1 - 25 of 202
Number of results to display per page
CreatorTitleDescriptionSubjectDate
1 Henderson, Thomas C.The importance of unknows in Epidemiologic studies1. Epidemiologic study data often include omitted/unobtainable responses (unknowns). In most cases, unknowns are eliminated during data-reduction to facilitate analysis. We examined the effect that elimination of unknowns would have on mortality calculations using data on newborns admitted to a newb...Unknowns; Mortality calculations1985
2 Henderson, Thomas C.From motes to Java stamps: smart sensor network testbedsWe have proposed Smart Sensor Networks (S-Nets) as an architecture and set of distributed algorithms to extract, interpret and exploit networked sensor devices. Heretofore, the development of this approach has been done in simulation. In this paper, we describe two complementary implementations o...Smart Sensor Networks; S-Nets2003-03-03
3 Eide, Eric NormanSecure disk scrubbing in a large-scale automated testbed2010-02-26
4 McDirmid, Sean; Hsieh, Wilson C.A path-precise analysis for property synthesisRecent systems such as SLAM, Metal, and ESP help programmers by automating reasoning about the correctness of temporal program properties. This paper presents a technique called property synthesis, which can be viewed as the inverse of property checking. We show that the code for some program pro...Property synthesis; Property codes2003-12-01
5 Bhanu, BirRepresentation and shape matching of 3-D objectsA three-dimensional scene analysis system for the shape matching of real world 3-D objects is presented. Various issues related to representation and modeling of 3-D objects are addressed. A new method for the approximation of 3-D objects by a set of planar faces is discussed. The major advantage of...3-D objects; Representation; Shape matching; Scene analysis system1984
6 Riloff, Ellen M.Corpus-based approach for building semantic lexiconsSemantic knowledge can be a great asset to natural language processing systems, but it is usually hand-coded for each application. Although some semantic information is available in general-purpose knowledge bases such as Word Net and Cyc, many applications require domain-specific lexicons that repr...Corpus-based method; Semantic lexicons1997
7 Subrahmanyam, P.A.TRACIS: transformations on Ada for circuit synthesis a report on the methodology for a silicon compilerThis report describes in detail, the ongoing design and implementation of a transformation system, for compiling specifications of integrated circuits into silicon. There are many levels in this process, and the area that we focus on produces target specifications of asynchronous and synchronous con...TRACIS; transformation system1983
8 Regehr, JohnDeriving abstract transfer functions for analyzing embedded softwareThis paper addresses the problem of creating abstract transfer functions supporting dataflow analyses. Writing these functions by hand is problematic: transfer functions are difficult to understand, difficult to make precise, and difficult to debug. Bugs in transfer functions are particularly seriou...2006-01-01
9 Smith, Kent F.Simppl user's guideThis work was supported in part by Defense Research Projects Agency under Contract Number DAAK1184K0017. All opinions, findings, conclusions or recommendations expressed in this document are those of the author(s) and do not necessarily reflect the view of DARPA.SIMPPL; User guide1986
10 Riloff, Ellen M.Empirical approach to conceptual case frame acquisitionConceptual natural language processing systems usually rely on case frame instantiation to recognize events and role objects in text. But generating a good set of case frames for a domain is time-consuming, tedious, and prone to errors of omission. We have developed a corpus-based algorithm for a...Conceptual case frame acquisition; Case frame instantiation; Corpus-based algorithm1998
11 Regehr, JohnPoster abstract: TinyOS 2.1 adding threads and memory protection to tinyOSThe release of TinyOS 2.0 two years ago was motivated by the need for greater platform flexibility, improved robustness and reliability, and a move towards service oriented application development. Since this time, we have seen the community embrace these efforts and add support for additional hardw...2008-01-01
12 Henderson, Thomas C.Multisensor methods to estimate thermal diffusivitySeveral methods for the estimation of thermal diffusivity are studied in this work. In many application scenarios, the thermal diffusivity is unknown and must be estimated in order to perform other estimation functions (e.g., tracking of the physical phenomenon, or solving other inverse problems lik...2012-01-01
13 Henderson, Thomas C.Multisensor knowledge systems: interpreting 3-D structureWe describe an approach which facilitates and makes explicit the organization of the knowledge necessary to map multisensor system requirements onto an appropriate assembly of algorithms, processors, sensors, and actuators. We have previously introduced the Multisensor Kernel System and Logical Sens...Multisensors; Knowledge systems; 3-D structure; Logical Sensors1987
14 Henderson, Thomas C.The synthesis of visual recognition strategiesA coherent automated manufacturing system needs to include CAD/CAM, computer vision, and object manipulation. Currently, most systems which support CAD/CAM do not provide for vision or manipulation and similarly, vision and manipulation systems incorporate no explicit relation to CAD/ CAM models. CA...visual recognition; automated manufacturing systems; object manipulation1985
15 Regehr, JohnTwo case studies in predictable application scheduling using Rialto/NTThis paper analyzes the results of two case studies in applying the Rialto/NT scheduler to real Windows 2000 applications. The first study is of a soft modem-a modem whose signal processing work is performed on the host CPU, rather than on a dedicated signal processing chip. The second is of an audi...2001-01-01
16 Regehr, JohnPredictable scheduling for digital audioThis paper presents results from applying the Rialto/ NT scheduler to some real Windows 2000 application scenarios. We report on two aspects of this work. First, we studied the reliability of an audio player application and the middleware and kernel components running beneath it in order to assess i...2000-01-01
17 Christiansen, Richard WesleyWord recognition in continuous speech using linear prediction analysisA promising method of automatic word recognition in continuous speech, recently designated as word spotting, has been demonstrated. The method uses error residual ratios from LPC (Linear Predictive Coding) vocoder analysis for waveform comparison and a dynamic programming procedure for time regist...Word recognition; continuous speech; linear prediction analysis; word spotting; error residual ratios; LPC; Linear Predictive Coding; vocoder analysis1976
18 Potter, Kristin CarrieUncertainty visualization in forward and inverse cardiac modelsQuantification and visualization of uncertainty in cardiac forward and inverse problems with complex geometries is subject to various challenges. Specific to visualization is the observation that occlusion and clutter obscure important regions of interest, making visual assessment difficult. In orde...2013-01-01
19 Pascucci, ValerioThe natural Helmholtz-Hodge decomposition for open-boundary flow analysisThe Helmholtz-Hodge decomposition (HHD), which describes a flow as the sum of an incompressible, an irrotational, and a harmonic flow, is a fundamental tool for simulation and analysis. Unfortunately, for bounded domains, the HHD is not uniquely defined, traditionally, boundary conditions are impose...2014-01-01
20 Sikorski, Christopher; Pardyjak, Eric R.Source characterization of atmospheric releases using quasi-random sampling and regularized gradient optimizationIn the present work, an inversion technique to solve the atmospheric source characterization problem is described. The inverse problem comprises characterizing the source (x, y and z coordinates and the source strength) and the meteorological conditions (wind speed and wind direction) at the sourc...Source characterization; Gaussian plume model; Quasi-Monte Carlo (QMC); Regularization; Newton?s method; Line-search; Tikhonov stabilizing functional; Adaptive regularization2009
21 Henderson, Thomas C.Target-directed navigation using wireless sensor networks and implicit surface interpolationAbstract-This paper extends the novel research for event localization and target-directed navigation using a deployed wireless sensor network (WSN) [4]. The goal is to have an autonomous mobile robot (AMR) navigate to a target-location by: (i) producing an artificial magnitude distribution within th...2012-01-01
22 Regehr, JohnARMor: fully verified software fault isolationWe have designed and implemented ARMor, a system that uses software fault isolation (SFI) to sandbox application code running on small embedded processors. Sandboxing can be used to protect components such as the RTOS and critical control loops from other, less-trusted components. ARMor guarantees m...2011-01-01
23 Ikits, MilanCoregistration of pose measurement devices using nonlinear least squares parameter estimationMultimodal visual haptic user interfaces can be made more effective by accurately colocating the workspaces of their components. We have developed a coregistration technique for pose measurement devices based on nonlinear least squares parameter estimation. A reduced quaternion parameterization is u...Coregistration; Pose measurement; Haptic interfaces2000
24 Cole, Edwin RandolphThe removal of unknown image blurs by homomorphic filteringThis report describes a homomorphic method for the estimation and removal of unknown image blurs, which are presumed to have been caused by a linear stationary system. Previous methods have required a more or less perfect a priori knowledge of the identity of the blur. the method described here requ...Homomorphic filtering; Removal; Image blurs; Blurred image1974
25 Regehr, JohnFinding and understanding bugs in C compilersCompilers should be correct. To improve the quality of C compilers, we created Csmith, a randomized test-case generation tool, and spent three years using it to find compiler bugs. During this period we reported more than 325 previously unknown bugs to compiler developers. Every compiler we tested w...2011-01-01
1 - 25 of 202