
Performance optimizations for scalable CFD applications on hybrid CPU+MIC heterogeneous computing system with millions of cores
For computational fluid dynamics (CFD) applications with a large number ...
read it

An Online Development Environment for Answer Set Programming
Recent progress in logic programming (e.g., the development of the Answe...
read it

SemistabilityBased Convergence Analysis for Paracontracting Multiagent Coordination Optimization
This sequential technical report extends some of the previous results we...
read it

Convergence Analysis and Parallel Computing Implementation for the Multiagent Coordination Optimization Algorithm
In this report, a novel variation of Particle Swarm Optimization (PSO) a...
read it

A RefinementBased Architecture for Knowledge Representation and Reasoning in Robotics
This paper describes an architecture that combines the complementary str...
read it

Vicious Circle Principle and Logic Programs with Aggregates
The paper presents a knowledge representation language Alog which extend...
read it

KR^3: An Architecture for Knowledge Representation and Reasoning in Robotics
This paper describes an architecture that combines the complementary str...
read it

Combining Answer Set Programming and POMDPs for Knowledge Representation and Reasoning on Mobile Robots
For widespread deployment in domains characterized by partial observabil...
read it

Language ASPf with Arithmetic Expressions and ConsistencyRestoring Rules
In this paper we continue the work on our extension of Answer Set Progra...
read it

SPARC  Sorted ASP with Consistency Restoring Rules
This is a preliminary report on the work aimed at making CRProlog  a ...
read it

Elastic Functional Coding of Riemannian Trajectories
Visual observations of dynamic phenomena, such as human actions, are oft...
read it

A Splitting Set Theorem for Epistemic Specifications
Over the past decade a considerable amount of research has been done to ...
read it

Feedback Regularization and Geometric PID Control for Robust Stabilization of a Planar Threelink Hybrid Bipedal Walking Model
This paper applies a recently developed geometric PID controller to stab...
read it

A Computational Framework for Modelling and Analyzing Ice Storms
Ice storms are extreme weather events that can have devastating implicat...
read it

A SoftwareDefined QoS Provisioning Framework for HPC Applications
With the emergence of largescale dataintensive highperformance applic...
read it

Clientside StragglerAware I/O Scheduler for Objectbased Parallel File Systems
Objectbased parallel file systems have emerged as promising storage sol...
read it

Evaluating language models of tonal harmony
This study borrows and extends probabilistic language models from natura...
read it

Empirical distributions of the robustified ttest statistics
Based on the median and the median absolute deviation estimators, and th...
read it

Introducing Computer Science to High School Students through Logic Programming
This paper investigates how high school students in an introductory comp...
read it

onlineSPARC: a Programming Environment for Answer Set Programming
Recent progress in logic programming (e.g., the development of the Answe...
read it

A Study on 3D Surface Graph Representations
Surface graphs have been used in many application domains to represent t...
read it

Application of the Fast Multipole Fully Coupled Poroelastic Displacement Discontinuity Method to Hydraulic Fracturing Problems
In this study, a fast multipole method (FMM) is used to decrease the com...
read it

Optimizing the SSD Burst Buffer by Traffic Detection
Currently, Burst buffer has been proposed to manage the SSD buffering of...
read it

Robustness of Neural Networks to Parameter Quantization
Quantization, a commonly used technique to reduce the memory footprint o...
read it

Deep Reinforcement Learning for Detecting Malicious Websites
Phishing is the simplest form of cybercrime with the objective of baitin...
read it

Markov Decision Process to Enforce Moving Target Defence Policies
Moving Target Defense (MTD) is an emerging gamechanging defense strateg...
read it

A primaldual weak Galerkin finite element method for firstorder transport problems
This article devises a new numerical method for firstorder transport pr...
read it

Multimodal Sentiment Analysis using Deep Canonical Correlation Analysis
This paper learns multimodal embeddings from text, audio, and video vie...
read it

PWillmore flow with quasiconformal mesh regularization
The pWillmore functional introduced by Gruber et al. unifies and extend...
read it

Job Scheduling on Data Centers with Deep Reinforcement Learning
Efficient job scheduling on data centers under heterogeneous complexity ...
read it

Selfboosted Timeseries Forecasting with Multitask and Multiview Learning
A robust model for time series forecasting is highly important in many d...
read it

Kinetic Song Comprehension: Deciphering Personal Listening Habits via Phone Vibrations
Music is an expression of our identity, showing a significant correlatio...
read it

A Comparative Analysis of Forecasting Financial Time Series Using ARIMA, LSTM, and BiLSTM
Machine and deep learningbased algorithms are the emerging approaches i...
read it

Discovering Opioid Use Patterns from Social Media for Relapse Prevention
The United States is currently experiencing an unprecedented opioid cris...
read it

Data Centers Job Scheduling with Deep Reinforcement Learning
Efficient job scheduling on data centers under heterogeneous complexity ...
read it

Remarks on a Tropical Key Exchange System
We consider a keyexchange protocol based on matrices over a tropical se...
read it

An adaptive sparse grid local discontinuous Galerkin method for HamiltonJacobi equations in high dimensions
We are interested in numerically solving the HamiltonJacobi (HJ) equati...
read it

Cloud as an Attack Platform
We present an exploratory study of responses from 75 security profession...
read it

Launching Stealth Attacks using Cloud
Cloud computing offers users scalable platforms and low resource cost. A...
read it

Vulnerability Coverage as an Adequacy Testing Criterion
Mainstream software applications and tools are the configurable platform...
read it

Vulnerability Coverage for Secure Configuration
We present a novel idea on adequacy testing called “vulnerability covera...
read it

Detection of Coincidentally Correct Test Cases through Random Forests
The performance of coveragebased fault localization greatly depends on ...
read it

Stringbased methods for tonal harmony: A corpus study of Haydn's string quartets
This chapter considers how stringbased methods might be adapted to addr...
read it

Computational Complexity Characterization of Protecting Elections from Bribery
The bribery problem in election has received considerable attention in t...
read it

Structure Probing Neural Network Deflation
Deep learning is a powerful tool for solving nonlinear differential equa...
read it

A New Block Preconditioner for Implicit RungeKutta Methods for Parabolic PDE
A new preconditioner based on a block LDU factorization with algebraic m...
read it

Coarse to Fine: Multilabel Image Classification with Global/Local Attention
In our daily life, the scenes around us are always with multiple labels ...
read it

A Survey on Vulnerabilities of Ethereum Smart Contracts
Smart contract (SC) is an extension of BlockChain technology. Ethereum B...
read it

Strong Scaling of OpenACC enabled Nek5000 on several GPU based HPC systems
We present new results on the strong parallel scaling for the OpenACCac...
read it
Texas Tech University
Texas Tech University, often referred to as Texas Tech, Tech, or TTU, is a public research university in Lubbock, Texas.