Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 11791 - 11820 of 12790

Full-Text Articles in Physical Sciences and Mathematics

Cs 766: Evolutionary Computation, Mateen M. Rizki Oct 2004

Cs 766: Evolutionary Computation, Mateen M. Rizki

Computer Science & Engineering Syllabi

This course explores evolutionary computation from a historical, theoretical, and application viewpoint. An overview of the most common evolutionary search techniques are presented including genetic algorithms, evolutionary programming, evolutionary strategies, and genetic programming. The fundamental issues driving the choice of problem representation and specific genetic operators are discussed. Various applications of evolutionary computation to problems in control, optimization, and pattern recognition are examined.


Cs 780: Compiler Design And Construction I, Krishnaprasad Thirunarayan Oct 2004

Cs 780: Compiler Design And Construction I, Krishnaprasad Thirunarayan

Computer Science & Engineering Syllabi

This course deals with the theory and practice of compiler design. Topics emphasized are scanning and parsing. If time permits, semantic analysis will also be covered.


Ceg 333: Introduction To Unix, Bin Wang Oct 2004

Ceg 333: Introduction To Unix, Bin Wang

Computer Science & Engineering Syllabi

This is a 2 credit hour course that has 10 50-minute lectures and I 0 50-minute Jab sessions. Introduction to the use of Unix and Unix tools as a problem-solving environment. Emphasis on the shell, files and directories, editing files, user process management, compiling, and debugging.


Ceg 361/561-01: Introduction To Software Testing, John A. Reisner Oct 2004

Ceg 361/561-01: Introduction To Software Testing, John A. Reisner

Computer Science & Engineering Syllabi

This course covers software testing strategies, along with established best practices, so students learn how to test their software in a complete and systematic (vice ad-hoc) manner. Particular attention is paid to planning, writing, and executing software testing documentation, i.e., software test plan, to include documented results. Various projects are assigned, designed to illustrate various challenges associated with software testing, and to reinforce the strategies and techniques used to overcome these challenges.


Ceg 476/676-01: Computer Graphics I, Lyubomir Zagorchev Oct 2004

Ceg 476/676-01: Computer Graphics I, Lyubomir Zagorchev

Computer Science & Engineering Syllabi

An introduction to 2-D and 3-D computer graphics and their OpenGL implementations.


Ceg 220: Introduction To C Programming For Engineers I, Ronald F. Taylor Oct 2004

Ceg 220: Introduction To C Programming For Engineers I, Ronald F. Taylor

Computer Science & Engineering Syllabi

This course provides a general introduction to computers as a problem solving tool using the C programming language. Emphasis is on algorithms and techniques useful to engineers. Topics include data representation, debugging, and program verification. Some programming assignments may involve complex arithmetic and trigonometric exponential functions.


Ceg 255: Introduction To The Design Of Information Technology Systems, Eric Matson Oct 2004

Ceg 255: Introduction To The Design Of Information Technology Systems, Eric Matson

Computer Science & Engineering Syllabi

Information systems consist of modern elements such as database systems, networks, multiplatform distributed computing, web infrastructure and multimedia computing. In this course we will address these areas individually and also where they intersect to gain a basic understanding of how information technology can be used to solve real problems.


Ceg 429/629: Internet Security, Prabhaker Mateti Oct 2004

Ceg 429/629: Internet Security, Prabhaker Mateti

Computer Science & Engineering Syllabi

Introduction to security issues arising primarily from computer networks. Topics include node and service authentication, address spoofing, hijacking, SYN floods, smurfing, sniffing, routing tricks, and privacy of data en route. Buffer overruns and other exploitation of software development errors. Hardening of operating systems. Intrusion detection. Firewalls. Ethics.


Ceg 402/602: Introduction To Computer Communication, Bin Wang Oct 2004

Ceg 402/602: Introduction To Computer Communication, Bin Wang

Computer Science & Engineering Syllabi

This course provides an introduction to basic concepts of communication networks, different types of networks, protocols over different layers, and network applications through lectures, labs, homework, and reading on relevant materials.


Ceg 434/634: Concurrent Software Design, Thomas C. Hartrum Oct 2004

Ceg 434/634: Concurrent Software Design, Thomas C. Hartrum

Computer Science & Engineering Syllabi

This course provides an introduction to concurrent program design in the UNIX environment. Classical problems of synchronization, concurrency, and their solutions are examined through course projects and through readings on operating system design.


Ceg 498: Design Experience, John C. Gallagher Oct 2004

Ceg 498: Design Experience, John C. Gallagher

Computer Science & Engineering Syllabi

CEG 498 (Design Experience) is a summative computer engineering design project course that builds upon previous engineering, science, mathematics and communications course work. CEG 498 projects are a minim um of two quarters in length and must be completed in groups of at least three students. Projects are selected under the guidance of the course instructor and are tailored to both student interest and formal classroom preparation. Students are evaluated both on their individual contributions as recorded in a graded engineering journals and on the quality of their collective efforts as reflected in group generated products.


Cs 206: Data Sheet, Terri Bauer Oct 2004

Cs 206: Data Sheet, Terri Bauer

Computer Science & Engineering Syllabi

Data Sheet for section 02.


Cs 480/680: Comparative Languages, Michael T. Cox Oct 2004

Cs 480/680: Comparative Languages, Michael T. Cox

Computer Science & Engineering Syllabi

"Comparative Languages" is a graduate/undergraduate level introductory course in programming languages. We will cover several basic topics ranging from syntax (BNF) and semantics formalisms (attribute grammars), to data types, scope and extent, type checking, parameter passing methods, expression parsing and other fundamentals of programming languages and language development. The intent of the course is to provide a background in the concepts and constructs of languages, rather than simply providing just a survey of various computer languages. Nonetheless in this class, we will learn and program in three very different languages: Pascal (an imperative language), Java (an object-oriented language), and LISP …


Cs/Bio 471/671: Algorithms For Bioinformatics, Michael L. Raymer, Dan E. Krane Oct 2004

Cs/Bio 471/671: Algorithms For Bioinformatics, Michael L. Raymer, Dan E. Krane

Computer Science & Engineering Syllabi

Theory-oriented approach to the application of contemporary algorithms to bioinformatics. Graph theory, complexity theory, dynamic programming and optimization techniques are introduced in the context of application toward solving specific computational problems in molecular genetics.


Cs 410/610: Theoretical Foundations Of Computing, Thomas Sudkamp Oct 2004

Cs 410/610: Theoretical Foundations Of Computing, Thomas Sudkamp

Computer Science & Engineering Syllabi

This course is an introduction to one of the fundamental topics in the theory of computer science: computability theory. Computability theory is concerned with determining whether there is an algorithmic solution to a problem. The study of computability uses the Turing machine as the basic computational model. A Turing machine is a random access, read-write, finite state automaton. The Church-Turing thesis asserts that any problem that can be solved in any algorithmic manner can be solved by a Turing machine.


Cs 240: Introduction To Computer Science I, Mateen M. Rizki Oct 2004

Cs 240: Introduction To Computer Science I, Mateen M. Rizki

Computer Science & Engineering Syllabi

No abstract provided.


Cs 240: Introduction To Computer Science, Eric Matson Oct 2004

Cs 240: Introduction To Computer Science, Eric Matson

Computer Science & Engineering Syllabi

We will develop basic techniques to design, develop and implement programs using the C++ language.


Cs 208: Computer Programming For Business With Java, I, Robert Rea Oct 2004

Cs 208: Computer Programming For Business With Java, I, Robert Rea

Computer Science & Engineering Syllabi

CS 208 is the first of a two quarter sequence in programming for business students. It is required for Management Information Science majors. The courses are designed to help students achieve an intermediate-level of programming in Java. This course assumes students have never written a program before.


Cs 784: Programming Languages, Krishnaprasad Thirunarayan Oct 2004

Cs 784: Programming Languages, Krishnaprasad Thirunarayan

Computer Science & Engineering Syllabi

This course introduces concepts related to the specification and design of high-level programming languages. It discusses different programming paradigms, algebraic specification and implementation of data types, and develops interpreters for specifying operationally the various programming language features/constructs. It also introduces attribute grammar formalism and axiomatic semantics briefly. The programming assignments will be coded in Scheme.


Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 21, Number 2, October 2004, College Of Engineering And Computer Science, Wright State University Oct 2004

Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 21, Number 2, October 2004, College Of Engineering And Computer Science, Wright State University

BITs and PCs Newsletter

An eight page newsletter created by the Wright State University College of Engineering and Computer Science that addresses the current affairs of the college.


Vector Operations In Superscalar Architectures, Nathan Daniel Flinn Oct 2004

Vector Operations In Superscalar Architectures, Nathan Daniel Flinn

Electrical & Computer Engineering Theses & Dissertations

Vector calculations are very prevalent today. Though the vector-processing computer is quite an old concept, superscalar processors lack hardware support for vector operations. This thesis investigates whether an ordinary superscalar computer architecture can be designed to include hardware support for improved vector operations without drastically changing the existing superscalar design and behavior. A computer architecture design was created and implemented that included the vector multiply (dot product) operation. The design includes a Vector Operations Unit that captures incoming vector operations and generates the necessary set of machine instructions to complete the vector operation internally. It then delivers these instructions to …


Bottleneck Analysis Of Cports, Sreekalyana Chakravarthy Kajuluri Oct 2004

Bottleneck Analysis Of Cports, Sreekalyana Chakravarthy Kajuluri

Electrical & Computer Engineering Theses & Dissertations

CPortS is a transportation logistics simulation that models the flow of military cargo through a seaport and the interaction of the cargo with the port resources and infrastructure. It provides information about the seaport's capabilities, how the cargo has been handled, how many days the cargo took to clear a particular port area, and the overall throughput of the seaport. The model is highly data intensive since it models the huge traffic in a real seaport.

Bottlenecks reduce system performance. Systems that are traffic intensive or simulations of systems, which are data intensive, encounter bottlenecks, which reduce their performance. In …


Hierarchical Hybrid Multicast An End System Multicast Algorithm Approach, Guillermo Loaisiga Oct 2004

Hierarchical Hybrid Multicast An End System Multicast Algorithm Approach, Guillermo Loaisiga

Electrical & Computer Engineering Theses & Dissertations

Due to the rapid development in the computer and communication technologies, the Internet is experiencing an increasing demand of high-speed, real-time distributed applications, such as live streaming multimedia, videoconferencing, distributed simulations, and multiparty games. Multicast is an efficient transmission mechanism to support these applications. Historically, IP Multicast (IPM) has provided multicast support with well-known benefits, especially in bandwidth savings. However, it has experienced little deployment due to economic and architectural limitations.

Overlay multicast holds promise for the implementation of large scale Internet multicast services. An overlay network is a virtual topology constructed on top of the Internet infrastructure. This concept …


Huffman Approach To Opcode Compression, Jason B. Shreve Oct 2004

Huffman Approach To Opcode Compression, Jason B. Shreve

Electrical & Computer Engineering Theses & Dissertations

Instructions are the building blocks of computer programs. They are composed of opcodes, which uniquely identify each instruction, and the operands or data. In most architectures, the instruction length is a set multiple of the word size. The size and number of operands vary by instruction. Due to programmer usage, program need, or compiler design, opcodes do not occur with a constant distribution. Likely, some opcodes occur very frequently, whereas others occur very infrequently or not at all. If the length of an opcode were representative of its frequency, compression in program size might be achieved.

This thesis is an …


Techniques And Patterns For Safe And Efficient Real-Time Middleware, Angelo Corsaro Sep 2004

Techniques And Patterns For Safe And Efficient Real-Time Middleware, Angelo Corsaro

All Computer Science and Engineering Research

Over 90 percent of all microprocessors are now used for real-time and embedded applications. The behavior of these applications is often constrained by the physical world. It is therefore important to devise higher-level languages and middleware that meet conventional functional requirements, as well as dependably and productively enforce real-time constraints. Real-Time Java is emerging as a safe, real-time environment. In this thesis we use it as our experimentation platform; however, our findings are easily adapted to other similar platforms. This thesis provides the following contributions to the study of safe and efficient real-time middleware. First, it identifies potential bottlenecks and …


Tcp Processor: Design, Implementation, Operation, And Usage, David V. Schuehler Sep 2004

Tcp Processor: Design, Implementation, Operation, And Usage, David V. Schuehler

All Computer Science and Engineering Research

There is a critical need to perform advanced data processing on network traffic. In order to accom-plish this, protocol processing must first be performed to reassemble individual network packets into consistent data streams representing the exact dataset being transferred between end systems. This task is currently performed by protocol stacks running on end systems. Similar protocol processing opera-tions are needed to process the data on the interior of the network. Given millions of network connections operating on multi-gigabit per second network links, this task is extremely difficult. The TCP-Processor addresses this challenge. It is a hardware circuit designed to perform …


Volume Holographic Recording And Readout For 90-Deg Geometry, Partha P. Banerjee, Monish Ranjan Chatterjee, Nickolai Kukhtarev, Tatiana Kukhtareva Sep 2004

Volume Holographic Recording And Readout For 90-Deg Geometry, Partha P. Banerjee, Monish Ranjan Chatterjee, Nickolai Kukhtarev, Tatiana Kukhtareva

Electrical and Computer Engineering Faculty Publications

When a prerecorded cross-beam hologram is reconstructed (so-called edge-lit readout) with a uniform plane wave and a point source, the resulting exact solutions reveal Bessel-function-type diffracted beam profiles, which are fundamentally modified under weak propagational diffraction. The case of a profiled beam readout with propagational diffraction may be analyzed using a transfer function approach based on 2-D Laplace transforms. In a second series of investigations, dynamic readout from a cross-beam volume hologram recorded with two orthogonal uniform plane waves is considered for various dependences of the refractive index modulation with intensity. Typically, refractive index profiles that are proportional to the …


Run-Time Modification Of The Class Hierarchy In A Live Java Development Environment, Joel R. Brandt, Kenneth J. Goldman Sep 2004

Run-Time Modification Of The Class Hierarchy In A Live Java Development Environment, Joel R. Brandt, Kenneth J. Goldman

All Computer Science and Engineering Research

Class hierarchy design is central to object-oriented software development. However, it is sometimes difficult for developers to anticipate all the implications of a design until implementation is underway. To support experimentation with different designs, we extend prior work on live development environments to allow run-time modification of the class hierarchy. The result is a more fluid object-oriented development process, in which immediate feedback from the executing program can be used to guide hierarchy design. This paper presents a framework and developer support for run-time modification of class inheritance relations in JPie, a live visual programming environment for Java. Most notably, …


Volume Holographic Optical Elements, Ching-Cherng Sun, Partha P. Banerjee Sep 2004

Volume Holographic Optical Elements, Ching-Cherng Sun, Partha P. Banerjee

Electrical and Computer Engineering Faculty Publications

The final two papers are concerned with the analysis of novel holograms. Banerjee et al. investigate holographic recording and reconstruction for edge-lit holograms recorded in a 90-degree geometry. Various cases of recording and readout that incorporate propagational diffraction have been modeled. It is shown that the 90-degree geometry can result in beam shaping, as evidenced through preliminary experimental results with photorefractive lithium niobate. Nguyen et al. propose a new approach for designing computer-generated holograms. An artificial neural network is used to initiate the genetic algorithm so that the high computation cost of genetic algorithms for synthesizing holograms is significantly reduced …


Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 21, Number 1, September 2004, College Of Engineering And Computer Science, Wright State University Sep 2004

Wright State University College Of Engineering And Computer Science Bits And Pcs Newsletter, Volume 21, Number 1, September 2004, College Of Engineering And Computer Science, Wright State University

BITs and PCs Newsletter

A ten page newsletter created by the Wright State University College of Engineering and Computer Science that addresses the current affairs of the college.