1 - 200 of 957
Number of results to display per page
CreatorTitleDescriptionSubjectDate
1 Sobh, Tarek M.; Henderson, Thomas C.A dynamic framwork for intelligent inspectionCAD Computer Aided Design typically involves the design manufacture and inspection of a me chanical part. The problem of reverse engineering is to take an existing mechanical part as the point of departure and to inspect or produce a design and perhaps a manufacturing process for the part. ...CAD; Manufacture; Inspection; Intelligent inspection1992
2 Sobh, Tarek M.; Henderson, Thomas C.A dynamic recursive structure for intelligent explorationWe suggest a new approach for inspection and reverse engineering applications. In particular, we investigate the use of discrete event dynamic systems (DEDS) to guide and control the active exploration and sensing of mechanical parts for industrial inspection and reverse engineering. We introduce dy...Intelligent exploration; Discrete event dynamic systems; DEDS; Dynamic recursive finite state machines; DRFSM1992
3 Sobh, Tarek M.; Henderson, Thomas C.A dynamic recursive structure for intelligent inspectionWe suggest a new approach for inspection and reverse engineering applications. In particular we investigate the use of discrete event dynamic systems DEDS to guide and control the active exploration and sensing of mechanical parts for industrial inspection and reverse engineering?? We introduce...Intelligent inspection; Discrete event dynamic systems; DEDS; Industrial inspection; Dynamic recursive structure1992
4 Whitaker, Ross T.A fast iterative method for a class of Hamilton-Jacobi equations on parallel systemsIn this paper we propose a novel computational technique, which we call the Fast Iterative Method (FIM), to solve a class of Hamilton- Jacobi (H-J) equations on massively parallel systems. The proposed method manages the list of active nodes and iteratively updates the solutions on those nodes u...Fast Iterative Method; FIM; Parallel systems2007
5 Smith, Kent F.A fast parallel squarer based on divide-and-conquerFast and small squarers are needed in many applications such as image compression. A new family of high performance parallel squarers based on the divide-and-conquer method is reported. Our main result was realizing the basis cases of the divide-and-conquer recursion by using optimized n-bit primiti...Squarer; Parallel squarers; Divide-and-conquer; MOPS; CMOS1995
6 Henderson, Thomas C.; Hansen, Charles D.A fault tolerant sensor schemeMulti-sensor systems pose the problem of how to coherently and efficiently treat the data provided by the various sensors. However. the availability of greater numbers of sensors also broadens the ability to build fault tolerant sensor systems. We define a framework in which sensors can be abstractl...Multi-sensor systems; Logical sensors1983
7 Lindstrom, Gary E.A framework for module-based language processorsA system composed of interconnected modules is a module-based system. We present an object-oriented (0-0) framework for the development of processors for module-based systems, such as compilers for 0-0 languages, linkers/loaders, and tools for user/system libraries. We claim t h a t this framework,...Language processors; Jigsaw; Module-based1993
8 Michell, NickA gallium arsenide mutual exclusion elementA mutual exclusion element is a key component in building asynchronous and self-timed circuits. As part of our effort to design high performance self-timed circuits, we have designed a mutual exclusion element in gallium arsenide. This circuit has been fabricated in a 1.2? process and tested. A test...Mutual exclusion element; Self-timed circuits1993
9 Mathew, Binu K.; Davis, Al; Fang, ZhenA Gaussian probability accelerator for SPHINX 3Accurate real-time speech recognition is not currently possible in the mobile embedded space where the need for natural voice interfaces is clearly important. The continuous nature of speech recognition coupled with an inherently large working set creates significant cache interference with other...Speech recognition; SPHINX 3; Speech recognizers2003-07-22
10 Gopalakrishnan, GaneshA general compositional approach to verifying hierarchical cache coherence protocolsModern chip multiprocessor (CMP) cache coherence protocols are extremely complex and error prone to design. Modern symbolic methods are unable to provide much leverage for this class of examples. In [1], we presented a method to verify hierarchical and inclusive versions of these protocols using ...Hierarchical cache coherence protocols; Verification2006-11-26
11 Yang, Yue; Gopalakrishnan, Ganesh; Lindstrom, Gary E.A generic operational memory model specification framework for multithreaded program verificationGiven the complicated nature of modern architectural and language level memory model designs, it is vital to have a systematic ap- proach for specifying memory consistency requirements that can support verification and promote understanding. In this paper, we develop a spec- ification methodolog...Multithreaded program verification2003
12 Lefohn, Aaron; Whitaker, Ross T.A GPU-based, three-dimensional level set solver with curvature flowLevel set methods are a powerful tool for implicitly representing deformable surfaces. Since their inception, these techniques have been used to solve prob- lems in fields as varied as computer vision, scientific visualization, computer graphics and computational physics. With the power and flexi...GPU-based; Level set solver2002-12-11
13 Sobh, Tarek M.A graphical environment and applications for discrete event and hybrid systems in robotics and automationIn this paper we present an overview for the development of a graphical environment for simulating, analyzing, synthesizing, monitoring, and controlling complex discrete event and hybrid systems within the robotics, automation, and intelligent system domain. We start by presenting an overview of di...Intelligent system domain; Graphical environment1994
14 Warnock, John E.A hidden line algorithm for halftone picture representationIn exploring applications in computer graphics, one finds quickly that the representation of three dimensional objects in picture form is both a desirable and necessary capability. Applications dealing with any form of spatial design or with visual environment simulation need the ability to represen...Halftone picture representation; Spatial design1968
15 Cohen, ElaineA hole-filling algorithm for triangular meshesData obtained by scanning 3D models typically contains missing pieces and holes. These can be caused due to scanning artifacts or artifacts in the surface due to wear and tear. We provide a method based on the Moving Least Squares projection to fill holes in triangular meshes obtained during the ...Hole-filling algorithm; Triangular meshes; 3D models; Scanning2004-12-20
16 Starkey, MikeA lisp-based occam interpreterThe OCCAM programming language is an implementation of Communicating Sequential Processes and is used in a number of different areas. These areas usually require explicitly describing small-grain paralleslism. OCCAM programs formed by such descriptions can be tested for correctness by executing the...Lisp-based; Occam interpreter1991
17 Bennion, Scott ThomasA method of solution for hydrodynamics and radiation diffusion as a multi-material problem in one dimensionMulti-material problem1971
18 Weinstein, DavidA morphing algorithm for generating near optimal grids: applications in computational medicineWe apply morphing to t h e problem of generating the initial mesh for finite element simulations. This algorithm reduces mesh adaptation time by integrating physical and geometric constraints to provide a near optimal initial mesh. We apply this method to large-scale bioelectric field problems invol...Morphing algorithm; Bioelectric field problems1994
19 Subrahmanyam, P.A.A new approach to specifying and handling exceptionsAn operation generally exhibits different patterns of behavior over different parts of its domain. Depending upon the context, such behavior may either be conceived of as "normal" or as an "exception." Thus, the behavior of an operation Is quite naturally characterized by the set of partial operatio...Computer operations; Exceptions; Exception handling1980
20 Bruderlin, BeatA new approach to tolerance analysisTolerance analysis is seen as part of a more general problem, namely handling data with uncertainty. Uncertain geometric data arises when interpreting measured data, but also in solid modeling where floating point approximations are common, when representing design tolerances, or when dealing with l...Tolerance analysis1994
21 Kirby, Robert Michael II; Johnson, Christopher R.A new family of variational-form-based regularizers for reconstructing epicardial potentials from body-surface mappingWe propose a new family of regularizers for the inverse ECG problem, using a variational principle that underlies finite element approximation methods. As an alternative to traditional Tikhonov regularizers, the variational formulation has several advantages: 1)it enables a simple construction of ...2010
22 Cohen, ElaineA new local basis for designing with tensioned splinesRecently there has been a great deal of interest in the use of "tension" parameters to augment control mesh vertices as design handles for piecewise polynomials. A particular local cubic basis called p-splines, which has been termed a "generalization of B-splines", has been proposed as an appropriat...Tensioned splines1985
23 Sikorski, KrisA note on optimal algorithms for fixed pointsWe present a constructive lemma that we believe will make possible the design of nearly optimal 0(dlog | ) cost algorithms for computing eresidual approximations to the fixed points of d-dimensional nonexpansive mappings with respect to the infinity norm. This lemma is a generalization of a two-...Fixed points; Constructive lemma2009
24 Lyche, TomA note on the Oslo algorithmThe Oslo algorithm is a recursive method for updating the B-spline representation of a curve or tensor product surface when extra knots are added. In the present note the derivation of this method is simplified.Oslo algorithm; B-spline; Curve product surface; Tensor product surface1987
25 Sloan, Peter-PikeA painterly approach to human skinRendering convincing human figures is one of the unsolved goals of computer graphics. Previous work has concentrated on modeling physics of human skin. We have taken a different approach. We are exploring techniques used by artists, specifically artists who paint air-brushed portraits. Our goal is t...Human skin1999
26 Parke, Frederic IraA parametric model for human facesThis report presents a computer model for the representation of human faces. This three-dimensional, parametric model produces shaded facial images. The face, constructed of polygonal surfaces, is manipulated through the use of parameters which control interpolation, translation, rotation and scalin...Parametric model; Human face1975
27 Gopalakrishnan, GaneshA partial order reduction algorithm without the ProvisoThis paper presents a partial order reduction algorithm, called Two phase, that preserves stutter free LTL properties. Two phase dramatically reduces the number of states visited compared to previous partial order reduction algorithms on most practical protocols. The reason can be traced to a step o...Order reduction algorithm; Proviso step1998
28 Brunvand, Erik L.A partial scan methodology for testing self-timed circuitsThis paper presents a partial scan method for testing control sections of macromodule based self-timed circuits for stuck-at faults. In comparison with other proposed test methods for self-timed circuits, this technique offers better fault coverage than methods using self-checking techniques, and ...1995
29 Brunvand, Erik L.A partial scan methodology for testing self-timed circuitsThis paper presents a partial scan method for testing control sections of macromodule based self-timed circuits for stuck-at faults. In comparison with other proposed test methods for self-timed circuits, this technique offers better fault coverage than methods using self-checking techniques, and re...Self-timed circuits; Testing1995
30 McDirmid, Sean; Hsieh, Wilson C.A path-precise analysis for property synthesisRecent systems such as SLAM, Metal, and ESP help programmers by automating reasoning about the correctness of temporal program properties. This paper presents a technique called property synthesis, which can be viewed as the inverse of property checking. We show that the code for some program pro...Property synthesis; Property codes2003-12-01
31 Thompson, Cynthia A.A personalized system for conversational recommendationsIncreased computing power and theWeb have made information widely accessible. In turn, this has encouraged the development of recommendation systems that help users find items of interest, such as books or restaurants. Such systems are more useful when they personalize themselves to each user?s p...Adaptive Place Advisor; Recommendation systems2002-06-26
32 Regehr, JohnA practical logic framework for verifying safety properties of executablesWe present a novel program logic, Lf , which is designed on top of a Hoare logic, but is simpler, more flexible and more scalable. Based on Lf , we develop a framework for automatically verifying safety properties of executables. It utilizes a whole-program interprocedural abstract interpretation to...2011-01-01
33 Hansen, Charles D.A practical workflow for making anatomical atlases for biological researchAn anatomical atlas provides a detailed map for medical and biological studies of anatomy. These atlases are important for understanding normal anatomy and the development and function of structures, and for determining the etiology of congenital abnormalities. Unfortunately, for biologists, generat...2012-01-01
34 Gouraud, HenriA programmer's guide to PDP-10 eulerThis manual describes the EULER language as implemented on the DEC PDP-10 computer. EULER is a block-structured language, similar to Algol-60 but simplified by omitting type declarations and by altering the way procedures are defined and called. PDP-10 EULER includes features for list-and array-mani...EULER language1970
35 Watkins, Gary ScottA real time visible surface algorithmWith the increasing use of computer graphics, a need is growing for a processor capable of displaying solid objects. Environmental simulation and architectural modeling are only two areas that would benefit from such a diplay processor. This dissertation describes an algorithm designed for such a ...Surface algorithm1970
36 Kirby, Robert MichaelA scalable, efficient scheme for evaluation of stencil computations over unstructured meshesStencil computations are a common class of operations that appear in many computational scientific and engineering applications. Stencil computations often benefit from compile-time analysis, exploiting data-locality, and parallelism. Post-processing of discontinuous Galerkin (dG) simulation solutio...2013-01-01
37 George, LalA scheduling strategy for shared memory multiprocessorsAn efficient scheduling strategy for shared memory multiprocessors is described. The rapid dissemination of tasks to available procesors and ready queues is crucial to the performance of any parallel system. Such overheads determine the attainable speedup and performance of the system. Poor techniq...Shared memory multiprocessors1990
38 Fujimoto, Richard M.A shared memory algorithm and proof for the alternative construct in CSPCommunicating Sequential Processes (CSP) is a paradigm for communication and synchronization among distributed processes. The alternative construct is a key feature of CSP that allows nondeterministic selection of one among several possible communicants. Previous algorithms for this construct assume...Shared memory algorithm; Communicating Sequential Processes; CSP1987
39 Baxter, Brent S.A standard magnetic tape format for digital image exchangeThis proposal describes a simple yet flexible magnetic tape format for exchanging digital image information. Multi-dimensional arrays of raster scan data are stored as sequential files, with descriptive information related to the sefiles stored in an initial directory file. Directory information is ...Raster scan data1981
40 Henderson, Thomas C.A study of Pierce's group generatorPierce describes an approach to map learning with uninterpreted sensors and effectors. As part of that, he describes a sensor grouping generator operator that attempts to arrange similar sensors into groups. Here we review that work and place it in a more strenuous statistical validation framewor...Pierce's group; Map learning; Sensor grouping generator2010
41 Henderson, Thomas C.A survey of dextrous manipulationThe development of mechanical end effectors capable of dextrous manipulation is a rapidly growing and quite successful field of research. It has in some sense put the focus on control issues, in particular, how to control these remarkably humanlike manipulators to perform the deft movement that we t...Dextrous manipulation1986
42 Berzins, MartinA survey of high level frameworks in block-structured adaptive mesh refinement packagesOver the last decade block-structured adaptive mesh refinement (SAMR) has found increasing use in large, publicly available codes and frameworks. SAMR frameworks have evolved along different paths. Some have stayed focused on specific domain areas, others have pursued a more general functionality, p...2014-01-01
43 Gopalakrishnan, Ganesh; Kirby, Robert Michael IIA survey of MPI related debuggers and toolsMessage Passing Interface is a widely used standard in the High Performance and Scienti c Computing Community for writing programs that can exploit the capability of parallel platforms. However, the inherent complexity and the size of the communication standard have made it difficult for programm...Message Passing Interface; MPI; Debuggers2007
44 Sobh, Tarek M.A survey on sensor classifications for industrial applicationsThe importance of sensors in industrial applications is a result of the introduction of many robotics, automation, and intelligent control techniques into factory floors. Research and improvements need to be continuously performed to meet the challenges in automation and manufacturing applications i...Sensor classifications; Industrial applications; Sensors1995
45 Gopalakrishnan, GaneshA symbolic partial order reduction algorithm for rule based transition systemsPartial order reductions are a class of methods that attempt to reduce the state space that must be explored to verify systems by explicit state enumeration. Partial order reduction algorithms have been successfully incorporated into tools such as Spin and VFSM-valid. However, current partial ord...Partial order reductions; Partial order reduction algorithms; SAT solver; Rule based transition systems2003-12-01
46 Henderson, Thomas C.A systolic array implementation of discrete relaxation algorithmDiscrete Relaxation techniques have proven useful in solving a wide range of problems in digital signal processing, artificial intelligence, machine vision, and VLSI engineering, etc. A conventional hardware design for an 8-label 8-object Discrete Relaxation Algorithm (DRA) requires three 4K memory...Discrete Relaxation algorithm; Systolic array1986
47 Seeley, DonnA tour of the wormOn the evening of November 2, 1988, a self-replicating program was released upon the Internet 1. This program (a worm) invaded VAX and Sun-3 computers running versions of Berkeley UNIX, and used their sources to attack still more computers2. Within the space of hours this program had spread aacross ...Computer worm1989
48 Gopalakrishnan, GaneshA transformational approach to asynchronous high-level synthesisAsynchronous high-level synthesis is aimed at transforming high level descriptions of algorithms into efficient asynchronous circuit implementations. This approach is attractive from the point of view of the flexibility it affords in performing high level program transformations on users' initial d...High level synthesis tool; SHILPA1993
49 Cohen, ElaineA triangulation-invariant method for anisotropic geodesic map computation on surface meshesThis paper addresses the problem of computing the geodesic distance map from a given set of source vertices to all other vertices on a surface mesh using an anisotropic distance metric. Formulating this problem as an equivalent control theoretic problem with Hamilton-Jacobi-Bellman partial different...2012-01-01
50 Sobh, Tarek M.; Henderson, Thomas C.A unifying framework for tolerance analysis in sensing, design, and manufacturingIn this work we address the problem of tolerance representation and analysis across the domains of industrial inspection using sensed data, CAD design, and manufacturing. Instead of using geometric primitives in CAD models to define and represent tolerances, we propose the use of stronger methods t...Tolerance representation; Tolerance analysis; Industrial inspection; Sensed data; CAD design1994
51 Beazley, David. M.A wrapper generation tool for the creation of scriptable scientific applicationsIn recent years, there has been considerable interest in the use of scripting languages as a mechanism for controlling and developing scientific software. Scripting languages allow scientific applications to be encapsulated in an interpreted environment similar to that found in commercial scientific...1998
52 Awasthi, Manu; Nellans, David W.; Sudan, Kshitij; Balasubramonian, RajeevABP : predictor based management of DRAM row buffersDRAM accesses are costly, especially in multicore systems. Future CMPs will run a mixed load of workloads/threads. Destructive interference at memory controller, spatio-temporal locality lost! DRAM row-buffer hits are least expensive, row-conflicts are most. Randomized memory access patterns re...2010-10-06
53 Panangaden, PrakashAbstract interpretation and indeterminacyWe present a semantic theory that allows us to discuss the semantics of indeterminate operators in a dataflow network. The assumption is made that the language in which the indeterminate operators are written has a construct that allows for the testing of availability of data on input lines. We then...Semantics; Indeterminate operators1984
54 Lindstrom, Gary E.Abstract semantics for functional constraint programmingA denotational semantics is given for a lazy functional language with monotonic side-effects arising from the unification of singly-bound logical variables. The semantics is based on a Scott-style information system, which elegantly captures the notion of "constraint additin" inherent in unificati...Abstract semantics1989
55 Hansen, Charles D.Accelerated isosurface extraction in time-varying fieldsFor large time-varying data sets, memory and disk limitations can lower the performance of visualization applications. Algorithms and data structures must be explicitly designed to handle these data sets in order to achieve more interactive rates. The Temporal Branch-on-Need Octree (T-BON) extends t...Isosurfaces; Time-dependent scalar field visualization; Multiresolution methods; Octree; Bricking; Unstructured grid visualization; Out-of-core visualization2000
56 Callahan, Michael WayneAcoustic signal processing based on the short-time spectrumThe frequency domain representation of a time signal afforded by the Fourier transform is a powerful tool in acoustic signal processing. The usefulness of this representation is rooted in the mechanisms of sound production and perception. Many sources of sound exhibit normal modes or natural frequen...Acoustic signal processing1976
57 Brunvand, Erik L.ACT: A DFT tool for self-timed circuitsThis paper presents a Design for Testability (DFT) tool called ACT (Asynchronous Circuit Testing) which uses a partial scan technique to make macro-module based selftimed circuits testable. The ACT tool is the first oFits kind for testing macro-module based self-timed circuits. ACT modifies design...1997
58 Sobh, Tarek M.Active inspection and reverse engineeringWe propose a new design for inspection and reverse engineering environments. In particular, we investigate the use of discrete event dynamic systems (DEDS) to guide and control the active exploration and sensing of mechanical parts for industrial inspection and reverse engineering. We introduce dyn...Discrete event dynamic systems; DEDS; Industrial inspection1993
59 Organick, Elliott I.ADA to silicon transformations: the outline of a methodThis report explores the contention that a high-order language specification of a machine (such as an Ada program) can be methodically transformed into a hardware representation of that machine. One series of well-defined steps through which such transformations can take place is presented in this i...ADA program; High-order language specification1982
60 Carter, Tony M.Ada-to-silicon compiler study (Final Report 30 Jan 85 - 30 Jun 86)The vision of a system design environment in which both hardware and software components could be designed, tested, and executed was proffered by the late Dr. Elliott Organick1 in 1981. He was impressed by the objectiveness of Ada and the availability of an architecture (the Intel 432) which was sp...ADA language1986
61 Berzins, MartinAdaptive high-order discontinuous galerkin solution of elastohydrodynamic lubrication point contact problemsThis paper describes an adaptive implementation of a high order Discontinuous Galerkin (DG) method for the solution of elastohydrodynamic lubrication (EHL) point contact problems. These problems arise when modelling the thin lubricating film between contacts which are under sufficiently high pressur...2012-01-01
62 Cohen, ElaineAdaptive isocurves based rendering for freeform surfacesFreeform surface rendering is traditionally performed by approximating the surface with polygons and then rendering the polygons. This approach is extremely common because of the complexity in accurately rendering the surfaces directly. Recently, several papers presented methods to render surfaces ...Freeform surface rendering; Isocurves1992
63 Cohen, ElaineAdaptive isocurves based rendering for freeform surfacesFreeform surface rendering is traditionally performed by approximating the surface with polygons and then rendering the polygons This approach is extremely common because of the complexity in accurately rendering the surfaces directly Recently?? several papers presented methods to render surface...Freeform surface rendering; Isocurves1992
64 Henderson, Thomas C.Agent-based engineering drawing analysisInterpretation of paper drawings has received a good deal of attention over the last decade. Related areas such as direct interpretation of human drawings (HCI), search and indexing of graphics databases, and knowledge representation in the domain of graphics and drawing understanding have also s...Interpretation; Human drawings; HCI; Graphic databases2002-02-04
65 Crow, Franklin C.The aliasing problem in computer-synthesized shaded imagesThis paper describes work toward improving the quality of computer-synthesized shaded images. Current (practical) hidden-surface algorithms produce an image whose precision is strictly limited by the number of picture elements. Problems caused by this limitation are described and explained in the t...aliasing problem; shaded images; hidden-surface algorithms1976
66 Lindstrom, Gary E.Alpha-beta pruning on evolving game treesThe alpha-beta strategy is a widely used method for economizing on the size of game trees. Heretofore, its application has been limited to depth-first tree growth in recursive search functions. However, many modern game players use retentive (i.e. coroutine-based) control to achieve greater attentio...Alpha-beta pruning; Game trees1979
67 George, LalAn abstract machine for parallel graph reductionAn abstract machine suitable for parallel graph reduction on a shared memory multiprocessor is described. Parallel programming is plagued with subtle race conditions resulting in deadlock or fatal system errors. Due to the nondeterministic nature of program execution the utilization of resources ma...Parallel graph reduction; Abstract machines1989
68 George, LalAn abstract machine for parallel graph reductionAn abstract machine for parallel graph reduction on a shared memory multiprocessor is described. This is intended primarily for normal order (lazy) evaluation of functional programs. It is absolutely essential in such a design to adapt an efficient sequential model since during execution under limit...Parallel graph reduction1989
69 Subrahmanyam, P.A.An algebraic formulation of seitz's weak conditions for self timed circuitsTwo fairly intuitive conditions are given that serve to algebraically characterize Seitz's "weak conditions" for self timed circuits. It is shown that these two conditions embody the 12 temporal logic conditions (developed b y Owicki and Malachi) which are intended to express both the weak condition...Seitz's weak conditions; Self-timed circuits1982
70 Shirley, Peter S.An anisotropic phong light reflection modelWe present a new BRDF model that attempts to combine the advantages of the various empirical models currently in use. In particular, it has intuitive parameters, is anisotropic, energy-conserving, reciprocal, has an appropriate non-Lambertian diffuse term, and is well-suited for use in a Monte Carlo...BRDF model; Anisotropic; Phong light reflection model2000
71 Henderson, Thomas C.An annotated bibligraphy of multisensor integrationIn this paper we give an annotated bibliography of the multisensor integration literature.Multisensor integration; Bibligraphy1988
72 Greenfield, HarveyAn application of computer graphics: two concurrent investigations within the medical fieldThe aim of this project is to apply new or recently developed computer graphic techniques to a particular discipline with the thought of broadening its research capabilities. The discipline chosen, that of medicine, has emphasis places on the area of hemodynamics. It is seen that computer graphics m...Computer graphic techniques1971
73 Keller, Robert M.An approach to determinacy proofsIt is known that any parallel program graph composed of continuous operators itself represents a continuous function. In other words, the network is determinate in the sense that for a given input, the output is unique, independent of the timing of the constituent operators. This result is applied t...Parallel program graph; Determinacy proofs1978
74 Henderson, Thomas C.An approach to three-dimensional scene databasesCurrent image database research is concerned for the most part with the encoding and processing of two-dimensional images. However, the most successful approach to computer vision is based on 3-dimensional information, organized as either stacks of 2-D images (e.g., the intrinsic images of Barrow an...Image databases; Three-dimensional; Scene databases1987
75 Keller, Robert M.; Lindstrom, Gary E.An architecture for a loosely-coupled parallel processorAn architecture for a large (e. g. 1000 processor) parallel computer is presented. The processors are loosely-coupled, in the sense that communication among them is fully asynchronous, and each processor is generally not unduly delayed by any immediate need for specific data values. The network supp...Loosely-coupled; Parallel processors1978
76 Bruderlin, BeatAn axiomatic approach for solving geometric problems symbolicallyThis paper describes a new approach for solving geometric constraint problems and problems in geometry theorem proving. We developed a rewrite-rule mechanism operating on geometric predicates. Termination and completeness of the problem solving algorithm can be obtained through well foundedness and ...Geometric constraint problems; Geometry theorem proving; Knuth-Bendix completion algorithm1990
77 Willemsen, Peter; Gooch, Amy A.An experimental comparison of perceived egocentric distance in real, image-based, and traditional virtual environment using direct walking tasksIn virtual environments, perceived egocentric distances are often underestimated when compared to the same distance judgments in the real world. The research presented in this paper explores two possible causes for this reduced distance perception in virtual environments: (1) real-time computer g...Egocentric distances; Virtual environments2002-02-12
78 Newman, William M.An experimental display programming language for the PDP-10 computerAn experimental language for display programming, called DIAL, has been developed for the PDP-10 and the UNIVAC 1559 display. It is experimental in the sense that it was originally conceived as a means of testing out some ideas, and the best way to test them seemed to be to produce a language that ...Display programming; DIAL; Display Algol1970
79 Riesenfeld, Richard F.; Smith, Kent F.An experimental system for computer aided geometric designThe main goal of this proposed level-of-effort project is to extend present capabilities in the area of Computer Aided Geometric Design (CAGD) and to develop custom VLSI support for some special geometric functions.Computer aided geometric design; CAGD; VLSI; Very large scale integration1984
80 Khoche, AjayAn extended cell set of self-timed designsThe high level synthesis approach described in [1] uses hopCP[2] language for behavioral descriptions. The behavioral specifications are then translated into Hop Flow Graphs (HFGs). The actions in the graph are then refined such that refined actions can be directly mapped onto asynchronous circuit b...Self-timed designs; hopCP; Hop Flow Graphs; Asynchronous circuit blocks; Action-blocks1993
81 Gopalakrishnan, Ganesh; Humphrey, Alan Parker; Derrick, Christopher GladeAn integration of dynamic MPI formal verification within eclipse PTPOur research goals were to verify practical MPI programs for deadlocks, resource leaks, and assertion violations at the push of a button and be able to easily visualize the results. We also sought to integrate these capabilities with the Eclipse IDE via an Eclipse plug-in for the Parallel Tools Plat...Verification; Graphical User Interfaces; Dynamic Interleaving Reduction; Message Passing; MPI; Multi-core; Eclipse Parallel Tools Platform; Trapeze Interactive Poster2010-03-15
82 Bruderlin, BeatAn interactive N-Dimensional constraint systemIn this paper, we present a graph-based approach to geometric constraint solving. Geometric primitives (points, lines, circles, planes, etc.) possess intrinsic degrees of freedom in their embedding space. Constraints reduce the degrees of freedom of a set of objects. A constraint graph is created wi...Geometric constraint solving1994
83 Gopalakrishnan, GaneshAn interface aware guided search method for error-trace justification in large protocolsMany complex concurrent protocols that cannot be formally verified due to state explosion can often be formally verified by initially creating a collection of abstractions (overapproximations), and subsequently refining the overapproximated protocol in response to spurious counterexample traces. ...Concurrent protocols; Verification; Error-trace justification2008
84 Sikorski, KrisAn interior ellipsoid algorithm for fixed pointsWe consider the problem of approximating fixed points of non-smooth contractive functions with using of the absolute error criterion. In [12] we proved that the upper bound on the number of function evaluations to compute ?-approximations is 0(n3(In 1/? + In 1/1-q +In n)) in the worst case, where ...Ellipsoid algorithm; Contractive functions; Fixed points1998
85 Davis, AlAn introduction to asynchronous circuit designThe purpose of this monograph is to provide both an introduction to field of asynchronous digital circuit design and an overview of the practical state of the art in 1997. In the early days of digital circuit design, little distinction was made between synchronous and asynchronous circuits. However,...Asynchronous circuit design1997
86 Riloff, Ellen M.An introduction to the Sundance and AutoSlog systemsThis document describes the Sundance natural language processing system that has been developed at the University of Utah, as well as the AutoSlog and AutoSlog-TS extraction pattern learners that have been implemented on top of Sundance. Sundance is a shallow parser that also includes clause hand...Sundance system; AutoSlog system; Extraction pattern learners2004-11-08
87 Regehr, JohnAn isotach implementation for myrinetAn isotach network provides strong guarantees about message delivery order. We show that an isotach network can be implemented efficiently entirely in software, using commercial o-the-shelf hardware. This report describes that effort. Parts of this implementation could be performed much more efficie...1997-01-01
88 Carter, John B.An O(1) time complexity software barrierAs network latency rapidly approaches thousands of processor cycles and multiprocessors systems become larger and larger, the primary factor in determining a barrier algorithm?s performance is the number of serialized network latencies it requires. All existing barrier algorithms require at least ...Network latency; Barrier algorithm; Time complexity software barrier2004
89 Henderson, Thomas C.An O(n) time discrete relaxation architecture for real-time processing of the consistent labeling problemDiscrete relaxation techniques have proven useful in solving a wide range of problems in digital signal and digital image processing, artificial intelligence, operations research, and machine vision. Much work has been devoted to finding efficient hardware architectures. This paper shows that a conv...Discrete relaxation techniques1986
90 Gu, JunAn optimal, parallel discrete relaxation algorithm and architecture (Revised January 1988 and August 1989)A variety of problems in artificial intelligence, operations research, symbolic logic, pattern recognition and computer vision, and robot manipulation are special cases of the Consistent Labeling Problem (CLP). The Discrete Relaxation Algorithm (DRA) is an efficient computational technique to enfor...Consistent Labeling Problem; CLP; Discrete Relaxation Algorithm; DRA1988
91 Riloff, Ellen M.Analyses for elucidating current question answering technologyIn this paper, we take a detailed look at the performance of components of an idealized question answering system on two diff erent tasks: the TREC Question Answering task and a set of reading comprehension exams. We carry out three types of analysis: inherent properties of the data, feature analys...TREC Question Answering task2001-12
92 Carter, John B.Analysis of avalanche's shared memory architectureIn this paper, we describe the design of the Avalanche multiprocessor's shared memory subsystem, evaluate its performance, and discuss problems associated with using commodity workstations and network interconnects as the building blocks of a scalable shared memory multiprocessor. Compared to other ...Avalanche multiprocessor; Shared memory1997
93 Sobh, Tarek M.Analysis of tolerance for manufacturing geometric objects from sense dataIn this work we address the problem of manufacturing machine parts from sense data. Constructing geometric models for the objects from sense data is the intermediate step in a reverse engineering manufacturing system. Sensors are usually inaccurate, providing uncertain sense information. We constr...Manufacture1993
94 Henderson, Thomas C.Analysis of topographic maps for recreational purposes using decision treesIn this paper we describe a method for predicting the subjective quality of a new mountain bike route for a particular subject based on routes previously ridden and ranked by the subject. GPS tracks of the previously ridden routes are over laid on rasterized topographic maps and topographic features...2013-01-01
95 Weinstein, DavidThe analytic 3-D transform for the least-squared fit of three pairs of corresponding pointsWe derive the analytic transformation for minimizing the summed-squared-distance between three movable points in one three-space pose to three corresponding fixed points in another three-space pose. This change of basis is a general rigid-body transformation (translation and rotation), with the addi...3-D transform; summed-squared-distance; three movable points; Three-space1998
96 Yang, Yue; Gopalakrishnan, Ganesh; Lindstrom, Gary E.; Slind, Konrad LeeAnalyzing the Intel Itanium memory ordering rules using logic programming and SATWe present a non-operational approach to specifying and analyzing shared memory consistency models. The method uses higher order logic to capture a complete set of ordering constraints on execution traces, in an axiomatic style. A direct translation of the semantics to a constraint logic program...Intel Itanium memory; Ordering rules; Sared memory; Consistency models2003
97 Bargteil, Adam WadeAnimation of deformable bodies with quadratic bézier finite elementsIn this article, we investigate the use of quadratic finite elements for graphical animation of deformable bodies.We consider both integrating quadratic elements with conventional linear elements to achieve a computationally efficient adaptive-degree simulation framework as well as wholly quadratic ...2014-01-01
98 Tasdizen, Tolga; Whitaker, Ross T.Anisotropic diffusion of surface normals for feature preserving surface reconstructionFor 3D surface reconstruction problems with noisy and incomplete range data measured from complex scenes with arbitrary topologies, a low-level representation, such as level set surfaces, is used. Such surface reconstruction is typically accomplished by minimizing a weighted sum of data-model dis...Anisotropic diffusion; Surface reconstruction2003-04-18
99 Henderson, Thomas C.Apparent symmetries in range dataA procedure for extracting symmetrical features from the output of a range scanner is described which is insensitive to sensor noise and robust with respect to object surface complexity. The acquisition of symmetry descriptors for rigid bodies from a range image was in this case motivated by the ne...Symmetry descriptors; Range data; Range scanner; Dextrous manipulation systems1987
100 Pulsipher, Dennis CarlApplication of adaptive noise cancellation to noise reduction in audio signalsThe LMS adaptive noise cancellation algorithm has been applied to the removal of high-level white noise from audio signals. Simulations and actual acoustically recorded signals have been processed successfully, with excellent agreement between the results obtained from simulations and the results ob...Noise cancellation; Noise reduction; White noise; LMS algorithm1979
101 Boll, Steven F.Application of the saber method for improved spectral analysis of noisy speechA stand alone noise suppression algorithm is described for reducing the spectral effects of acoustically added noise in speech. A fundamental result is developed which shows that the spectral magnitude of speech plus noise can be effectively approximated as the sum of magnitudes of speech and noise....Noise suppression algorithm; SABER method1977
102 Riesenfeld, Richard F.The application of total positivity to computer aided curve and surface designOf particular importance in an interactive curve and surface design system is the interface to the user. The mathematical model employed in the system must be sufficiently flexible for interaction between designer and machine to converge to a satisfactory result. The mathematical theory of Total Pos...interactive curves; total positivity1979
103 Jacobson, Hans; Gopalakrishnan, GaneshApplication specific asynchronous microengines for efficient high-level controlDespite the growing interest in asynchronous circuits programmable asynchronous controllers based on the idea of microprogramming have not been actively pursued Since programmable control is widely used in many commercial ASICs to allow late correction of design errors to easily upgrade product f...Asynchronous microengines1997
104 Jacobson, HansApplication specific asynchronous microgengines for efficient high-level controlDespite the growing interest in asynchronous circuits, programmable asynchronous controllers based on the idea of microprogramming have not been actively pursued. Since programmable control is widely used in many commercial ASICs to allow late correction of design errors, to easily upgrade product ...Asynchronous microgengines; Programmable asynchronous controllers1997
105 Venkatasubramanian, SureshApproximate Bregman near neighbors in sublinear time: beyond the triangle inequalityBregman divergences are important distance measures that are used extensively in data-driven applications such as computer vision, text mining, and speech processing, and are a key focus of interest in machine learning. Answering nearest neighbor (NN) queries under these measures is very important i...2012-01-01
106 Henderson, Thomas C.Arc and path consistency revisitedMackworth and Freuder have analyzed the time complexity of several constraint satisfaction algorithms [4]. We present here new algorithms for arc and path consistency and show that the arc consistency algorithm is optimal in time complexity and of the same order space complexity as the earlier algor...Arc consistency; Path consistency; Constraint satisfaction algorithms1985
107 Wehrli, RobertARCAID: The ARChitects computer graphics AIDARCAID?The ARChitect's Computer Graphics AID?is one part of a two-part research program at the University of Utah under the direction of David C. Evans. ARCAID is a specification for the organization of computer processes including data and procedures for the use of architects, engineers, and other...ARCAID1970
108 Balasubramonian, RajeevArchitecting efficient interconnects for large caches with CACTI 6.0Efficiently executing multithreaded applications on future multicores will require fast intercore communication. Most of this communication happens via reads and writes to large shared caches in the memory hierarchy. Microprocessor performance and power will be strongly influenced by the long inter...Interconnects; CACTI 6.0; Non-uniform cache architectures (NUCA)2008-01
109 Davis, A.L.The architecture of DDMl: a recursively structured data driven machineAn architecture for a highly modular, recursively structured class of machines is presented. DDMl is an instance of such a machine structure, and is capable of executing machine language programs which are data driven (data flow) nets. These nets may represent arbitrary amounts of concurrency as wel...DDMl; machine structure; machine language programs1977
110 Regehr, JohnARMor: fully verified software fault isolationWe have designed and implemented ARMor, a system that uses software fault isolation (SFI) to sandbox application code running on small embedded processors. Sandboxing can be used to protect components such as the RTOS and critical control loops from other, less-trusted components. ARMor guarantees m...2011-01-01
111 Gooch, Bruce; Reinhard, Erik; Moulding, Chris; Shirley, Peter S.Artistic composition for image creationAltering the viewing parameters of a 3D object results in computer graphics images of varying quality. One aspect of image quality is the composition of the image. While the esthetic properties of an image are subjective, some heuristics used by artists to create images can be approximated quanti...Image creation; Image quality2000
112 Shirley, Peter S.; Gooch, BruceArtistic vision: painterly rendering using computer vision techniquesWe present a method that takes a raster image as input and produces a painting-like image composed of strokes rather than pixels. Unlike previous automatic painting methods, we attempt to keep the number of brush-stroke small. This is accomplished by first segmenting the image into features, finding...Painting-like image; Raster image; Painterly rendering2000
113 Carter, John B.AS-COMA: An adaptive hybrid shared memory ArchitectureScalable shared memory multiprocessors traditionally use either a cache coherent nonuniform memory access (CC-NUMA) or simple cache-only memory architecture (S-COMA) memory architecture. Recently, hybrid architectures that combine aspects of both CC-NUMA and S-COMA have emerged. In this paper, we pr...AS-COMA; Hybrid shared memory1998
114 Carter, Tony M.ASSASSIN : a CAD system for self-timed control-unit designMany software systems exist for automatically implementing synchronous state machines . Presented is this paper is a software system -- ASSASSIN -- for the design and automatic layout of self-timed (or speed- independent) control units as integrated circuit modules.ASSASSIN; Self-timed control units1982
115 Sikorski, KrisAsymptotic near optimality of the bisection methodThe bisection method is shown to possess the nearly best rate of convergence for infinitely differentiable functions having zeros of arbitrary multiplicity. If the multiplicity of zeros is bounded, methods are known which have asymptotically at least quadratic rate of convergence.Bisection method1988
116 Gopalakrishnan, GaneshAsynchronous circuit verification using trace theory and CCSWe investigate asynchronous circuit verification using Dill's trace theory as well as Milner's CCS (as mechanized by the Concurrency Workbench). Trace theory is a formalism specifically designed for asynchronous circuit specification and verification. CCS is a general purpose calculus of communicat...Trace theory; Verification; CCS1992
117 Regehr, JohnAtomicity and visibility in tiny embedded systemsVisibility is a property of a programming language's memory model that determines when values stored by one concurrent computation become visible to other computations. Our work exploits the insight that in nesC, a C-like language with explicit atomicity, the traditional way of ensuring timely visib...2006-01-01
118 Regehr, JohnAugmented CPU reservations: towards predictable execution on general-purpose operating systemsOne problem with performing soft real-time computations on general-purpose operating systems is that these OSs may spend significant amounts of time in the kernel instead of performing work on behalf of the application that is nominally scheduled: the OS effectively steals time from the running appl...2001-01-01
119 Zhu, XiaohongAutomatic compensating cleanup operationToday's part geometries are becoming ever more complex and require more accurate tool path to manufacture. Machining process efficiency is also a major consideration for designers as well as manufacturing engineers. Although the current advanced CAD/CAM systems have greatly improved the efficiency ...Part geometries1989
120 Gooch, Bruce; Shirley, Peter S.Automatic image creation via artistic composition principlesMethods for choosing image parameters in both art and computer graphics are currently subjective. The choice of parameters results in images of varying quality. One aspect of image quality is the composition of the image. While the principles underlying composition are somewhat subjective, a portion...Image parameters2000
121 Lee, Hyo JongAutomatic mesh analysis technique by knowledge-based systemThe finite element analysis technique has been recognized as a very important tool to solve various engineering problems, such as structural analysis, heat transfer, and fluid dynamics. The key point to the technique is discretization of the domain of interest into many finite elements. A good resul...Mesh analysis; Mesh generation algorithm1989
122 Shirley, Peter S.; Gooch, BruceAutomatic painting with economized strokesWe present a method that takes a raster image as input and produces a painting-like image composed of strokes rather than pixels. Unlike previous automatic painting methods, we attempt to use very few brush-strokes. This is accomplished by first segmenting the image into features, finding the medial...Raster image; Painting-like image; Automatic painting methods2000
123 Brunvand, Erik L.Automatic rapid prototyping of semi-custom VLSI circuits using actel FPGAsAbstract : We describe a technique for translating semi-custom VLSI circuits automatically into field programmable gate arrays (FPGAs) for rapid prototyping to develop a system. Using an array multiplier as an example of this translation, the VLSI circuits are designed using a cell-matrix based envi...1995
124 Smith, Kent F.Automatic rapid prototyping of semi-custom VLSI circuits using FPGAsWe describe a technique for translating semi-custom VLSI circuits automatically, integrating two design environments, into field programmable gate arrays (FPGAs) for rapid and inexpensive prototyping. The VLSI circuits are designed using a cell-matrix based environment that produces chips with densi...Semi-custom; VLSI circuits1994
125 Cohen, ElaineAutomatic sculptured five-axis milling with check surfacesAn approach to 5-axis milling of B-spline surfaces is presented. Within its domain, it provides better check surface handling than APT. The scheme for tool position generation is based on a B-spline curve refinement method and a set of criteria for tolerance control which allows the tool positions ...B-spline surfaces; 5-axis milling; Tool paths1989
126 Fuchs, HenryThe automatic sensing and analysis of 3-D surface points from visual scenesDescribed are the design and implementation of a new range-measuring sensing device and an associated software algorithm for constructing surface descriptions of arbitrary three-dimensional objects from single or multiple views. The sensing device, which measures surface points from objects in its ...Range-measuring; Sensing device1976
127 Riloff, Ellen M.Automatically constructing a dictionary for information extraction tasksKnowledge-based natural language processing systems have achieved good success with certain tasks but they are often criticized because they depend on a domain-specific dictionary that requires a great deal of manual knowledge engineering. This knowledge engineering bottleneck makes knowledge-based ...Information extraction; Dictionary construction; Knowledge-based systems; AutoSlog; Domain-specific dictionary1993
128 Freire, JulianaAutomatically extracting form labelsWe describe a machine-learning-based approach for extracting attribute labels from Web form interfaces. Having these labels is a requirement for several techniques that attempt to retrieve and integrate data that reside in online databases and that are hidden behind form interfaces, including schema...Learning classifiers2008
129 Riloff, Ellen M.Automatically generating extraction patterns from untagged textMany corpus-based natural language processing systems rely on text corpora that have been manually annotated with syntactic or semantic tags. In particular, all previous dictionary construction systems for information extraction have used an annotated training corpus or some form of annotated input...Information extraction; Automatically generating; Extraction patterns; Untagged text; Corpus-based; AutoSlog-TS; AutoSlog system; MUC-4; Dictionary construction1996
130 Davis, AlAutomating the design of embedded domain specific acceleratorsDomain specific architecture (DSA) design currently involves a lengthy process that requires significant designer knowledge, experience, and time in arriving at a suitable code generator and architecture for the target application suite. Given the stringent time to market constraints and the dyna...Domain specific architecture; Stall cycle analysis; SCA; Domain specific accelerators2008
131 Sobh, Tarek M.Autonomous ObservationWe address the problem of observing an agent. We advocate a modeling approach for the visual system and its observer, where a discrete event dynamic system (DEDS) framework is developed and "events" are defined as ranges on parameter subsets. The dynamic recursive context for finite state machines (...Observation; Manipulation process1992
132 Sobh, Tarek M.Autonomous observationWe address the problem of observing an agent?? We advocate a modeling approach for the visual system and its observer where a discrete event dynamic system DEDS framework is developed and events are de ned as ranges on parameter subsets?? The dynamic recursive context for nite state machine...Autonomous observation1992
133 Carter, John B.The avalanche myrinet simulation packageThis is a user manual for version 2.0 of the Myrinet simulation package. Users of the V2.0 package can specify arbitrary network topologies composed of Myrinet switches with different number of ports. For example, 4-port and 32-port switches can be used in a single system. Because the V2.0 model sup...Avalanche Myrinet; Simulation Package; User manual; Myrinet switches; port switches1996
134 Carter, John B.The avalanche myrinet simulation package user manual for V2.0This is a user manual for Version 2.0 of the Myrinet simulation package Users of the V2.0 pack age can specify arbitrary network topologies composed of Myrinet switches with different number of ports For example port and 4-port switches can be used in a single system Because the V2.0 model suppor...Avalanche Myrinet; Simulation Package; user manual; Myrinet switches; Port switches1996
135 Carter, John B.; Davis, Al; Kuramkote, Ravindra; Stoller, Leigh B.Avalanche: A communication and memory architecture for scalable parallel computingAs the gap between processor and memory speeds widens?? system designers will inevitably incorpo rate increasingly deep memory hierarchies to maintain the balance between processor and memory system performance At the same time?? most communication subsystems are permitted access only to main m...Avalanche; Communication architecture; Memory architecture1995
136 Carter, John B.Avalanche: A communication and memory architecture for scalable parallel computingAs the gap between processor and memory speeds widens, system designers will inevitably incorporate increasingly deep memory hierarchies to maintain the balance between processor and memory system performance. At the same time, most communication subsystems are permitted access only to main memory ...Avalanche; Computer memory; Memory architecture1995
137 Stark, Michael M.; Martin, William; Cohen, Elaine; Lyche, Tom; Riesenfeld, Richard F.B-splines for physically-based renderingAlthough B-spline curves and surfaces have enjoyed a long established place in the graphics community as constructive modeling tools, the use of B-spline approximation techniques has received relatively little attention in rendering. In this work we explore the use of 4D and 5D tensor product B-s...B-spline curves; Rendering algorithms2002-01-09
138 Lindstrom, Gary E.Backtracking in generalized control settingsBacktracking is a powerful conceptual and practical technique in programming. However, its application in general has been limited to global control over recursive programs. In this paper we explore through several examples the coherence and utility of applying backtracking in more general control s...Backtracking1977
139 Freire, JulianaBeyond depth-first strategies: improving tabled logic programs through alternative schedulingTabled evaluation ensures termination for programs with finite models by keeping track of which subgoals have been called. Given several variant subgoals in an evaluation, only the fi rst one encountered will use program-clause resolution; the rest will resolve with the answers generated by the f...Alternate scheduling; SLG-WAM; Tabled logic programs1998
140 Freire, JulianaBeyond depth-first: improving tabled logic programs through alternative scheduling strategiesTabled evaluations ensure termination of logic programs with fi nite models by keeping track of which subgoals have been called Given several variant subgoals in an evaluation, only the fi rst one encountered will use program clause resolution the rest uses answer resolution This use of answer r...Alternate scheduling; SLG-WAM; Tabled logic programs1996
141 Hansen, Charles D.Binary-swap and shear-warp volume renderer on the T3DLarge parallel machines give today's scientists the ability to compute very large simulations which may generate equally large data. Not only does having visualization tools on the parallel system allow the scientist to take advantage of the large memory to visualize the data, the processing power a...Volume rendering; Binary-swap1995
142 Hansen, Charles D.Binary-swap volumetric rendering on the T3DThis paper presents a data distributed parallel raytraced volume rendering algorithm and its implementation on the CRI T3D. This algorithm distributes the data and the computational load to individual processing units to achieve fast and high-quality rendering of high-resolution data. The volume dat...Volume rendering; Binary-swap; Ray tracing; Parallel rendering1995
143 Johnson, Christopher R.Biomedical visual computing: case studies and challengesAdvances in computational geometric modeling, imaging, and simulation let researchers build and test models of increasing complexity, generating unprecedented amounts of data. As recent research in biomedical applications illustrates, visualization will be critical in making this vast amount of data...2012-01-01
144 Gerpheide, George E.Bit-driven logic: a style of digital logic for VLSI designThis memo describes a new style of low-level digital logic design called Bit-Driven Logic (BDL) which may prove attractive for the design of VLSI chips. BDL is an application of speed-independent, data-flow ideas to a very low level. It has the advantages of good locality, clockless operation, and...Bit-Driven Logic; BDL; Digital logic design; VLSI chips1980
145 Riloff, Ellen M.Bootstrapping for text learning tasksWhen applying text learning algorithms to complex tasks, it is tedious and expensive to hand-label the large amounts of training data necessary for good performance. This paper presents bootstrapping as an alternative approach to learning from large sets of labeled data. Instead of a large quantity ...Bootstrapping; Text learning algorithms; Seed information1999
146 Riloff, Ellen M.Bootstrapping method for learning semantic lexicons using extraction pattern contextsThis paper describes a bootstrapping algorithm called Basilisk that learns high-quality semantic lexicons for multiple categories. Basilisk begins with an unannotated corpus and seed words for each semantic category, which are then bootstrapped to learn new words for each category. Basilisk hypothe...Basilisk; Bootstrapping method; Semantic lexicons2002
147 Hansen, Charles D.Boundary aware reconstruction of scalar fieldsIn visualization, the combined role of data reconstruction and its classification plays a crucial role. In this paper we propose a novel approach that improves classification of different materials and their boundaries by combining information from the classifiers at the reconstruction stage. Our ap...2014-01-01
148 Gopalakrishnan, GaneshBounded transaction model checkingIndustrial cache coherence protocol models often have too many reachable states, preventing full reachability analysis even for small model instances (number of processors, addresses, etc.). Several partial search debugging methods are, therefore, employed, including lossy state compression using...Model checking; Reachability analysis2006-02-27
149 Freire, JulianaBridging the XML-relational divide with LegoDB: a demonstrationWe present LegoDB, a cost-based XML storage mapping engine that automatically explores a space of possible XML-to-relational mappings and selects an efficient mapping for a given application.LegoDB; Storage mappings2003
150 Brandt, Richard C.Building databases for the computer-based memorization systemThe Computer-Based Memorization System (CBMS) consists of eight games used by students to memorize groups of related facts that are stored in an associative network. The instructional design is built into the games. Designing and implementing associative networks for the CBMS is very different from...Computer-Based Memorization System; CBMS1988
151 Starkey, MikeC-RISC A C language reduced instruction set computerThis project is the implementation of a Reduced Instruction Set Computer (RISC) on a tiny chip. RISC technology is based on the idea that a small number of simple instructions can be used to create a fast, flexible computer. Our RISC uses this principle while staying within the confines of the tiny ...RISC; C language1990
152 Weinstein, DavidCache-rings for memory efficient isosurface constructionProcessor speeds continue to increase at faster rates than memory speeds. As this performance gap widens, it becomes increasingly important to develop "memory-conscious" algorithms - programs that still optimize instruction count and algorithmic complexity, but that also integrate optimizations for ...Processor speeds; Memory speeds; Computer memory; Cache-rings1997
153 Hansen, Charles D.; Henderson, Thomas C.CAD-based 3-D object recognitionWe propose an approach to 3-D object recognition using CAD-based geometry models for freeform surfaces. Geometry is modeled with rational B-splines by defining surface patches and then combining these into a volumetric model of the object. Characteristic features are then extracted from this model ...Object recognition; Strategy trees; Geometric knowledge representation; Automatic feature selection1989
154 Hansen, Charles D.CAD-based computer vision: the automatic generation of recognition stragtegiesThree-dimensional model-based computer vision uses geometric models of objects and sensed data to recognize objects in a scene. Likewise, Computer Aided Design (CAD) systems are used to interactively generate three-dimensional models during these fields. Recently, the unification of CAD and vision s...1988
155 Hansen, Charles D.; Henderson, Thomas C.CAD-based roboticsWe describe an approach which facilitates and makes explicit the organization of the knowledge necessary to map robotic system requirements onto an appropriate assembly of algorithms, processors, sensor, and actuators. In order to achieve this mapping, several kinds of knowledge are needed. In this ...CAD-based robotics; CAD-based vision; CAGD System1987
156 Henderson, Thomas C.; Bhanu, BirCAGD based 3-D visual recognitionA coherent automated manufacturing system needs to include CAD/CAM, computer vision, and object manipulation. Currently, most systems which support CAD/CAM do not provide for vision or manipulation and similarly, vision and manipulation systems incorporate no explicit relation to CAD/CAM models. CAD...Object manipulation; CAGD1985
157 Hansen, Charles D.; Henderson, Thomas C.CAGD based 3-D visual recognitionA coherent automated manufacturing system needs to include CAD/CAM, computer vision, and object manipulation. Currently, most systems which support CAD/CAM do not provide for vision or manipulation and similarly, vision and manipulation systems incorporate no explicit relation to CAD/CAM models. CAD...Visual recognition; Computer Aided Geometric Design (CAGD)1986
158 Hansen, Charles D.; Henderson, Thomas C.CAGD-based computer visionThree-dimensional model-based computer vision uses geometric models of objects and sensed data to recognize objects in a scene. Likewise, Computer Aided Geometric Design (CAGD) systems are used to interactively generate three-dimensional models during the design process. Despite this similarity, the...Computer Aided Geometric Design (CAGD); CAD-based vision; Model based vision; Strategy trees; Geometric knowledge representation; Automatic feature selection1987
159 Hansen, Charles D.CAGD-based computer visionAbstract-Three-dimensional model-based computer vision uses geometric models of objects and sensed data to recognize objects in a scene. Likewise, computer aided geometric design (CAGD) systems are used to interactively generate three-dimensional models during the design process. Despite this simil...1989-11
160 Henderson, Thomas C.CAGD-based computer visionThree-dimensional model-based computer vision uses geometric models of objects and sensed data to recognize objects in a scene. Likewise, Computer Aided Geometric Design (CAGD) systems are used to interactively generate three-dimensional models during the design process. Despite this similarity, t...Computer Aided Geometric Design; CAGD1987
161 Bhanu, BirCAOS an approach to robot controlControl systems which enable robots to behave intelligently is a major issue in todays process of automating factories. This thesis presents a hierarchical robot control system, a programming language for goal achievement, termed CAOS for Control using Action Oriented Schemata, with ideas taken fro...Robot control system; CAOS; Control using Action Oriented Schemata1987
162 Carter, Tony M.Cascade: a hardware alternative to bignumsThe Cascade hardware architecture for high/variable precision arithmetic is described. It uses a radix-16 redundant signed-digit number representation and directly supports single or multiple precision addition, subtraction, multiplication, division, extraction of the square root and computation of ...Cascade hardware; Bignums; Precision arithmetic1989
163 Carter, Tony M.Cascade: hardware for high/variable precision arithmeticThe Cascade hardware architecture for high/variable precision arithmetic is described. It uses a radix-16 redundant signed-digit number representation and directly supports single or multiple precision addition, subtraction, multiplication, division, extraction of the square root and computation...1989
164 Regehr, JohnThe case for hierarchical schedulers with performance guarantees2000-01-01
165 Gopalakrishnan, GaneshCase studies in symbolic model checkingThe need to formally verify hardware and software systems before they are deployed the real world has been recognized for several decades now. This is especially true of concurrent systems that are even more difficult to debug than sequential systems. For example, many of the protocols that get emp...Symbolic model checking; Hardware verification; Software verification1994
166 Riloff, Ellen M.Case study in using linguistic phrases for text categorization on the WWWMost learning algorithms that arc applied to text categorization problems rely on a bag-of-words document representation, i.e., each word occurring in the document is considered as a separate feature. In this paper, we investigate the use of linguistic phrases as input features for text categoriz...Learning algorithms; Text categorization; Linguistic phrases; Information extraction patterns; AutoSlog-TS1998
167 Hansen, Charles D.Case study of isosurface extraction algorithm performanceIsosurface extraction is an important and useful visualization method. Over the past ten years, the field has seen numerous isosurface techniques published, leaving the user in a quandary about which one should be used. Some papers have published complexity analysis of the techniques, yet empirical...Isosurfaces; Contours2000
168 Cates, Joshua E.; Whitaker, Ross T.; Jones, Greg M.Case study: an evaluation of user-assisted hierarchical watershed segmentationWhile level sets have demonstrated a great potential for 3D medical image segmentation, their usefulness has been limited by two problems. First, 3D level sets are relatively slow to compute. Second, their formulation usually entails several free parameters which can be very difficult to correctl...Watershed segmentation; Brain tumor imaging2004-02-27
169 Organick, Elliott I.CASL - A language for automating the implementation of computer architecturesThe computer Architecture Specification Language (CASL), described in this paper, is intended for use by computer architects CASL is a state machine description language especially useful for describing digital systems at the "register transfer" level and designed to meet the needs of the computer a...Computer Architecture Specification Language1979
170 Regehr, JohnCause reduction for quick testingAbstract-In random testing, it is often desirable to produce a "quick test" - an extremely inexpensive test suite that can serve as a frequently applied regression and allow the benefits of random testing to be obtained even in very slow or oversubscribed test environments. Delta debugging is an alg...2014-01-01
171 Henderson, Thomas C.CBCV: A CAD-based vision systemThe CBCV system has been developed in order to provide the capability of automatically synthesizing executable vision modules for various functions like object recognition, pose determinaion, quality inspection, etc. A wide range of tools exist for both 2D and 3D vision, including not only software...CBCV1990
172 Carter, Tony M.; Smith, Kent F.Cell matrix methodologies for integrated circuit designA class of integrated circuit design and implementation methodologies is described. These techniques are unique in that they simultaneously model both function and interconnect using cells. These cells are designed such that cell adjacency normally implies interconnection. The absence of an interco...Integrated circuit design; Cell matrix1989
173 Akella, VenkateshCFSIM: A concurrent compiled-code functional simulator for hopCPControl intensive ICs pose a significant challenge to the users of formal methods in designing hardware. These ICs have to support a wide variety of requirements including synchronous and asynchronous operations, polling and interrupt-driven modes of operation, multiple concurrent threads of executi...CFSIM; Hardware design; hopCP1992
174 Organick, Elliott I.Characteristics of a functional programming languageA programming language kernel is presented where an algorithm is a function defined through a functional expression. The only data structure introduced is an object that may be an atom or a sequence of objects. A number of functional forms are defined, with a notation close to ordinary mathematical ...1980
175 Pascucci, ValerioCharacterization and modeling of PIDX parallel I/O for performance optimizationParallel I/O library performance can vary greatly in re- sponse to user-tunable parameter values such as aggregator count, file count, and aggregation strategy. Unfortunately, manual selection of these values is time consuming and dependent on characteristics of the target machine, the underlying fi...2013-01-01
176 Balasubramonian, RajeevCHOP: adaptive filter-based DRAM caching for CMP server platformsAs manycore architectures enable a large number of cores on the die, a key challenge that emerges is the availability of memory bandwidth with conventional DRAM solutions. To address this challenge, integration of large DRAM caches that provide as much as 5× higher bandwidth and as low as 1/3rd of...CHOP; DRAM caching; CMP server platforms; Manycore architectures; Hot page; Filter cache; Multi-core processors2010
177 Kniss, Joe; Ikits, Milan; Lefohn, Aaron; Hansen, Charles D.Closed-form approximations to the volume rendering integral with Gaussian transfer functionsIn direct volume rendering, transfer functions map data points to optical properties such as color and opacity. We have found transfer functions based on the Gaussian primitive to be particularly useful for multivariate volumes, because they are simple and rely on a limited number of free paramet...Volume rendering2003-07-25
178 Hansen, Charles D.Cluster-based interactive volume rendering with SimianCommodity-based computer clusters offer a cost-effective alternative to traditional largescale, tightly coupled computers as a means to provide high-performance computational and visualization services. The Center for the Simulation of Accidental Fires and Explosions (C-SAFE) at the University of...Volume rendering; Simian2003-09-03
179 Lindstrom, Gary E.Combinator evaluation of functional programs with logical variablesA technique is presented that brings logical variables into the scope of the well known Turner method for evaluating normal order functioned programs by S, K, I combinator graph reduction. This extension is illustrated by SASL+LV, an extension of Turner's language SASL in which general expressions s...Functional programs; Logical variables; SASL+LV; Turner's language1987
180 Hansen, Charles D.Combined surface and volumetric occlusion shadingIn this paper, a method for interactive direct volume rendering is proposed that computes ambient occlusion effects for visualizations that combine both volumetric and geometric primitives, specifically tube shaped geometric objects representing streamlines, magnetic field lines or DTI fiber tracts....2012-01-01
181 Pascucci, ValerioCombining in-situ and in-transit processing to enable extreme-scale scientific analysisWith the onset of extreme-scale computing, I/O constraints make it increasingly difficult for scientists to save a sufficient amount of raw simulation data to persistent storage. One potential solution is to change the data analysis pipeline from a post-process centric to a concurrent approach based...2012-01-01
182 Freire, JulianaCombining scheduling strategies in tabled evaluationsTabled evaluations ensure termination for Datalog programs by distinguishing calls to tabled subgoals. Given several variant subgoals in an evaluation, only the first (the generator) will use program clause resolution, the rest (consumers) must perform answer resolution using answers computed by th...SLG; SLG-WAM; Tabling; Local scheduling; Batched scheduling1997
183 Henderson, Thomas C.Combining symbolic and numeric computation on the CRAYIt is now widely accepted that the CRAY supercomputers are very useful for large numeric applications, e.g., Finite Element Analysis, Fluid Dynamics, Image Processing, etc. Much work has been done to make them run efficiently on the CRAY. There has also been some effort to do symbolic computing (Al ...CRAY supercomputers; Symbolic computation; Numeric computation1986
184 Balasubramonian, RajeevCommit algorithms for scalable hardware transactional memoryIn a hardware transactional memory system with lazy versioning and lazy conflict detection, the process of transaction commit can emerge as a bottleneck. For a large-scale distributed memory system, we propose novel algorithms to implement commit that are deadlock- and livelock-free and do not empl...Commit algorithms; Scalable; Hardware; Transactional memory2007
185 Gopalakrishnan, Ganesh; Kirby, Robert Michael IIThe communication semantics of the message passing interfaceThe Message Passing Interface (MPI) standard is a natural language document that describes a software library for interprocess communication. Automatic reasoning about the reactive nature of programs communicating via MPI libraries is not possible without also analizing the library being used. Ma...communication semantics; Message Passing Interface; MPI; natural language2006-10-31
186 Zhao, Lu; Regehr, JohnComparing program logics for reasoning about safety propertiesTo prove memory write and controls transfers do not interfere with other programs in embedded systems. Hoare Logic with Bale Predicate; Hoare Logic with Separation Conjunction.2010-10-06
187 Kessler, Robert R.Compiling distributed C++Distributed C++ (DC++) is a language for writing parallel applications on loosely coupled distributed systems in C++. Its key idea is to extend the C++ class into 3 categories: gateway classes which act as communication and synchronization entry points between abstract processors, classes whose...Distributed C++; DC++; Parallel applications1994
188 Sikorski, KrisComplexity of computing topological degree of Lipschitz functions in n dimensionsWe find lower and upper bounds on the complexity, comp(deg), of computing t h e topological degree of functions defined on the n-dimensional unit cube Cn, f : ?Cn Rn,n ? 2, which satisfy a Lipschitz condition with constant K and whose infinity norm at each point on t h e boundary of Cn is at least d...Lipschitz functions1986
189 Susarla, Sai R.; Carter, JohnComposable consistency for large-scale peer replicationThe lack of a flexible consistency management solution hinders P2P implementation of applications involving updates, such as directory services, online auctions and collaboration. Managing shared data in a P2P setting requires a consistency solution that can operate in a heterogenous network, sup...P2P2003-11-14
190 Lindstrom, Gary E.Compositionally modular SchemeWe present a new module system for Scheme that supports a high degree of implementation reuse via module composition. The module system encourages breaking down a program into the smallest possible individually meaningful modules, and recomposing them using a powerful set of adaptation and combinat...Module system1995
191 Johnson, Christopher R.; Parker, Steven G.; Whitaker, Ross T.; Hansen, Charles D.Computational field visualizationToday, scientists, engineers, and medical researchers routinely use computers to simulate complex physical phenomena. Such simulations present new challenges for computational scientists, including the need to effectively analyze and visualize complex three-dimensional data. As simulations become mo...Volume rendering; Isosurface extraction; Ray tracing; Multi-field visualizations2001
192 Henderson, Thomas C.; Sikorski, ChristopherComputational sensor networksWe propose Computational Sensor Networks as a methodology to exploit models of physical phenomena in order to better understand the structure of the sensor network. To do so, it is necessary to relate changes in the sensed variables (e.g., temperature) to the aspect of interest in the sensor netw...Computational sensor networks2007
193 Parker, Steven G.; Hansen, Charles D.; Johnson, Christopher R.Computational steering and the SCIRun integrated problem solving environmentSCIRun is a problem solving environment that allows the interactive construction, debugging, and steering of large-scale scientific computations. We review related systems and introduce a taxonomy that explores different computational steering solutions. Considering these approaches, we discuss why ...Computational steering; Problem solving environment; SCIRun; Volume rendering1997
194 Riesenfeld, Richard F.Computer aided designThe report is based on the proposal submitted to the National Science Foundation in September 1981, as part of the Coordinated Experimental Computer Science Research Program. The sections covering the budget and biographical data on the senior research personnel have not been included. Also, the sec...1984
195 Riesenfeld, Richard F.Computer aided geometric designThis book contains the edited proceedings of the first International Conference on Computer Aided Geometric Design, an important new field that draws on the principles of computer science, mathematics, and geometric design. The list of contributors includes most of the leading researchers in the...Computer aided geometric design1973
196 Gouraud, HenriComputer display of curved surfacesThis research describes a method for producing shaped pictures of curved surfaces. It uses a small polygon approximation of the surface to solve efficiently the nidden parts detection, and then computes the shading on each polygon in such a way that visual discontinuities between adjacent polygons d...Curved surfaces; Computer display1971
197 Fletcher, Preston Thomas; Moeller, John Henry; Phillips, Jeffrey; Venkatasubramanian, SureshComputing hulls in positive definite spaceP(n): a Riemannian manifold Definition: symmetric positive-definite (n) (n) matrices Applications: Diffusion Tensor MRI (DT-MRI) Flow through voxel modeled in P(3) Elasticity Tensors Modeled by elements of P(6) Machine Learning Used in kernels Convex Hulls Data on P(n): Want to analyze...2010-10-06
198 Pascucci, ValerioComputing morse-smale complexes with accurate geometryTopological techniques have proven highly successful in analyzing and visualizing scientific data. As a result, significant efforts have been made to compute structures like the Morse-Smale complex as robustly and efficiently as possible. However, the resulting algorithms, while topologically consis...2012-01-01
199 Cohen, ElaineComputing offsets and tool paths with Voronoi diagramsIn this paper we describe the use of Voronoi diagrams to generate offsets for planar regions bounded by circular arcs and line segments, and then use the generated offsets as tool paths for NC machining. Two methods are presented, each producing a different type of offset. One of them generates the ...Voronoi diagrams1989
200 Sobh, Tarek M.; Henderson, Thomas C.Concurrent engineering and robot prototypingThis report addresses the theoretical basis for building a prototyping environment for electromechanical systems using concurrent engineering approach. In Designing a robot manipulator, as an example of electro-mechanical systems, the interaction between several modules (S/W, VLSI, CAD, CAM, Robotic...Robot prototyping1993
1 - 200 of 957