Recent advances in cyber-infrastructure have enabled digital data sharing and ubiquitous network ... more Recent advances in cyber-infrastructure have enabled digital data sharing and ubiquitous network connectivity between scientific instruments and cloud-based storage infrastructure for uploading, storing, curating, and correlating of large amounts of materials and semiconductor fabrication data and metadata. However, there is still a significant number of scientific instruments running on old operating systems that are taken offline and cannot connect to the cloud infrastructure, due to security and performance concerns. In this paper, we propose BRACELET an edge-cloud infrastructure that augments the existing cloud-based infrastructure with edge devices and helps to tackle the unique performance & security challenges that scientific instruments face when they are connected to the cloud through public network. With BRACELET, we put a networked edge device, called cloudlet, in between the scientific instruments and the cloud as the middle tier of a three-tier hierarchy. The cloudlet w...
The recent development of high-speed data transmission over wireless cellular networks has enable... more The recent development of high-speed data transmission over wireless cellular networks has enabled the delivery of multimedia broadcasting services to mobile users. These services involve a range of interactions among different system components, including the wireless channel, the network, and mobile devices, making it crucial for the service provider to verify the model, design, and behavior of a new service before it is deployed. However, previous studies have largely relied on network simulations or scaled experiments, and there has been little work on the sort of unified framework for quality-of-service (QoS) assessment, which considers the interactions between components, that we propose in this paper. Accurate models of the wireless channel, the network, and the data processing that takes place on an embedded system of a mobile client, are integrated within our framework, and allow us to predict several key system metrics and the quality of the video stream as it is perceived by users. Furthermore, different models of system components can be easily plugged in to extend this framework. As an example application, we analyze the performance of the process of decoding scalable videos on ARM-based mobile embedded systems in CDMA2000 wireless cellular networks.
MapReduce paradigm has become the compelling choice for performing advanced analytics over unstru... more MapReduce paradigm has become the compelling choice for performing advanced analytics over unstructured information and enabling efficient “Big Data ” processing. There is an increasing number of MapReduce applications, e.g., personalized advertising, sentiment analysis, spam detection, real-time event log analysis, etc., that require completion time guarantees and are deadline-driven. In an enterprise setting, users share Hadoop clusters and benefit from processing a diverse variety of applications over the same or different datasets. The existing Hadoop schedulers (Hadoop Fair Scheduler, Capacity Scheduler) do not support completion time guarantees. Given a MapReduce workload consisting of diverse jobs with deadlines, how do we schedule them
a b s t r a c t The core business of many companies depends on the timely analysis of large quant... more a b s t r a c t The core business of many companies depends on the timely analysis of large quantities of new data. MapReduce clusters that routinely process petabytes of data represent a new entity in the evolving landscape of clouds and data centers. During the lifetime of a data center, old hardware needs to be eventually replaced by new hardware. The hardware selection process needs to be driven by performance objectives of the existing production workloads. In this work, we present a general framework, called Ariel, that automates system administrators' efforts for evaluating different hardware choices and predicting completion times of MapReduce applications for their migration to a Hadoop cluster based on the new hardware. The proposed framework consists of two key components: (i) a set of microbenchmarks to profile the MapReduce processing pipeline on a given platform, and (ii) a regression-based model that establishes a performance relationship between the source and t...
Third IEEE International Conference on Pervasive Computing and Communications
The confluence of pervasive computing, anywhere/anytime access to information resources and scala... more The confluence of pervasive computing, anywhere/anytime access to information resources and scalable computing enables the construction of smart environments or Active Spaces. In such a Space, a spectrum of computation and communication devices seamlessly augment human thought and activity with digital information, processing, and analysis to provide an observed or imagined world that is automated and enhanced by the behavioral context of its users. The power of such a computer infrastructure has three contributing factors; the translation of information to and from physical properties, the computers and their ability to transform data, and the cooperative computational environment that results from embedding these devices in a network. This computational environment or "Active World" is the likely long-term benefit of the current information technology revolution. Several major projects have shown the benefits of considering pervasive computing environments within an infrastructure, constructed from computing elements that interact to form active or smart spaces, and managed by a software control system or meta-operating system to provide integrity and consistency. As a case study, our experimental system, Gaia, creates a pervasive computing environment that encompasses multiple rooms of our new building: the Siebel Center. Tasks like tours, exhibitions, seminars, lectures, or meetings are supported by coordinated distributed applications and both tasks and their contents may be programmed. Mobile users within the building are tracked with location sensors and may create sessions involving different tasks which they then may migrate, suspend, or resume as they move from room to room. Despite recent advances, many challenges remain. Integrating the various services, components, applications, and entities into a programmable COTS infrastructure enables context sensitive applications that allow users to interact seamlessly with a combination of physical and computer facilities. Such an infrastructure of smart devices, rooms, and buildings raises the question of how to manage, program, automate, and formalize these heterogeneous sources, sinks, repositories, and processors of data. The organization, management, and programmability of physical devices and information activities in a pervasive computing environment is key to enabling diverse, autonomic, digital habitats such as university campuses, office buildings, scientific labs, and museums. However, the promise of pervasive computing cannot be realized without cost-effective and efficient mechanisms, policies, and tools to organize, manage, operate, repair, program, and evaluate systems built from pervasive computing components. Human tasks, human factors and pervasive system infrastructure interact in complex ways and methodologies need to be devised to explore and measure these interactions. In particular, a pervasive environment would need to enable opportunistic collaboration, facilitate social interaction, and support teaching and learning. This talk will explore the benefits of an Active World, the barriers to its deployment, and the research challenges that lie ahead.
1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258)
A fast, degradation-free solution for the DCT block extraction problem is proposed. The problem i... more A fast, degradation-free solution for the DCT block extraction problem is proposed. The problem is defined as extracting a DCT block from a DCT compressed frame composed of DCT blocks. This problem is encountered in both video/image manipulations in the compressed domain and transcodecs, for example, converting from MPEG to Motion JPEG. Traditionally, solutions involve using the pixel domain manipulation
When threads use context switching, they incur an overhead in addition to the minimum required ru... more When threads use context switching, they incur an overhead in addition to the minimum required running time. The source of this overhead is both direct overhead due to running the context switch code and indirect overhead due to perturbation of caches. We calculate indirect overhead by measuring the running time of tasks that use context switching and subtracting the direct overhead. We also measure the indirect overhead impact on the running time of tasks due to processor interrupt servicing. Experiment results are presented for the Linux kernel running on a mobile device platform.
2000 IEEE International Conference on Communications. ICC 2000. Global Convergence Through Communications. Conference Record
This paper proposes two frameworks for secure multicast on active networks. The frameworks exploi... more This paper proposes two frameworks for secure multicast on active networks. The frameworks exploit the computational power of active networks to provide the security desired for multicast, while removing drawbacks in traditional approaches. The main security component in the frameworks is the Active Capability(AC) which replaces the passive session key. The main advantages of using an AC are lack of an asymmetric key pair requirement for authentication, lack of session key modification requirement when a member leaves the group and a highly distributed and scalable key distribution mechanism independent of availability of a group owner.
W hen two people chat face to face, they know the conversation's context—each knows, for exam... more W hen two people chat face to face, they know the conversation's context—each knows, for example , the other person's location, what he or she is doing, who else is nearby, and the room's condition (lighting, sound, and so forth). There is also significant communication through facial and other nonverbal cues. Knowing such information makes the conversation richer. However, when you chat with someone electronically , you don't get to exchange this type of contex-tual information. Recently, there has been great interest in making applications context aware so that they can adapt to different situations and be more receptive to users' needs. In particular, text-based chat programs could greatly benefit from being context aware. Today's chat programs let users set their status (such as " out to lunch " or " on the phone "), but they generally don't let the two parties exchange any other type of contextual information. Systems such as Babb...
The Information Trust Institute (ITI) at the University of Illinois at Urbana-Champaign is develo... more The Information Trust Institute (ITI) at the University of Illinois at Urbana-Champaign is developing an entirely new multidisciplinary undergraduate curriculum on the topic of digital forensics, and this paper presents the findings of the development process, including initial results and evaluation of a pilot offering of the coursework to students. The curriculum consists of a four-course sequence, including introductory and advanced lecture courses with parallel laboratory courses, followed by an advanced course. The content has been designed to reflect both the emerging national standards and the strong multidisciplinary character of the profession of digital forensics, and includes modules developed collaboratively by faculty experts in multiple fields of computer science, law, psychology, social sciences, and accountancy. A preliminary plan for the introductory course was presented to a workshop of digital forensics experts in May 2013 and received their strong approval. Pilot...
Ubiquitous computing enables an environment that assimilates digital and physical devices seamles... more Ubiquitous computing enables an environment that assimilates digital and physical devices seamlessly and presents a unified programming interface to the user. Users can program the environment similar to programming a computer. With the widespread availability of personal devices and personal area networks, there is a growing need for personal devices to share resources and services among themselves to support complex applications. Middleware support is required for enabling interactions among services and for sharing resources. We introduce Mobile Gaia, a middleware framework to enable the construction of personal ubiquitous computing environments, or personal spaces, which are formed ad hoc using personal devices carried or worn by a person as well as devices that are physically nearby. We discuss the architecture and services of Mobile Gaia and some of the challenges that need to be addressed in this endeavor.
In this paper, we present an overview of our research project with GaiaOS, a middleware operating... more In this paper, we present an overview of our research project with GaiaOS, a middleware operating system that provides a generic computational environment for ubiquitous computing. In addition to an outline of theGaiaOSarchitecture, we describe how we address some mobility issues in this infrastructure.
Neural networks allow the implementation of complicated applications such as stock market predict... more Neural networks allow the implementation of complicated applications such as stock market predictions on low-end PCs. However, the training of neural networks can take many hours on a PC. In this paper we propose a technique for training complicated neural networks on a commodity GPU (available in a low-end PC) that completes 6 times faster than training on a multi core. Using the Proben1 benchmark for our analysis we use 15 datasets from 12 different domains to explore our solution. Our technique allows the training to be done with minimal CPU utilization time. This allows the user to carry out other tasks while the training is in progress. We compare several avenues of neural network training on a general purpose computer. The benchmark we use, covers problems of pattern classification from real life and hence is best suited for our tests as we aim to solve the problem of stock market predictions.
Abstract Proceedings of the 2021 ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2021
This work presents the first-ever detailed and large-scale measurement analysis of storage consum... more This work presents the first-ever detailed and large-scale measurement analysis of storage consumption behavior of applications (apps) on smart mobile devices. We start by carrying out a five-year longitudinal static analysis of millions of Android apps to study the increase in their sizes over time and identify various sources of app storage consumption. Our study reveals that mobile apps have evolved as large monolithic packages that are packed with features to monetize/engage users and optimized for performance at the cost of redundant storage consumption. We also carry out a mobile storage usage study with 140 Android participants. We built and deployed a lightweight context-aware storage tracing tool, called cosmos, on each participant's device. Leveraging the traces from our user study, we show that only a small fraction of apps/features are actively used and usage is correlated to user context. Our findings suggest a high degree of app feature bloat and unused functionali...
Machine Learning 2020 Organizing Committee is dedicated to gather you all for the International C... more Machine Learning 2020 Organizing Committee is dedicated to gather you all for the International Conference on Computer Science and Machine Learning slated to be held from November 02-03, 2020 at Tokyo, Japan. The conference will revolve around the theme by making the world a new place with technology. Machine Learning 2020 gives a main global gathering that unites analysts and experts from diverse fields to investigate the basic roles, interaction also the practical impact of Artificial Intelligence (AI). Computer Graphics & Animation 2020 is distinguished with the attendance of Organizing Committee Members and Editorial Board Members of supporting Journals, Scientists, young and brilliant researchers, business delegates and talented research student communities representing from developed and under developing countries, who made this conference rewarding and fecund. Conference the theme is “Innovate the immersive environments with Computer Graphics and Animation” offering a unique ...
The analysis phase of the digital forensic process is the most complex. This phase grows more com... more The analysis phase of the digital forensic process is the most complex. This phase grows more complicated as the size and ubiquity of digital devices increase. There are many tools aimed at assisting the investigator in the analysis process; however, they do not address growing challenges. In this paper, we discuss the application of graph theory, a study of related mathematical structures, to aid in the investigation process of digital forensic examiners. Graph theory is used to study the pairwise relations between objects. We explore how graph theory can be used as a basis for further analysis. We demonstrate the potential of the application of graph theory through its implementation in a case study.
Recent advances in cyber-infrastructure have enabled digital data sharing and ubiquitous network ... more Recent advances in cyber-infrastructure have enabled digital data sharing and ubiquitous network connectivity between scientific instruments and cloud-based storage infrastructure for uploading, storing, curating, and correlating of large amounts of materials and semiconductor fabrication data and metadata. However, there is still a significant number of scientific instruments running on old operating systems that are taken offline and cannot connect to the cloud infrastructure, due to security and performance concerns. In this paper, we propose BRACELET an edge-cloud infrastructure that augments the existing cloud-based infrastructure with edge devices and helps to tackle the unique performance & security challenges that scientific instruments face when they are connected to the cloud through public network. With BRACELET, we put a networked edge device, called cloudlet, in between the scientific instruments and the cloud as the middle tier of a three-tier hierarchy. The cloudlet w...
The recent development of high-speed data transmission over wireless cellular networks has enable... more The recent development of high-speed data transmission over wireless cellular networks has enabled the delivery of multimedia broadcasting services to mobile users. These services involve a range of interactions among different system components, including the wireless channel, the network, and mobile devices, making it crucial for the service provider to verify the model, design, and behavior of a new service before it is deployed. However, previous studies have largely relied on network simulations or scaled experiments, and there has been little work on the sort of unified framework for quality-of-service (QoS) assessment, which considers the interactions between components, that we propose in this paper. Accurate models of the wireless channel, the network, and the data processing that takes place on an embedded system of a mobile client, are integrated within our framework, and allow us to predict several key system metrics and the quality of the video stream as it is perceived by users. Furthermore, different models of system components can be easily plugged in to extend this framework. As an example application, we analyze the performance of the process of decoding scalable videos on ARM-based mobile embedded systems in CDMA2000 wireless cellular networks.
MapReduce paradigm has become the compelling choice for performing advanced analytics over unstru... more MapReduce paradigm has become the compelling choice for performing advanced analytics over unstructured information and enabling efficient “Big Data ” processing. There is an increasing number of MapReduce applications, e.g., personalized advertising, sentiment analysis, spam detection, real-time event log analysis, etc., that require completion time guarantees and are deadline-driven. In an enterprise setting, users share Hadoop clusters and benefit from processing a diverse variety of applications over the same or different datasets. The existing Hadoop schedulers (Hadoop Fair Scheduler, Capacity Scheduler) do not support completion time guarantees. Given a MapReduce workload consisting of diverse jobs with deadlines, how do we schedule them
a b s t r a c t The core business of many companies depends on the timely analysis of large quant... more a b s t r a c t The core business of many companies depends on the timely analysis of large quantities of new data. MapReduce clusters that routinely process petabytes of data represent a new entity in the evolving landscape of clouds and data centers. During the lifetime of a data center, old hardware needs to be eventually replaced by new hardware. The hardware selection process needs to be driven by performance objectives of the existing production workloads. In this work, we present a general framework, called Ariel, that automates system administrators' efforts for evaluating different hardware choices and predicting completion times of MapReduce applications for their migration to a Hadoop cluster based on the new hardware. The proposed framework consists of two key components: (i) a set of microbenchmarks to profile the MapReduce processing pipeline on a given platform, and (ii) a regression-based model that establishes a performance relationship between the source and t...
Third IEEE International Conference on Pervasive Computing and Communications
The confluence of pervasive computing, anywhere/anytime access to information resources and scala... more The confluence of pervasive computing, anywhere/anytime access to information resources and scalable computing enables the construction of smart environments or Active Spaces. In such a Space, a spectrum of computation and communication devices seamlessly augment human thought and activity with digital information, processing, and analysis to provide an observed or imagined world that is automated and enhanced by the behavioral context of its users. The power of such a computer infrastructure has three contributing factors; the translation of information to and from physical properties, the computers and their ability to transform data, and the cooperative computational environment that results from embedding these devices in a network. This computational environment or "Active World" is the likely long-term benefit of the current information technology revolution. Several major projects have shown the benefits of considering pervasive computing environments within an infrastructure, constructed from computing elements that interact to form active or smart spaces, and managed by a software control system or meta-operating system to provide integrity and consistency. As a case study, our experimental system, Gaia, creates a pervasive computing environment that encompasses multiple rooms of our new building: the Siebel Center. Tasks like tours, exhibitions, seminars, lectures, or meetings are supported by coordinated distributed applications and both tasks and their contents may be programmed. Mobile users within the building are tracked with location sensors and may create sessions involving different tasks which they then may migrate, suspend, or resume as they move from room to room. Despite recent advances, many challenges remain. Integrating the various services, components, applications, and entities into a programmable COTS infrastructure enables context sensitive applications that allow users to interact seamlessly with a combination of physical and computer facilities. Such an infrastructure of smart devices, rooms, and buildings raises the question of how to manage, program, automate, and formalize these heterogeneous sources, sinks, repositories, and processors of data. The organization, management, and programmability of physical devices and information activities in a pervasive computing environment is key to enabling diverse, autonomic, digital habitats such as university campuses, office buildings, scientific labs, and museums. However, the promise of pervasive computing cannot be realized without cost-effective and efficient mechanisms, policies, and tools to organize, manage, operate, repair, program, and evaluate systems built from pervasive computing components. Human tasks, human factors and pervasive system infrastructure interact in complex ways and methodologies need to be devised to explore and measure these interactions. In particular, a pervasive environment would need to enable opportunistic collaboration, facilitate social interaction, and support teaching and learning. This talk will explore the benefits of an Active World, the barriers to its deployment, and the research challenges that lie ahead.
1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258)
A fast, degradation-free solution for the DCT block extraction problem is proposed. The problem i... more A fast, degradation-free solution for the DCT block extraction problem is proposed. The problem is defined as extracting a DCT block from a DCT compressed frame composed of DCT blocks. This problem is encountered in both video/image manipulations in the compressed domain and transcodecs, for example, converting from MPEG to Motion JPEG. Traditionally, solutions involve using the pixel domain manipulation
When threads use context switching, they incur an overhead in addition to the minimum required ru... more When threads use context switching, they incur an overhead in addition to the minimum required running time. The source of this overhead is both direct overhead due to running the context switch code and indirect overhead due to perturbation of caches. We calculate indirect overhead by measuring the running time of tasks that use context switching and subtracting the direct overhead. We also measure the indirect overhead impact on the running time of tasks due to processor interrupt servicing. Experiment results are presented for the Linux kernel running on a mobile device platform.
2000 IEEE International Conference on Communications. ICC 2000. Global Convergence Through Communications. Conference Record
This paper proposes two frameworks for secure multicast on active networks. The frameworks exploi... more This paper proposes two frameworks for secure multicast on active networks. The frameworks exploit the computational power of active networks to provide the security desired for multicast, while removing drawbacks in traditional approaches. The main security component in the frameworks is the Active Capability(AC) which replaces the passive session key. The main advantages of using an AC are lack of an asymmetric key pair requirement for authentication, lack of session key modification requirement when a member leaves the group and a highly distributed and scalable key distribution mechanism independent of availability of a group owner.
W hen two people chat face to face, they know the conversation's context—each knows, for exam... more W hen two people chat face to face, they know the conversation's context—each knows, for example , the other person's location, what he or she is doing, who else is nearby, and the room's condition (lighting, sound, and so forth). There is also significant communication through facial and other nonverbal cues. Knowing such information makes the conversation richer. However, when you chat with someone electronically , you don't get to exchange this type of contex-tual information. Recently, there has been great interest in making applications context aware so that they can adapt to different situations and be more receptive to users' needs. In particular, text-based chat programs could greatly benefit from being context aware. Today's chat programs let users set their status (such as " out to lunch " or " on the phone "), but they generally don't let the two parties exchange any other type of contextual information. Systems such as Babb...
The Information Trust Institute (ITI) at the University of Illinois at Urbana-Champaign is develo... more The Information Trust Institute (ITI) at the University of Illinois at Urbana-Champaign is developing an entirely new multidisciplinary undergraduate curriculum on the topic of digital forensics, and this paper presents the findings of the development process, including initial results and evaluation of a pilot offering of the coursework to students. The curriculum consists of a four-course sequence, including introductory and advanced lecture courses with parallel laboratory courses, followed by an advanced course. The content has been designed to reflect both the emerging national standards and the strong multidisciplinary character of the profession of digital forensics, and includes modules developed collaboratively by faculty experts in multiple fields of computer science, law, psychology, social sciences, and accountancy. A preliminary plan for the introductory course was presented to a workshop of digital forensics experts in May 2013 and received their strong approval. Pilot...
Ubiquitous computing enables an environment that assimilates digital and physical devices seamles... more Ubiquitous computing enables an environment that assimilates digital and physical devices seamlessly and presents a unified programming interface to the user. Users can program the environment similar to programming a computer. With the widespread availability of personal devices and personal area networks, there is a growing need for personal devices to share resources and services among themselves to support complex applications. Middleware support is required for enabling interactions among services and for sharing resources. We introduce Mobile Gaia, a middleware framework to enable the construction of personal ubiquitous computing environments, or personal spaces, which are formed ad hoc using personal devices carried or worn by a person as well as devices that are physically nearby. We discuss the architecture and services of Mobile Gaia and some of the challenges that need to be addressed in this endeavor.
In this paper, we present an overview of our research project with GaiaOS, a middleware operating... more In this paper, we present an overview of our research project with GaiaOS, a middleware operating system that provides a generic computational environment for ubiquitous computing. In addition to an outline of theGaiaOSarchitecture, we describe how we address some mobility issues in this infrastructure.
Neural networks allow the implementation of complicated applications such as stock market predict... more Neural networks allow the implementation of complicated applications such as stock market predictions on low-end PCs. However, the training of neural networks can take many hours on a PC. In this paper we propose a technique for training complicated neural networks on a commodity GPU (available in a low-end PC) that completes 6 times faster than training on a multi core. Using the Proben1 benchmark for our analysis we use 15 datasets from 12 different domains to explore our solution. Our technique allows the training to be done with minimal CPU utilization time. This allows the user to carry out other tasks while the training is in progress. We compare several avenues of neural network training on a general purpose computer. The benchmark we use, covers problems of pattern classification from real life and hence is best suited for our tests as we aim to solve the problem of stock market predictions.
Abstract Proceedings of the 2021 ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2021
This work presents the first-ever detailed and large-scale measurement analysis of storage consum... more This work presents the first-ever detailed and large-scale measurement analysis of storage consumption behavior of applications (apps) on smart mobile devices. We start by carrying out a five-year longitudinal static analysis of millions of Android apps to study the increase in their sizes over time and identify various sources of app storage consumption. Our study reveals that mobile apps have evolved as large monolithic packages that are packed with features to monetize/engage users and optimized for performance at the cost of redundant storage consumption. We also carry out a mobile storage usage study with 140 Android participants. We built and deployed a lightweight context-aware storage tracing tool, called cosmos, on each participant's device. Leveraging the traces from our user study, we show that only a small fraction of apps/features are actively used and usage is correlated to user context. Our findings suggest a high degree of app feature bloat and unused functionali...
Machine Learning 2020 Organizing Committee is dedicated to gather you all for the International C... more Machine Learning 2020 Organizing Committee is dedicated to gather you all for the International Conference on Computer Science and Machine Learning slated to be held from November 02-03, 2020 at Tokyo, Japan. The conference will revolve around the theme by making the world a new place with technology. Machine Learning 2020 gives a main global gathering that unites analysts and experts from diverse fields to investigate the basic roles, interaction also the practical impact of Artificial Intelligence (AI). Computer Graphics & Animation 2020 is distinguished with the attendance of Organizing Committee Members and Editorial Board Members of supporting Journals, Scientists, young and brilliant researchers, business delegates and talented research student communities representing from developed and under developing countries, who made this conference rewarding and fecund. Conference the theme is “Innovate the immersive environments with Computer Graphics and Animation” offering a unique ...
The analysis phase of the digital forensic process is the most complex. This phase grows more com... more The analysis phase of the digital forensic process is the most complex. This phase grows more complicated as the size and ubiquity of digital devices increase. There are many tools aimed at assisting the investigator in the analysis process; however, they do not address growing challenges. In this paper, we discuss the application of graph theory, a study of related mathematical structures, to aid in the investigation process of digital forensic examiners. Graph theory is used to study the pairwise relations between objects. We explore how graph theory can be used as a basis for further analysis. We demonstrate the potential of the application of graph theory through its implementation in a case study.
Uploads
Papers by Roy Campbell