476 - 500 of 912
Number of results to display per page
CreatorTitleDescriptionSubjectDate
476 Back, Godmar V.Java operating systems: design and implementationLanguage-based extensible systems such as Java use type safety to provide memory safety in a single address space. Memory safety alone, however, is not sufficient to protect different applications from each other. such systems must support a process model that enables the control and management of c...Java operating systems; Language-based systems1998
477 Lindstrom, Gary E.The key node method: a highly-parallel alpha-beta algorithmA new parallel formulation of the alpha-beta algorithm for minimax game tree searching is presented. Its chief characteristic is incremental information sharing among subsearch processes in the form of "provisional" node value communication. Such "eager" communication can offer the double benefit of...Key node method; Alpha-beta algorithm; Minimax; Game tree searching1983
478 Carter, John; Susarla, Sai R.Khazana An infrastructure for building distributed servicesEssentially all distributed systems?? applications?? and services at some level boil down to the problem of man aging distributed shared state Unfortunately?? while the problem of managing distributed shared state is shared by many applications?? there is no common means of managing the data ...Khazana; Distributed shared state1998
479 Carter, John B.Khazana an infrastructure for building distributed servicesEssentially all distributed systems, applications and service at some level boil down to the problem of managing distributed shared state. Unfortunately, while the problem of managing distributed shared state is shared by man applications, there is no common means of managing the data - every applic...Khazana; Distributed shared state1998
480 Susarla, Sai R.; Carter, JohnKhazana: a flexible wide area data storeKhazana is a peer-to-peer data service that supports efficient sharing and aggressive caching of mutable data across the wide area while giving clients significant control over replica divergence. Previous work on wide-area replicated services focussed on at most two of the following three proper...Khazana; Peer-to-peer data service2003-10-13
481 Kirby, Robert MichaelKirby research group2012
482 Henderson, Thomas C.Knowledge-based 2-D vision system synthesisA knowledge-based approach to computer vision provides the needed flexibility for performing recognition and inspection of objects in a complex environment. A system is described which uses knowledge about the environment, sensors, and performance requirements to construct a functional configuratio...2-D vision system1987
483 Hansen, Charles D.Knowledge-based out-of-core algorithms for data management in visualizationData management is the very first issue in handling very large datasets. Many existing out-of-core algorithms used in visualization are closely coupled with application-specific logic. This paper presents two knowledgebased out-of-core prefetching algorithms that do not use hard-coded rendering-re...2006
484 Bronson, Jonathan RichardLattice cleaving: a multimaterial tetrahedral meshing algorithm with guaranteesWe introduce a new algorithm for generating tetrahedral meshes that conform to physical boundaries in volumetric domains consisting of multiple materials. The proposed method allows for an arbitrary number of materials, produces high-quality tetrahedral meshes with upper and lower bounds on dihedral...2014-01-01
485 Lindstrom, Gary E.Layered, server-based support for Object-Oriented application developmentThis paper advocates the idea that the physical modularity (file structure) of application components supported by conventional OS environments can be elevated to the level of logical modularity, which in turn can directly support application development in an object-oriented manner. We demonstrate ...Object-Oriented application development1995
486 Weinstein, DavidLead field basis for FEM source localizationIn recent years, significant progress has been made in the area of EEG/MEG source imaging. source imaging on simple spherical models has become increasingly efficient, with consistently reported accuracy of within 5mm. In contrast, source localization on realistic head models remains slow, with sub-...FEM source localization; Source imaging; EEG; MEG1999
487 Henderson, Thomas C.Leadership protocol for S-NetsSmart Sensor Networks are collections of non-mobile devices (S-elements) which can compute, communicate and sense the environment; they must be able to create local groups of devices (S-cliques). We propose here a protocol to solve the leadership problems for S-Nets. We sketch the correctness of thi...Smart Sensor Networks; S-Nets2001
488 Riloff, Ellen M.Learning and evaluating the content and structure of a term taxonomyIn this paper, we describe a weakly supervised bootstrapping algorithm that reads Web texts and learns taxonomy terms. The bootstrapping algorithm starts with two seed words (a seed hypernym (Root concept) and a seed hyponym) that are inserted into a doubly anchored hyponym pattern. In alternatin...Weakly supervised; Bootstrapping algorithm; Seed hypernym; Seed hyponym; Root concept; Term taxonomy; Learning by reading systems2009
489 Riloff, Ellen M.Learning dictionaries for information extraction by multi-level bootstrappingInformation extraction systems usually require two dictionaries: a semantic lexicon and a dictionary of extraction patterns for the domain. We present a multilevel bootstrapping algorithm that generates both the semantic lexicon and extraction patterns simultaneously. As input, our technique requir...Information extraction; Extraction patterns; Multi-level bootstrapping; Learning dictionaries1999
490 Riloff, Ellen M.Learning domain-specific information extraction patterns from the webMany information extraction (IE) systems rely on manually annotated training data to learn patterns or rules for extracting information about events. Manually annotating data is expensive, however, and a new data set must be annotated for each domain. So most IE training sets are relatively small. C...Information extraction; Domain-specific; Annotated training sets; MUC-42006
491 Riloff, Ellen M.Learning extraction patterns for subjective expressionsThis paper presents a bootstrapping process that learns linguistically rich extraction patterns for subjective (opinionated) expressions. High-precision classifiers label unannotated data to automatically create a large training set, which is then given to an extraction pattern learning algorithm. T...Bootstrapping process; Extraction patterns; Subjective expressions; Opinions2003
492 Riloff, Ellen M.Learning subjective nouns using extraction pattern bootstrappingWe explore the idea of creating a subjectivity classifier that uses lists of subjective nouns learned by bootstrapping algorithms. The goal of our research is to develop a system that can distinguish subjective sentences from objective sentences. First, we use two bootstrapping algorithms that explo...Subjective nouns; Bootstrapping; Extraction patterns; Subjectivity classifier; Naive Bayes classifier2003
493 Riloff, Ellen M.Learning to identify reduced passive verb phrases with a shallow parserOur research is motivated by the observation that NLP systems frequently mislabel passive voice verb phrases as being in the active voice when there is no auxiliary verb (e.g., "The man arrested had a long record"). These errors directly impact thematic role recognition and NLP applications that dep...Passive voice; Reduced passive verb phrases; Shallow parser; Learned classifier2008
494 Freire, JulianaLegoDB: customizing relational storage for XML documentsXML is becoming the predominant data exchange format in a variety of application domains (supply-chain, scientific data processing, telecommunication infrastructure, etc.). Not only is an increasing amount of XML data now being processed, but XML is also increasingly being used in business-critical...LegoDB; XML Schema2002
495 Balasubramonian, RajeevLeveraging 3D technology for improved reliabilityAggressive technology scaling over the years has helped improve processor performance but has caused a reduction in processor reliability. Shrinking transistor sizes and lower supply voltages have increased the vulnerability of computer systems towards transient faults. An increase in within-die an...Reliability; Redundant multi-threading, 3D die-stacking; Parameter variation; Soft errors; Dynamic timing errors; Power-efficient microarchitecture; On-chip temperature2007-12
496 Balasubramonian, RajeevLeveraging bloom filters for smart search within NUCA cachesOn-chip wire delays are becoming increasingly problematic in modern microprocessors. To alleviate the negative effect of wire delays, architects have considered splitting up large L2/L3 caches into several banks, with each bank having a different access latency depending on its physical proximit...Bloom filters; Smart search; NUCA caches; Wire delays; On-chip2006
497 Balasubramonian, RajeevLeveraging heterogeneity in DRAM main memories to accelerate critical word accessThe DRAM main memory system in modern servers is largely homogeneous. In recent years, DRAM manufacturers have produced chips with vastly differing latency and energy characteristics. This provides the opportunity to build a heterogeneous main memory system where different parts of the address space...2012-01-01
498 Balasubramonian, RajeevLeveraging wire properties at the microarchitecture levelIn future microprocessors, communication will emerge as a major bottleneck. The authors advocate composing future interconnects of some wires that minimize latency, some that maximize bandwidth, and some that minimize power. A microarchitecture aware of these wire characteristics can steer on-chip ...Microarchitecture; Interconnects; Cache coherence2006-11
499 Gray, Kathryn E.Linguistic support for unit testingExisting systems for writing unit tests exploit built-in language constructs, such as reflection, to simulate the addition of testing constructs. While these simulations provide the minimally necessary functionality, they fail to support testing properly in many instances. In response, we have ...Java; Testing; Unit testing2007
500 Weinstein, DavidLocalization of multiple deep epileptic sources in a realistic head model via independent component analysisEstimating the location and distribution of current sources within the brain from electroencephalographic (EEG) recordings is an ill-posed inverse problem. The ill-posedness of the problem is due to a lack of uniqueness in the solution; that is, different configurations of sources can generate ident...EEG; Current sources; Head model2000
476 - 500 of 912