1 - 25 of 26
Number of results to display per page
CreatorTitleDescriptionSubjectDate
1 Henderson, Thomas C.Reaction-diffusion processes as a computational paradigmTuring introduced reaction diffusion systems (RD-systems) as a mechanism which made possible the differentiation of morphological structure. We have shown how these systems can be used to provide an information network for smart sensor systems. However, we propose here that reaction diffusion system...Reaction diffusion systems; RD-systems; Computational paradigm2000
2 Henderson, Thomas C.; Thompson, William B.Smart sensor snowWe propose to deploy and exploit and large number of inexpensive sensors to obtain information or trigger actions over a wide geographic area. Sensors may be of diverse physical natures: acoustic, IR, seismic, chemical, magnetic, thermal, etc. We describe here three major issues: (1) sensor distribu...Smart sensors1998
3 Evans, DavidGraphical man/machine communications: June 1971Semi-Annual Technical Report for period 1 January 1971 to 31 May 1971. This document includes a summary of research activities and facilities at the University of Utah under Contract F30602-70-C-0300. Information conveys important research milestones attained during this period by each of the fo...Curved surfaces; Digital waveform processing1971
4 Henderson, Thomas C.Shortest paths in sensor snowWe propose to deploy and exploit a large number of non-mobile inexpensive distributed sensor and communication devices (called Smart Sensor Snow) to obtain information and guide mobile robots over a wide geographic area. Sensors may be of diverse physical natures: acoustic, IR, seismic, chemical, ma...Sensor snow; Distributed sensor; Smart Sensor Snow; Sensors1999
5 Freire, JulianaBridging the XML-relational divide with LegoDB: a demonstrationWe present LegoDB, a cost-based XML storage mapping engine that automatically explores a space of possible XML-to-relational mappings and selects an efficient mapping for a given application.LegoDB; Storage mappings2003
6 Thompson, William B.Exploiting discontinuities in optical flowMost optical flow estimation techniques have substantial difficulties dealing with flow discontinuities. Methods which simultaneously detect flow boundaries and use the detected boundaries to aid in flow estimation can produce significantly improved results. Current approaches to implementing these ...Optical flow; Discontinuities1995
7 Henderson, Thomas C.Pattern formation in wireless sensor networksBiological systems exhibit an amazing array of distributed sensor/actuator systems, and the exploitation of principles and practices found in nature will lead to more effective artificial systems. The retina is an example of a highly tuned sensing organ, and the human skin is comprised of a set o...Pattern formation; Wireless sensor networks2008
8 Seyedhosseini Tarzjani, Seyed MojtabaWatershed merge tree classification for electron microscopy image segmentationAutomated segmentation of electron microscopy (EM) images is a challenging problem. In this paper, we present a novel method that utilizes a hierarchical structure and boundary classification for 2D neuron segmentation. With a membrane detection probability map, a watershed merge tree is built for t...2012-01-01
9 Freire, JulianaLegoDB: customizing relational storage for XML documentsXML is becoming the predominant data exchange format in a variety of application domains (supply-chain, scientific data processing, telecommunication infrastructure, etc.). Not only is an increasing amount of XML data now being processed, but XML is also increasingly being used in business-critical...LegoDB; XML Schema2002
10 Riloff, Ellen M.Learning and evaluating the content and structure of a term taxonomyIn this paper, we describe a weakly supervised bootstrapping algorithm that reads Web texts and learns taxonomy terms. The bootstrapping algorithm starts with two seed words (a seed hypernym (Root concept) and a seed hyponym) that are inserted into a doubly anchored hyponym pattern. In alternatin...Weakly supervised; Bootstrapping algorithm; Seed hypernym; Seed hyponym; Root concept; Term taxonomy; Learning by reading systems2009
11 Evans, DavidGraphical man/machine communications: May 1971Final technical report 1 December 1969 to 30 June 1970.1971-05
12 Henderson, Thomas C.Reaction-diffusion patterns in smart sensor networksWe introduced the use of Turing?s reaction-diffusion pattern formation to support high-level tasks in smart sensor networks (S-Nets). This has led us to explore various biologically motivated mechanisms. In this paper we address some issues that arise in trying to get reliable, efficient patterns...Reaction-diffusion; Pattern formation; Smart sensor networks; S-Nets2003-11-05
13 Evans, DavidGraphical man/machine communications: December 1972The object of the graphical man/machine communication effort is the development of computers and computing techniques the people may use interactively in real time to extend their problem-solving capability, and to work cooperatively by means of improved communications via computer. This report summ...Waveform processing; Symbolic computation; Man/machine communications1972-12
14 Evans, DavidGraphical man/machine communications: June 19721972-06
15 Freire, JulianaPersonalizing the web using site descriptionsThe information overload on the Web has created a great need for efficient filtering mechanisms. Many sites (e.g., CNN and Quicken) address this problem by allowing a user to create personalized pages that contain only information that is of interest to the user. We propose a new approach for p...XPointer; Data extraction; Site descriptions; Personalized web pages1999
16 Gopalakrishnan, GaneshExplicit-enumeration based verification made memory-efficientWe investigate techniques for reducing the memory requirements of a model checking tool employing explicit enumeration. Two techniques are studied in depth: (1) exploiting symmetries in the model, and (2) exploiting sequential regions in the model. The first technique resulted in a significant reduc...Verification; Model checking tool; Memory-efficient1995
17 Freire, JulianaMetaComm: a meta-directory for telecommunicationsA great deal of corporate data is buried in network devices - such as PBX messaging/email platforms, and data networking equipment - where it is difficult to access and modify. Typically, the data is only available to the device itself for its internal purposes and it must be administered using eith...MetaComm; Meta-Directories; Directory Enabled Networking; Data integration2000
18 Regehr, JohnSafe and structured use of interrupts in real-time and embedded softwareWhile developing embedded and real-time systems, it is usually necessary to write code that handles interrupts, or code the interacts with interrupt handlers. Interrupts are indispensable because they use hardware support to reduce both the latency and overhead of event detection, when compared to p...2007-01-01
19 Balasubramonian, RajeevNon-uniform power access in large caches with low-swing wiresModern processors dedicate more than half their chip area to large L2 and L3 caches and these caches contribute significantly to the total processor power. A large cache is typically split into multiple banks and these banks are either connected through a bus (uniform cache access - UCA) or an on-c...Large caches; Low-swing wires; Non Uniform Cache Access; NUCA2009
20 Back, Godmar V.Processes in KaffeOS: lsolation, resource management, and sharing in JavaSingle-language runtime systems, in the form of Java virtual machines, are widely deployed platforms for executing untrusted mobile code. These runtimes provide some of the features that operating systems provide: inter-application memory protection and basic system services. They do not. however, p...KaffeOS; Single-language; Java virtual machines; Mobile code; Runtimes2000
21 Lindstrom, Gary E.Fast and accurate NN approach for multi-event annotation of time seriesSimilarity search in time-series subsequences is an important time series data mining task. Searching in time series subsequences for matches for a set of shapes is an extension of this task and is equally important. In this work we propose a simple but efficient approach for finding matches for a g...Time-series subsequences; Nearest neighbor approach; Multi-event2003
22 Henderson, Thomas C.; Sikorski, ChristopherSymmetry: a basis for sensorimotor reconstructionGiven a set of unknown sensors and actuators, sensorimotor reconstruction is achieved by exploiting relations between the sensor data and the actuator control data to determine sets of similar sensors, sets of similar actuators, necessary relations between them, as well as sensorimotor relations ...sensorimotor reconstruction; sensor data; actuator control data2011
23 Kasera, Sneha K.Monitoring breathing via signal strength in wireless networksThis paper shows experimentally that standard wireless networks which measure received signal strength (RSS) can be used to reliably detect human breathing and estimate the breathing rate, an application we call "BreathTaking". We present analysis showing that, as a first order approximation, breath...2014-01-01
24 Back, Godmar V.Java operating systems: design and implementationLanguage-based extensible systems such as Java use type safety to provide memory safety in a single address space. Memory safety alone, however, is not sufficient to protect different applications from each other. such systems must support a process model that enables the control and management of c...Java operating systems; Language-based systems1998
25 Evans, DavidDisplay of complex three dimensional finite element modelsComplex three dimensional models can be displayed after an automatic generation of a finite element (panel) mapping. although this automatic generation algorithm fails at certain levels of model complexity, the elimination of these failures can be accomplished through user interaction. This report p...Three dimensional models; Finite element models1978
1 - 25 of 26