|
|
Creator | Title | Description | Subject | Date |
501 |
|
Lindstrom, Gary E. | The key node method: a highly-parallel alpha-beta algorithm | A new parallel formulation of the alpha-beta algorithm for minimax game tree searching is presented. Its chief characteristic is incremental information sharing among subsearch processes in the form of "provisional" node value communication. Such "eager" communication can offer the double benefit of... | Key node method; Alpha-beta algorithm; Minimax; Game tree searching | 1983 |
502 |
|
Carter, John; Susarla, Sai R. | Khazana An infrastructure for building distributed services | Essentially all distributed systems?? applications?? and services at some level boil down to the problem of man aging distributed shared state Unfortunately?? while the problem of managing distributed shared state is shared by many applications?? there is no common means of managing the data ... | Khazana; Distributed shared state | 1998 |
503 |
|
Carter, John B. | Khazana an infrastructure for building distributed services | Essentially all distributed systems, applications and service at some level boil down to the problem of managing distributed shared state. Unfortunately, while the problem of managing distributed shared state is shared by man applications, there is no common means of managing the data - every applic... | Khazana; Distributed shared state | 1998 |
504 |
|
Susarla, Sai R.; Carter, John | Khazana: a flexible wide area data store | Khazana is a peer-to-peer data service that supports efficient sharing and aggressive caching of mutable data across the wide area while giving clients significant control over replica divergence. Previous work on wide-area replicated services focussed on at most two of the following three proper... | Khazana; Peer-to-peer data service | 2003-10-13 |
505 |
|
Kirby, Robert Michael | Kirby research group | | | 2012 |
506 |
|
Henderson, Thomas C. | Knowledge-based 2-D vision system synthesis | A knowledge-based approach to computer vision provides the needed flexibility for performing recognition and inspection of objects in a complex environment. A system is described which uses knowledge about the environment, sensors, and performance requirements to construct a functional configuratio... | 2-D vision system | 1987 |
507 |
|
Hansen, Charles D. | Knowledge-based out-of-core algorithms for data management in visualization | Data management is the very first issue in handling very large datasets. Many existing out-of-core algorithms used in visualization are closely coupled with application-specific logic. This paper presents two knowledgebased out-of-core prefetching algorithms that do not use hard-coded rendering-re... | | 2006 |
508 |
|
Bronson, Jonathan Richard | Lattice cleaving: a multimaterial tetrahedral meshing algorithm with guarantees | We introduce a new algorithm for generating tetrahedral meshes that conform to physical boundaries in volumetric domains consisting of multiple materials. The proposed method allows for an arbitrary number of materials, produces high-quality tetrahedral meshes with upper and lower bounds on dihedral... | | 2014-01-01 |
509 |
|
Lindstrom, Gary E. | Layered, server-based support for Object-Oriented application development | This paper advocates the idea that the physical modularity (file structure) of application components supported by conventional OS environments can be elevated to the level of logical modularity, which in turn can directly support application development in an object-oriented manner. We demonstrate ... | Object-Oriented application development | 1995 |
510 |
|
Weinstein, David | Lead field basis for FEM source localization | In recent years, significant progress has been made in the area of EEG/MEG source imaging. source imaging on simple spherical models has become increasingly efficient, with consistently reported accuracy of within 5mm. In contrast, source localization on realistic head models remains slow, with sub-... | FEM source localization; Source imaging; EEG; MEG | 1999 |
511 |
|
Henderson, Thomas C. | Leadership protocol for S-Nets | Smart Sensor Networks are collections of non-mobile devices (S-elements) which can compute, communicate and sense the environment; they must be able to create local groups of devices (S-cliques). We propose here a protocol to solve the leadership problems for S-Nets. We sketch the correctness of thi... | Smart Sensor Networks; S-Nets | 2001 |
512 |
|
Riloff, Ellen M. | Learning and evaluating the content and structure of a term taxonomy | In this paper, we describe a weakly supervised bootstrapping algorithm that reads Web texts and learns taxonomy terms. The bootstrapping algorithm starts with two seed words (a seed hypernym (Root concept) and a seed hyponym) that are inserted into a doubly anchored hyponym pattern. In alternatin... | Weakly supervised; Bootstrapping algorithm; Seed hypernym; Seed hyponym; Root concept; Term taxonomy; Learning by reading systems | 2009 |
513 |
|
Riloff, Ellen M. | Learning dictionaries for information extraction by multi-level bootstrapping | Information extraction systems usually require two dictionaries: a semantic lexicon and a dictionary of extraction patterns for the domain. We present a multilevel bootstrapping algorithm that generates both the semantic lexicon and extraction patterns simultaneously. As input, our technique requir... | Information extraction; Extraction patterns; Multi-level bootstrapping; Learning dictionaries | 1999 |
514 |
|
Riloff, Ellen M. | Learning domain-specific information extraction patterns from the web | Many information extraction (IE) systems rely on manually annotated training data to learn patterns or rules for extracting information about events. Manually annotating data is expensive, however, and a new data set must be annotated for each domain. So most IE training sets are relatively small. C... | Information extraction; Domain-specific; Annotated training sets; MUC-4 | 2006 |
515 |
|
Riloff, Ellen M. | Learning extraction patterns for subjective expressions | This paper presents a bootstrapping process that learns linguistically rich extraction patterns for subjective (opinionated) expressions. High-precision classifiers label unannotated data to automatically create a large training set, which is then given to an extraction pattern learning algorithm. T... | Bootstrapping process; Extraction patterns; Subjective expressions; Opinions | 2003 |
516 |
|
Riloff, Ellen M. | Learning subjective nouns using extraction pattern bootstrapping | We explore the idea of creating a subjectivity classifier that uses lists of subjective nouns learned by bootstrapping algorithms. The goal of our research is to develop a system that can distinguish subjective sentences from objective sentences. First, we use two bootstrapping algorithms that explo... | Subjective nouns; Bootstrapping; Extraction patterns; Subjectivity classifier; Naive Bayes classifier | 2003 |
517 |
|
Riloff, Ellen M. | Learning to identify reduced passive verb phrases with a shallow parser | Our research is motivated by the observation that NLP systems frequently mislabel passive voice verb phrases as being in the active voice when there is no auxiliary verb (e.g., "The man arrested had a long record"). These errors directly impact thematic role recognition and NLP applications that dep... | Passive voice; Reduced passive verb phrases; Shallow parser; Learned classifier | 2008 |
518 |
|
Freire, Juliana | LegoDB: customizing relational storage for XML documents | XML is becoming the predominant data exchange format in a variety of application domains (supply-chain, scientific data processing, telecommunication infrastructure, etc.). Not only is an increasing amount of XML data now being processed, but XML is also increasingly being used in business-critical... | LegoDB; XML Schema | 2002 |
519 |
|
Balasubramonian, Rajeev | Leveraging 3D technology for improved reliability | Aggressive technology scaling over the years has helped improve processor performance but has caused a reduction in processor reliability. Shrinking transistor sizes and lower supply voltages have increased the vulnerability of computer systems towards transient faults. An increase in within-die an... | Reliability; Redundant multi-threading, 3D die-stacking; Parameter variation; Soft errors; Dynamic timing errors; Power-efficient microarchitecture; On-chip temperature | 2007-12 |
520 |
|
Balasubramonian, Rajeev | Leveraging bloom filters for smart search within NUCA caches | On-chip wire delays are becoming increasingly problematic in modern microprocessors. To alleviate the negative effect of wire delays, architects have considered splitting up large L2/L3 caches into several banks, with each bank having a different access latency depending on its physical proximit... | Bloom filters; Smart search; NUCA caches; Wire delays; On-chip | 2006 |
521 |
|
Balasubramonian, Rajeev | Leveraging heterogeneity in DRAM main memories to accelerate critical word access | The DRAM main memory system in modern servers is largely homogeneous. In recent years, DRAM manufacturers have produced chips with vastly differing latency and energy characteristics. This provides the opportunity to build a heterogeneous main memory system where different parts of the address space... | | 2012-01-01 |
522 |
|
Balasubramonian, Rajeev | Leveraging wire properties at the microarchitecture level | In future microprocessors, communication will emerge as a major bottleneck. The authors advocate composing future interconnects of some wires that minimize latency, some that maximize bandwidth, and some that minimize power. A microarchitecture aware of these wire characteristics can steer on-chip ... | Microarchitecture; Interconnects; Cache coherence | 2006-11 |
523 |
|
Gray, Kathryn E. | Linguistic support for unit testing | Existing systems for writing unit tests exploit built-in language constructs, such as reflection, to simulate the addition of testing constructs. While these simulations provide the minimally necessary functionality, they fail to support testing properly in many instances. In response, we have ... | Java; Testing; Unit testing | 2007 |
524 |
|
Weinstein, David | Localization of multiple deep epileptic sources in a realistic head model via independent component analysis | Estimating the location and distribution of current sources within the brain from electroencephalographic (EEG) recordings is an ill-posed inverse problem. The ill-posedness of the problem is due to a lack of uniqueness in the solution; that is, different configurations of sources can generate ident... | EEG; Current sources; Head model | 2000 |
525 |
|
Regehr, John | Lock inference for systems software | We have developed task scheduler logic (TSL) to automate reasoning about scheduling and concurrency in systems software. TSL can detect race conditions and other errors as well as supporting lock inference: the derivation of an appropriate lock implementation for each critical section in a system. L... | | 2003-01-01 |