501 - 525 of 957
Number of results to display per page
CreatorTitleDescriptionSubjectDate
501 Lindstrom, Gary E.The key node method: a highly-parallel alpha-beta algorithmA new parallel formulation of the alpha-beta algorithm for minimax game tree searching is presented. Its chief characteristic is incremental information sharing among subsearch processes in the form of "provisional" node value communication. Such "eager" communication can offer the double benefit of...Key node method; Alpha-beta algorithm; Minimax; Game tree searching1983
502 Carter, John; Susarla, Sai R.Khazana An infrastructure for building distributed servicesEssentially all distributed systems?? applications?? and services at some level boil down to the problem of man aging distributed shared state Unfortunately?? while the problem of managing distributed shared state is shared by many applications?? there is no common means of managing the data ...Khazana; Distributed shared state1998
503 Carter, John B.Khazana an infrastructure for building distributed servicesEssentially all distributed systems, applications and service at some level boil down to the problem of managing distributed shared state. Unfortunately, while the problem of managing distributed shared state is shared by man applications, there is no common means of managing the data - every applic...Khazana; Distributed shared state1998
504 Susarla, Sai R.; Carter, JohnKhazana: a flexible wide area data storeKhazana is a peer-to-peer data service that supports efficient sharing and aggressive caching of mutable data across the wide area while giving clients significant control over replica divergence. Previous work on wide-area replicated services focussed on at most two of the following three proper...Khazana; Peer-to-peer data service2003-10-13
505 Kirby, Robert MichaelKirby research group2012
506 Henderson, Thomas C.Knowledge-based 2-D vision system synthesisA knowledge-based approach to computer vision provides the needed flexibility for performing recognition and inspection of objects in a complex environment. A system is described which uses knowledge about the environment, sensors, and performance requirements to construct a functional configuratio...2-D vision system1987
507 Hansen, Charles D.Knowledge-based out-of-core algorithms for data management in visualizationData management is the very first issue in handling very large datasets. Many existing out-of-core algorithms used in visualization are closely coupled with application-specific logic. This paper presents two knowledgebased out-of-core prefetching algorithms that do not use hard-coded rendering-re...2006
508 Bronson, Jonathan RichardLattice cleaving: a multimaterial tetrahedral meshing algorithm with guaranteesWe introduce a new algorithm for generating tetrahedral meshes that conform to physical boundaries in volumetric domains consisting of multiple materials. The proposed method allows for an arbitrary number of materials, produces high-quality tetrahedral meshes with upper and lower bounds on dihedral...2014-01-01
509 Lindstrom, Gary E.Layered, server-based support for Object-Oriented application developmentThis paper advocates the idea that the physical modularity (file structure) of application components supported by conventional OS environments can be elevated to the level of logical modularity, which in turn can directly support application development in an object-oriented manner. We demonstrate ...Object-Oriented application development1995
510 Weinstein, DavidLead field basis for FEM source localizationIn recent years, significant progress has been made in the area of EEG/MEG source imaging. source imaging on simple spherical models has become increasingly efficient, with consistently reported accuracy of within 5mm. In contrast, source localization on realistic head models remains slow, with sub-...FEM source localization; Source imaging; EEG; MEG1999
511 Henderson, Thomas C.Leadership protocol for S-NetsSmart Sensor Networks are collections of non-mobile devices (S-elements) which can compute, communicate and sense the environment; they must be able to create local groups of devices (S-cliques). We propose here a protocol to solve the leadership problems for S-Nets. We sketch the correctness of thi...Smart Sensor Networks; S-Nets2001
512 Riloff, Ellen M.Learning and evaluating the content and structure of a term taxonomyIn this paper, we describe a weakly supervised bootstrapping algorithm that reads Web texts and learns taxonomy terms. The bootstrapping algorithm starts with two seed words (a seed hypernym (Root concept) and a seed hyponym) that are inserted into a doubly anchored hyponym pattern. In alternatin...Weakly supervised; Bootstrapping algorithm; Seed hypernym; Seed hyponym; Root concept; Term taxonomy; Learning by reading systems2009
513 Riloff, Ellen M.Learning dictionaries for information extraction by multi-level bootstrappingInformation extraction systems usually require two dictionaries: a semantic lexicon and a dictionary of extraction patterns for the domain. We present a multilevel bootstrapping algorithm that generates both the semantic lexicon and extraction patterns simultaneously. As input, our technique requir...Information extraction; Extraction patterns; Multi-level bootstrapping; Learning dictionaries1999
514 Riloff, Ellen M.Learning domain-specific information extraction patterns from the webMany information extraction (IE) systems rely on manually annotated training data to learn patterns or rules for extracting information about events. Manually annotating data is expensive, however, and a new data set must be annotated for each domain. So most IE training sets are relatively small. C...Information extraction; Domain-specific; Annotated training sets; MUC-42006
515 Riloff, Ellen M.Learning extraction patterns for subjective expressionsThis paper presents a bootstrapping process that learns linguistically rich extraction patterns for subjective (opinionated) expressions. High-precision classifiers label unannotated data to automatically create a large training set, which is then given to an extraction pattern learning algorithm. T...Bootstrapping process; Extraction patterns; Subjective expressions; Opinions2003
516 Riloff, Ellen M.Learning subjective nouns using extraction pattern bootstrappingWe explore the idea of creating a subjectivity classifier that uses lists of subjective nouns learned by bootstrapping algorithms. The goal of our research is to develop a system that can distinguish subjective sentences from objective sentences. First, we use two bootstrapping algorithms that explo...Subjective nouns; Bootstrapping; Extraction patterns; Subjectivity classifier; Naive Bayes classifier2003
517 Riloff, Ellen M.Learning to identify reduced passive verb phrases with a shallow parserOur research is motivated by the observation that NLP systems frequently mislabel passive voice verb phrases as being in the active voice when there is no auxiliary verb (e.g., "The man arrested had a long record"). These errors directly impact thematic role recognition and NLP applications that dep...Passive voice; Reduced passive verb phrases; Shallow parser; Learned classifier2008
518 Freire, JulianaLegoDB: customizing relational storage for XML documentsXML is becoming the predominant data exchange format in a variety of application domains (supply-chain, scientific data processing, telecommunication infrastructure, etc.). Not only is an increasing amount of XML data now being processed, but XML is also increasingly being used in business-critical...LegoDB; XML Schema2002
519 Balasubramonian, RajeevLeveraging 3D technology for improved reliabilityAggressive technology scaling over the years has helped improve processor performance but has caused a reduction in processor reliability. Shrinking transistor sizes and lower supply voltages have increased the vulnerability of computer systems towards transient faults. An increase in within-die an...Reliability; Redundant multi-threading, 3D die-stacking; Parameter variation; Soft errors; Dynamic timing errors; Power-efficient microarchitecture; On-chip temperature2007-12
520 Balasubramonian, RajeevLeveraging bloom filters for smart search within NUCA cachesOn-chip wire delays are becoming increasingly problematic in modern microprocessors. To alleviate the negative effect of wire delays, architects have considered splitting up large L2/L3 caches into several banks, with each bank having a different access latency depending on its physical proximit...Bloom filters; Smart search; NUCA caches; Wire delays; On-chip2006
521 Balasubramonian, RajeevLeveraging heterogeneity in DRAM main memories to accelerate critical word accessThe DRAM main memory system in modern servers is largely homogeneous. In recent years, DRAM manufacturers have produced chips with vastly differing latency and energy characteristics. This provides the opportunity to build a heterogeneous main memory system where different parts of the address space...2012-01-01
522 Balasubramonian, RajeevLeveraging wire properties at the microarchitecture levelIn future microprocessors, communication will emerge as a major bottleneck. The authors advocate composing future interconnects of some wires that minimize latency, some that maximize bandwidth, and some that minimize power. A microarchitecture aware of these wire characteristics can steer on-chip ...Microarchitecture; Interconnects; Cache coherence2006-11
523 Gray, Kathryn E.Linguistic support for unit testingExisting systems for writing unit tests exploit built-in language constructs, such as reflection, to simulate the addition of testing constructs. While these simulations provide the minimally necessary functionality, they fail to support testing properly in many instances. In response, we have ...Java; Testing; Unit testing2007
524 Weinstein, DavidLocalization of multiple deep epileptic sources in a realistic head model via independent component analysisEstimating the location and distribution of current sources within the brain from electroencephalographic (EEG) recordings is an ill-posed inverse problem. The ill-posedness of the problem is due to a lack of uniqueness in the solution; that is, different configurations of sources can generate ident...EEG; Current sources; Head model2000
525 Regehr, JohnLock inference for systems softwareWe have developed task scheduler logic (TSL) to automate reasoning about scheduling and concurrency in systems software. TSL can detect race conditions and other errors as well as supporting lock inference: the derivation of an appropriate lock implementation for each critical section in a system. L...2003-01-01
501 - 525 of 957