|
|
Creator | Title | Description | Subject | Date |
1 |
|
Regehr, John | Poster abstract: TinyOS 2.1 adding threads and memory protection to tinyOS | The release of TinyOS 2.0 two years ago was motivated by the need for greater platform flexibility, improved robustness and reliability, and a move towards service oriented application development. Since this time, we have seen the community embrace these efforts and add support for additional hardw... | | 2008-01-01 |
2 |
|
Evans, David | Graphical man/machine communications: May 1967 | Semiannual technical report for period ending 15 May, 1967. | | 1967-05 |
3 |
|
Freire, Juliana | LegoDB: customizing relational storage for XML documents | XML is becoming the predominant data exchange format in a variety of application domains (supply-chain, scientific data processing, telecommunication infrastructure, etc.). Not only is an increasing amount of XML data now being processed, but XML is also increasingly being used in business-critical... | LegoDB; XML Schema | 2002 |
4 |
|
Freire, Juliana | ShreX: managing XML documents in relational databases | We describe ShreX, a freely-available system for shredding, loading and querying XML documents in relational databases. ShreX supports all mapping strategies proposed in the literature as well as strategies available in commercial RDBMSs. It provides generic (mapping-independent) functions for... | ShreX; XML Schema; Mapping strategies | 2004 |
5 |
|
Seeley, Donn | Password cracking: a game of wits | A password cracking algorithm seems like a slow and bulky item to put in a worm, but the worm makes this work by being persistent and efficient. The worm is aided by some unfortunate statistics about typical password choices. | Password cracking algorithm; Computer worms | 1989 |
6 |
|
Evans, David | Graphical man/machine communications: November 1966 | Semiannual progress report for period ending 30 November, 1966. | | 1966-11 |
7 |
|
Brunvand, Erik L. | Practical advances in asynchronous design and in asynchronous/synchronous interfaces | Asynchronous systems are being viewed as an increasingly viable alternative to purely synchronous systems. This paper gives an overview of the current state of the art in practical asynchronous circuit and system design in four areas: controllers, datapaths, processors, and the design of asynchr... | | 1999 |
8 |
|
Evans, David | Graphical man/machine communications: May 1969 | Semi-Annual Technical Report 1 December 1968 - 30 May 1969 | | 1969-05 |
9 |
|
Regehr, John | Interface contracts for TinyOS | TinyOS applications are built with software components that communicate through narrow interfaces. Since components enable fine-grained code reuse, this approach has been successful in creating applications that make very efficient use of the limited code and data memory on sensor network nodes. How... | | 2007-01-01 |
10 |
|
Sudan, Kshitij | Optimizing datacenter power with memory system levers for guaranteed quality-of-service | Co-location of applications is a proven technique to improve hardware utilization. Recent advances in virtualization have made co-location of independent applications on shared hardware a common scenario in datacenters. Colocation, while maintaining Quality-of-Service (QoS) for each application is a... | | 2012-01-01 |
11 |
|
Regehr, John | Random testing of interrupt-driven software | Interrupt-driven embedded software is hard to thoroughly test since it usually contains a very large number of executable paths. Developers can test more of these paths using random interrupt testing-firing random interrupt handlers at random times. Unfortunately, na¨ıve application of random test... | | 2005-01-01 |
12 |
|
Evans, David | Graphical man/machine communications: February 1968 | Technical report No. RADC - TR - 68 - 90 for the period ending 30 November, 1967. Two classes of research activities are being conducted. One is research in information processsing system technology. The other is researach in application of interactive computing technology to the solution of severa... | Fluid flow problems | 1968-02 |
13 |
|
Regehr, John | Pluggable abstract domains for analyzing embedded software | Many abstract value domains such as intervals, bitwise, constants, and value-sets have been developed to support dataflow analysis. Different domains offer alternative tradeoffs between analysis speed and precision. Furthermore, some domains are a better match for certain kinds of code than others. ... | | 2006-01-01 |
14 |
|
Berzins, Martin | Radiation modeling using the Uintah heterogeneous CPU/GPU runtime system | The Uintah Computational Framework was developed to provide an environment for solving fluid-structure interaction problems on structured adaptive grids on large-scale, long-running, data-intensive problems. Uintah uses a combination of fluid-flow solvers and particle-based methods for solids, toget... | | 2012-01-01 |
15 |
|
Hansen, Charles D. | Efficient depth estimation using trinocular stereo | We present recent advancements in our passive trinocular stereo system. These include a technique for calibrating and rectifying in a very efficient and simple manner the triplets of images taken for trinocular stereovision systems. After the rectification of images, epipolar lines are parallel to t... | Trinocular stereo; Stereovision | 1988 |
16 |
|
Evans, David | Graphical man/machine communications: November 1969 | Semi-Annual Technical Report 1 June 1969 - 30 November 1969 | | 1969-11 |
17 |
|
Kirby, Robert Michael | A scalable, efficient scheme for evaluation of stencil computations over unstructured meshes | Stencil computations are a common class of operations that appear in many computational scientific and engineering applications. Stencil computations often benefit from compile-time analysis, exploiting data-locality, and parallelism. Post-processing of discontinuous Galerkin (dG) simulation solutio... | | 2013-01-01 |
18 |
|
Regehr, John | ARMor: fully verified software fault isolation | We have designed and implemented ARMor, a system that uses software fault isolation (SFI) to sandbox application code running on small embedded processors. Sandboxing can be used to protect components such as the RTOS and critical control loops from other, less-trusted components. ARMor guarantees m... | | 2011-01-01 |
19 |
|
Regehr, John | Deriving abstract transfer functions for analyzing embedded software | This paper addresses the problem of creating abstract transfer functions supporting dataflow analyses. Writing these functions by hand is problematic: transfer functions are difficult to understand, difficult to make precise, and difficult to debug. Bugs in transfer functions are particularly seriou... | | 2006-01-01 |
20 |
|
Regehr, John | Eliminating the call stack to save RAM | Most programming languages support a call stack in the programming model and also in the runtime system.We show that for applications targeting low-power embedded microcontrollers (MCUs), RAM usage can be significantly decreased by partially or completely eliminating the runtime callstack. We presen... | | 2009-01-01 |
21 |
|
Pascucci, Valerio | Exploring power behaviors and trade-offs of in-situ data analytics | As scientific applications target exascale, challenges related to data and energy are becoming dominating concerns. For example, coupled simulation workflows are increasingly adopting in-situ data processing and analysis techniques to address costs and overheads due to data movement and I/O. However... | | 2013-01-01 |
22 |
|
Shirley, Peter S.; Thompson, William B. | Expressive rendering of mountainous terrain | Painters and cartographers have developed artistic landscape rendering techniques for centuries. Such renderings can visualize complex three-dimensional landscapes in a pleasing and understandable way. In this work we examine a particular type of artistic depiction, panorama maps, in terms of fun... | panorama maps; Non-photorealistic rendering; Terrain; Texture synthesis | 2007 |
23 |
|
Freire, Juliana | Indexing relations on the web | There has been a substantial increase in the volume of (semi) structured data on the Web. This opens new opportunities for exploring and querying these data that goes beyond the keyword-based queries traditionally used on the Web. But supporting queries over a very large number of apparently disconn... | Dataspaces; Web relations; Rewriting | 2010 |
24 |
|
Regehr, John | Offline compression for on-chip RAM | We present offline RAM compression, an automated source-to-source transformation that reduces a program's data size. Statically allocated scalars, pointers, structures, and arrays are encoded and packed based on the results of a whole-program analysis in the value set and pointer set domains. We tar... | | 2007-01-01 |
25 |
|
Gopalakrishnan, Ganesh; Kirby, Robert Michael II | Runtime model checking of multithreaded C/C++ programs | We present inspect, a tool for model checking safety prop- erties of multithreaded C/C++ programs where threads in- teract through shared variables and synchronization primi- tives. The given program is mechanically transformed into an instrumented version that yields control to a centralized s... | Dynamic partial order reduction; Multithreaded; C/C++; Runtime model checking | 2007 |