301 - 325 of 912
Number of results to display per page
CreatorTitleDescriptionSubjectDate
301 Carter, JohnEnsuring prolonged participation and deterring cheating behaviors in a collectiveWe are building a system that harnesses the idle resources (cpu, storage, and bandwidth) of nodes (e.g., home desktops) distributed across the Internet to build useful distributed services like content distribution or remote backup. Users are compensated in return for contributing their nodes? id...Collective systems; Cheating; Idle resources; Nodes2008
302 Cohen, ElaineError bounded approximate reparametrization of NURBS curvesThis paper reports research on solutions to the following reparametrization problem: approximate c(r(t)) by a NURBS where c is a NURBS curve and r may, or may not, be a NURBS function. There are many practical applications of this problem including establishing and exploring correspondence in geomet...Reparametrization; NURBS curve2000
303 Cohen, ElaineError bounded variable distance offset operator for free from curves and surfacesMost offset approximation algorithms for freeform curves and surfaces may be classified into two main groups. The first approximates the curve using simple primitives such as piecewise arcs and lines and then calculates the (exact) offset operator to this approximation. The second offsets the contro...Error bounded; Freeform curves1991
304 Brunvand, Erik L.Estimating performance of an ray- tracing ASIC designRecursive ray tracing is a powerful rendering technique used to compute realistic images by simulating the global light transport in a scene. Algorithmic improvements and FPGA-based hardware implementations of ray tracing have demonstrated realtime performance but hardware that achieves performance ...2006
305 Done, William JohnEstimation of the parameters of an autoregressive process in the presence of additive white noiseApplications of linear prediction (LP) algorithms have been successful in modeling various physical processes. In the area of speech analysis this has resulted in the development of LP vocoders, devices used in digital speech communication systems. The LP algorithms used in speech and other areas ar...Autoregressive process; Linear prediction algorithms; All-pole model1979
306 Lindstrom, Gary E.ETYMA: a framework for modular systemsModularity, i.e. support for the flexible construction, adaptation, and combination of units of software, is an important goal in many systems. In most cases, however, systems achieve only a few aspects of modularity. The problem can be traced to the inflexibility, or the limited view of modularity ...ETYMA; Modularity; Modular systems1994
307 Thompson, William B.Evaluating the accuracy of size perception in real and virtual environmentsAccurate perception of the size of 3D objects depicted on 2D desktop displays is important for many applications. Whether users perceive objects depicted on a display to be the same size as comparable real world objects is not well understood. We propose using affordances judgments as a way of measu...2012-01-01
308 Carter, John B.Evaluating the potential of programmable multiprocessor cache controllersThe next generation of scalable parallel systems (e.g., machines by KSR, Convex, and others) will have shared memory supported in hardware, unlike most current generation machines (e.g., offerings by Intel, nCube, and Thinking Machines). However, current shared memory architectures are constrained b...Programmable multiprocessor cache controllers; Scalable parallel systems; Shared memory1994
309 Hansen, Charles D.Evaluation of depth of field for depth perception in DVRIn this paper we present a user study on the use of Depth of Field for depth perception in Direct Volume Rendering. Direct Volume Rendering with Phong shading and perspective projection is used as the baseline. Depth of Field is then added to see its impact on the correct perception of ordinal depth...2013-01-01
310 Henderson, Thomas C.Evolutionary teleomorphologyThe physical layout of organs and neural structures in biological systems is important to their functioning, and is the result of evolutionary selection forces. We believe this is true even at the individual neuron level, and should be accounted for in any bio-based approach. In particular, when tr...Evolutionary teleomorphology; Bio-based approach; Physical layout problem; PLP; Neurons; Nodes1995
311 Regehr, JohnEvolving real-time systems using hierarchical scheduling and concurrency analysisWe have developed a new way to look at real-time and embedded software: as a collection of execution environments created by a hierarchy of schedulers. Common schedulers include those that run interrupts, bottom-half handlers, threads, and events. We have created algorithms for deriving response tim...2003-01-01
312 Henderson, Thomas C.Explicit and persistent knowledge in engineering drawing analysisDomain knowledge permeates all aspects of the engineering drawing analysis process, including understanding the physical processes operating on the medium (i.e., paper), the image analysis techniques, and the interpretation semantics of the structural layout and contents of the drawing. Additiona...Engineering drawing analysis2003-10-10
313 Gopalakrishnan, GaneshExplicit-enumeration based verification made memory-efficientWe investigate techniques for reducing the memory requirements of a model checking tool employing explicit enumeration. Two techniques are studied in depth: (1) exploiting symmetries in the model, and (2) exploiting sequential regions in the model. The first technique resulted in a significant reduc...Verification; Model checking tool; Memory-efficient1995
314 Kasera, Sneha K.Exploiting altruism in social networks for friend-to-friend malware detectionWe propose a novel malware detection application- SocialScan-which enables friend-to-friend (f2f) malware scanning services among social peers, with scanning resource sharing governed by levels of social altruism. We show that with f2f sharing of resources, SocialScan achieves a 65% increase in the ...2014-01-01
315 Thompson, William B.Exploiting discontinuities in optical flowMost optical flow estimation techniques have substantial difficulties dealing with flow discontinuities. Methods which simultaneously detect flow boundaries and use the detected boundaries to aid in flow estimation can produce significantly improved results. Current approaches to implementing these ...Optical flow; Discontinuities1995
316 Balasubramonian, RajeevExploiting eager register release in a redundantly multi-threaded processorDue to shrinking transistor sizes and lower supply voltages, transient faults (soft errors) in computer systems are projected to increase by orders of magnitude. Fault detection and recovery can be achieved through redundancy. Redundant multithreading (RMT) is one attractive approach to detect and r...Transient faults; Soft errors; Redundant multithreading; Eager register release; Register file design2006
317 Riloff, Ellen M.Exploiting role-identifying nouns and expressions for information extractionWe present a new approach for extraction pattern learning that exploits role-identifying nouns, which are nouns whose semantics reveal the role that they play in an event (e.g., an "assassin" is a perpetrator). Given a few seed nouns, a bootstrapping algorithm automatically learns role-identifying ...Information extraction; Role-identifying; Nouns; Expressions; Pattern learning; Basilisk bootstrapping algorithm2007
318 Riloff, Ellen M.Exploiting strong syntactic heuristics and co-training to learn semantic lexiconsWe present a bootstrapping method that uses strong syntactic heuristics to learn semantic lexicons. The three sources of information are appositives, compound nouns, and ISA clauses. We apply heuristics to these syntactic structures, embed them in a bootstrapping architecture, and combine them with...Syntactic heuristics; Semantic lexicons; Bootstrapping method; Appositives; Compound nouns; ISA clauses; Co-training2002
319 Riloff, Ellen M.Exploiting subjectivity classification to improve information extractionInformation extraction (IE) systems are prone to false hits for a variety of reasons and we observed that many of these false hits occur in sentences that contain subjective language (e.g., opinions, emotions, and sentiments). Motivated by these observations, we explore the idea of using subjecti...Subjectivity classification; Information extraction; Subjectivity analysis; MUC-42005
320 Balasubramonian, RajeevExploring the design space for 3D clustered architectures3D die-stacked chips are emerging as intriguing prospects for the future because of their ability to reduce on-chip wire delays and power consumption. However, they will likely cause an increase in chip operating temperature, which is already a major bottleneck in modern microprocessor design. We...2006
321 Kuramkote, Ravindra; Carter, JohnExploring the value of supporting multiple DSM protocols in Hardware DSM ControllersThe performance of a hardware distributed shared memory (DSM) system is largely dependent on its architect's ability to reduce the number of remote memory misses that occur. Previous attempts to solve this problem have included measures such as supporting both the CC-NUMA and S-COMA architectures is...DSM; Controllers1999
322 McDirmid, Sean; Hsieh, Wilson C.; Flatt, MattExpressive modular linking for object-oriented languagesIn this paper we show how modular linking of program fragments can be added to statically typed, object-oriented (OO) languages. Programs are being assembled out of separately developed software components deployed in binary form. Unfortunately, mainstream OO languages (such as Java) still do not ...Modular linking; Program fragments2002-10-11
323 Shirley, Peter S.; Thompson, William B.Expressive rendering of mountainous terrainPainters and cartographers have developed artistic landscape rendering techniques for centuries. Such renderings can visualize complex three-dimensional landscapes in a pleasing and understandable way. In this work we examine a particular type of artistic depiction, panorama maps, in terms of fun...panorama maps; Non-photorealistic rendering; Terrain; Texture synthesis2007
324 Lindstrom, Gary E.Fast and accurate NN approach for multi-event annotation of time seriesSimilarity search in time-series subsequences is an important time series data mining task. Searching in time series subsequences for matches for a set of shapes is an extension of this task and is equally important. In this work we propose a simple but efficient approach for finding matches for a g...Time-series subsequences; Nearest neighbor approach; Multi-event2003
325 Hansen, Charles D.Fast data parallel polygon renderingThis paper describes a data parallel method for polygon rendering on a massively parallel machine. This method, based on a simple shading model, is targeted for applications which require very fast rendering for extremely large sets of polygons. Such sets are found in many scienti c visualization ap...1993
301 - 325 of 912