|
|
Creator | Title | Description | Subject | Date |
226 |
|
Bruderlin, Beat | DI - An object-oriented user interface toolbox for modula-2 applications | The DI dialog interface tool library for Modula-2 applications described in this paper facilitates the design and implementation of graphical, object-oriented user interfaces for workstations with a graphical screen, a mouse and a keyboard. Much emphasis is put on the portability of the application... | DI dialog interface tool | 1990 |
227 |
|
Silva, Claudio T. | ISP: An optimal out-of-core image-set processing streaming architecture for parallel heterogeneous systems | Image population analysis is the class of statistical methods that plays a central role in understanding the development, evolution, and disease of a population. However, these techniques often require excessive computational power and memory that are compounded with a large number of volumetric inp... | | 2012-01-01 |
228 |
|
Susarla, Sai R.; Carter, John | Khazana: a flexible wide area data store | Khazana is a peer-to-peer data service that supports efficient sharing and aggressive caching of mutable data across the wide area while giving clients significant control over replica divergence. Previous work on wide-area replicated services focussed on at most two of the following three proper... | Khazana; Peer-to-peer data service | 2003-10-13 |
229 |
|
Susarla, Sai R.; Carter, John | Middleware support for locality-aware wide area replication | Coherent wide-area data caching can improve the scalability and responsiveness of distributed services such as wide-area file access, database and directory services, and content distribution. However, distributed services differ widely in the frequency of read/write sharing, the amount of conten... | Wide-area data caching; Distributed services | 2004-11-18 |
230 |
|
Clark, James Henry | 3-D Design of free-form B-Spline surfaces (CSTD-74-005) | This report describes an experimental system for designing free-form B-spline surfaces using a head-mounted display. In this system, the interaction with the surfaces takes place in three dimensions as the designed object's shape Is updated in real-time. The report also examines some of the problems... | Computer animation | 1974-09 |
231 |
|
Kasera, Sneha K.; Patwari, Neal | High-rate uncorrelated bit extraction for shared secret key generation from channel measurements | Secret keys can be generated and shared between two wireless nodes by measuring and encoding radio channel characteristics without ever revealing the secret key to an eavesdropper at a third location. This paper addresses bit extraction, i.e., the extraction of secret key bits from noisy radio chan... | Wireless networks; Multipath fading; Physical layer; Key generation; Secret keys; Bit extraction | 2010-01 |
232 |
|
Berzins, Martin | Investigating applications portability with the Uintah DAG-based runtime system on PetaScale supercomputers | Present trends in high performance computing present formidable challenges for applications code using multicore nodes possibly with accelerators and/or co-processors and reduced memory while still attaining scalability. Software frameworks that execute machine-independent applications code using a ... | | 2013-01-01 |
233 |
|
Venkatasubramanian, Suresh | Multiple target tracking with RF sensor networks | RF sensor networks are wireless networks that can localize and track people (or targets) without needing them to carry or wear any electronic device. They use the change in the received signal strength (RSS) of the links due to the movements of people to infer their locations. In this paper, we cons... | | 2014-01-01 |
234 |
|
Gardner, Reed M. | Patient-Monitoring Systems | Biomedical Informatics | | 2006 |
235 |
|
Organick, Elliott I. | Semiannual technical report transformation of ADA programs into silicon (1 Sept. 1981- 28 Feb. 1982) | This report summarizes the first six months work of the research project, "Transformation of Ada Programs into Silicon." Our project has five main objectives: 1. Develop and document elements of a transformation methodology for converting Ada programs, or program constructs, into VLSI systems which ... | ADA programs; VLSI | 1982 |
236 |
|
Kirby, Robert Michael | Verifying volume rendering using discretization error analysis | We propose an approach for verification of volume rendering correctness based on an analysis of the volume rendering integral, the basis of most DVR algorithms. With respect to the most common discretization of this continuous model (Riemann summation), we make assumptions about the impact of parame... | | 2014-01-01 |
237 |
|
Lobell, Steven E. | Why Israel launched a preventive military strike on Iraq's nuclear weapons program (1981): the fungibility of power reources | In 1981, Israel launched a preventive military strike against a nuclear reactor that Iraq was constructing at the Tuwaitha Nuclear Research Center. The low fungibility of Iraq's power resources, and especially its nuclear weapons program, shaped Israel's decision-making process. First, it motivated ... | Reventive war; Osiraq granular; Theory of balancing; fungibility brittle; Israel power resources | |
238 |
|
Fujimoto, Richard M. | A shared memory algorithm and proof for the alternative construct in CSP | Communicating Sequential Processes (CSP) is a paradigm for communication and synchronization among distributed processes. The alternative construct is a key feature of CSP that allows nondeterministic selection of one among several possible communicants. Previous algorithms for this construct assume... | Shared memory algorithm; Communicating Sequential Processes; CSP | 1987 |
239 |
|
Jacobson, Hans; Gopalakrishnan, Ganesh | Application specific asynchronous microengines for efficient high-level control | Despite the growing interest in asynchronous circuits programmable asynchronous controllers based on the idea of microprogramming have not been actively pursued Since programmable control is widely used in many commercial ASICs to allow late correction of design errors to easily upgrade product f... | Asynchronous microengines | 1997 |
240 |
|
Balasubramonian, Rajeev | Dynamically tunable memory hierarchy | The widespread use of repeaters in long wires creates the possibility of dynamically sizing regular on-chip structures. We present a tunable cache and translation lookaside buffer (TLB) hierarchy that leverages repeater insertion to dynamically trade off size for speed and power consumption on a per... | Microarchitecture; High performance microprocessors; Reconfigurable architectures; Energy and performance of on-chip caches; Translation lookaside buffer (TLB); Tunable cache | 2003-10 |
241 |
|
Zhang, Lixin | ISIM: The simulator for the impulse adaptable memory system | This document describes ISIM, the simulator for the Impulse Adaptable Memory System. Impulse adds two new features to a conventional memory system. First, it supports a configurable, extra level of address remapping at the memory controller. Second, it supports prefetching at the memory controller. ... | ISIM; Impulse Adaptable Memory System; Memory systems | 1999 |
242 |
|
Kasera, Sneha K. | On fast and accurate detection of unauthorized wireless access points using clock skews | We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind using clock skews is to overcome one of the major limitations of existing solutions-the inability to effectively detect Mediu... | Clock skews; Unauthorized access; Medium access control; MAC; Address spoofing; Wireless networks; Time Synchronization Function; TSF | 2010-03 |
243 |
|
Gardner, Reed M. | Patient Monitoring Systems | Biomedical Informatics | | 1990 |
244 |
|
Wen, Ming | Personal, social, and ecological influences on loneliness and satisfaction among rural-to-urban migrants in Shanghai, China | This study examined personal, social, and ecological influences on loneliness and satisfaction among rural-urban migrants in Shanghai, China. Data used in this study were from the Shanghai Rural-to-Urban Migrant Worker Survey conducted by the Institute of Demographic Research, Fudan University, C... | Lonliness; Rural-to-urban migration; Internal migration; Shanghai, China | 2008-02-02 |
245 |
|
Jacobson, Hans | Application specific asynchronous microgengines for efficient high-level control | Despite the growing interest in asynchronous circuits, programmable asynchronous controllers based on the idea of microprogramming have not been actively pursued. Since programmable control is widely used in many commercial ASICs to allow late correction of design errors, to easily upgrade product ... | Asynchronous microgengines; Programmable asynchronous controllers | 1997 |
246 |
|
Freire, Juliana | Beyond depth-first strategies: improving tabled logic programs through alternative scheduling | Tabled evaluation ensures termination for programs with finite models by keeping track of which subgoals have been called. Given several variant subgoals in an evaluation, only the fi rst one encountered will use program-clause resolution; the rest will resolve with the answers generated by the f... | Alternate scheduling; SLG-WAM; Tabled logic programs | 1998 |
247 |
|
Warner, Homer R. | Designing a Controlled Medical Vocabulary Server: The VOSER Project | Biomedical Informatics | | 1994 |
248 |
|
Gardner, Reed M. | Patient-Monitoring Systems | Biomedical Informatics | | 2001 |
249 |
|
Riesenfeld, Richard F.; Smith, Kent F. | An experimental system for computer aided geometric design | The main goal of this proposed level-of-effort project is to extend present capabilities in the area of Computer Aided Geometric Design (CAGD) and to develop custom VLSI support for some special geometric functions. | Computer aided geometric design; CAGD; VLSI; Very large scale integration | 1984 |
250 |
|
Sobh, Tarek M. | Autonomous observation | We address the problem of observing an agent?? We advocate a modeling approach for the visual system and its observer where a discrete event dynamic system DEDS framework is developed and events are de ned as ranges on parameter subsets?? The dynamic recursive context for nite state machine... | Autonomous observation | 1992 |