Finding information can cost a significant amount of time, even when the information is already stored on the user’s local computer system. There is significant research aimed at reducing these time costs, but little research into exactly what these costs are or how they impact people’s use of tools and...
A Graphic User Interface is developed to determine the existence of a
particular sequence of piano notes within a monophonic sound waveform.
Such waveforms are recorded within the Graphic User Interface and then
passed to the monophonic analysis engine. The first phase of analysis segments
the PCM sound data to...
Quotient rings of Gaussian and Eisenstein-Jacobi(EJ) integers can be deployed to construct interconnection networks with good topological properties. In this thesis, we propose deadlock-free deterministic and partially adaptive routing algorithms for hexagonal networks, one special class of EJ networks. Then we discuss higher dimensional Gaussian networks as an alternative to...
Magnetic and gravity modelling was completed along two E-W transects offshore central Oregon. These models indicate that the backstop-forming western edge of the Siletz terrane has a seaward dip of approximately 40° to 49° at 44°48'N, shallowing to ~28° at 44°1 1 'N. This is a well-determined result, given available...
Modern superscalar processors exploit instruction-level parallelism (ILP) by issuing multiple instructions in a single cycle because of increasing demand for higher performance in computing. However, stalls due to cache misses severely degrade the performance by disturbing the exploitation of ILP. Multiprocessors also greatly exacerbate the memory latency problem. In SMPs,...
The microprocessors will have more than a billion logic transistors on a single chip in the near future. Several alternatives have been suggested for obtaining highest performance with billion-transistor chips. To achieve the highest performance possible, an on-chip multiprocessor will become one promising alternative to the current superscalar microprocessor. It...
Modular multiplication is a mathematical operation fundamental to the RSA cryptosystern,
a public-key cryptosystem with many applications in privacy, security, and authenticity.
However, cryptosecurity requires that the numbers involved be extremely large,
typically ranging from 512-1024 bits in length. Calculations on numbers of this magnitude
are cumbersome and lengthy; this...
Standard accounts of women's relationship with technology stress women's need to overcome anxiety to achieve competence with computers. Recent studies provide evidence that this woman-anxiety-technology connection is an oversimplification of the relationship between women and computers. New literature also suggests that making computers more appealing will help girls overcome computational...
In pursuit of global sustainability, forestry has witnessed significant shifts in practices and the development of new technologies and ideas. Primary and secondary processing industries have made substantial efforts to increase wood utilization rates, improve occupational safety and the working environment for humans, and have exhibited interest in procuring raw...