|
|
Creator | Title | Description | Subject | Date |
1 |
|
Frey, Lewis J. | ca! - emergency and disaster recovery system extensions to caBIG™ | During Hurricane Katrina, US Federal and State Agencies had disparate data acquisition systems, separate data networks and unique incompatible applications. •System incompatibilities exist even between various Federal agencies. •Consistent data available to one agency should be available to an... | caBIG; Data acquisition systems; Data sharing; Information sharing; Trapeze Interactive Poster | 2009-09-23 |
2 |
|
Meyer, Miriah Dawn | Visualizing biological data | | | 2012 |
3 |
|
Pascucci, Valerio; Swank, William Lorenzo | Scalable scientific data | Question Hierarchial Z-Order Evaluation How can we present hundreds or thousands of gigabytes of scientific data to a user for analysis and interpretation? • The Scientific Computing and Imaging Institute is responsible for helping scientists visualize massive amounts of data. • Sources ... | | 2010-02-26 |
4 |
|
Pugsley, Seth H; Spjut, Josef Bo; Nellans, David W; Balasubramonian, Rajeev | SWEL: hardware cache coherence protocols to map shared data onto shared caches | In chip multiprocessors, replication of cache lines is allowed to reduce the latency each core has to access a cache line. Because of this replication, it is possible for one copy of data to become out of date if another copy of that data is modified. How a MESI protocol accomplishes this: ? K... | | |
5 |
|
Tasdizen, Tolga | Long range axon tracing with NeuroTracker | | | 2012 |
6 |
|
Anderson, Erik Wesley | Using EEG to Investigate the Visual Properties of Images | | | 2012 |
7 |
|
Pascucci, Valerio | Unconventional mappings for visual analysis of large data | | | 2011-10-15 |
8 |
|
Johnson, Robert R. | Patterns, not genes Characterize diseases and optimal treatments | | | 2010-02-25 |
9 |
|
Johnson, Robert R. | Patterns of patterns | Purpose of this Poster is to demonstrate that it takes the patterns of values in all the many dimensions to place each patient in the final patterns shown in each of the 5 charts. The final patterns determine the ability of each technology to identify or distinguish patients in each class. It is p... | Gene patterns; Colon cancer; Trapeze Interactive poster | 2010-03-15 |
10 |
|
Rosen, Paul Andrew | Cache ensemble analysis for understanding algorithmic memory performance | | | 2012 |
11 |
|
Krishnamoorthy, Vaidyanathan | Collaborative visualization tools for the analysis of petascale combustion simulation data | | | 2010-02-26 |
12 |
|
DuVall, Scott L. | Creation of an open source master person index from proprietary code: the open source "care data exchange" project | From 1998 to 2004 the ""Care Data Exchange"" (CDE) software was developed as a proprietary product by CareScience for the California HealthCare Foundation (CHCF). In 2005 CHCF asked Forrester Research to study the feasibility of releasing the CDE software assets under a free, open source license. Th... | Care Data Exchange; CDE; Proprietary code; Forrester report; Trapeze Interactive Poster | 2009 |
13 |
|
Furse, Cynthia M. | Utah's engineers: a statewide initiative for growth | Imagine finding a place where inventors gather to create their inventions. Envision getting a sneak peek at the latest technological innovations in engineering and computer science. Can you see yourself as an inventor? Join us on February 20 for Meet an Inventor Day sponsored by the students of... | | 2010-10-06 |
14 |
|
Sudan, Kshitij | Understanding the behavior of Pthread applications on non-uniform cache architectures | Why is it important? As number of cores in a processor scale up, caches would become banked Keeps individual look-up time small. Allows parallel accesses by different cores. Present shared programming model assumes a flat memory. Unaware application can have sub-optimal performance Conclusion ... | Computer architecture, compiler analysis, NUCA caches | 2011-10-08 |
15 |
|
Khan, Malik Murtaza | Auto-tuning for memory hierarchy optimizations in GPUs | | | 2010-02-26 |
16 |
|
Fletcher, Preston Thomas; Moeller, John Henry; Phillips, Jeffrey; Venkatasubramanian, Suresh | Computing hulls in positive definite space | P(n): a Riemannian manifold Definition: symmetric positive-definite (n) (n) matrices Applications: Diffusion Tensor MRI (DT-MRI) Flow through voxel modeled in P(3) Elasticity Tensors Modeled by elements of P(6) Machine Learning Used in kernels Convex Hulls Data on P(n): Want to analyze... | | 2010-10-06 |
17 |
|
Teerlink, Craig Carl | Heritability of facial appearance | | | 2012 |
18 |
|
Schott, Mathias; Hansen, Charles D | A directional occlusion shading model for interactive direct volume rendering | Volumetric rendering is widely used to examine 3D scalar fields Key aspect: provide perceptual cues to aid in understanding the data set Shading models with natural lighting conditions better convey depth information and spatial relationships Traditionally require considerable (pre)computatio... | | |
19 |
|
Hansen, Charles D. | Dynamic particle system on the GPU | | | 2012 |
20 |
|
Chatterjee, Niladrish; Balasubramonian, Rajeev; Davis, Alan L. | Rethinking DRAM design and organization for energy-constrained multicores | DRAM vendors have traditionally optimized for low cost and high performance, often making design decisions that incur energy penalties. For example, a single conventional DRAM access activates thousands of bitlines in many chips, to return a single cache line to the CPU. The other bits may be access... | DRAM power consumption; Data-center power; Multicore memory; Trapeze Interactive Poster | 2010-03-15 |
21 |
|
Hansen, Charles D. | Using Depth Perception to Enhance Volume Rendering | | | 2012 |
22 |
|
Sudan, Kshitij | Micro-pages : increasing DRAM efficiency with locality-aware data placement | | | 2010-02-26 |
23 |
|
Vardhan, Avantika | Segmenting the Invisible : Processing 4D Image Data | | | 2012 |
24 |
|
Cohen, Elaine | Volumetric parameterization and trivariate B-spline fitting using harmonic functions | | | 2010-02-26 |
25 |
|
DuVall, Scott L. | Identifying data set specific duplicate patient records | Probabilistic models are commonly used in the identification of duplicate records. These methods are usually more accurate than deterministic methods, but are exponentially more computationally complex. Thus to make them computationally feasible, they rely on deterministic blocking strategies. Th... | Probabilistic models; Duplicate records; Duplicate patient records; Trapeze Interactive Poster | 2009 |