226 - 250 of 259
Number of results to display per page
CreatorTitleDescriptionSubjectDate
226 Bruderlin, BeatDI - An object-oriented user interface toolbox for modula-2 applicationsThe DI dialog interface tool library for Modula-2 applications described in this paper facilitates the design and implementation of graphical, object-oriented user interfaces for workstations with a graphical screen, a mouse and a keyboard. Much emphasis is put on the portability of the application...DI dialog interface tool1990
227 Silva, Claudio T.ISP: An optimal out-of-core image-set processing streaming architecture for parallel heterogeneous systemsImage population analysis is the class of statistical methods that plays a central role in understanding the development, evolution, and disease of a population. However, these techniques often require excessive computational power and memory that are compounded with a large number of volumetric inp...2012-01-01
228 Susarla, Sai R.; Carter, JohnKhazana: a flexible wide area data storeKhazana is a peer-to-peer data service that supports efficient sharing and aggressive caching of mutable data across the wide area while giving clients significant control over replica divergence. Previous work on wide-area replicated services focussed on at most two of the following three proper...Khazana; Peer-to-peer data service2003-10-13
229 Susarla, Sai R.; Carter, JohnMiddleware support for locality-aware wide area replicationCoherent wide-area data caching can improve the scalability and responsiveness of distributed services such as wide-area file access, database and directory services, and content distribution. However, distributed services differ widely in the frequency of read/write sharing, the amount of conten...Wide-area data caching; Distributed services2004-11-18
230 Clark, James Henry3-D Design of free-form B-Spline surfaces (CSTD-74-005)This report describes an experimental system for designing free-form B-spline surfaces using a head-mounted display. In this system, the interaction with the surfaces takes place in three dimensions as the designed object's shape Is updated in real-time. The report also examines some of the problems...Computer animation1974-09
231 Kasera, Sneha K.; Patwari, NealHigh-rate uncorrelated bit extraction for shared secret key generation from channel measurementsSecret keys can be generated and shared between two wireless nodes by measuring and encoding radio channel characteristics without ever revealing the secret key to an eavesdropper at a third location. This paper addresses bit extraction, i.e., the extraction of secret key bits from noisy radio chan...Wireless networks; Multipath fading; Physical layer; Key generation; Secret keys; Bit extraction2010-01
232 Berzins, MartinInvestigating applications portability with the Uintah DAG-based runtime system on PetaScale supercomputersPresent trends in high performance computing present formidable challenges for applications code using multicore nodes possibly with accelerators and/or co-processors and reduced memory while still attaining scalability. Software frameworks that execute machine-independent applications code using a ...2013-01-01
233 Venkatasubramanian, SureshMultiple target tracking with RF sensor networksRF sensor networks are wireless networks that can localize and track people (or targets) without needing them to carry or wear any electronic device. They use the change in the received signal strength (RSS) of the links due to the movements of people to infer their locations. In this paper, we cons...2014-01-01
234 Gardner, Reed M.Patient-Monitoring SystemsBiomedical Informatics2006
235 Organick, Elliott I.Semiannual technical report transformation of ADA programs into silicon (1 Sept. 1981- 28 Feb. 1982)This report summarizes the first six months work of the research project, "Transformation of Ada Programs into Silicon." Our project has five main objectives: 1. Develop and document elements of a transformation methodology for converting Ada programs, or program constructs, into VLSI systems which ...ADA programs; VLSI1982
236 Kirby, Robert MichaelVerifying volume rendering using discretization error analysisWe propose an approach for verification of volume rendering correctness based on an analysis of the volume rendering integral, the basis of most DVR algorithms. With respect to the most common discretization of this continuous model (Riemann summation), we make assumptions about the impact of parame...2014-01-01
237 Lobell, Steven E.Why Israel launched a preventive military strike on Iraq's nuclear weapons program (1981): the fungibility of power reourcesIn 1981, Israel launched a preventive military strike against a nuclear reactor that Iraq was constructing at the Tuwaitha Nuclear Research Center. The low fungibility of Iraq's power resources, and especially its nuclear weapons program, shaped Israel's decision-making process. First, it motivated ...Reventive war; Osiraq granular; Theory of balancing; fungibility brittle; Israel power resources
238 Fujimoto, Richard M.A shared memory algorithm and proof for the alternative construct in CSPCommunicating Sequential Processes (CSP) is a paradigm for communication and synchronization among distributed processes. The alternative construct is a key feature of CSP that allows nondeterministic selection of one among several possible communicants. Previous algorithms for this construct assume...Shared memory algorithm; Communicating Sequential Processes; CSP1987
239 Jacobson, Hans; Gopalakrishnan, GaneshApplication specific asynchronous microengines for efficient high-level controlDespite the growing interest in asynchronous circuits programmable asynchronous controllers based on the idea of microprogramming have not been actively pursued Since programmable control is widely used in many commercial ASICs to allow late correction of design errors to easily upgrade product f...Asynchronous microengines1997
240 Balasubramonian, RajeevDynamically tunable memory hierarchyThe widespread use of repeaters in long wires creates the possibility of dynamically sizing regular on-chip structures. We present a tunable cache and translation lookaside buffer (TLB) hierarchy that leverages repeater insertion to dynamically trade off size for speed and power consumption on a per...Microarchitecture; High performance microprocessors; Reconfigurable architectures; Energy and performance of on-chip caches; Translation lookaside buffer (TLB); Tunable cache2003-10
241 Zhang, LixinISIM: The simulator for the impulse adaptable memory systemThis document describes ISIM, the simulator for the Impulse Adaptable Memory System. Impulse adds two new features to a conventional memory system. First, it supports a configurable, extra level of address remapping at the memory controller. Second, it supports prefetching at the memory controller. ...ISIM; Impulse Adaptable Memory System; Memory systems1999
242 Kasera, Sneha K.On fast and accurate detection of unauthorized wireless access points using clock skewsWe explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind using clock skews is to overcome one of the major limitations of existing solutions-the inability to effectively detect Mediu...Clock skews; Unauthorized access; Medium access control; MAC; Address spoofing; Wireless networks; Time Synchronization Function; TSF2010-03
243 Gardner, Reed M.Patient Monitoring SystemsBiomedical Informatics1990
244 Wen, MingPersonal, social, and ecological influences on loneliness and satisfaction among rural-to-urban migrants in Shanghai, ChinaThis study examined personal, social, and ecological influences on loneliness and satisfaction among rural-urban migrants in Shanghai, China. Data used in this study were from the Shanghai Rural-to-Urban Migrant Worker Survey conducted by the Institute of Demographic Research, Fudan University, C...Lonliness; Rural-to-urban migration; Internal migration; Shanghai, China2008-02-02
245 Jacobson, HansApplication specific asynchronous microgengines for efficient high-level controlDespite the growing interest in asynchronous circuits, programmable asynchronous controllers based on the idea of microprogramming have not been actively pursued. Since programmable control is widely used in many commercial ASICs to allow late correction of design errors, to easily upgrade product ...Asynchronous microgengines; Programmable asynchronous controllers1997
246 Freire, JulianaBeyond depth-first strategies: improving tabled logic programs through alternative schedulingTabled evaluation ensures termination for programs with finite models by keeping track of which subgoals have been called. Given several variant subgoals in an evaluation, only the fi rst one encountered will use program-clause resolution; the rest will resolve with the answers generated by the f...Alternate scheduling; SLG-WAM; Tabled logic programs1998
247 Warner, Homer R.Designing a Controlled Medical Vocabulary Server: The VOSER ProjectBiomedical Informatics1994
248 Gardner, Reed M.Patient-Monitoring SystemsBiomedical Informatics2001
249 Riesenfeld, Richard F.; Smith, Kent F.An experimental system for computer aided geometric designThe main goal of this proposed level-of-effort project is to extend present capabilities in the area of Computer Aided Geometric Design (CAGD) and to develop custom VLSI support for some special geometric functions.Computer aided geometric design; CAGD; VLSI; Very large scale integration1984
250 Sobh, Tarek M.Autonomous observationWe address the problem of observing an agent?? We advocate a modeling approach for the visual system and its observer where a discrete event dynamic system DEDS framework is developed and events are de ned as ranges on parameter subsets?? The dynamic recursive context for nite state machine...Autonomous observation1992
226 - 250 of 259