1 - 25 of 989
Number of results to display per page
1 URK: Utah robot kit - a three-link robot prototypeIn this paper we will present the stages of designing and building a three-link robot manipulator prototype that was built as part of a research project for establishing a prototyping environment for robot manipulators. Building this robot enabled us determine the required subsystems and interfaces ...URK; Utah robot kit; robot manipulator prototype; prototyping environment; robot manipulators; three-link1994
2 B-splines for physically-based renderingAlthough B-spline curves and surfaces have enjoyed a long established place in the graphics community as constructive modeling tools, the use of B-spline approximation techniques has received relatively little attention in rendering. In this work we explore the use of 4D and 5D tensor product B-s...B-spline curves; Rendering algorithms2002-01-09
3 A dynamic recursive structure for intelligent inspectionWe suggest a new approach for inspection and reverse engineering applications. In particular we investigate the use of discrete event dynamic systems DEDS to guide and control the active exploration and sensing of mechanical parts for industrial inspection and reverse engineering?? We introduce...Intelligent inspection; Discrete event dynamic systems; DEDS; Industrial inspection; Dynamic recursive structure1992
4 The NSR processor prototypeThe NSR (Non-Synchronous RISC) processor is a general purpose processor structured as a collection of self-timed units that operate concurrently and communicate over bundled data channels in the style of micropipelines. These units correspond to standard synchronous pipeline stages such as Instructi...Self-timed Systems; Asynchronous systems; Micropipelines; FPGAs; RISC processor; NSR1992
5 Received signal strength based bearing-only robot navigation in a sensor network fieldThis paper presents a low-complexity, novel approach to wireless sensor network (WSN) assisted autonomous mobile robot (AMR) navigation. The goal is to have an AMR navigate to a target location using only the information inherent to WSNs, i.e., topology of the WSN and received signal strength (RSS) ...2014-01-01
6 Boundary aware reconstruction of scalar fieldsIn visualization, the combined role of data reconstruction and its classification plays a crucial role. In this paper we propose a novel approach that improves classification of different materials and their boundaries by combining information from the classifiers at the reconstruction stage. Our ap...2014-01-01
7 A new family of variational-form-based regularizers for reconstructing epicardial potentials from body-surface mappingWe propose a new family of regularizers for the inverse ECG problem, using a variational principle that underlies finite element approximation methods. As an alternative to traditional Tikhonov regularizers, the variational formulation has several advantages: 1)it enables a simple construction of ...2010
8 Physically-based interactive schlieren flow visualizationUnderstanding fluid flow is a difficult problem and of increasing importance as computational fluid dynamics produces an abundance of simulation data. Experimental flow analysis has employed techniques such as shadowgraph and schlieren imaging for centuries which allow empirical observation of inho...2010-03
9 End-to-end eScience: integrating workflow, query, visualization, and provenance at an ocean observatoryData analysis tasks at an Ocean Observatory require integrative and and domain-specialized use of database, workflow, visualization systems. We describe a platform to support these tasks developed as part of the cyberinfrastructure at the NSF Science and Technology Center for Coastal Margin Obser...Coastal margins; Ocean observatories; Workflow systems; VisTrails2008-12
10 GEM: graphical explorer for MPI programsFormal dynamic verification can complement MPI program testing by detecting hard-to-find concurrency bugs. In previous work, we described our dynamic verifier called ISP that can parsimoniously search the execution space of an MPI program while detecting important classes of bugs. One major limit...GEM; Graphical explorer; MPI programs; Dynamic verification; Concurrency bugs2009
11 Reaction-diffusion patterns in smart sensor networksWe introduced the use of Turing?s reaction-diffusion pattern formation to support high-level tasks in smart sensor networks (S-Nets). This has led us to explore various biologically motivated mechanisms. In this paper we address some issues that arise in trying to get reliable, efficient patterns...Reaction-diffusion; Pattern formation; Smart sensor networks; S-Nets2003-11-05
12 Static and dynamic structure in design patternsDesign patterns are a valuable mechanism for emphasizing structure, capturing design expertise, and facilitating restructuring of software systems. Patterns are typically applied in the context of an object-oriented language and are implemented so that the pattern participants correspond to obje...Design patterns; Static structure; Dynamic structure2001-11-01
13 Constraint objects - integrating constraint definition and interactionThis paper describes the implementation of a new constraint-based technique for direct manipulation in interactive CAD, which will simplify the design process, especially in the early stages. We introduce so called Constraint Objects and Parameter Objects which constitute an object-oriented view on ...Constraint objects; Parameter objects1992
14 Computing offsets and tool paths with Voronoi diagramsIn this paper we describe the use of Voronoi diagrams to generate offsets for planar regions bounded by circular arcs and line segments, and then use the generated offsets as tool paths for NC machining. Two methods are presented, each producing a different type of offset. One of them generates the ...Voronoi diagrams1989
15 Industrial inspection and reverse engineeringWe propose a new design for inspection and reverse engineering environments. We have designed and experimented with such an environment for capturing sense data of mechanical parts in an intelligent way. We construct a sensing ? CAD interface for the automatic reconstruction of parts from visual d...Industrial inspection; Discrete event dynamic system; DEDS; DRFSM1994
16 High level optimizations in compiling process descriptions to asynchronous circuitsAsynchronous/'Self-Timed designs are beginning to attract attention as promising means of dealing with the complexity of modern VLSI technology. In this paper, we present our views on why asynchronous systems matter. We then present details of our high level synthesis tool SHILPA that can automatic...Self-timed; VLSI1992
17 A general compositional approach to verifying hierarchical cache coherence protocolsModern chip multiprocessor (CMP) cache coherence protocols are extremely complex and error prone to design. Modern symbolic methods are unable to provide much leverage for this class of examples. In [1], we presented a method to verify hierarchical and inclusive versions of these protocols using ...Hierarchical cache coherence protocols; Verification2006-11-26
18 A method of solution for hydrodynamics and radiation diffusion as a multi-material problem in one dimensionMulti-material problem1971
19 A communication-ordered task graph allocation algorithmThe inherently asynchronous nature of the data flow computation model allows the exploitation of maximum parallelism in program execution. While this computational model holds great promise, several problems must be solved in order to achieve a high degree of program performance. The allocation and ...Task graph allocation algorithm1992
20 Conforming Morse-Smale complexesMorse-Smale (MS) complexes have been gaining popularity as a tool for feature-driven data analysis and visualization. However, the quality of their geometric embedding and the sole dependence on the input scalar field data can limit their applicability when expressing application-dependent features....2014-01-01
21 Curve boxplot: Generalization of boxplot for ensembles of curvesIn simulation science, computational scientists often study the behavior of their simulations by repeated solutions with variations in parameters and/or boundary values or initial conditions. Through such simulation ensembles, one can try to understand or quantify the variability or uncertainty in a...2014-01-01
22 Sandbox prefetching: safe run-time evaluation of aggressive prefetchersMemory latency is a major factor in limiting CPU per- formance, and prefetching is a well-known method for hiding memory latency. Overly aggressive prefetching can waste scarce resources such as memory bandwidth and cache capacity, limiting or even hurting performance. It is therefore important to e...2014-01-01
23 Ovis: A framework for visual analysis of ocean forecast ensemblesWe present a novel integrated visualization system that enables interactive visual analysis of ensemble simulations of the sea surface height that is used in ocean forecasting. The position of eddies can be derived directly from the sea surface height and our visualization approach enables their int...2014-01-01
24 MemZip: exploring unconventional benefits from memory compressionMemory compression has been proposed and deployed in the past to grow the capacity of a memory system and reduce page fault rates. Compression also has secondary benefits: it can reduce energy and bandwidth demands. However, most prior mechanisms have been designed to focus on the capacity metric an...2014-01-01
25 HLS: a framework for composing soft real-time schedulersHierarchical CPU scheduling has emerged as a way to (1) support applications with diverse scheduling requirements in open systems, and (2) provide load isolation between applications, users, and other resource principals. Most existing work on hierarchical scheduling has focused on systems that prov...2001-01-01
1 - 25 of 989