|
|
Creator | Title | Description | Subject | Date |
301 |
|
Carter, John | Ensuring prolonged participation and deterring cheating behaviors in a collective | We are building a system that harnesses the idle resources (cpu, storage, and bandwidth) of nodes (e.g., home desktops) distributed across the Internet to build useful distributed services like content distribution or remote backup. Users are compensated in return for contributing their nodes? id... | Collective systems; Cheating; Idle resources; Nodes | 2008 |
302 |
|
Cohen, Elaine | Error bounded approximate reparametrization of NURBS curves | This paper reports research on solutions to the following reparametrization problem: approximate c(r(t)) by a NURBS where c is a NURBS curve and r may, or may not, be a NURBS function. There are many practical applications of this problem including establishing and exploring correspondence in geomet... | Reparametrization; NURBS curve | 2000 |
303 |
|
Cohen, Elaine | Error bounded variable distance offset operator for free from curves and surfaces | Most offset approximation algorithms for freeform curves and surfaces may be classified into two main groups. The first approximates the curve using simple primitives such as piecewise arcs and lines and then calculates the (exact) offset operator to this approximation. The second offsets the contro... | Error bounded; Freeform curves | 1991 |
304 |
|
Brunvand, Erik L. | Estimating performance of an ray- tracing ASIC design | Recursive ray tracing is a powerful rendering technique used to compute realistic images by simulating the global light transport in a scene. Algorithmic improvements and FPGA-based hardware implementations of ray tracing have demonstrated realtime performance but hardware that achieves performance ... | | 2006 |
305 |
|
Done, William John | Estimation of the parameters of an autoregressive process in the presence of additive white noise | Applications of linear prediction (LP) algorithms have been successful in modeling various physical processes. In the area of speech analysis this has resulted in the development of LP vocoders, devices used in digital speech communication systems. The LP algorithms used in speech and other areas ar... | Autoregressive process; Linear prediction algorithms; All-pole model | 1979 |
306 |
|
Lindstrom, Gary E. | ETYMA: a framework for modular systems | Modularity, i.e. support for the flexible construction, adaptation, and combination of units of software, is an important goal in many systems. In most cases, however, systems achieve only a few aspects of modularity. The problem can be traced to the inflexibility, or the limited view of modularity ... | ETYMA; Modularity; Modular systems | 1994 |
307 |
|
Thompson, William B. | Evaluating the accuracy of size perception in real and virtual environments | Accurate perception of the size of 3D objects depicted on 2D desktop displays is important for many applications. Whether users perceive objects depicted on a display to be the same size as comparable real world objects is not well understood. We propose using affordances judgments as a way of measu... | | 2012-01-01 |
308 |
|
Carter, John B. | Evaluating the potential of programmable multiprocessor cache controllers | The next generation of scalable parallel systems (e.g., machines by KSR, Convex, and others) will have shared memory supported in hardware, unlike most current generation machines (e.g., offerings by Intel, nCube, and Thinking Machines). However, current shared memory architectures are constrained b... | Programmable multiprocessor cache controllers; Scalable parallel systems; Shared memory | 1994 |
309 |
|
Hansen, Charles D. | Evaluation of depth of field for depth perception in DVR | In this paper we present a user study on the use of Depth of Field for depth perception in Direct Volume Rendering. Direct Volume Rendering with Phong shading and perspective projection is used as the baseline. Depth of Field is then added to see its impact on the correct perception of ordinal depth... | | 2013-01-01 |
310 |
|
Henderson, Thomas C. | Evolutionary teleomorphology | The physical layout of organs and neural structures in biological systems is important to their functioning, and is the result of evolutionary selection forces. We believe this is true even at the individual neuron level, and should be accounted for in any bio-based approach. In particular, when tr... | Evolutionary teleomorphology; Bio-based approach; Physical layout problem; PLP; Neurons; Nodes | 1995 |
311 |
|
Regehr, John | Evolving real-time systems using hierarchical scheduling and concurrency analysis | We have developed a new way to look at real-time and embedded software: as a collection of execution environments created by a hierarchy of schedulers. Common schedulers include those that run interrupts, bottom-half handlers, threads, and events. We have created algorithms for deriving response tim... | | 2003-01-01 |
312 |
|
Henderson, Thomas C. | Explicit and persistent knowledge in engineering drawing analysis | Domain knowledge permeates all aspects of the engineering drawing analysis process, including understanding the physical processes operating on the medium (i.e., paper), the image analysis techniques, and the interpretation semantics of the structural layout and contents of the drawing. Additiona... | Engineering drawing analysis | 2003-10-10 |
313 |
|
Gopalakrishnan, Ganesh | Explicit-enumeration based verification made memory-efficient | We investigate techniques for reducing the memory requirements of a model checking tool employing explicit enumeration. Two techniques are studied in depth: (1) exploiting symmetries in the model, and (2) exploiting sequential regions in the model. The first technique resulted in a significant reduc... | Verification; Model checking tool; Memory-efficient | 1995 |
314 |
|
Kasera, Sneha K. | Exploiting altruism in social networks for friend-to-friend malware detection | We propose a novel malware detection application- SocialScan-which enables friend-to-friend (f2f) malware scanning services among social peers, with scanning resource sharing governed by levels of social altruism. We show that with f2f sharing of resources, SocialScan achieves a 65% increase in the ... | | 2014-01-01 |
315 |
|
Thompson, William B. | Exploiting discontinuities in optical flow | Most optical flow estimation techniques have substantial difficulties dealing with flow discontinuities. Methods which simultaneously detect flow boundaries and use the detected boundaries to aid in flow estimation can produce significantly improved results. Current approaches to implementing these ... | Optical flow; Discontinuities | 1995 |
316 |
|
Balasubramonian, Rajeev | Exploiting eager register release in a redundantly multi-threaded processor | Due to shrinking transistor sizes and lower supply voltages, transient faults (soft errors) in computer systems are projected to increase by orders of magnitude. Fault detection and recovery can be achieved through redundancy. Redundant multithreading (RMT) is one attractive approach to detect and r... | Transient faults; Soft errors; Redundant multithreading; Eager register release; Register file design | 2006 |
317 |
|
Riloff, Ellen M. | Exploiting role-identifying nouns and expressions for information extraction | We present a new approach for extraction pattern learning that exploits role-identifying nouns, which are nouns whose semantics reveal the role that they play in an event (e.g., an "assassin" is a perpetrator). Given a few seed nouns, a bootstrapping algorithm automatically learns role-identifying ... | Information extraction; Role-identifying; Nouns; Expressions; Pattern learning; Basilisk bootstrapping algorithm | 2007 |
318 |
|
Riloff, Ellen M. | Exploiting strong syntactic heuristics and co-training to learn semantic lexicons | We present a bootstrapping method that uses strong syntactic heuristics to learn semantic lexicons. The three sources of information are appositives, compound nouns, and ISA clauses. We apply heuristics to these syntactic structures, embed them in a bootstrapping architecture, and combine them with... | Syntactic heuristics; Semantic lexicons; Bootstrapping method; Appositives; Compound nouns; ISA clauses; Co-training | 2002 |
319 |
|
Riloff, Ellen M. | Exploiting subjectivity classification to improve information extraction | Information extraction (IE) systems are prone to false hits for a variety of reasons and we observed that many of these false hits occur in sentences that contain subjective language (e.g., opinions, emotions, and sentiments). Motivated by these observations, we explore the idea of using subjecti... | Subjectivity classification; Information extraction; Subjectivity analysis; MUC-4 | 2005 |
320 |
|
Balasubramonian, Rajeev | Exploring the design space for 3D clustered architectures | 3D die-stacked chips are emerging as intriguing prospects for the future because of their ability to reduce on-chip wire delays and power consumption. However, they will likely cause an increase in chip operating temperature, which is already a major bottleneck in modern microprocessor design. We... | | 2006 |
321 |
|
Kuramkote, Ravindra; Carter, John | Exploring the value of supporting multiple DSM protocols in Hardware DSM Controllers | The performance of a hardware distributed shared memory (DSM) system is largely dependent on its architect's ability to reduce the number of remote memory misses that occur. Previous attempts to solve this problem have included measures such as supporting both the CC-NUMA and S-COMA architectures is... | DSM; Controllers | 1999 |
322 |
|
McDirmid, Sean; Hsieh, Wilson C.; Flatt, Matt | Expressive modular linking for object-oriented languages | In this paper we show how modular linking of program fragments can be added to statically typed, object-oriented (OO) languages. Programs are being assembled out of separately developed software components deployed in binary form. Unfortunately, mainstream OO languages (such as Java) still do not ... | Modular linking; Program fragments | 2002-10-11 |
323 |
|
Shirley, Peter S.; Thompson, William B. | Expressive rendering of mountainous terrain | Painters and cartographers have developed artistic landscape rendering techniques for centuries. Such renderings can visualize complex three-dimensional landscapes in a pleasing and understandable way. In this work we examine a particular type of artistic depiction, panorama maps, in terms of fun... | panorama maps; Non-photorealistic rendering; Terrain; Texture synthesis | 2007 |
324 |
|
Lindstrom, Gary E. | Fast and accurate NN approach for multi-event annotation of time series | Similarity search in time-series subsequences is an important time series data mining task. Searching in time series subsequences for matches for a set of shapes is an extension of this task and is equally important. In this work we propose a simple but efficient approach for finding matches for a g... | Time-series subsequences; Nearest neighbor approach; Multi-event | 2003 |
325 |
|
Hansen, Charles D. | Fast data parallel polygon rendering | This paper describes a data parallel method for polygon rendering on a massively parallel machine. This method, based on a simple shading model, is targeted for applications which require very fast rendering for extremely large sets of polygons. Such sets are found in many scienti c visualization ap... | | 1993 |