1 - 25 of 26
Number of results to display per page
CreatorTitleDescriptionSubjectDate
1 Kirby, Robert Michael II; Johnson, Christopher R.A new family of variational-form-based regularizers for reconstructing epicardial potentials from body-surface mappingWe propose a new family of regularizers for the inverse ECG problem, using a variational principle that underlies finite element approximation methods. As an alternative to traditional Tikhonov regularizers, the variational formulation has several advantages: 1)it enables a simple construction of ...2010
2 Henderson, Thomas C.A study of Pierce's group generatorPierce describes an approach to map learning with uninterpreted sensors and effectors. As part of that, he describes a sensor grouping generator operator that attempts to arrange similar sensors into groups. Here we review that work and place it in a more strenuous statistical validation framewor...Pierce's group; Map learning; Sensor grouping generator2010
3 Balasubramonian, RajeevCHOP: adaptive filter-based DRAM caching for CMP server platformsAs manycore architectures enable a large number of cores on the die, a key challenge that emerges is the availability of memory bandwidth with conventional DRAM solutions. To address this challenge, integration of large DRAM caches that provide as much as 5× higher bandwidth and as low as 1/3rd of...CHOP; DRAM caching; CMP server platforms; Manycore architectures; Hot page; Filter cache; Multi-core processors2010
4 Regehr, JohnCorrectness proofs for device drivers in embedded systemsComputer systems do not exist in isolation: they must interact with the world through I/O devices. Our work, which focuses on constrained embedded systems, provides a framework for verifying device driver software at the machine code level. We created an abstract device model that can be plugged...2010
5 Freire, JulianaIndexing relations on the webThere has been a substantial increase in the volume of (semi) structured data on the Web. This opens new opportunities for exploring and querying these data that goes beyond the keyword-based queries traditionally used on the Web. But supporting queries over a very large number of apparently disconn...Dataspaces; Web relations; Rewriting2010
6 Balasubramonian, RajeevTowards scalable, energy-efficient, bus-based on-chip networksIt is expected that future on-chip networks for many-core processors will impose huge overheads in terms of energy, delay, complexity, verification effort, and area. There is a common belief that the bandwidth necessary for future applications can only be provided by employing packet-switched netwo...On-chip networks; Multi-core computing; Bus-based; Energy efficient2010
7 Kasera, Sneha K.; Patwari, NealHigh-rate uncorrelated bit extraction for shared secret key generation from channel measurementsSecret keys can be generated and shared between two wireless nodes by measuring and encoding radio channel characteristics without ever revealing the secret key to an eavesdropper at a third location. This paper addresses bit extraction, i.e., the extraction of secret key bits from noisy radio chan...Wireless networks; Multipath fading; Physical layer; Key generation; Secret keys; Bit extraction2010-01
8 Kasera, Sneha K.On fast and accurate detection of unauthorized wireless access points using clock skewsWe explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind using clock skews is to overcome one of the major limitations of existing solutions-the inability to effectively detect Mediu...Clock skews; Unauthorized access; Medium access control; MAC; Address spoofing; Wireless networks; Time Synchronization Function; TSF2010-03
9 Hansen, Charles D.Physically-based interactive schlieren flow visualizationUnderstanding fluid flow is a difficult problem and of increasing importance as computational fluid dynamics produces an abundance of simulation data. Experimental flow analysis has employed techniques such as shadowgraph and schlieren imaging for centuries which allow empirical observation of inho...2010-03
10 Gerig, GuidoA new framework for analyzing white matter maturation in early brain developmentThe trajectory of early brain development is marked by rapid growth presented by volume but also by tissue property changes. Capturing regional characteristics of axonal structuring and myelination via neuroimaging requires analysis of longitudinal image data with multiple modalities. Complementary ...2010-01-01
11 Awasthi, Manu; Nellans, David W.; Sudan, Kshitij; Balasubramonian, RajeevABP : predictor based management of DRAM row buffersDRAM accesses are costly, especially in multicore systems. Future CMPs will run a mixed load of workloads/threads. Destructive interference at memory controller, spatio-temporal locality lost! DRAM row-buffer hits are least expensive, row-conflicts are most. Randomized memory access patterns re...2010-10-06
12 Gopalakrishnan, Ganesh; Humphrey, Alan Parker; Derrick, Christopher GladeAn integration of dynamic MPI formal verification within eclipse PTPOur research goals were to verify practical MPI programs for deadlocks, resource leaks, and assertion violations at the push of a button and be able to easily visualize the results. We also sought to integrate these capabilities with the Eclipse IDE via an Eclipse plug-in for the Parallel Tools Plat...Verification; Graphical User Interfaces; Dynamic Interleaving Reduction; Message Passing; MPI; Multi-core; Eclipse Parallel Tools Platform; Trapeze Interactive Poster2010-03-15
13 Zhao, Lu; Regehr, JohnComparing program logics for reasoning about safety propertiesTo prove memory write and controls transfers do not interfere with other programs in embedded systems. Hoare Logic with Bale Predicate; Hoare Logic with Separation Conjunction.2010-10-06
14 Fletcher, Preston Thomas; Moeller, John Henry; Phillips, Jeffrey; Venkatasubramanian, SureshComputing hulls in positive definite spaceP(n): a Riemannian manifold Definition: symmetric positive-definite (n) (n) matrices Applications: Diffusion Tensor MRI (DT-MRI) Flow through voxel modeled in P(3) Elasticity Tensors Modeled by elements of P(6) Machine Learning Used in kernels Convex Hulls Data on P(n): Want to analyze...2010-10-06
15 Mates, Phillip Lopes; Silva, Claudio T.crowdLabs: a provenance enabled web repositoryThe National Science Foundation Science and Technology Center for Coastal Margin Observation and Prediction (CMPO) is a multi-institutional center dedicated to coastal margins, which are regions consisting of very productive ecosystems that play an important role in global elemental cycles. CMPO ma...CrowdLabs; Web repository; Coastal margins; Trapeze Interactive Poster2010-03-15
16 Kasera, Sneha K.Enhancing covert communications with multiple colluding receiversTraditional (single receiver) system setup: ? Choose exploit field (e.g. last byte of TCP Timestamp) ? Alice: probabilistically inject parts of coded message into field ? Bob: extract symbols from field, decode to correct errors ?Warden: assume full knowledge of system and keys Can we create un...2010-10-06
17 Grosset, Andre Vincent Pascal; Pascucci, ValerioInfinite ZoomAny image (apart from a fractal) has a finite resolution. On zooming in, we eventually see pixels. The aim of this project is to allow users to infinitely zoom in on an image.2010-10-06
18 Johnson, Robert R.Patterns of patternsPurpose of this Poster is to demonstrate that it takes the patterns of values in all the many dimensions to place each patient in the final patterns shown in each of the 5 charts. The final patterns determine the ability of each technology to identify or distinguish patients in each class. It is p...Gene patterns; Colon cancer; Trapeze Interactive poster2010-03-15
19 Flatt, MatthewPLT scheme as an intermediate language2010-02-26
20 Li, Guodong; Gopalakrishnan, Ganesh; Kirby, Robert Michael IiPUG : A Symbolic Verifier of GPU ProgramsPUG is a automated verifier for GPU programs written in C/CUDA. PUG verifies GPU kernels for Data Races, Barrier mismatches, Totally wrong results, and Weak memory model related bugs. SMT-based correctness checking methods for these error are often more scalable, general and modular.2010-10-06
21 Chatterjee, Niladrish; Balasubramonian, Rajeev; Davis, Alan L.Rethinking DRAM design and organization for energy-constrained multicoresDRAM vendors have traditionally optimized for low cost and high performance, often making design decisions that incur energy penalties. For example, a single conventional DRAM access activates thousands of bitlines in many chips, to return a single cache line to the CPU. The other bits may be access...DRAM power consumption; Data-center power; Multicore memory; Trapeze Interactive Poster2010-03-15
22 Pascucci, Valerio; Swank, William LorenzoScalable scientific dataQuestion Hierarchial Z-Order Evaluation How can we present hundreds or thousands of gigabytes of scientific data to a user for analysis and interpretation? • The Scientific Computing and Imaging Institute is responsible for helping scientists visualize massive amounts of data. • Sources ...2010-02-26
23 Eide, Eric NormanSecure disk scrubbing in a large-scale automated testbed2010-02-26
24 Li, Peng; Regehr, JohnT-check: bug finding for sensor networksA safety property is true if something bad never happens. If any state in an execution violates the safety property, the entire execution violates that property. A liveness property holds if something good will eventually happen. An execution satisfies a liveness property if the execution will en...2010-02-26
25 Thulasinathan, Aravindan; Pascucci, Valerio; Tierny, JulienTopology Based Surface Meshing and MorphingMorphing is a seamless transition from one image to the other, used in animation and motion pictures. Mesh Parameterization used in this process is a fundamental tool used for domain remeshing. In case of 2-manifolds for example, most approaches require that the input mesh be cut into one or mor...2010-10-06
1 - 25 of 26