1 - 25 of 21
Number of results to display per page
CreatorTitleDescriptionSubjectDate
1 Seeley, DonnA tour of the wormOn the evening of November 2, 1988, a self-replicating program was released upon the Internet 1. This program (a worm) invaded VAX and Sun-3 computers running versions of Berkeley UNIX, and used their sources to attack still more computers2. Within the space of hours this program had spread aacross ...Computer worm1989
2 Lindstrom, Gary E.Abstract semantics for functional constraint programmingA denotational semantics is given for a lazy functional language with monotonic side-effects arising from the unification of singly-bound logical variables. The semantics is based on a Scott-style information system, which elegantly captures the notion of "constraint additin" inherent in unificati...Abstract semantics1989
3 George, LalAn abstract machine for parallel graph reductionAn abstract machine suitable for parallel graph reduction on a shared memory multiprocessor is described. Parallel programming is plagued with subtle race conditions resulting in deadlock or fatal system errors. Due to the nondeterministic nature of program execution the utilization of resources ma...Parallel graph reduction; Abstract machines1989
4 George, LalAn abstract machine for parallel graph reductionAn abstract machine for parallel graph reduction on a shared memory multiprocessor is described. This is intended primarily for normal order (lazy) evaluation of functional programs. It is absolutely essential in such a design to adapt an efficient sequential model since during execution under limit...Parallel graph reduction1989
5 Zhu, XiaohongAutomatic compensating cleanup operationToday's part geometries are becoming ever more complex and require more accurate tool path to manufacture. Machining process efficiency is also a major consideration for designers as well as manufacturing engineers. Although the current advanced CAD/CAM systems have greatly improved the efficiency ...Part geometries1989
6 Lee, Hyo JongAutomatic mesh analysis technique by knowledge-based systemThe finite element analysis technique has been recognized as a very important tool to solve various engineering problems, such as structural analysis, heat transfer, and fluid dynamics. The key point to the technique is discretization of the domain of interest into many finite elements. A good resul...Mesh analysis; Mesh generation algorithm1989
7 Cohen, ElaineAutomatic sculptured five-axis milling with check surfacesAn approach to 5-axis milling of B-spline surfaces is presented. Within its domain, it provides better check surface handling than APT. The scheme for tool position generation is based on a B-spline curve refinement method and a set of criteria for tolerance control which allows the tool positions ...B-spline surfaces; 5-axis milling; Tool paths1989
8 Hansen, Charles D.; Henderson, Thomas C.CAD-based 3-D object recognitionWe propose an approach to 3-D object recognition using CAD-based geometry models for freeform surfaces. Geometry is modeled with rational B-splines by defining surface patches and then combining these into a volumetric model of the object. Characteristic features are then extracted from this model ...Object recognition; Strategy trees; Geometric knowledge representation; Automatic feature selection1989
9 Carter, Tony M.Cascade: a hardware alternative to bignumsThe Cascade hardware architecture for high/variable precision arithmetic is described. It uses a radix-16 redundant signed-digit number representation and directly supports single or multiple precision addition, subtraction, multiplication, division, extraction of the square root and computation of ...Cascade hardware; Bignums; Precision arithmetic1989
10 Carter, Tony M.Cascade: hardware for high/variable precision arithmeticThe Cascade hardware architecture for high/variable precision arithmetic is described. It uses a radix-16 redundant signed-digit number representation and directly supports single or multiple precision addition, subtraction, multiplication, division, extraction of the square root and computation...1989
11 Carter, Tony M.; Smith, Kent F.Cell matrix methodologies for integrated circuit designA class of integrated circuit design and implementation methodologies is described. These techniques are unique in that they simultaneously model both function and interconnect using cells. These cells are designed such that cell adjacency normally implies interconnection. The absence of an interco...Integrated circuit design; Cell matrix1989
12 Cohen, ElaineComputing offsets and tool paths with Voronoi diagramsIn this paper we describe the use of Voronoi diagrams to generate offsets for planar regions bounded by circular arcs and line segments, and then use the generated offsets as tool paths for NC machining. Two methods are presented, each producing a different type of offset. One of them generates the ...Voronoi diagrams1989
13 Cohen, ElaineConstant scallop height tool path generationAn approach for the automatic generation of constant scallop height tool paths is presented. An example is shown generated from a B-spline model, although it can be used with many types of sculptured surfaces. The approach utilizes surface subdivision techniques and a new algorithm for tool path gen...Scallop height; Tool path generation; B-spline model1989
14 Cohen, ElaineHidden curve removal for free form surfacesThis paper describes a hidden curve algorithm specifically designed for sculptured surfaces. A technique is described to extract the visible curves for a given scene without the need to approximate the surface by polygons. This algorithm produces higher quality results than polygon based algorithms,...Hidden curves; Free form surfaces; Sculptured surfaces1989
15 Lee, Hyo JongImplementation and characteristics of rule-based system for the finite element analysisIt it well known that the analysis of process for the finite element method is tedious and errorprone steps. Considering the importance of the task of engineering analyses, such as structural analysis, heat transfer, fluid flow simulation, and electromagnetic potential, many researchers have tried t...finite element analysis; Rule-based system1989
16 Henderson, Thomas C.Logical behaviorsIn this paper we describe an approach to high-level multisensor integration in t h e context of an autonomous mobile robot. Previous papers have described the development of t h e INRIA mobile robot subsystems: 1. sensor and actuator systems 2. distance and range analysis 3. feature extraction ...Multisensor integration; 3-D environment descriptions1989
17 Seeley, DonnPassword cracking: a game of witsA password cracking algorithm seems like a slow and bulky item to put in a worm, but the worm makes this work by being persistent and efficient. The worm is aided by some unfortunate statistics about typical password choices.Password cracking algorithm; Computer worms1989
18 Carter, Tony M.Path-programmable logicPath-Programmable Logic (PPL) is a structured IC design methodology under development at the University of Utah. PPL employs a sea-of-wires approach to design. In PPL, design is done entirely using cells for both functionality and interconnect. PPL cells may have modifiers that change either their ...Path-Programmable Logic; PPL1989
19 Carter, Tony M.The set theory of arithmetic decompositionThe Set Theory of Arithmetic Decomposition is a method for designing complex addition/ subtraction circuits at any radix using strictly positional, sign-local number systems. The specification of an addition circuit is simply an equation that describes the inputs and the outputs as weighted digit se...Arithmetic decomposition; Addition/ subtraction circuits1989
20 Gu, JunStructured, technology independent VLSI designRapid advancement in new semiconductor technologies has created a need for the design of existing integrated circuits using these new technologies. These new technologies are required to provide improved performance, smaller feature sizes and lower costs. The conversion of an integrated circuit fro...VLSI design; semiconductor technologies1989
21 Brunvand, Erik L.Translating concurrent programs into delay-insensitive circuitsPrograms written in a subset of occam are automatically translated into delay-insensitive circuits using syntax-directed techniques. The resulting circuits are improved using semantics-preserving circuit-to-circuit transformations. Since each step of the translation process can be proven correct, th...1989
1 - 25 of 21