The major drawback of partial dynamic reconfiguration is the reconfiguration delay overhead. To reduce the reconfiguration bitstream between two consecutive implementations, design components are reused. However, this incurs additional... more
The design of security protocols is usually performed manually by pen and paper, by experts in security. Assumptions are rarely specified explicitly. We present a new way to approach security specification: The protocol is refined fully... more
Taguchi Methods may be used to train small Artificial Neural Networks very quickly in a variety of tasks. These include, importantly, Control Systems. Previous experimental work has shown that they could be successfully used to train... more
The Inverse Augmented Data Manipulator (IADM) is a multistage interconnection network based on the Augmented Data Manipulator (ADM) and Feng's data manipulator. It is designed to be used in large-scale parallel/distributed processing... more
This study examined the interplay among processor speed, cluster interconnect and file I/O, using parallel applications to quantify interactions. We focused on a common case where multiple compute nodes communicate with a single master... more
The evolution of wireless sensor network technology has enabled us to develop advanced systems for real time monitoring. In the present scenario wireless sensor networks are increasingly being used for precision agriculture. The... more
We present an MPI topology discovery tool for homogeneous Ethernet switched clusters. Unlike existing Ethernet topology discovery methods that rely on Simple Network Management Protocol (SNMP) queries to obtain the topology information,... more
A parallel distributed processing (PDP) model is proposed to account for choice reaction time (RT) performance in diverse cognitive and perceptual tasks such as the Stroop task, the Simon task, the Eriksen flanker task, and the... more
In this work we present the parallelisation of the global strategy with first least-connected node (GS-FLCN), which is a novel structural technique for the classification of unmeasured variables in process plant instrumentation design.... more
This article addresses the ability of Parallel Distributed Processing (PDP) networks to generate stagewise cognitive development in accordance with Piaget's theory of cognitive epigenesis. We carried out a replication study of the... more
Wireless Sensor Network (WSN) is a noticeable subject currently. There are many WSN applications including military control and environmental monitoring. In these applications, the security of data transmission is an important issue.... more
We report on work-in-progress that aims to provide a run-time management kernel for applications running on FPGAs with embedded CPUs. We describe the global concept, the organization of the hardware environment for the reconfigurable... more
Results of an experimental study of an anomaly detection system based on the paradigm of artificial immune systems (AISs) are presented. Network traffic data are mapped into antibodies or antigenes either by using selected general... more
In the paper we present a new approach based on application of neural networks to detect SQL attacks. SQL attacks are those attacks that take advantage of using SQL statements to be performed. The problem of detection of this class of... more
This paper is focused on designing an efficient approach to retrieve information that is processed by mobile devices. So, this system is designed to combine various techniques that can be beneficial for using distributed parallel... more
Large scale High Performance Computing and Communication (HPCC) applications (e.g. Video-on-Demand, and HPDC) would require storage and processing capabilities which are beyond existing single computer systems. The current advances in... more
The research interest in sensor nets is still growing because they simplify data acquisition in many applications. If hardware resources are very sparse, routing algorithms cannot use data gathering. However, if a large number of channels... more
Two experiments investigated naming performance for items with and without digraphs. Both experiments compared performance for Regular Consistent, Regular Inconsistent and Exception words. Experiment 1 also compared nonwords with... more
Gypsy is a component-based, dynamically extensible environment for mobile agent systems. The runtime environment consists of lightweight servers that provide a distributed execution environment for agents, and a remote administration tool... more
This paper presents the design and study of reconfigurable architectures for two data-link layer frame delineation techniques used for ATM and GFP. The architectures are targeted to Altera Stratix II FPGA technology and are investigated... more
This paper details the implementation of a highly pipelined 2.5 Gbit/s point-to-point-protocol packet processor (P5) aimed at the latest system-on-a-programmable-chip (SoPC) technology. Throughput rates beyond 2.5 Gbit/s based on FPGA... more
This paper is focused on designing an efficient approach to retrieve information that is processed by mobile devices. So, this system is designed to combine various techniques that can be beneficial for using distributed parallel... more
vii 9.5 The study of complex dynamics 9.6 Towards a general theory of communication? 10. The expectation of social change 10.1 The post-institutional perspective 10.1.1 'All that is solid melts into air' 10.1.2 The linguistic turn 10.1.3... more
Large scale High Performance Computing and Communication (HPCC) applications (e.g. Video-on-Demand, and HPDC) would require storage and processing capabilities which are beyond existing single computer systems. The current advances in... more
The ease of deployment of economic sensor networks has always been a boon to disaster management applications. However, their vulnerability to a number of security threats makes communication a challenging task. This paper proposes a new... more
Does knowledge of language consist of mentally-represented rules? Rumelhart and McClelland have described a connectionist (parallel distributed processing) model of the acquisition of the past tense in English which successfully maps many... more
Workflow enactment systems are becoming an effective solution to ease programming, deployment and execution of distributed applications in several domains such as telecommunication, manufacturing, ebusiness, e-government and grid... more
The Java programming language supports concurrency. Concurrent programs are hard to test due to their inherent non-determinism. This paper presents a classification of concurrency failures that is based on a model of Java concurrency. The... more
The Java programming language supports concurrency. Concurrent programs are hard to test due to their inherent non-determinism. This paper presents a classification of concurrency failures that is based on a model of Java concurrency. The... more
Recently, routing on dBG has been investigated as shortest path and fault tolerant routing but investigation into shortest path in failure mode on dBG has been non-existent. Furthermore, dBG based broadcasting has been studied as local... more
A number of reports claim that humans perform lexical decisions faster to words with many meanings than to words with only one meaning. It is a challenge to simulate this ambiguity effect with a parallel distributed processing model... more
Distributed Virtual Environments (DVEs) are distributed systems that allow multiple geographically distributed clients (users) to interact simultaneously in a computer-generated, shared virtual world. Applications of DVEs can be seen in... more
This paper is focused on designing an efficient approach to retrieve information that is processed by mobile devices. So, this system is designed to combine various techniques that can be beneficial for using distributed parallel... more
In this paper, we propose system support for building adaptive migratory continuous media applications in distributed real-time environments. In future distributed computing environments, various objects in homes and oces will embed... more
Workflow enactment systems are becoming an effective solution to ease programming, deployment and execution of distributed applications in several domains such as telecommunication, manufacturing, ebusiness, e-government and grid... more
Composition represents today one of the most challenging approach to design complex software systems, especially in distributed environments. While two different views (in time and in space) are considered by researchers to compose... more
This paper exploits a previously developed analytical modeling framework to compare several variations of the basic flooding search strategy in unstructured decentralized peer-to-peer (P2P) networks. The model predictions are used to... more
The last few years have witnessed huge growth in computer technology and available resources throughout the Internet. These resources can be used to run CPU-intensive applications requiring long periods of processing time. Grid systems... more
Construction of a backbone architecture is an important issue in mobile ad hoc networks(MANET)s to ease routing and resource management. We propose a new fully distributed algorithm for backbone formation in MANETs that constructs a... more
Traditional views of automatic!ty are in need of revision. For example, automaticity often has been treated as an all-or-none phenomenon, and traditional theories have held that automatic processes are independent of attention. Yet recent... more
People are generally faster and more accurate to name or categorize objects at the basic level (e.g., dog) relative to more general (animal) or specific (collie) levels, an effect replicated in Experiment 1 for categorization of object... more
Recently, routing on dBG has been investigated as shortest path and fault tolerant routing but investigation into shortest path in failure mode on dBG has been non-existent. Furthermore, dBG based broadcasting has been studied as local... more
I go deep into the biology of the human organism to argue that the psychological features and functions of persons are realized by cellular and molecular parallel distributed processing networks dispersed throughout the whole body.... more
In this paper, the index space of the (n×n)-matrix multiply-add problem C = C + A•B is represented as a 3D n×n×n torus. All possible time-scheduling functions to activate the computation and data rolling inside the 3D torus index space... more
I would like to thank many people who have contributed either directly, or indirectly, in making this thesis a reality for me. I will try to list all of them and I apologize if I have missed out some names. I would like to begin with... more