Skip to main content

Showing 1–5 of 5 results for author: Wheeler, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.16569  [pdf, ps, other

    cs.LG cs.AI cs.CL eess.IV

    Autoencoder-Based Domain Learning for Semantic Communication with Conceptual Spaces

    Authors: Dylan Wheeler, Balasubramaniam Natarajan

    Abstract: Communication with the goal of accurately conveying meaning, rather than accurately transmitting symbols, has become an area of growing interest. This paradigm, termed semantic communication, typically leverages modern developments in artificial intelligence and machine learning to improve the efficiency and robustness of communication systems. However, a standard model for capturing and quantifyi… ▽ More

    Submitted 29 January, 2024; originally announced January 2024.

    Comments: 6 pages, 5 figures. This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  2. arXiv:2105.12880  [pdf, other

    cs.DC cs.PF

    The Petascale DTN Project: High Performance Data Transfer for HPC Facilities

    Authors: Eli Dart, William Allcock, Wahid Bhimji, Tim Boerner, Ravinderjeet Cheema, Andrew Cherry, Brent Draney, Salman Habib, Damian Hazen, Jason Hill, Matt Kollross, Suzanne Parete-Koon, Daniel Pelfrey, Adrian Pope, Jeff Porter, David Wheeler

    Abstract: The movement of large-scale (tens of Terabytes and larger) data sets between high performance computing (HPC) facilities is an important and increasingly critical capability. A growing number of scientific collaborations rely on HPC facilities for tasks which either require large-scale data sets as input or produce large-scale data sets as output. In order to enable the transfer of these data sets… ▽ More

    Submitted 8 September, 2021; v1 submitted 26 May, 2021; originally announced May 2021.

  3. BOSS-LDG: A Novel Computational Framework that Brings Together Blue Waters, Open Science Grid, Shifter and the LIGO Data Grid to Accelerate Gravitational Wave Discovery

    Authors: E. A. Huerta, Roland Haas, Edgar Fajardo, Daniel S. Katz, Stuart Anderson, Peter Couvares, Josh Willis, Timothy Bouvet, Jeremy Enos, William T. C. Kramer, Hon Wai Leong, David Wheeler

    Abstract: We present a novel computational framework that connects Blue Waters, the NSF-supported, leadership-class supercomputer operated by NCSA, to the Laser Interferometer Gravitational-Wave Observatory (LIGO) Data Grid via Open Science Grid technology. To enable this computational infrastructure, we configured, for the first time, a LIGO Data Grid Tier-1 Center that can submit heterogeneous LIGO workfl… ▽ More

    Submitted 25 September, 2017; originally announced September 2017.

    Comments: 10 pages, 10 figures. Accepted as a Full Research Paper to the 13th IEEE International Conference on eScience

    ACM Class: C.2.4; C.5.1; D.1.3; J.2

    Journal ref: 2017 IEEE 13th International Conference on e-Science

  4. Countering Trusting Trust through Diverse Double-Compiling

    Authors: David A. Wheeler

    Abstract: An Air Force evaluation of Multics, and Ken Thompson's famous Turing award lecture "Reflections on Trusting Trust," showed that compilers can be subverted to insert malicious Trojan horses into critical software, including themselves. If this attack goes undetected, even complete analysis of a system's source code will not find the malicious code that is running, and methods for detecting this pa… ▽ More

    Submitted 30 April, 2010; originally announced April 2010.

    Comments: 13 pages.

    Journal ref: Proc. of the 21st Annual Computer Security Applications Conference (ACSAC), December 5-9, 2005, Tucson, Arizona, pp. 28-40, Los Alamitos: IEEE Computer Society, ISBN 0-7695-2461-3, ISSN 1063-9527, IEEE Computer Society Order Number P2461.

  5. arXiv:1004.5534  [pdf

    cs.CR cs.PL

    Fully Countering Trusting Trust through Diverse Double-Compiling

    Authors: David A. Wheeler

    Abstract: An Air Force evaluation of Multics, and Ken Thompson's Turing award lecture ("Reflections on Trusting Trust"), showed that compilers can be subverted to insert malicious Trojan horses into critical software, including themselves. If this "trusting trust" attack goes undetected, even complete analysis of a system's source code will not find the malicious code that is running. Previously-known cou… ▽ More

    Submitted 30 April, 2010; originally announced April 2010.

    Comments: PhD dissertation. Accepted by George Mason University, Fairfax, Virginia, USA's Volgenau School of Information Technology and Engineering in 2009. 199 single-side printed pages.