|
|
Creator | Title | Description | Subject | Date |
1 |
|
Kirby, Robert Michael | A scalable, efficient scheme for evaluation of stencil computations over unstructured meshes | Stencil computations are a common class of operations that appear in many computational scientific and engineering applications. Stencil computations often benefit from compile-time analysis, exploiting data-locality, and parallelism. Post-processing of discontinuous Galerkin (dG) simulation solutio... | | 2013-01-01 |
2 |
|
Henderson, Thomas C. | Analysis of topographic maps for recreational purposes using decision trees | In this paper we describe a method for predicting the subjective quality of a new mountain bike route for a particular subject based on routes previously ridden and ranked by the subject. GPS tracks of the previously ridden routes are over laid on rasterized topographic maps and topographic features... | | 2013-01-01 |
3 |
|
Pascucci, Valerio | Characterization and modeling of PIDX parallel I/O for performance optimization | Parallel I/O library performance can vary greatly in re- sponse to user-tunable parameter values such as aggregator count, file count, and aggregation strategy. Unfortunately, manual selection of these values is time consuming and dependent on characteristics of the target machine, the underlying fi... | | 2013-01-01 |
4 |
|
Bargteil, Adam Wade | Dynamic sprites | Traditional methods for creating dynamic objects and characters from static drawings involve careful tweaking of animation curves and/or simulation parameters. Sprite sheets offer a more drawing-centric solution, but they do not encode timing information or the logic that determines how objects shou... | | 2013-01-01 |
5 |
|
Hansen, Charles D. | Evaluation of depth of field for depth perception in DVR | In this paper we present a user study on the use of Depth of Field for depth perception in Direct Volume Rendering. Direct Volume Rendering with Phong shading and perspective projection is used as the baseline. Depth of Field is then added to see its impact on the correct perception of ordinal depth... | | 2013-01-01 |
6 |
|
Pascucci, Valerio | Exploring power behaviors and trade-offs of in-situ data analytics | As scientific applications target exascale, challenges related to data and energy are becoming dominating concerns. For example, coupled simulation workflows are increasingly adopting in-situ data processing and analysis techniques to address costs and overheads due to data movement and I/O. However... | | 2013-01-01 |
7 |
|
Regehr, John | Help, help, Im being suppressed the significance of suppressors in software testing | Abstract-Test features are basic compositional units used to describe what a test does (and does not) involve. For example, in API-based testing, the most obvious features are function calls; in grammar-based testing, the obvious features are the elements of the grammar. The relationship between fea... | | 2013-01-01 |
8 |
|
Hansen, Charles D. | Interactive rendering and efficient querying for large multivariate seismic volumes on consumer level PCs | We present a volume visualization method that allows interactive rendering and efficient querying of large multivariate seismic volume data on consumer level PCs. The volume rendering pipeline utilizes a virtual memory structure that supports out-of-core mul- tivariate multi-resolution data and a GP... | | 2013-01-01 |
9 |
|
Berzins, Martin | Investigating applications portability with the Uintah DAG-based runtime system on PetaScale supercomputers | Present trends in high performance computing present formidable challenges for applications code using multicore nodes possibly with accelerators and/or co-processors and reduced memory while still attaining scalability. Software frameworks that execute machine-independent applications code using a ... | | 2013-01-01 |
10 |
|
Hibler, Michael J. | Isolation of malicious external inputs in a security focused adaptive execution environment | Reliable isolation of malicious application inputs is necessary for preventing the future success of an observed novel attack after the initial incident. In this paper we describe, measure and analyze, Input-Reduction, a technique that can quickly isolate malicious external inputs that embody unfore... | | 2013-01-01 |
11 |
|
Gopalakrishnan, Ganesh | Overcoming extreme-scale reproducibility challenges through a unified, targeted, and multilevel toolset | Reproducibility, the ability to repeat program executions with the same numerical result or code behavior, is crucial for computational science and engineering applications. However, non-determinism in concurrency scheduling often hampers achieving this ability on high performance computing (HPC) sy... | | 2013-01-01 |
12 |
|
Venkatasubramanian, Suresh | Power to the points: validating data memberships in clusterings | In this paper, we present a method to attach affinity scores to the implicit labels of individual points in a clustering. The affinity scores capture the confidence level of the cluster that claims to "own" the point. We demonstrate that these scores accurately capture the quality of the label assig... | | 2013-01-01 |
13 |
|
Balasubramonian, Rajeev | Quantifying the relationship between the power delivery network and architectural policies in a 3D-stacked memory device | Many of the pins on a modern chip are used for power delivery. If fewer pins were used to supply the same current, the wires and pins used for power delivery would have to carry larger currents over longer distances. This results in an "IR-drop" problem, where some of the voltage is dropped across t... | | 2013-01-01 |
14 |
|
Venkatasubramanian, Suresh | Track estimation using link line crossing information in wireless networks | Device-free or non-cooperative localization uses the changes in signal strength measured on links in a wireless network to estimate a person's position in the network area. Existing methods provide an instantaneous coordinate estimate via radio tomographic imaging or location fingerprinting. In this... | | 2013-01-01 |
15 |
|
Hansen, Charles D. | Transfer function design based on user selected samples for intuitive multivariate volume exploration | Multivariate volumetric datasets are important to both science and medicine. We propose a transfer function (TF) design approach based on user selected samples in the spatial domain to make multivariate volumetric data visualization more accessible for domain users. Specifically, the user starts the... | | 2013-01-01 |
16 |
|
Potter, Kristin Carrie | Uncertainty visualization in forward and inverse cardiac models | Quantification and visualization of uncertainty in cardiac forward and inverse problems with complex geometries is subject to various challenges. Specific to visualization is the observation that occlusion and clutter obscure important regions of interest, making visual assessment difficult. In orde... | | 2013-01-01 |
17 |
|
Gopalakrishnan, Ganesh | Visual analysis of uncertainties in ocean forecasts for planning and operation of off-shore structures | We present a novel integrated visualization system that enables interactive visual analysis of ensemble simulations used in ocean forecasting, i.e, simulations of sea surface elevation. Our system enables the interactive planning of both the placement and operation of off-shore structures. We illust... | | 2013-01-01 |