1 - 25 of 44
Number of results to display per page
CreatorTitleDescriptionSubjectDate
1 Regehr, JohnPoster abstract: TinyOS 2.1 adding threads and memory protection to tinyOSThe release of TinyOS 2.0 two years ago was motivated by the need for greater platform flexibility, improved robustness and reliability, and a move towards service oriented application development. Since this time, we have seen the community embrace these efforts and add support for additional hardw...2008-01-01
2 Evans, DavidGraphical man/machine communications: May 1967Semiannual technical report for period ending 15 May, 1967.1967-05
3 Freire, JulianaLegoDB: customizing relational storage for XML documentsXML is becoming the predominant data exchange format in a variety of application domains (supply-chain, scientific data processing, telecommunication infrastructure, etc.). Not only is an increasing amount of XML data now being processed, but XML is also increasingly being used in business-critical...LegoDB; XML Schema2002
4 Freire, JulianaShreX: managing XML documents in relational databasesWe describe ShreX, a freely-available system for shredding, loading and querying XML documents in relational databases. ShreX supports all mapping strategies proposed in the literature as well as strategies available in commercial RDBMSs. It provides generic (mapping-independent) functions for...ShreX; XML Schema; Mapping strategies2004
5 Seeley, DonnPassword cracking: a game of witsA password cracking algorithm seems like a slow and bulky item to put in a worm, but the worm makes this work by being persistent and efficient. The worm is aided by some unfortunate statistics about typical password choices.Password cracking algorithm; Computer worms1989
6 Evans, DavidGraphical man/machine communications: November 1966Semiannual progress report for period ending 30 November, 1966.1966-11
7 Brunvand, Erik L.Practical advances in asynchronous design and in asynchronous/synchronous interfacesAsynchronous systems are being viewed as an increasingly viable alternative to purely synchronous systems. This paper gives an overview of the current state of the art in practical asynchronous circuit and system design in four areas: controllers, datapaths, processors, and the design of asynchr...1999
8 Evans, DavidGraphical man/machine communications: May 1969Semi-Annual Technical Report 1 December 1968 - 30 May 19691969-05
9 Regehr, JohnInterface contracts for TinyOSTinyOS applications are built with software components that communicate through narrow interfaces. Since components enable fine-grained code reuse, this approach has been successful in creating applications that make very efficient use of the limited code and data memory on sensor network nodes. How...2007-01-01
10 Sudan, KshitijOptimizing datacenter power with memory system levers for guaranteed quality-of-serviceCo-location of applications is a proven technique to improve hardware utilization. Recent advances in virtualization have made co-location of independent applications on shared hardware a common scenario in datacenters. Colocation, while maintaining Quality-of-Service (QoS) for each application is a...2012-01-01
11 Regehr, JohnRandom testing of interrupt-driven softwareInterrupt-driven embedded software is hard to thoroughly test since it usually contains a very large number of executable paths. Developers can test more of these paths using random interrupt testing-firing random interrupt handlers at random times. Unfortunately, na¨ıve application of random test...2005-01-01
12 Evans, DavidGraphical man/machine communications: February 1968Technical report No. RADC - TR - 68 - 90 for the period ending 30 November, 1967. Two classes of research activities are being conducted. One is research in information processsing system technology. The other is researach in application of interactive computing technology to the solution of severa...Fluid flow problems1968-02
13 Regehr, JohnPluggable abstract domains for analyzing embedded softwareMany abstract value domains such as intervals, bitwise, constants, and value-sets have been developed to support dataflow analysis. Different domains offer alternative tradeoffs between analysis speed and precision. Furthermore, some domains are a better match for certain kinds of code than others. ...2006-01-01
14 Berzins, MartinRadiation modeling using the Uintah heterogeneous CPU/GPU runtime systemThe Uintah Computational Framework was developed to provide an environment for solving fluid-structure interaction problems on structured adaptive grids on large-scale, long-running, data-intensive problems. Uintah uses a combination of fluid-flow solvers and particle-based methods for solids, toget...2012-01-01
15 Hansen, Charles D.Efficient depth estimation using trinocular stereoWe present recent advancements in our passive trinocular stereo system. These include a technique for calibrating and rectifying in a very efficient and simple manner the triplets of images taken for trinocular stereovision systems. After the rectification of images, epipolar lines are parallel to t...Trinocular stereo; Stereovision1988
16 Evans, DavidGraphical man/machine communications: November 1969Semi-Annual Technical Report 1 June 1969 - 30 November 19691969-11
17 Kirby, Robert MichaelA scalable, efficient scheme for evaluation of stencil computations over unstructured meshesStencil computations are a common class of operations that appear in many computational scientific and engineering applications. Stencil computations often benefit from compile-time analysis, exploiting data-locality, and parallelism. Post-processing of discontinuous Galerkin (dG) simulation solutio...2013-01-01
18 Regehr, JohnARMor: fully verified software fault isolationWe have designed and implemented ARMor, a system that uses software fault isolation (SFI) to sandbox application code running on small embedded processors. Sandboxing can be used to protect components such as the RTOS and critical control loops from other, less-trusted components. ARMor guarantees m...2011-01-01
19 Regehr, JohnDeriving abstract transfer functions for analyzing embedded softwareThis paper addresses the problem of creating abstract transfer functions supporting dataflow analyses. Writing these functions by hand is problematic: transfer functions are difficult to understand, difficult to make precise, and difficult to debug. Bugs in transfer functions are particularly seriou...2006-01-01
20 Regehr, JohnEliminating the call stack to save RAMMost programming languages support a call stack in the programming model and also in the runtime system.We show that for applications targeting low-power embedded microcontrollers (MCUs), RAM usage can be significantly decreased by partially or completely eliminating the runtime callstack. We presen...2009-01-01
21 Pascucci, ValerioExploring power behaviors and trade-offs of in-situ data analyticsAs scientific applications target exascale, challenges related to data and energy are becoming dominating concerns. For example, coupled simulation workflows are increasingly adopting in-situ data processing and analysis techniques to address costs and overheads due to data movement and I/O. However...2013-01-01
22 Shirley, Peter S.; Thompson, William B.Expressive rendering of mountainous terrainPainters and cartographers have developed artistic landscape rendering techniques for centuries. Such renderings can visualize complex three-dimensional landscapes in a pleasing and understandable way. In this work we examine a particular type of artistic depiction, panorama maps, in terms of fun...panorama maps; Non-photorealistic rendering; Terrain; Texture synthesis2007
23 Freire, JulianaIndexing relations on the webThere has been a substantial increase in the volume of (semi) structured data on the Web. This opens new opportunities for exploring and querying these data that goes beyond the keyword-based queries traditionally used on the Web. But supporting queries over a very large number of apparently disconn...Dataspaces; Web relations; Rewriting2010
24 Regehr, JohnOffline compression for on-chip RAMWe present offline RAM compression, an automated source-to-source transformation that reduces a program's data size. Statically allocated scalars, pointers, structures, and arrays are encoded and packed based on the results of a whole-program analysis in the value set and pointer set domains. We tar...2007-01-01
25 Gopalakrishnan, Ganesh; Kirby, Robert Michael IIRuntime model checking of multithreaded C/C++ programsWe present inspect, a tool for model checking safety prop- erties of multithreaded C/C++ programs where threads in- teract through shared variables and synchronization primi- tives. The given program is mechanically transformed into an instrumented version that yields control to a centralized s...Dynamic partial order reduction; Multithreaded; C/C++; Runtime model checking2007
1 - 25 of 44