1 - 25 of 35
Number of results to display per page
CreatorTitleDescriptionSubjectDate
1 Balasubramonian, RajeevMemZip: exploring unconventional benefits from memory compressionMemory compression has been proposed and deployed in the past to grow the capacity of a memory system and reduce page fault rates. Compression also has secondary benefits: it can reduce energy and bandwidth demands. However, most prior mechanisms have been designed to focus on the capacity metric an...2014-01-01
2 Kasera, Sneha K.Energy efficient radio tomographic imagingIn this paper, our goal is to develop approaches to reduce the energy consumption in Radio Tomographic Imaging (RTI)-based methods for device free localization without giving up localization accuracy. Our key idea is to only measure those links that are near the current location of the moving object...2014-01-01
3 Balasubramonian, RajeevNDC: Analyzing the impact of 3D-stacked memory+logic devices on MapReduce workloadsWhile Processing-in-Memory has been investigated for decades, it has not been embraced commercially. A number of emerging technologies have renewed interest in this topic. In particular, the emergence of 3D stacking and the imminent release of Micron's Hybrid Memory Cube device have made it more pra...2014-01-01
4 Kirby, Robert MichaelVerifying volume rendering using discretization error analysisWe propose an approach for verification of volume rendering correctness based on an analysis of the volume rendering integral, the basis of most DVR algorithms. With respect to the most common discretization of this continuous model (Riemann summation), we make assumptions about the impact of parame...2014-01-01
5 Pascucci, ValerioThe natural Helmholtz-Hodge decomposition for open-boundary flow analysisThe Helmholtz-Hodge decomposition (HHD), which describes a flow as the sum of an incompressible, an irrotational, and a harmonic flow, is a fundamental tool for simulation and analysis. Unfortunately, for bounded domains, the HHD is not uniquely defined, traditionally, boundary conditions are impose...2014-01-01
6 Pascucci, ValerioMultivariate volume visualization through dynamic projectionsWe propose a multivariate volume visualization framework that tightly couples dynamic projections with a high-dimensional transfer function design for interactive volume visualization. We assume that the complex, high-dimensional data in the attribute space can be well-represented through a collecti...2014-01-01
7 Gopalakrishnan, GaneshOvis: A framework for visual analysis of ocean forecast ensemblesWe present a novel integrated visualization system that enables interactive visual analysis of ensemble simulations of the sea surface height that is used in ocean forecasting. The position of eddies can be derived directly from the sea surface height and our visualization approach enables their int...2014-01-01
8 Berzins, MartinParallel breadth first search on GPU clustersFast, scalable, low-cost, and low-power execution of parallel graph algorithms is important for a wide variety of commercial and public sector applications. Breadth First Search (BFS) imposes an extreme burden on memory bandwidth and network communications and has been proposed as a benchmark that m...2014-01-01
9 Henderson, Thomas C.Received signal strength based bearing-only robot navigation in a sensor network fieldThis paper presents a low-complexity, novel approach to wireless sensor network (WSN) assisted autonomous mobile robot (AMR) navigation. The goal is to have an AMR navigate to a target location using only the information inherent to WSNs, i.e., topology of the WSN and received signal strength (RSS) ...2014-01-01
10 Gopalakrishnan, GaneshTowards providing low-overhead data race detection for large OpenMP applicationsNeither static nor dynamic data race detection methods, by themselves, have proven to be sufficient for large HPC applications, as they often result in high runtime overheads and/or low race-checking accuracy. While combined static and dynamic approaches can fare better, creating such combinations, ...2014-01-01
11 Kasera, Sneha K.Violating privacy through walls by passive monitoring of radio windowsWe investigate the ability of an attacker to passively use an otherwise secure wireless network to detect moving people through walls. We call this attack on privacy of people a "monitoring radio windows" (MRW) attack. We design and implement the MRW attack methodology to reliably detect when a pers...2014-01-01
12 Kasera, Sneha K.Exploiting altruism in social networks for friend-to-friend malware detectionWe propose a novel malware detection application- SocialScan-which enables friend-to-friend (f2f) malware scanning services among social peers, with scanning resource sharing governed by levels of social altruism. We show that with f2f sharing of resources, SocialScan achieves a 65% increase in the ...2014-01-01
13 Kirby, Robert MichaelGPU-based volume visualization from high-order finite element fieldsThis paper describes a new volume rendering system for spectral/hp finite-element methods that has as its goal to be both accurate and interactive. Even though high-order finite element methods are commonly used by scientists and engineers, there are few visualization methods designed to display thi...2014-01-01
14 Bronson, Jonathan RichardLattice cleaving: a multimaterial tetrahedral meshing algorithm with guaranteesWe introduce a new algorithm for generating tetrahedral meshes that conform to physical boundaries in volumetric domains consisting of multiple materials. The proposed method allows for an arbitrary number of materials, produces high-quality tetrahedral meshes with upper and lower bounds on dihedral...2014-01-01
15 Gopalakrishnan, GaneshEfficient search for inputs causing high floating-point errorsTools for floating-point error estimation are fundamental to program understanding and optimization. In this paper, we focus on tools for determining the input settings to a floating point routine that maximizes its result error. Such tools can help support activities such as precision allocation, p...2014-01-01
16 Hansen, Charles D.Boundary aware reconstruction of scalar fieldsIn visualization, the combined role of data reconstruction and its classification plays a crucial role. In this paper we propose a novel approach that improves classification of different materials and their boundaries by combining information from the classifiers at the reconstruction stage. Our ap...2014-01-01
17 Regehr, JohnCause reduction for quick testingAbstract-In random testing, it is often desirable to produce a "quick test" - an extremely inexpensive test suite that can serve as a frequently applied regression and allow the benefits of random testing to be obtained even in very slow or oversubscribed test environments. Delta debugging is an alg...2014-01-01
18 Bargteil, Adam WadeDeformation embedding for point-based elastoplastic simulationWe present a straightforward, easy-to-implement, point-based approach for animating elastoplastic materials. The core idea of our approach is the introduction of embedded space-the least-squares best fit of the material's rest state into three dimensions. Nearest neighbor queries in the embedded spa...2014-01-01
19 Bargteil, Adam WadeDynamic spritesTraditional methods for creating dynamic objects and characters from static drawings involve careful tweaking of animation curves and/or simulation parameters. Sprite sheets offer a more drawing-centric solution, but they do not encode timing information or the logic that determines how objects shou...2014-01-01
20 Bargteil, Adam WadeAnimation of deformable bodies with quadratic bézier finite elementsIn this article, we investigate the use of quadratic finite elements for graphical animation of deformable bodies.We consider both integrating quadratic elements with conventional linear elements to achieve a computationally efficient adaptive-degree simulation framework as well as wholly quadratic ...2014-01-01
21 Pascucci, ValerioConforming Morse-Smale complexesMorse-Smale (MS) complexes have been gaining popularity as a tool for feature-driven data analysis and visualization. However, the quality of their geometric embedding and the sole dependence on the input scalar field data can limit their applicability when expressing application-dependent features....2014-01-01
22 Balasubramonian, RajeevSandbox prefetching: safe run-time evaluation of aggressive prefetchersMemory latency is a major factor in limiting CPU per- formance, and prefetching is a well-known method for hiding memory latency. Overly aggressive prefetching can waste scarce resources such as memory bandwidth and cache capacity, limiting or even hurting performance. It is therefore important to e...2014-01-01
23 Kasera, Sneha K.Secret key extraction using Bluetooth wireless signal strength measurementsBluetooth has found widespread adoption in phones, wireless headsets, stethoscopes, glucose monitors, and oximeters for communication of, at times, very critical information. However, the link keys and encryption keys in Bluetooth are ultimately generated from a short 4 digit PIN, which can be crack...2014-01-01
24 Venkatasubramanian, SureshMultiple target tracking with RF sensor networksRF sensor networks are wireless networks that can localize and track people (or targets) without needing them to carry or wear any electronic device. They use the change in the received signal strength (RSS) of the links due to the movements of people to infer their locations. In this paper, we cons...2014-01-01
25 Bargteil, Adam WadeMultiphase flow of immiscible fluids on unstructured moving meshesIn this paper, we present a method for animating multiphase flow of immiscible fluids using unstructured moving meshes. Our underlying discretization is an unstructured tetrahedral mesh, the deformable simplicial complex (DSC), that moves with the flow in a Lagrangian manner. Mesh optimization opera...2014-01-01
1 - 25 of 35