|
|
Creator | Title | Description | Subject | Date |
326 |
|
Kasera, Sneha K. | Exploiting altruism in social networks for friend-to-friend malware detection | We propose a novel malware detection application- SocialScan-which enables friend-to-friend (f2f) malware scanning services among social peers, with scanning resource sharing governed by levels of social altruism. We show that with f2f sharing of resources, SocialScan achieves a 65% increase in the ... | | 2014-01-01 |
327 |
|
Thompson, William B. | Exploiting discontinuities in optical flow | Most optical flow estimation techniques have substantial difficulties dealing with flow discontinuities. Methods which simultaneously detect flow boundaries and use the detected boundaries to aid in flow estimation can produce significantly improved results. Current approaches to implementing these ... | Optical flow; Discontinuities | 1995 |
328 |
|
Balasubramonian, Rajeev | Exploiting eager register release in a redundantly multi-threaded processor | Due to shrinking transistor sizes and lower supply voltages, transient faults (soft errors) in computer systems are projected to increase by orders of magnitude. Fault detection and recovery can be achieved through redundancy. Redundant multithreading (RMT) is one attractive approach to detect and r... | Transient faults; Soft errors; Redundant multithreading; Eager register release; Register file design | 2006 |
329 |
|
Riloff, Ellen M. | Exploiting role-identifying nouns and expressions for information extraction | We present a new approach for extraction pattern learning that exploits role-identifying nouns, which are nouns whose semantics reveal the role that they play in an event (e.g., an "assassin" is a perpetrator). Given a few seed nouns, a bootstrapping algorithm automatically learns role-identifying ... | Information extraction; Role-identifying; Nouns; Expressions; Pattern learning; Basilisk bootstrapping algorithm | 2007 |
330 |
|
Riloff, Ellen M. | Exploiting strong syntactic heuristics and co-training to learn semantic lexicons | We present a bootstrapping method that uses strong syntactic heuristics to learn semantic lexicons. The three sources of information are appositives, compound nouns, and ISA clauses. We apply heuristics to these syntactic structures, embed them in a bootstrapping architecture, and combine them with... | Syntactic heuristics; Semantic lexicons; Bootstrapping method; Appositives; Compound nouns; ISA clauses; Co-training | 2002 |
331 |
|
Riloff, Ellen M. | Exploiting subjectivity classification to improve information extraction | Information extraction (IE) systems are prone to false hits for a variety of reasons and we observed that many of these false hits occur in sentences that contain subjective language (e.g., opinions, emotions, and sentiments). Motivated by these observations, we explore the idea of using subjecti... | Subjectivity classification; Information extraction; Subjectivity analysis; MUC-4 | 2005 |
332 |
|
Gilbert, Nathan Alan; Riloff, Ellen M. | Exploring Knowledge-Rich Solutions to Noun Phrase Coreference Resolution | Coreference resolution is the task of identifying coreferent expressions in text. Accurate coreference resolution can improve other tasks such as machine translation, information retrievel and document summarization. Currently, the best approaches involve some form of supervised Machine Learni... | | |
333 |
|
Pascucci, Valerio | Exploring performance data with boxfish | The growth in size and complexity of scaling applications and the systems on which they run pose challenges in analyzing and improving their overall performance. With metrics coming from thousands or millions of processes, visualization techniques are necessary to make sense of the increasing amount... | | 2012-01-01 |
334 |
|
Pascucci, Valerio | Exploring power behaviors and trade-offs of in-situ data analytics | As scientific applications target exascale, challenges related to data and energy are becoming dominating concerns. For example, coupled simulation workflows are increasingly adopting in-situ data processing and analysis techniques to address costs and overheads due to data movement and I/O. However... | | 2013-01-01 |
335 |
|
Balasubramonian, Rajeev | Exploring the design space for 3D clustered architectures | 3D die-stacked chips are emerging as intriguing prospects for the future because of their ability to reduce on-chip wire delays and power consumption. However, they will likely cause an increase in chip operating temperature, which is already a major bottleneck in modern microprocessor design. We... | | 2006 |
336 |
|
Kuramkote, Ravindra; Carter, John | Exploring the value of supporting multiple DSM protocols in Hardware DSM Controllers | The performance of a hardware distributed shared memory (DSM) system is largely dependent on its architect's ability to reduce the number of remote memory misses that occur. Previous attempts to solve this problem have included measures such as supporting both the CC-NUMA and S-COMA architectures is... | DSM; Controllers | 1999 |
337 |
|
McDirmid, Sean; Hsieh, Wilson C.; Flatt, Matt | Expressive modular linking for object-oriented languages | In this paper we show how modular linking of program fragments can be added to statically typed, object-oriented (OO) languages. Programs are being assembled out of separately developed software components deployed in binary form. Unfortunately, mainstream OO languages (such as Java) still do not ... | Modular linking; Program fragments | 2002-10-11 |
338 |
|
Shirley, Peter S.; Thompson, William B. | Expressive rendering of mountainous terrain | Painters and cartographers have developed artistic landscape rendering techniques for centuries. Such renderings can visualize complex three-dimensional landscapes in a pleasing and understandable way. In this work we examine a particular type of artistic depiction, panorama maps, in terms of fun... | panorama maps; Non-photorealistic rendering; Terrain; Texture synthesis | 2007 |
339 |
|
Pascucci, Valerio | Extreme-scale visual analytics | The September/October 2004 CG&A introduced the term visual analytics (VA) to the computer science literature.1 In 2005, an international advisory panel with representatives from academia, industry, and government defined VA as "the science of analytical reasoning facilitated by interactive visual in... | | 2012-01-01 |
340 |
|
Lindstrom, Gary E. | Fast and accurate NN approach for multi-event annotation of time series | Similarity search in time-series subsequences is an important time series data mining task. Searching in time series subsequences for matches for a set of shapes is an extension of this task and is equally important. In this work we propose a simple but efficient approach for finding matches for a g... | Time-series subsequences; Nearest neighbor approach; Multi-event | 2003 |
341 |
|
Hansen, Charles D. | Fast data parallel polygon rendering | This paper describes a data parallel method for polygon rendering on a massively parallel machine. This method, based on a simple shading model, is targeted for applications which require very fast rendering for extremely large sets of polygons. Such sets are found in many scienti c visualization ap... | | 1993 |
342 |
|
Hansen, Charles D. | Fast stereoscopic images with ray-traced volume rendering | One of the drawbacks of standard volume rendering techniques is that it is often difficult to comprehend the three-dimensional structure of the volume from a single frame; this is especially true in cases where there is no solid surface. Generally, several frames must be generated and viewed sequent... | Volume rendering; Ray tracing; Stereoscopic images; Reprojection | 1994 |
343 |
|
Gu, Jun | Fast structured design of VLSI circuits | We believe that a structured, user-friendly, cost-effective tool for rapid implementation of VLSI circuits which encourages students to participate directly in research projects are the key components in digital integrated circuit (IC) education. In this paper, we introduce our VLSI education activ... | VLSI circuits; Rapid implementation | 1988 |
344 |
|
Kopta, Daniel M.; Kensler, Andrew Erin; Spjut, Josef Bo; Brunvand, Erik L.; Davis, Al | Fast, effective BVH updates for dynamic ray-traced scenes using tree rotations | Bounding volume hierarchies are a popular choice for ray tracing animated scenes due to the relative simplicity of refitting bounding volumes around moving geometry. However, the quality of such a refitted tree can degrade rapidly if objects in the scene deform or rearrange significantly as the ... | Ray tracing; Acceleration structures; Bounding volume hierarchies; Tree rotations; Dynamic scenes; Parallel update | 2011 |
345 |
|
Riloff, Ellen M. | Feature subsumption for opinion analysis | Lexical features are key to many approaches to sentiment analysis and opinion detection. A variety of representations have been used, including single words, multi-word Ngrams, phrases, and lexicosyntactic patterns. In this paper, we use a subsumption hierarchy to formally define different types o... | Feature subsumption; Sentiment analysis; Opinion detection; Subsumption hierarchy | 2006 |
346 |
|
Cohen, Elaine | Feature-based process planning for CNC machining | Today CNC machining is used successfully to provide program-driven medium lot size manufacturing. The range of applicability of CNC machining should be greater: For small lot sizes such as prototyping or custom products, these machines should provide quick turnaround and flexible production schedul... | CNC machining | 1998 |
347 |
|
Thompson, William B. | Feature-based reverse engineering of mechanical parts | Reverse engineering of mechanical parts requires extraction of information about an instance of a particular part sufficient to replicate the part using appropriate manufacturing techniques. This is important in a wide variety of situations, since functioning CAD models are often unavailable or unus... | Mechanical parts | 1995 |
348 |
|
Regehr, John | Finding and understanding bugs in C compilers | Compilers should be correct. To improve the quality of C compilers, we created Csmith, a randomized test-case generation tool, and spent three years using it to find compiler bugs. During this period we reported more than 325 previously unknown bugs to compiler developers. Every compiler we tested w... | | 2011-01-01 |
349 |
|
Yang, Xuejun; Chen, Yang; Eide, Eric; Regehr, John | Finding compiler bugs with random testing | Undefined behavior (such as divide by 0) or unspecified behavior (such as order of evaluation) gives compilers freedom to diverge, causing failure to our voting mechanism Control Flow Analysis • a control flow analyzer that can handle abnormal edges created by jump statements (goto / break ... | | |
350 |
|
Balasubramonian, Rajeev | First-order analysis of power overheads of redundant multi-threading | Redundant multi-threading (RMT) has been proposed as an architectural approach that efficiently detects and recovers from soft errors. RMT can impose non-trivial overheads in terms of power consumption. In this paper, we characterize some of the major factors that influence the power consumed by R... | Redundant multi-threading; RMT; Soft errors; Power overheads; Power consumption | 2006 |