326 - 350 of 957
Number of results to display per page
CreatorTitleDescriptionSubjectDate
326 Kasera, Sneha K.Exploiting altruism in social networks for friend-to-friend malware detectionWe propose a novel malware detection application- SocialScan-which enables friend-to-friend (f2f) malware scanning services among social peers, with scanning resource sharing governed by levels of social altruism. We show that with f2f sharing of resources, SocialScan achieves a 65% increase in the ...2014-01-01
327 Thompson, William B.Exploiting discontinuities in optical flowMost optical flow estimation techniques have substantial difficulties dealing with flow discontinuities. Methods which simultaneously detect flow boundaries and use the detected boundaries to aid in flow estimation can produce significantly improved results. Current approaches to implementing these ...Optical flow; Discontinuities1995
328 Balasubramonian, RajeevExploiting eager register release in a redundantly multi-threaded processorDue to shrinking transistor sizes and lower supply voltages, transient faults (soft errors) in computer systems are projected to increase by orders of magnitude. Fault detection and recovery can be achieved through redundancy. Redundant multithreading (RMT) is one attractive approach to detect and r...Transient faults; Soft errors; Redundant multithreading; Eager register release; Register file design2006
329 Riloff, Ellen M.Exploiting role-identifying nouns and expressions for information extractionWe present a new approach for extraction pattern learning that exploits role-identifying nouns, which are nouns whose semantics reveal the role that they play in an event (e.g., an "assassin" is a perpetrator). Given a few seed nouns, a bootstrapping algorithm automatically learns role-identifying ...Information extraction; Role-identifying; Nouns; Expressions; Pattern learning; Basilisk bootstrapping algorithm2007
330 Riloff, Ellen M.Exploiting strong syntactic heuristics and co-training to learn semantic lexiconsWe present a bootstrapping method that uses strong syntactic heuristics to learn semantic lexicons. The three sources of information are appositives, compound nouns, and ISA clauses. We apply heuristics to these syntactic structures, embed them in a bootstrapping architecture, and combine them with...Syntactic heuristics; Semantic lexicons; Bootstrapping method; Appositives; Compound nouns; ISA clauses; Co-training2002
331 Riloff, Ellen M.Exploiting subjectivity classification to improve information extractionInformation extraction (IE) systems are prone to false hits for a variety of reasons and we observed that many of these false hits occur in sentences that contain subjective language (e.g., opinions, emotions, and sentiments). Motivated by these observations, we explore the idea of using subjecti...Subjectivity classification; Information extraction; Subjectivity analysis; MUC-42005
332 Gilbert, Nathan Alan; Riloff, Ellen M.Exploring Knowledge-Rich Solutions to Noun Phrase Coreference ResolutionCoreference resolution is the task of identifying coreferent expressions in text. Accurate coreference resolution can improve other tasks such as machine translation, information retrievel and document summarization. Currently, the best approaches involve some form of supervised Machine Learni...
333 Pascucci, ValerioExploring performance data with boxfishThe growth in size and complexity of scaling applications and the systems on which they run pose challenges in analyzing and improving their overall performance. With metrics coming from thousands or millions of processes, visualization techniques are necessary to make sense of the increasing amount...2012-01-01
334 Pascucci, ValerioExploring power behaviors and trade-offs of in-situ data analyticsAs scientific applications target exascale, challenges related to data and energy are becoming dominating concerns. For example, coupled simulation workflows are increasingly adopting in-situ data processing and analysis techniques to address costs and overheads due to data movement and I/O. However...2013-01-01
335 Balasubramonian, RajeevExploring the design space for 3D clustered architectures3D die-stacked chips are emerging as intriguing prospects for the future because of their ability to reduce on-chip wire delays and power consumption. However, they will likely cause an increase in chip operating temperature, which is already a major bottleneck in modern microprocessor design. We...2006
336 Kuramkote, Ravindra; Carter, JohnExploring the value of supporting multiple DSM protocols in Hardware DSM ControllersThe performance of a hardware distributed shared memory (DSM) system is largely dependent on its architect's ability to reduce the number of remote memory misses that occur. Previous attempts to solve this problem have included measures such as supporting both the CC-NUMA and S-COMA architectures is...DSM; Controllers1999
337 McDirmid, Sean; Hsieh, Wilson C.; Flatt, MattExpressive modular linking for object-oriented languagesIn this paper we show how modular linking of program fragments can be added to statically typed, object-oriented (OO) languages. Programs are being assembled out of separately developed software components deployed in binary form. Unfortunately, mainstream OO languages (such as Java) still do not ...Modular linking; Program fragments2002-10-11
338 Shirley, Peter S.; Thompson, William B.Expressive rendering of mountainous terrainPainters and cartographers have developed artistic landscape rendering techniques for centuries. Such renderings can visualize complex three-dimensional landscapes in a pleasing and understandable way. In this work we examine a particular type of artistic depiction, panorama maps, in terms of fun...panorama maps; Non-photorealistic rendering; Terrain; Texture synthesis2007
339 Pascucci, ValerioExtreme-scale visual analyticsThe September/October 2004 CG&A introduced the term visual analytics (VA) to the computer science literature.1 In 2005, an international advisory panel with representatives from academia, industry, and government defined VA as "the science of analytical reasoning facilitated by interactive visual in...2012-01-01
340 Lindstrom, Gary E.Fast and accurate NN approach for multi-event annotation of time seriesSimilarity search in time-series subsequences is an important time series data mining task. Searching in time series subsequences for matches for a set of shapes is an extension of this task and is equally important. In this work we propose a simple but efficient approach for finding matches for a g...Time-series subsequences; Nearest neighbor approach; Multi-event2003
341 Hansen, Charles D.Fast data parallel polygon renderingThis paper describes a data parallel method for polygon rendering on a massively parallel machine. This method, based on a simple shading model, is targeted for applications which require very fast rendering for extremely large sets of polygons. Such sets are found in many scienti c visualization ap...1993
342 Hansen, Charles D.Fast stereoscopic images with ray-traced volume renderingOne of the drawbacks of standard volume rendering techniques is that it is often difficult to comprehend the three-dimensional structure of the volume from a single frame; this is especially true in cases where there is no solid surface. Generally, several frames must be generated and viewed sequent...Volume rendering; Ray tracing; Stereoscopic images; Reprojection1994
343 Gu, JunFast structured design of VLSI circuitsWe believe that a structured, user-friendly, cost-effective tool for rapid implementation of VLSI circuits which encourages students to participate directly in research projects are the key components in digital integrated circuit (IC) education. In this paper, we introduce our VLSI education activ...VLSI circuits; Rapid implementation1988
344 Kopta, Daniel M.; Kensler, Andrew Erin; Spjut, Josef Bo; Brunvand, Erik L.; Davis, AlFast, effective BVH updates for dynamic ray-traced scenes using tree rotationsBounding volume hierarchies are a popular choice for ray tracing animated scenes due to the relative simplicity of refitting bounding volumes around moving geometry. However, the quality of such a refitted tree can degrade rapidly if objects in the scene deform or rearrange significantly as the ...Ray tracing; Acceleration structures; Bounding volume hierarchies; Tree rotations; Dynamic scenes; Parallel update2011
345 Riloff, Ellen M.Feature subsumption for opinion analysisLexical features are key to many approaches to sentiment analysis and opinion detection. A variety of representations have been used, including single words, multi-word Ngrams, phrases, and lexicosyntactic patterns. In this paper, we use a subsumption hierarchy to formally define different types o...Feature subsumption; Sentiment analysis; Opinion detection; Subsumption hierarchy2006
346 Cohen, ElaineFeature-based process planning for CNC machiningToday CNC machining is used successfully to provide program-driven medium lot size manufacturing. The range of applicability of CNC machining should be greater: For small lot sizes such as prototyping or custom products, these machines should provide quick turnaround and flexible production schedul...CNC machining1998
347 Thompson, William B.Feature-based reverse engineering of mechanical partsReverse engineering of mechanical parts requires extraction of information about an instance of a particular part sufficient to replicate the part using appropriate manufacturing techniques. This is important in a wide variety of situations, since functioning CAD models are often unavailable or unus...Mechanical parts1995
348 Regehr, JohnFinding and understanding bugs in C compilersCompilers should be correct. To improve the quality of C compilers, we created Csmith, a randomized test-case generation tool, and spent three years using it to find compiler bugs. During this period we reported more than 325 previously unknown bugs to compiler developers. Every compiler we tested w...2011-01-01
349 Yang, Xuejun; Chen, Yang; Eide, Eric; Regehr, JohnFinding compiler bugs with random testingUndefined behavior (such as divide by 0) or unspecified behavior (such as order of evaluation) gives compilers freedom to diverge, causing failure to our voting mechanism Control Flow Analysis • a control flow analyzer that can handle abnormal edges created by jump statements (goto / break ...
350 Balasubramonian, RajeevFirst-order analysis of power overheads of redundant multi-threadingRedundant multi-threading (RMT) has been proposed as an architectural approach that efficiently detects and recovers from soft errors. RMT can impose non-trivial overheads in terms of power consumption. In this paper, we characterize some of the major factors that influence the power consumed by R...Redundant multi-threading; RMT; Soft errors; Power overheads; Power consumption2006
326 - 350 of 957