Advanced computer architectures are centered around the parallel computer systems. This project is focused on the experiment on two parallel computer architectures : Sequent Balance 21000 shared memory multiprocessor and Cogent XTM distributed system.
A set of benchmark programs are implemented using "C" language and Dynix parallel programming library on...
Collaborative filtering (CF) algorithms are used in a wide range of internet applications. However the chief objective of using CF algorithms across most of these applications is to discover items that might be of interest to its users. CF algorithms work by obtaining feedback from users on the items that...
A method of locating electric transmission line towers using
ground survey data in a digital computer program is presented in this
thesis. The towers are located for maximum spacing subject to the
constraints of available tower heights, forbidden ground areas, minimum
ground clearance, and specified conductor tensions. The digital
method...
Information derived from a Landsat Multispectral Scanner CMSS) scene can be used to assign individual pixels, each representing about one acre on the Earth's surface, to natural resource classes, A lineprinter can be used to generate a 1:24,000 scale map of the scene in which each symbol corresponds to a...
In current practice, design documentation often fails
to support the activities of design understanding,
communication, and redesign. A Design History Tool has been
developed to improve current design documentation. This
tool is a computerized design history that represents and
plays back important information generated during the
process of designing a...
Basic biological information is stored in strings of nucleic acids (DNA, RNA) or amino acids
(proteins). Teasing out the meaning of these strings is a central problem of modern biology. Matching and
aligning strings brings out their shared characteristics. Although string matching is well-understood in the
edit-distance model, biological strings...
A public key cryptosystem allows two or more parties to securely communicate
over an insecure channel without establishing a physically secure channel for key
exchange. The RSA cryptosystem is the most popular public key cryptosystem ever
invented. It is based on the difficulty of factoring large composite numbers. Once the...
Our thesis is that data parallel programs can be translated into programs that execute efficiently on a variety of architectures. Currently we are focusing on the data parallel programming language C*, developed by Thinking Machines Corporation for the Connection Machine processor array. Previous papers have described our design of a...