|
|
Creator | Title | Description | Subject | Date |
1 |
|
Henderson, Thomas C. | Reaction-diffusion processes as a computational paradigm | Turing introduced reaction diffusion systems (RD-systems) as a mechanism which made possible the differentiation of morphological structure. We have shown how these systems can be used to provide an information network for smart sensor systems. However, we propose here that reaction diffusion system... | Reaction diffusion systems; RD-systems; Computational paradigm | 2000 |
2 |
|
Henderson, Thomas C.; Thompson, William B. | Smart sensor snow | We propose to deploy and exploit and large number of inexpensive sensors to obtain information or trigger actions over a wide geographic area. Sensors may be of diverse physical natures: acoustic, IR, seismic, chemical, magnetic, thermal, etc. We describe here three major issues: (1) sensor distribu... | Smart sensors | 1998 |
3 |
|
Evans, David | Graphical man/machine communications: June 1971 | Semi-Annual Technical Report for period 1 January 1971 to 31 May 1971. This document includes a summary of research activities and facilities at the University of Utah under Contract F30602-70-C-0300. Information conveys important research milestones attained during this period by each of the fo... | Curved surfaces; Digital waveform processing | 1971 |
4 |
|
Henderson, Thomas C. | Shortest paths in sensor snow | We propose to deploy and exploit a large number of non-mobile inexpensive distributed sensor and communication devices (called Smart Sensor Snow) to obtain information and guide mobile robots over a wide geographic area. Sensors may be of diverse physical natures: acoustic, IR, seismic, chemical, ma... | Sensor snow; Distributed sensor; Smart Sensor Snow; Sensors | 1999 |
5 |
|
Freire, Juliana | Bridging the XML-relational divide with LegoDB: a demonstration | We present LegoDB, a cost-based XML storage mapping engine that automatically explores a space of possible XML-to-relational mappings and selects an efficient mapping for a given application. | LegoDB; Storage mappings | 2003 |
6 |
|
Thompson, William B. | Exploiting discontinuities in optical flow | Most optical flow estimation techniques have substantial difficulties dealing with flow discontinuities. Methods which simultaneously detect flow boundaries and use the detected boundaries to aid in flow estimation can produce significantly improved results. Current approaches to implementing these ... | Optical flow; Discontinuities | 1995 |
7 |
|
Henderson, Thomas C. | Pattern formation in wireless sensor networks | Biological systems exhibit an amazing array of distributed sensor/actuator systems, and the exploitation of principles and practices found in nature will lead to more effective artificial systems. The retina is an example of a highly tuned sensing organ, and the human skin is comprised of a set o... | Pattern formation; Wireless sensor networks | 2008 |
8 |
|
Seyedhosseini Tarzjani, Seyed Mojtaba | Watershed merge tree classification for electron microscopy image segmentation | Automated segmentation of electron microscopy (EM) images is a challenging problem. In this paper, we present a novel method that utilizes a hierarchical structure and boundary classification for 2D neuron segmentation. With a membrane detection probability map, a watershed merge tree is built for t... | | 2012-01-01 |
9 |
|
Freire, Juliana | LegoDB: customizing relational storage for XML documents | XML is becoming the predominant data exchange format in a variety of application domains (supply-chain, scientific data processing, telecommunication infrastructure, etc.). Not only is an increasing amount of XML data now being processed, but XML is also increasingly being used in business-critical... | LegoDB; XML Schema | 2002 |
10 |
|
Riloff, Ellen M. | Learning and evaluating the content and structure of a term taxonomy | In this paper, we describe a weakly supervised bootstrapping algorithm that reads Web texts and learns taxonomy terms. The bootstrapping algorithm starts with two seed words (a seed hypernym (Root concept) and a seed hyponym) that are inserted into a doubly anchored hyponym pattern. In alternatin... | Weakly supervised; Bootstrapping algorithm; Seed hypernym; Seed hyponym; Root concept; Term taxonomy; Learning by reading systems | 2009 |
11 |
|
Evans, David | Graphical man/machine communications: May 1971 | Final technical report 1 December 1969 to 30 June 1970. | | 1971-05 |
12 |
|
Henderson, Thomas C. | Reaction-diffusion patterns in smart sensor networks | We introduced the use of Turing?s reaction-diffusion pattern formation to support high-level tasks in smart sensor networks (S-Nets). This has led us to explore various biologically motivated mechanisms. In this paper we address some issues that arise in trying to get reliable, efficient patterns... | Reaction-diffusion; Pattern formation; Smart sensor networks; S-Nets | 2003-11-05 |
13 |
|
Evans, David | Graphical man/machine communications: December 1972 | The object of the graphical man/machine communication effort is the development of computers and computing techniques the people may use interactively in real time to extend their problem-solving capability, and to work cooperatively by means of improved communications via computer. This report summ... | Waveform processing; Symbolic computation; Man/machine communications | 1972-12 |
14 |
|
Evans, David | Graphical man/machine communications: June 1972 | | | 1972-06 |
15 |
|
Freire, Juliana | Personalizing the web using site descriptions | The information overload on the Web has created a great need for efficient filtering mechanisms. Many sites (e.g., CNN and Quicken) address this problem by allowing a user to create personalized pages that contain only information that is of interest to the user. We propose a new approach for p... | XPointer; Data extraction; Site descriptions; Personalized web pages | 1999 |
16 |
|
Gopalakrishnan, Ganesh | Explicit-enumeration based verification made memory-efficient | We investigate techniques for reducing the memory requirements of a model checking tool employing explicit enumeration. Two techniques are studied in depth: (1) exploiting symmetries in the model, and (2) exploiting sequential regions in the model. The first technique resulted in a significant reduc... | Verification; Model checking tool; Memory-efficient | 1995 |
17 |
|
Freire, Juliana | MetaComm: a meta-directory for telecommunications | A great deal of corporate data is buried in network devices - such as PBX messaging/email platforms, and data networking equipment - where it is difficult to access and modify. Typically, the data is only available to the device itself for its internal purposes and it must be administered using eith... | MetaComm; Meta-Directories; Directory Enabled Networking; Data integration | 2000 |
18 |
|
Regehr, John | Safe and structured use of interrupts in real-time and embedded software | While developing embedded and real-time systems, it is usually necessary to write code that handles interrupts, or code the interacts with interrupt handlers. Interrupts are indispensable because they use hardware support to reduce both the latency and overhead of event detection, when compared to p... | | 2007-01-01 |
19 |
|
Balasubramonian, Rajeev | Non-uniform power access in large caches with low-swing wires | Modern processors dedicate more than half their chip area to large L2 and L3 caches and these caches contribute significantly to the total processor power. A large cache is typically split into multiple banks and these banks are either connected through a bus (uniform cache access - UCA) or an on-c... | Large caches; Low-swing wires; Non Uniform Cache Access; NUCA | 2009 |
20 |
|
Back, Godmar V. | Processes in KaffeOS: lsolation, resource management, and sharing in Java | Single-language runtime systems, in the form of Java virtual machines, are widely deployed platforms for executing untrusted mobile code. These runtimes provide some of the features that operating systems provide: inter-application memory protection and basic system services. They do not. however, p... | KaffeOS; Single-language; Java virtual machines; Mobile code; Runtimes | 2000 |
21 |
|
Lindstrom, Gary E. | Fast and accurate NN approach for multi-event annotation of time series | Similarity search in time-series subsequences is an important time series data mining task. Searching in time series subsequences for matches for a set of shapes is an extension of this task and is equally important. In this work we propose a simple but efficient approach for finding matches for a g... | Time-series subsequences; Nearest neighbor approach; Multi-event | 2003 |
22 |
|
Henderson, Thomas C.; Sikorski, Christopher | Symmetry: a basis for sensorimotor reconstruction | Given a set of unknown sensors and actuators, sensorimotor reconstruction is achieved by exploiting relations between the sensor data and the actuator control data to determine sets of similar sensors, sets of similar actuators, necessary relations between them, as well as sensorimotor relations ... | sensorimotor reconstruction; sensor data; actuator control data | 2011 |
23 |
|
Kasera, Sneha K. | Monitoring breathing via signal strength in wireless networks | This paper shows experimentally that standard wireless networks which measure received signal strength (RSS) can be used to reliably detect human breathing and estimate the breathing rate, an application we call "BreathTaking". We present analysis showing that, as a first order approximation, breath... | | 2014-01-01 |
24 |
|
Back, Godmar V. | Java operating systems: design and implementation | Language-based extensible systems such as Java use type safety to provide memory safety in a single address space. Memory safety alone, however, is not sufficient to protect different applications from each other. such systems must support a process model that enables the control and management of c... | Java operating systems; Language-based systems | 1998 |
25 |
|
Evans, David | Display of complex three dimensional finite element models | Complex three dimensional models can be displayed after an automatic generation of a finite element (panel) mapping. although this automatic generation algorithm fails at certain levels of model complexity, the elimination of these failures can be accomplished through user interaction. This report p... | Three dimensional models; Finite element models | 1978 |