|
|
Creator | Title | Description | Subject | Date |
1 |
 | Whitaker, Ross T. | A fast iterative method for a class of Hamilton-Jacobi equations on parallel systems | In this paper we propose a novel computational technique, which we call the Fast Iterative Method (FIM), to solve a class of Hamilton- Jacobi (H-J) equations on massively parallel systems. The proposed method manages the list of active nodes and iteratively updates the solutions on those nodes u... | Fast Iterative Method; FIM; Parallel systems | 2007 |
2 |
 | Gopalakrishnan, Ganesh; Kirby, Robert Michael II | A survey of MPI related debuggers and tools | Message Passing Interface is a widely used standard in the High Performance and Scienti c Computing Community for writing programs that can exploit the capability of parallel platforms. However, the inherent complexity and the size of the communication standard have made it difficult for programm... | Message Passing Interface; MPI; Debuggers | 2007 |
3 |
 | Balasubramonian, Rajeev | Commit algorithms for scalable hardware transactional memory | In a hardware transactional memory system with lazy versioning and lazy conflict detection, the process of transaction commit can emerge as a bottleneck. For a large-scale distributed memory system, we propose novel algorithms to implement commit that are deadlock- and livelock-free and do not empl... | Commit algorithms; Scalable; Hardware; Transactional memory | 2007 |
4 |
 | Henderson, Thomas C.; Sikorski, Christopher | Computational sensor networks | We propose Computational Sensor Networks as a methodology to exploit models of physical phenomena in order to better understand the structure of the sensor network. To do so, it is necessary to relate changes in the sensed variables (e.g., temperature) to the aspect of interest in the sensor netw... | Computational sensor networks | 2007 |
5 |
 | Riloff, Ellen M. | Effective information extraction with semantic affinity patterns and relevant regions | We present an information extraction system that decouples the tasks of finding relevant regions of text and applying extraction patterns. We create a self-trained relevant sentence classifier to identify relevant regions, and use a semantic affinity measure to automatically learn domain-relevant ex... | Information extraction; Semantic affinity patterns; Relevant regions; MUC-4 terrorism corpus; ProMed disease outbreak stories | 2007 |
6 |
 | Riloff, Ellen M. | Exploiting role-identifying nouns and expressions for information extraction | We present a new approach for extraction pattern learning that exploits role-identifying nouns, which are nouns whose semantics reveal the role that they play in an event (e.g., an "assassin" is a perpetrator). Given a few seed nouns, a bootstrapping algorithm automatically learns role-identifying ... | Information extraction; Role-identifying; Nouns; Expressions; Pattern learning; Basilisk bootstrapping algorithm | 2007 |
7 |
 | Shirley, Peter S.; Thompson, William B. | Expressive rendering of mountainous terrain | Painters and cartographers have developed artistic landscape rendering techniques for centuries. Such renderings can visualize complex three-dimensional landscapes in a pleasing and understandable way. In this work we examine a particular type of artistic depiction, panorama maps, in terms of fun... | panorama maps; Non-photorealistic rendering; Terrain; Texture synthesis | 2007 |
8 |
 | Gray, Kathryn E. | Linguistic support for unit testing | Existing systems for writing unit tests exploit built-in language constructs, such as reflection, to simulate the addition of testing constructs. While these simulations provide the minimally necessary functionality, they fail to support testing properly in many instances. In response, we have ... | Java; Testing; Unit testing | 2007 |
9 |
 | Sikorski, Christopher | Method of generated solutions as a numerical verification tool for ice code | Method of Manufactured solutions is a well-known method used to verify numerical algorithms. It is used to estimate convergence and order of accuracy of the algorithms. The method involves design of analytical solutions to the set of equations solved by the algorithm and generation of the forcing fu... | Validation; Verification; Method of Generated Solutions; Finite volume solver; ICE code | 2007 |
10 |
 | Sikorski, Christopher | The method of generated solutions for numerical verification of ICE code | Method of Manufactured Solutions (MMS) is a widely used technique to verify convergence and possible coding errors in numerical algorithms. This method involves designing analytical solutions satisfying the governing equations that are solved by the numerical algorithm. The solutions investigated... | Method of Manufactured Solutions; MMS; Convergence; Verification; numerical Algorithms; ICE code; Numerical verification | 2007 |
11 |
 | Gopalakrishnan, Ganesh | Precision on demand: an improvement in probabilistic hashing | In explicit state (enumerative) model checking, state vectors are often represented in a compressed form in order to reduce storage needs, typically employing fingerprints, bithashes, or state signatures. When using this kind of techniques, it could happen that the compressed image of a nonvisite... | Probabilistic hashing; Model checking | 2007 |
12 |
 | Freire, Juliana | Provenance in scientific workflow systems | The automated tracking and storage of provenance information promises to be a major advantage of scientific workflow systems. We discuss issues related to data and workflow provenance, and present techniques for focusing user attention on meaningful provenance through "user views," for managing the ... | Workflow systems; Provenance | 2007 |
13 |
 | Henderson, Thomas C. | RobotShare: a framework for robot knowledge sharing | Knowledge representation is a traditional field in artificial intelligence. Researchers have developed various ways to represent and share information among intelligent agents. Agents that share resources, data, information, and knowledge perform better than agents working alone. However, previou... | RobotShare; Robot knowledge sharing | 2007 |
14 |
 | Gopalakrishnan, Ganesh; Kirby, Robert Michael II | Runtime model checking of multithreaded C/C++ programs | We present inspect, a tool for model checking safety prop- erties of multithreaded C/C++ programs where threads in- teract through shared variables and synchronization primi- tives. The given program is mechanically transformed into an instrumented version that yields control to a centralized s... | Dynamic partial order reduction; Multithreaded; C/C++; Runtime model checking | 2007 |
15 |
 | Sikorski, Kris | Selected fixed point problems and algorithms | We present a new version of the almost optimal Circumscribed Ellipsoid Algorithm (CEA) for approximating fixed points of nonexpanding Lipschitz functions. We utilize the absolute and residual error criteria with respect to the second norm. The numerical results confirm that the CEA algorithm is m... | Fixed point problems; Optimal algorithms; Nonlinear equations; Ellipsoid algorithm; Computational complexity. | 2007 |
16 |
 | Kniss, Joe; Riesenfeld, Richard F. | Visual summary statistics | Traditionally, statistical summaries of categorical data often have been visualized using graphical plots of central moments (e.g., mean and standard deviation), or cumulants (e.g., median and quartiles) by box plots. In this work we reexamine the box plot and its relatives and develop a new hyb... | Visual summary statistics; categorical data; box plot; hybrid summary plot | 2007 |
17 |
 | Hansen, Charles D.; Wald, Ingo | Interactive isosurface ray tracing of time-varying tetrahedral volumes | Abstract- We describe a system for interactively rendering isosurfaces of tetrahedral finite-element scalar fields using coherent ray tracing techniques on the CPU. By employing state-of-the art methods in polygonal ray tracing, namely aggressive packet/frustum traversal of a bounding volume hierarc... | | 2007-11 |
18 |
 | Hansen, Charles D.; Wald, Ingo | Interactive ray tracing of arbitrary implicits with SIMD interval arithmetic | We present a practical and efficient algorithm for interactively ray tracing arbitrary implicit surfaces. We use interval arithmetic (IA) both for robust root computation and guaranteed detection of topological features. In conjunction with ray tracing, this allows for rendering literally any progr... | | 2007-09 |
19 |
 | Balasubramonian, Rajeev | Leveraging 3D technology for improved reliability | Aggressive technology scaling over the years has helped improve processor performance but has caused a reduction in processor reliability. Shrinking transistor sizes and lower supply voltages have increased the vulnerability of computer systems towards transient faults. An increase in within-die an... | Reliability; Redundant multi-threading, 3D die-stacking; Parameter variation; Soft errors; Dynamic timing errors; Power-efficient microarchitecture; On-chip temperature | 2007-12 |
20 |
 | Balasubramonian, Rajeev | Optimizing NUCA organizations and wiring alternatives for large caches with CACTI 6.0 | A significant part of future microprocessor real estate will be dedicated to L2 or L3 caches. These on-chip caches will heavily impact processor performance, power dissipation, and thermal management strategies. There are a number of interconnect design considerations that influence power/performanc... | CACTI 6.0; Non-uniform cache architectures (NUCA); Cache models; Memory hierarchies; On-chip interconnects | 2007-12 |
21 |
 | Freire, Juliana | Organizing hidden-web databases by clustering visible web documents | In this paper we address the problem of organizing hidden-Web databases. Given a heterogeneous set of Web forms that serve as entry points to hidden-Web databases, our goal is to cluster the forms according to the database domains to which they belong. We propose a new clustering approach that mode... | Hidden-web databases; Web documents | 2007-04 |
22 |
 | Balasubramonian, Rajeev | Power efficient approaches to redundant multithreading | Noise and radiation-induced soft errors (transient faults) in computer systems have increased significantly over the last few years and are expected to increase even more as we move toward smaller transistor sizes and lower supply voltages. Fault detection and recovery can be achieved through redund... | Reliability; Power; Transient faults; Soft errors; Redundant multithreading (RMT); Heterogeneous chip multiprocessors dynamic frequency scaling | 2007-08 |
23 |
 | Freire, Juliana; Silva, Claudio T. | Provenance for visualizations: reproducibility and beyond | The demand for the construction of complex visualizations is growing in many disciplines of science, as users are faced with ever increasing volumes of data to analyze. The authors present VisTrails, an open source provenance-management system that provides infrastructure for data exploration and ... | Provenance management; Reproducibility; VisTrails; Pipelines | 2007-09 |
24 |
 | Freire, Juliana; Silva, Claudio T. | Querying and creating visualizations by analogy | While there have been advances in visualization systems, particularly in multi-view visualizations and visual exploration, the process of building visualizations remains a major bottleneck in data exploration. We show that provenance metadata collected during the creation of pipelines can be reused ... | Provenance; VisTrails; Pipelines; Query-by-example | 2007-11 |
25 |
 | Regehr, John | Efficient memory safety for TinyOS | Reliable sensor network software is difficult to create: applications are concurrent and distributed, hardware-based memory protection is unavailable, and severe resource constraints necessitate the use of unsafe, low-level languages. Our work improves this situation by providing efficient memory an... | | 2007-01-01 |