|
|
Creator | Title | Description | Subject | Date |
1 |
|
Mathews, V. John; Schlegel, Christian | A blind adaptive projection receiver for CDMA systems | Abstract - This paper presents a blind and adaptive CDMA receiver that does not require knowledge of the spreading codes associated with users other than the ones of interest. Receivers for synchronous as well as asynchronous transmission by multiple users with error control coding are develope... | | 1998 |
2 |
|
Stevens, Kenneth | A mathematical approach to a low power FFT architecture | Architecture and circuit design are the two most effective means of reducing power in CMOS VLSI. Mathematical manipulations have been applied to create a power efficient architecture of an FFT. This architecture has been implemented in asynchronous circuit technology that achieves significant powe... | | 1998 |
3 |
|
Gopalakrishnan, Ganesh | A partial order reduction algorithm without the Proviso | This paper presents a partial order reduction algorithm, called Two phase, that preserves stutter free LTL properties. Two phase dramatically reduces the number of states visited compared to previous partial order reduction algorithms on most practical protocols. The reason can be traced to a step o... | Order reduction algorithm; Proviso step | 1998 |
4 |
|
Stevens, Kenneth | A single chip low power asynchronous implementation of an FFT algorithm for space applications | A fully asynchronous _x000C_fixed point FFT processor is introduced for low power space applications. The architecture is based on an algorithm developed by Suter and Stevens specifi_x000C_cally for a low power implementation. The novelty of this architecture lies in its high localization of compo... | | 1998 |
5 |
|
Beazley, David. M. | A wrapper generation tool for the creation of scriptable scientific applications | In recent years, there has been considerable interest in the use of scripting languages as a mechanism for controlling and developing scientific software. Scripting languages allow scientific applications to be encapsulated in an interpreted environment similar to that found in commercial scientific... | | 1998 |
6 |
|
Mathews, V. John | Adaptive parallel-cascade truncated volterra filters | Abstract-This paper studies adaptive truncated Volterra filters employing parallel-cascade structures. Parallel-cascade realizations implement higher order Volterra systems a s a parallel connection of multiplicative combinations of lower order truncated Volterra systems. A normalized LMS adaptive f... | | 1998 |
7 |
|
Mathews, V. John | Adaptive, quadratic preprocessing of document images for binarization | Abstract-This paper presents an adaptive algorithm for preprocessing document images prior to binarization in character recognition problems. Our method is similar in its approach to the blind adaptive equalization of binary communication channels. The adaptive filter utilizes a quadratic system mod... | | 1998 |
8 |
|
Mathews, V. John | An analytical model of the perceptual threshold function for multichannel image compression | ABSTRACT The human observer is often the final judge of the quality of compressed images. One way to design a compression system that attempts to reduce or eliminate subjective distortions in the coded images is to incorporate a perceptual threshold function model into the compression system. The... | | 1998 |
9 |
|
Sikorski, Kris | An interior ellipsoid algorithm for fixed points | We consider the problem of approximating fixed points of non-smooth contractive functions with using of the absolute error criterion. In [12] we proved that the upper bound on the number of function evaluations to compute ?-approximations is 0(n3(In 1/? + In 1/1-q +In n)) in the worst case, where ... | Ellipsoid algorithm; Contractive functions; Fixed points | 1998 |
10 |
|
Weinstein, David | The analytic 3-D transform for the least-squared fit of three pairs of corresponding points | We derive the analytic transformation for minimizing the summed-squared-distance between three movable points in one three-space pose to three corresponding fixed points in another three-space pose. This change of basis is a general rigid-body transformation (translation and rotation), with the addi... | 3-D transform; summed-squared-distance; three movable points; Three-space | 1998 |
11 |
|
Carter, John B. | AS-COMA: An adaptive hybrid shared memory Architecture | Scalable shared memory multiprocessors traditionally use either a cache coherent nonuniform memory access (CC-NUMA) or simple cache-only memory architecture (S-COMA) memory architecture. Recently, hybrid architectures that combine aspects of both CC-NUMA and S-COMA have emerged. In this paper, we pr... | AS-COMA; Hybrid shared memory | 1998 |
12 |
|
Stevens, Kenneth; Myers, Chris J. | Average-case optimized technology mapping of one-hot domino circuits | This paper presents a technology mapping technique for optimizing the average-case delay of asynchronous combinational circuits implemented using domino logic and one-hot encoded outputs. The technique minimizes the critical path for common input patterns at the possible expense of making less commo... | | 1998 |
13 |
|
Myers, Chris J.; Stevens, Kenneth | Average-case optimized technology mapping of one-hot domino circuits* | This paper presents a technology mapping technique for optimizing the average-case delay of asynchronous combinational circuits implemented using domino logic and one-hot encoded outputs. The technique minimizes the critical path for common input patterns at the possible expense of making less commo... | | 1998 |
14 |
|
Freire, Juliana | Beyond depth-first strategies: improving tabled logic programs through alternative scheduling | Tabled evaluation ensures termination for programs with finite models by keeping track of which subgoals have been called. Given several variant subgoals in an evaluation, only the fi rst one encountered will use program-clause resolution; the rest will resolve with the answers generated by the f... | Alternate scheduling; SLG-WAM; Tabled logic programs | 1998 |
15 |
|
Riloff, Ellen M. | Case study in using linguistic phrases for text categorization on the WWW | Most learning algorithms that arc applied to text categorization problems rely on a bag-of-words document representation, i.e., each word occurring in the document is considered as a separate feature. In this paper, we investigate the use of linguistic phrases as input features for text categoriz... | Learning algorithms; Text categorization; Linguistic phrases; Information extraction patterns; AutoSlog-TS | 1998 |
16 |
|
Nelson, Donald | Constraint Jacobians for constant-time inverse kinematics and assembly optimization | An algorithm for the constant-time solution of systems of geometric constraint equations is presented in this work. constraint equations and their Jacobians may be used in conjunction with other numerical methods to solve for a variety of kinematics, dynamics, and assembly optimization problems. The... | Constant-time; Inverse kinematics; Constraint Jacobians | 1998 |
17 |
|
Myers, Chris J. | Covering conditions and algorithms for the synthesis of speed-independent circuits | Abstract-This paper presents theory and algorithms for the synthesis of standard C-implementations of speed-independent circuits. These implementations are block-level circuits which may consist of atomic gates to perform complex functions in order to ensure hazard freedom. First, we present Boolean... | | 1998 |
18 |
|
Gopalakrishnan, Ganesh | Decomposing the proof of correctness of pipelined microprocessors | We present a systematic approach to decompose and incrementally build the proof of correctness of pipelined microprocessors. The central idea is to construct the abstraction function using completion functions, one per unfinished instruction, each of which specify the effect (on the observables) of ... | Pipelined microprocessors; Proof of correctness | 1998 |
19 |
|
Carter, John B. | Design alternatives for shared memory multiprocessors | In this paper. we consider the design alternatives available for building the next generation DSM machine (e.g., the choice of memory architecture, network technology, and amount and location of per-node remote data cache). To investigate this design space, we have simulated six applications on a wi... | Shared memory multiprocessors | 1998 |
20 |
|
Gesteland, Raymond F.; Atkins, John F.; Ingram, Jennifer A.; Kelly, Paul J.; Grentzmann, Guido | Dual-luciferase reporter system for studying recoding signals | A new reporter system has been developed for measuring translation coupling efficiency of recoding mechanisms such as frameshifting or readthrough. A recoding test sequence is cloned in between the renilla and firefly luciferase reporter genes and the two luciferase activities are subsequently measu... | Amino Acid Sequence; Genes, Reporter; HIV; Antizyme; Translation | 1998 |
21 |
|
Riloff, Ellen M. | Empirical approach to conceptual case frame acquisition | Conceptual natural language processing systems usually rely on case frame instantiation to recognize events and role objects in text. But generating a good set of case frames for a domain is time-consuming, tedious, and prone to errors of omission. We have developed a corpus-based algorithm for a... | Conceptual case frame acquisition; Case frame instantiation; Corpus-based algorithm | 1998 |
22 |
|
Furse, Cynthia M. | Faster than fourier -- ultra-efficient time-to-frequency domain conversions for FDTD | Two highly efficient methods of computing magnitude and phase from time-domain data are demonstrated. These methods, based on solution of linear equations, are found to be equally accurate and more efficient than Fourier transform methods (DIT and FFT) for limited numbers of Frequencies. These metho... | Finite-difference time-domain method; FDTD; Fourier transform methods; Sine wave magnitude; Sine wave phase | 1998 |
23 |
|
Cohen, Elaine | Feature-based process planning for CNC machining | Today CNC machining is used successfully to provide program-driven medium lot size manufacturing. The range of applicability of CNC machining should be greater: For small lot sizes such as prototyping or custom products, these machines should provide quick turnaround and flexible production schedul... | CNC machining | 1998 |
24 |
|
Hibler, Michael J. | The flask security architecture: system support for diverse security policies | Operating systems must be flexible in their support for security policies, i.e., the operating system must provide sufficient mechanisms for supporting the wide variety of real-world security policies. Systems claiming to provide this support have failed to do so in two ways: they either fail to pro... | Flask; Security architecture | 1998 |
25 |
|
Stringfellow, Gerald B. | Influence of tellurium doping on step bunching of GaAs (001) vicinal surfaces grown by organometallic vapor phase epitaxy | Atomic force microscopy has been used to investigate the influence of controlled tellurium Te incorporation on the step structure of GaAs grown by organometallic vapor phase epitaxy on vicinal 001 surfaces. Te doping, using the precursor diethyltelluride, is found to markedly decrease the surface r... | Epitaxial growth; Misorientation; Organometallic vapor phase epitaxy | 1998 |