Matching Items (855)
Filtering by

Clear all filters

ContributorsASU Library. Music Library (Publisher)
Created2018-10-10
ContributorsASU Library. Music Library (Publisher)
Created2018-10-11
135084-Thumbnail Image.png
Description
The Nash, a jazz venue in Phoenix, Arizona, is an example of a decades-long process of the formalization of jazz—being codified as an art music relying on academic and philanthropic support. Formalization developed as jazz began to be taken seriously as art music worth of critical evaluation from critics, academics,

The Nash, a jazz venue in Phoenix, Arizona, is an example of a decades-long process of the formalization of jazz—being codified as an art music relying on academic and philanthropic support. Formalization developed as jazz began to be taken seriously as art music worth of critical evaluation from critics, academics, and the hallowed establishments of American high art. Jazz became increasingly dependent on an infrastructure of institutional support, and a neoclassical ideology sought to define what styles of jazz were ‘real’ and worthy of preservation. In Phoenix, the origins of The Nash were laid in 1977 when Jazz in Arizona was formed, a non-profit organization that aimed to support jazz through information dissemination, music scholarships, festival organizing, and attending jazz events throughout Arizona. The Nash was conceived as a way to more fully engage young people in the community. Herb Ely, a prominent Phoenix attorney and philanthropist, pitched the idea to Joel Goldenthal, then Executive Director of Jazz in Arizona. The venue was built under the auspices of Jazz in Arizona, and operates as the organization’s headquarters. In keeping with the broader trend of formalization, The Nash presents jazz as a performance of artistic expression. Continued philanthropic support allows The Nash a degree of independence from economic concerns. The Nash is also committed to providing support for jazz education, by partnering with local educational institutions and presenting educational programming. The focus on providing opportunities for young musicians, as well as its location in the hip neighborhood of Roosevelt Row have contributed to The Nash becoming relatively popular among young people. However, the formalized approach to jazz espoused by The Nash has created some conflicts within the Phoenix jazz community, as some professional musicians feel that The Nash is underpaying musicians for their labor. The American Federation of Musicians Local 586 argues that musicians are workers, and The Nash ought to be paying union scale.
Created2016-12
153597-Thumbnail Image.png
Description
In this dissertation, two problems are addressed in the verification and control of Cyber-Physical Systems (CPS):

1) Falsification: given a CPS, and a property of interest that the CPS must satisfy under all allowed operating conditions, does the CPS violate, i.e. falsify, the property?

2) Conformance testing: given a model of a

In this dissertation, two problems are addressed in the verification and control of Cyber-Physical Systems (CPS):

1) Falsification: given a CPS, and a property of interest that the CPS must satisfy under all allowed operating conditions, does the CPS violate, i.e. falsify, the property?

2) Conformance testing: given a model of a CPS, and an implementation of that CPS on an embedded platform, how can we characterize the properties satisfied by the implementation, given the properties satisfied by the model?

Both problems arise in the context of Model-Based Design (MBD) of CPS: in MBD, the designers start from a set of formal requirements that the system-to-be-designed must satisfy.

A first model of the system is created.

Because it may not be possible to formally verify the CPS model against the requirements, falsification tries to verify whether the model satisfies the requirements by searching for behavior that violates them.

In the first part of this dissertation, I present improved methods for finding falsifying behaviors of CPS when properties are expressed in Metric Temporal Logic (MTL).

These methods leverage the notion of robust semantics of MTL formulae: if a falsifier exists, it is in the neighborhood of local minimizers of the robustness function.

The proposed algorithms compute descent directions of the robustness function in the space of initial conditions and input signals, and provably converge to local minima of the robustness function.

The initial model of the CPS is then iteratively refined by modeling previously ignored phenomena, adding more functionality, etc., with each refinement resulting in a new model.

Many of the refinements in the MBD process described above do not provide an a priori guaranteed relation between the successive models.

Thus, the second problem above arises: how to quantify the distance between two successive models M_n and M_{n+1}?

If M_n has been verified to satisfy the specification, can it be guaranteed that M_{n+1} also satisfies the same, or some closely related, specification?

This dissertation answers both questions for a general class of CPS, and properties expressed in MTL.
ContributorsAbbas, Houssam Y (Author) / Fainekos, Georgios (Thesis advisor) / Duman, Tolga (Thesis advisor) / Mittelmann, Hans (Committee member) / Tsakalis, Konstantinos (Committee member) / Arizona State University (Publisher)
Created2015
154548-Thumbnail Image.png
Description
The percussion jazz ensemble is a long-established yet rare component of 21st century percussion studios in the United States. While many American collegiate programs have percussion ensembles that perform jazz-based pieces, none are identified as a “percussion jazz ensemble.” This may be for a variety of reasons. Professors may not

The percussion jazz ensemble is a long-established yet rare component of 21st century percussion studios in the United States. While many American collegiate programs have percussion ensembles that perform jazz-based pieces, none are identified as a “percussion jazz ensemble.” This may be for a variety of reasons. Professors may not have considered adding a percussion jazz ensemble to their program because of its scarcity in American universities. Including such a class would be challenging if the instructors did not feel comfortable or familiar enough with jazz idioms and vernacular. Additionally, very few compositions or arrangements are available for this group. While there are several method books on jazz vibraphone, there are no pedagogical resources designed specifically for the percussion jazz ensemble. The purpose of this document is to provide historical context, curricula, resource materials, and arrangements necessary for establishing a percussion jazz ensemble at the collegiate level. The end result will be to demonstrate the importance of an ensemble such as this for aspiring percussionists and motivate institutions focused on Western classical music to incorporate jazz elements into their percussion program. Research conducted for this project was limited to academic universities, pedagogical approaches, and ensembles found only in the United States and will not include a survey of those outside this country.
ContributorsMoreau, Danielle (Author) / Smith, Jeffrey (Thesis advisor) / Feisst, Sabine (Committee member) / Swoboda, Deanna (Committee member) / Arizona State University (Publisher)
Created2016
154657-Thumbnail Image.png
Description
Several decades of transistor technology scaling has brought the threat of soft errors to modern embedded processors. Several techniques have been proposed to protect these systems from soft errors. However, their effectiveness in protecting the computation cannot be ascertained without accurate and quantitative estimation of system reliability. Vulnerability -- a

Several decades of transistor technology scaling has brought the threat of soft errors to modern embedded processors. Several techniques have been proposed to protect these systems from soft errors. However, their effectiveness in protecting the computation cannot be ascertained without accurate and quantitative estimation of system reliability. Vulnerability -- a metric that defines the probability of system-failure (reliability) through analytical models -- is the most effective mechanism for our current estimation and early design space exploration needs. Previous vulnerability estimation tools are based around the Sim-Alpha simulator which has been to shown to have several limitations. In this thesis, I present gemV: an accurate and comprehensive vulnerability estimation tool based on gem5. Gem5 is a popular cycle-accurate micro-architectural simulator that can model several different processor models in close to real hardware form. GemV can be used for fast and early design space exploration and also evaluate the protection afforded by commodity processors. gemV is comprehensive, since it models almost all sequential components of the processor. gemV is accurate because of fine-grain vulnerability tracking, accurate vulnerability modeling of squashed instructions, and accurate vulnerability modeling of shared data structures in gem5. gemV has been thoroughly validated against extensive fault injection experiments and achieves a 97\% accuracy with 95\% confidence. A micro-architect can use gemV to discover micro-architectural variants of a processor that minimize vulnerability for allowed performance penalty. A software developer can use gemV to explore the performance-vulnerability trade-off by choosing different algorithms and compiler optimizations, while the system designer can use gemV to explore the performance-vulnerability trade-offs of choosing different Insruction Set Architectures (ISA).
ContributorsTanikella, Srinivas Karthik (Author) / Shrivastava, Aviral (Thesis advisor) / Bazzi, Rida (Committee member) / Wu, Carole-Jean (Committee member) / Arizona State University (Publisher)
Created2016
155085-Thumbnail Image.png
Description
High-level inference tasks in video applications such as recognition, video retrieval, and zero-shot classification have become an active research area in recent years. One fundamental requirement for such applications is to extract high-quality features that maintain high-level information in the videos.

Many video feature extraction algorithms have been purposed, such

High-level inference tasks in video applications such as recognition, video retrieval, and zero-shot classification have become an active research area in recent years. One fundamental requirement for such applications is to extract high-quality features that maintain high-level information in the videos.

Many video feature extraction algorithms have been purposed, such as STIP, HOG3D, and Dense Trajectories. These algorithms are often referred to as “handcrafted” features as they were deliberately designed based on some reasonable considerations. However, these algorithms may fail when dealing with high-level tasks or complex scene videos. Due to the success of using deep convolution neural networks (CNNs) to extract global representations for static images, researchers have been using similar techniques to tackle video contents. Typical techniques first extract spatial features by processing raw images using deep convolution architectures designed for static image classifications. Then simple average, concatenation or classifier-based fusion/pooling methods are applied to the extracted features. I argue that features extracted in such ways do not acquire enough representative information since videos, unlike images, should be characterized as a temporal sequence of semantically coherent visual contents and thus need to be represented in a manner considering both semantic and spatio-temporal information.

In this thesis, I propose a novel architecture to learn semantic spatio-temporal embedding for videos to support high-level video analysis. The proposed method encodes video spatial and temporal information separately by employing a deep architecture consisting of two channels of convolutional neural networks (capturing appearance and local motion) followed by their corresponding Fully Connected Gated Recurrent Unit (FC-GRU) encoders for capturing longer-term temporal structure of the CNN features. The resultant spatio-temporal representation (a vector) is used to learn a mapping via a Fully Connected Multilayer Perceptron (FC-MLP) to the word2vec semantic embedding space, leading to a semantic interpretation of the video vector that supports high-level analysis. I evaluate the usefulness and effectiveness of this new video representation by conducting experiments on action recognition, zero-shot video classification, and semantic video retrieval (word-to-video) retrieval, using the UCF101 action recognition dataset.
ContributorsHu, Sheng-Hung (Author) / Li, Baoxin (Thesis advisor) / Turaga, Pavan (Committee member) / Liang, Jianming (Committee member) / Tong, Hanghang (Committee member) / Arizona State University (Publisher)
Created2016
155240-Thumbnail Image.png
Description
Cyber-physical systems and hard real-time systems have strict timing constraints that specify deadlines until which tasks must finish their execution. Missing a deadline can cause unexpected outcome or endanger human lives in safety-critical applications, such as automotive or aeronautical systems. It is, therefore, of utmost importance to obtain and optimize

Cyber-physical systems and hard real-time systems have strict timing constraints that specify deadlines until which tasks must finish their execution. Missing a deadline can cause unexpected outcome or endanger human lives in safety-critical applications, such as automotive or aeronautical systems. It is, therefore, of utmost importance to obtain and optimize a safe upper bound of each task’s execution time or the worst-case execution time (WCET), to guarantee the absence of any missed deadline. Unfortunately, conventional microarchitectural components, such as caches and branch predictors, are only optimized for average-case performance and often make WCET analysis complicated and pessimistic. Caches especially have a large impact on the worst-case performance due to expensive off- chip memory accesses involved in cache miss handling. In this regard, software-controlled scratchpad memories (SPMs) have become a promising alternative to caches. An SPM is a raw SRAM, controlled only by executing data movement instructions explicitly at runtime, and such explicit control facilitates static analyses to obtain safe and tight upper bounds of WCETs. SPM management techniques, used in compilers targeting an SPM-based processor, determine how to use a given SPM space by deciding where to insert data movement instructions and what operations to perform at those program locations. This dissertation presents several management techniques for program code and stack data, which aim to optimize the WCETs of a given program. The proposed code management techniques include optimal allocation algorithms and a polynomial-time heuristic for allocating functions to the SPM space, with or without the use of abstraction of SPM regions, and a heuristic for splitting functions into smaller partitions. The proposed stack data management technique, on the other hand, finds an optimal set of program locations to evict and restore stack frames to avoid stack overflows, when the call stack resides in a size-limited SPM. In the evaluation, the WCETs of various benchmarks including real-world automotive applications are statically calculated for SPMs and caches in several different memory configurations.
ContributorsKim, Yooseong (Author) / Shrivastava, Aviral (Thesis advisor) / Broman, David (Committee member) / Fainekos, Georgios (Committee member) / Wu, Carole-Jean (Committee member) / Arizona State University (Publisher)
Created2017
155796-Thumbnail Image.png
Description
This dissertation describes the public sphere that coalesced in the Soviet jazz scene during Josef Stalin’s reign. Scholars debate the extent to which Soviet citizens, especially under Stalin, were coerced into cooperating with the regime through terror; willingly cooperated with the regime out of self-interest; or re-aligned their speech, behavior,

This dissertation describes the public sphere that coalesced in the Soviet jazz scene during Josef Stalin’s reign. Scholars debate the extent to which Soviet citizens, especially under Stalin, were coerced into cooperating with the regime through terror; willingly cooperated with the regime out of self-interest; or re-aligned their speech, behavior, and thoughts to conform to Bolshevik ideology and discourse. In all cases, citizens were generally unable to openly express their own opinions on what Soviet society should look like. In this dissertation, I attempt to bridge this gap by analyzing the diverse reactions to jazz music in Josef Stalin’s Soviet Union. I argue that audience engagement with jazz and discussions about the genre in the Soviet press and elsewhere were attempts to grapple with bigger questions of public concern about leisure, morality, ethnicity, cosmopolitanism and patriotism in a socialist society. This jazz public sphere was suppressed in the late 1940s and early 1950s because of Cold War paranoia and fears of foreign influences in Soviet life. In its place, a counterpublic sphere formed, in which jazz enthusiasts expressed views on socialism that were more open and contradictory to official norms. This counterpublic sphere foreshadowed aspects of post-Stalinist Soviet culture. To support my arguments, I employ archival documents such as fan mail and censorship records, periodicals, memoirs, and Stalin-era jazz recordings to determine the themes present in jazz music, how audiences reacted to them, and how these popular reactions overlapped with those of journalists, musicologists, bureaucrats, and composers. This project expands our understanding of when and where public spheres can form, challenges top-down interpretations of Soviet cultural policy, and illuminates the Soviet Union and Russia’s ambivalent relationship with the West and its culture.
ContributorsBeresford, Benjamin J. (Author) / Von Hagen, Mark (Thesis advisor) / Manchester, Laurie (Committee member) / Schmelz, Peter (Committee member) / Moore, Aaron (Committee member) / Arizona State University (Publisher)
Created2017
149452-Thumbnail Image.png
Description
Cyber Physical Systems (CPSs) are systems comprising of computational systems that interact with the physical world to perform sensing, communication, computation and actuation. Common examples of these systems include Body Area Networks (BANs), Autonomous Vehicles (AVs), Power Distribution Systems etc. The close coupling between cyber and physical worlds in a

Cyber Physical Systems (CPSs) are systems comprising of computational systems that interact with the physical world to perform sensing, communication, computation and actuation. Common examples of these systems include Body Area Networks (BANs), Autonomous Vehicles (AVs), Power Distribution Systems etc. The close coupling between cyber and physical worlds in a CPS manifests in two types of interactions between computing systems and the physical world: intentional and unintentional. Unintentional interactions result from the physical characteristics of the computing systems and often cause harm to the physical world, if the computing nodes are close to each other, these interactions may overlap thereby increasing the chances of causing a Safety hazard. Similarly, due to mobile nature of computing nodes in a CPS planned and unplanned interactions with the physical world occur. These interactions represent the behavior of a computing node while it is following a planned path and during faulty operations. Both of these interactions change over time due to the dynamics (motion) of the computing node and may overlap thereby causing harm to the physical world. Lack of proper modeling and analysis frameworks for these systems causes system designers to use ad-hoc techniques thereby further increasing their design and development time. The thesis addresses these problems by taking a holistic approach to model Computational, Physical and Cyber Physical Interactions (CPIs) aspects of a CPS and proposes modeling constructs for them. These constructs are analyzed using a safety analysis algorithm developed as part of the thesis. The algorithm computes the intersection of CPIs for both mobile as well as static computing nodes and determines the safety of the physical system. A framework is developed by extending AADL to support these modeling constructs; the safety analysis algorithm is implemented as OSATE plug-in. The applicability of the proposed approach is demonstrated by considering the safety of human tissue during the operations of BAN, and the safety of passengers traveling in an Autonomous Vehicle.
ContributorsKandula, Sailesh Umamaheswara (Author) / Gupta, Sandeep (Thesis advisor) / Lee, Yann Hang (Committee member) / Fainekos, Georgios (Committee member) / Arizona State University (Publisher)
Created2010