
different research fields such as evolution, optimization and game theory, i.e., we focus on systems that describe the evolution of species, an ...
Semantic representation learning for discourse processing
(Georgia Institute of Technology, 2016-07-21)
Discourse processing is to identify coherent relations, such as contrast and causal relation, from well-organized texts. The outcomes from discourse processing can benefit both research and applications in natural language ...
OS support for heterogeneous memory
(Georgia Institute of Technology, 2016-07-29)
To address the 'memory wall' problem of future systems, vendors are creating heterogeneous memory structures, supplementing DRAM with on-chip stacked 3D-RAM and high capacity
non-volatile memory (NVM). Each of these ...
Preventing exploits against memory corruption vulnerabilities
(Georgia Institute of Technology, 2016-08-02)
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts toward building secure software, software systems of even modest complexity still routinely have serious vulnerabilities. More ...
Grasp selection strategies for robot manipulation using a superquadric-based object representation
(Georgia Institute of Technology, 2016-07-29)
This thesis presents work on the implementation of a robotic system targeted to perform a set of basic manipulation tasks instructed by a human user. The core motivation on the development of this system was in enabling ...
Simulations of binary black holes in scalar field cosmologies
(Georgia Institute of Technology, 2016-08-01)
Numerical relativity allows us to solve Einstein's equations and study astrophysical phenomena we may not be able to observe directly, such as the very early universe. In this work, we examine the effect of scalar field ...
Protecting computer systems through eliminating or analyzing vulnerabilities
(Georgia Institute of Technology, 2016-08-01)
There have been tremendous efforts to build fully secure computer systems, but it is not an easy goal. Making a simple mistake
introduces a vulnerability, which can critically endanger a whole system's security. This ...
Frame, rods and beads of the edge computing abacus
(Georgia Institute of Technology, 2016-11-15)
Emerging applications enabled by powerful end-user devices and 5G technologies, pose demands for reduced access latencies to web services and dramatic increase in the back-haul network capacity. In response, edge computing---the ...
Enhancing manageability of execution and data for GPGPU computing
(Georgia Institute of Technology, 2016-12-13)
GPGPUs are useful for many types of compute-intensive workloads from scientific simulations to cloud-focused applications like machine learning and graph analytics. However, unlike CPUs they do not allow for software-controlled ...
Augmenting accountability, security and fraud detection in health data sharing systems
(Georgia Institute of Technology, 2016-04-12)
The U.S. government has introduced federal incentive programs to accelerate the adoption of meaningful use of electronic health records. These electronic records are expected to improve healthcare quality, reduce costs, ...