1 - 25 of 29
Number of results to display per page
CreatorTitleDescriptionSubjectDate
1 Whitaker, Ross T.A fast iterative method for a class of Hamilton-Jacobi equations on parallel systemsIn this paper we propose a novel computational technique, which we call the Fast Iterative Method (FIM), to solve a class of Hamilton- Jacobi (H-J) equations on massively parallel systems. The proposed method manages the list of active nodes and iteratively updates the solutions on those nodes u...Fast Iterative Method; FIM; Parallel systems2007
2 Gopalakrishnan, Ganesh; Kirby, Robert Michael IIA survey of MPI related debuggers and toolsMessage Passing Interface is a widely used standard in the High Performance and Scienti c Computing Community for writing programs that can exploit the capability of parallel platforms. However, the inherent complexity and the size of the communication standard have made it difficult for programm...Message Passing Interface; MPI; Debuggers2007
3 Balasubramonian, RajeevCommit algorithms for scalable hardware transactional memoryIn a hardware transactional memory system with lazy versioning and lazy conflict detection, the process of transaction commit can emerge as a bottleneck. For a large-scale distributed memory system, we propose novel algorithms to implement commit that are deadlock- and livelock-free and do not empl...Commit algorithms; Scalable; Hardware; Transactional memory2007
4 Henderson, Thomas C.; Sikorski, ChristopherComputational sensor networksWe propose Computational Sensor Networks as a methodology to exploit models of physical phenomena in order to better understand the structure of the sensor network. To do so, it is necessary to relate changes in the sensed variables (e.g., temperature) to the aspect of interest in the sensor netw...Computational sensor networks2007
5 Riloff, Ellen M.Effective information extraction with semantic affinity patterns and relevant regionsWe present an information extraction system that decouples the tasks of finding relevant regions of text and applying extraction patterns. We create a self-trained relevant sentence classifier to identify relevant regions, and use a semantic affinity measure to automatically learn domain-relevant ex...Information extraction; Semantic affinity patterns; Relevant regions; MUC-4 terrorism corpus; ProMed disease outbreak stories2007
6 Riloff, Ellen M.Exploiting role-identifying nouns and expressions for information extractionWe present a new approach for extraction pattern learning that exploits role-identifying nouns, which are nouns whose semantics reveal the role that they play in an event (e.g., an "assassin" is a perpetrator). Given a few seed nouns, a bootstrapping algorithm automatically learns role-identifying ...Information extraction; Role-identifying; Nouns; Expressions; Pattern learning; Basilisk bootstrapping algorithm2007
7 Shirley, Peter S.; Thompson, William B.Expressive rendering of mountainous terrainPainters and cartographers have developed artistic landscape rendering techniques for centuries. Such renderings can visualize complex three-dimensional landscapes in a pleasing and understandable way. In this work we examine a particular type of artistic depiction, panorama maps, in terms of fun...panorama maps; Non-photorealistic rendering; Terrain; Texture synthesis2007
8 Gray, Kathryn E.Linguistic support for unit testingExisting systems for writing unit tests exploit built-in language constructs, such as reflection, to simulate the addition of testing constructs. While these simulations provide the minimally necessary functionality, they fail to support testing properly in many instances. In response, we have ...Java; Testing; Unit testing2007
9 Sikorski, ChristopherMethod of generated solutions as a numerical verification tool for ice codeMethod of Manufactured solutions is a well-known method used to verify numerical algorithms. It is used to estimate convergence and order of accuracy of the algorithms. The method involves design of analytical solutions to the set of equations solved by the algorithm and generation of the forcing fu...Validation; Verification; Method of Generated Solutions; Finite volume solver; ICE code2007
10 Sikorski, ChristopherThe method of generated solutions for numerical verification of ICE codeMethod of Manufactured Solutions (MMS) is a widely used technique to verify convergence and possible coding errors in numerical algorithms. This method involves designing analytical solutions satisfying the governing equations that are solved by the numerical algorithm. The solutions investigated...Method of Manufactured Solutions; MMS; Convergence; Verification; numerical Algorithms; ICE code; Numerical verification2007
11 Gopalakrishnan, GaneshPrecision on demand: an improvement in probabilistic hashingIn explicit state (enumerative) model checking, state vectors are often represented in a compressed form in order to reduce storage needs, typically employing fingerprints, bithashes, or state signatures. When using this kind of techniques, it could happen that the compressed image of a nonvisite...Probabilistic hashing; Model checking2007
12 Freire, JulianaProvenance in scientific workflow systemsThe automated tracking and storage of provenance information promises to be a major advantage of scientific workflow systems. We discuss issues related to data and workflow provenance, and present techniques for focusing user attention on meaningful provenance through "user views," for managing the ...Workflow systems; Provenance2007
13 Henderson, Thomas C.RobotShare: a framework for robot knowledge sharingKnowledge representation is a traditional field in artificial intelligence. Researchers have developed various ways to represent and share information among intelligent agents. Agents that share resources, data, information, and knowledge perform better than agents working alone. However, previou...RobotShare; Robot knowledge sharing2007
14 Gopalakrishnan, Ganesh; Kirby, Robert Michael IIRuntime model checking of multithreaded C/C++ programsWe present inspect, a tool for model checking safety prop- erties of multithreaded C/C++ programs where threads in- teract through shared variables and synchronization primi- tives. The given program is mechanically transformed into an instrumented version that yields control to a centralized s...Dynamic partial order reduction; Multithreaded; C/C++; Runtime model checking2007
15 Sikorski, KrisSelected fixed point problems and algorithmsWe present a new version of the almost optimal Circumscribed Ellipsoid Algorithm (CEA) for approximating fixed points of nonexpanding Lipschitz functions. We utilize the absolute and residual error criteria with respect to the second norm. The numerical results confirm that the CEA algorithm is m...Fixed point problems; Optimal algorithms; Nonlinear equations; Ellipsoid algorithm; Computational complexity.2007
16 Kniss, Joe; Riesenfeld, Richard F.Visual summary statisticsTraditionally, statistical summaries of categorical data often have been visualized using graphical plots of central moments (e.g., mean and standard deviation), or cumulants (e.g., median and quartiles) by box plots. In this work we reexamine the box plot and its relatives and develop a new hyb...Visual summary statistics; categorical data; box plot; hybrid summary plot2007
17 Hansen, Charles D.; Wald, IngoInteractive isosurface ray tracing of time-varying tetrahedral volumesAbstract- We describe a system for interactively rendering isosurfaces of tetrahedral finite-element scalar fields using coherent ray tracing techniques on the CPU. By employing state-of-the art methods in polygonal ray tracing, namely aggressive packet/frustum traversal of a bounding volume hierarc...2007-11
18 Hansen, Charles D.; Wald, IngoInteractive ray tracing of arbitrary implicits with SIMD interval arithmeticWe present a practical and efficient algorithm for interactively ray tracing arbitrary implicit surfaces. We use interval arithmetic (IA) both for robust root computation and guaranteed detection of topological features. In conjunction with ray tracing, this allows for rendering literally any progr...2007-09
19 Balasubramonian, RajeevLeveraging 3D technology for improved reliabilityAggressive technology scaling over the years has helped improve processor performance but has caused a reduction in processor reliability. Shrinking transistor sizes and lower supply voltages have increased the vulnerability of computer systems towards transient faults. An increase in within-die an...Reliability; Redundant multi-threading, 3D die-stacking; Parameter variation; Soft errors; Dynamic timing errors; Power-efficient microarchitecture; On-chip temperature2007-12
20 Balasubramonian, RajeevOptimizing NUCA organizations and wiring alternatives for large caches with CACTI 6.0A significant part of future microprocessor real estate will be dedicated to L2 or L3 caches. These on-chip caches will heavily impact processor performance, power dissipation, and thermal management strategies. There are a number of interconnect design considerations that influence power/performanc...CACTI 6.0; Non-uniform cache architectures (NUCA); Cache models; Memory hierarchies; On-chip interconnects2007-12
21 Freire, JulianaOrganizing hidden-web databases by clustering visible web documentsIn this paper we address the problem of organizing hidden-Web databases. Given a heterogeneous set of Web forms that serve as entry points to hidden-Web databases, our goal is to cluster the forms according to the database domains to which they belong. We propose a new clustering approach that mode...Hidden-web databases; Web documents2007-04
22 Balasubramonian, RajeevPower efficient approaches to redundant multithreadingNoise and radiation-induced soft errors (transient faults) in computer systems have increased significantly over the last few years and are expected to increase even more as we move toward smaller transistor sizes and lower supply voltages. Fault detection and recovery can be achieved through redund...Reliability; Power; Transient faults; Soft errors; Redundant multithreading (RMT); Heterogeneous chip multiprocessors dynamic frequency scaling2007-08
23 Freire, Juliana; Silva, Claudio T.Provenance for visualizations: reproducibility and beyondThe demand for the construction of complex visualizations is growing in many disciplines of science, as users are faced with ever increasing volumes of data to analyze. The authors present VisTrails, an open source provenance-management system that provides infrastructure for data exploration and ...Provenance management; Reproducibility; VisTrails; Pipelines2007-09
24 Freire, Juliana; Silva, Claudio T.Querying and creating visualizations by analogyWhile there have been advances in visualization systems, particularly in multi-view visualizations and visual exploration, the process of building visualizations remains a major bottleneck in data exploration. We show that provenance metadata collected during the creation of pipelines can be reused ...Provenance; VisTrails; Pipelines; Query-by-example2007-11
25 Regehr, JohnEfficient memory safety for TinyOSReliable sensor network software is difficult to create: applications are concurrent and distributed, hardware-based memory protection is unavailable, and severe resource constraints necessitate the use of unsafe, low-level languages. Our work improves this situation by providing efficient memory an...2007-01-01
1 - 25 of 29