351 - 375 of 561
Number of results to display per page
CreatorTitleDescriptionSubjectDate
351 Carter, John B.An O(1) time complexity software barrierAs network latency rapidly approaches thousands of processor cycles and multiprocessors systems become larger and larger, the primary factor in determining a barrier algorithm?s performance is the number of serialized network latencies it requires. All existing barrier algorithms require at least ...Network latency; Barrier algorithm; Time complexity software barrier2004
352 Carter, John B.Analysis of avalanche's shared memory architectureIn this paper, we describe the design of the Avalanche multiprocessor's shared memory subsystem, evaluate its performance, and discuss problems associated with using commodity workstations and network interconnects as the building blocks of a scalable shared memory multiprocessor. Compared to other ...Avalanche multiprocessor; Shared memory1997
353 Hansen, Charles D.; Henderson, Thomas C.CAGD-based computer visionThree-dimensional model-based computer vision uses geometric models of objects and sensed data to recognize objects in a scene. Likewise, Computer Aided Geometric Design (CAGD) systems are used to interactively generate three-dimensional models during the design process. Despite this similarity, the...Computer Aided Geometric Design (CAGD); CAD-based vision; Model based vision; Strategy trees; Geometric knowledge representation; Automatic feature selection1987
354 Hansen, Charles D.CAGD-based computer visionAbstract-Three-dimensional model-based computer vision uses geometric models of objects and sensed data to recognize objects in a scene. Likewise, computer aided geometric design (CAGD) systems are used to interactively generate three-dimensional models during the design process. Despite this simil...1989-11
355 Henderson, Thomas C.CAGD-based computer visionThree-dimensional model-based computer vision uses geometric models of objects and sensed data to recognize objects in a scene. Likewise, Computer Aided Geometric Design (CAGD) systems are used to interactively generate three-dimensional models during the design process. Despite this similarity, t...Computer Aided Geometric Design; CAGD1987
356 Organick, Elliott I.CASL - A language for automating the implementation of computer architecturesThe computer Architecture Specification Language (CASL), described in this paper, is intended for use by computer architects CASL is a state machine description language especially useful for describing digital systems at the "register transfer" level and designed to meet the needs of the computer a...Computer Architecture Specification Language1979
357 Lindstrom, Gary E.Combinator evaluation of functional programs with logical variablesA technique is presented that brings logical variables into the scope of the well known Turner method for evaluating normal order functioned programs by S, K, I combinator graph reduction. This extension is illustrated by SASL+LV, an extension of Turner's language SASL in which general expressions s...Functional programs; Logical variables; SASL+LV; Turner's language1987
358 Henderson, Thomas C.Combining symbolic and numeric computation on the CRAYIt is now widely accepted that the CRAY supercomputers are very useful for large numeric applications, e.g., Finite Element Analysis, Fluid Dynamics, Image Processing, etc. Much work has been done to make them run efficiently on the CRAY. There has also been some effort to do symbolic computing (Al ...CRAY supercomputers; Symbolic computation; Numeric computation1986
359 Riesenfeld, Richard F.Discrete B-splines and subdivision techniques in compter-aided geometric design and computer graphicsThe relevant theory of discrete 5-sphnes with associated new algorithms is extended to provide a framework for understanding and implementing general subdivision schemes for nonuniform B-splines. The new derived polygon corresponding to an arbitrary refinement of the knot vector for an existing .B-...1979
360 Evans, JohnDPOS programming manualThis manual describes the basic concepts of the DPOS Metalanguage and the programming language DPOS Scheme.DPOS; Programming manual1990
361 Regehr, JohnDynamic CPU management for real-time, middleware-based systemsMany real-world distributed, real-time, embedded (DRE) systems, such as multi-agent military applications, are built using commercially available operating systems, middleware, and collections of pre-existing software. The complexity of these systems makes it difficult to ensure that they maintain h...2004-01-01
362 Orr, Douglas B.Dynamic program monitoring and transformation using the OMOS object serverIn traditional monolithic operating systems the constraints of working within the kernel have limited the sophistication of the schemes used to manage executable program images. By implementing an executable image loader as a persistent user-space program, we can extend system program loading capabi...Program monitoring; Object/Meta-Object Server; OMOS1992
363 Gopalakrishnan, GaneshEfficient symbolic simulation based verification using the parametric form of boolean expressions (rev.)We present several new techniques to make symbolic simulation based verification efficient. These techniques hinge on the use of the parametric form of a boolean expression (e.g. the parametric form for the boolean expression XQ V -<xi is the equivalent expression 3a b . (XQ = a V 6) A (xi = b), whe...Symbolic simulation; Verification1991
364 Lindstrom, Gary E.ETYMA: a framework for modular systemsModularity, i.e. support for the flexible construction, adaptation, and combination of units of software, is an important goal in many systems. In most cases, however, systems achieve only a few aspects of modularity. The problem can be traced to the inflexibility, or the limited view of modularity ...ETYMA; Modularity; Modular systems1994
365 Kuramkote, Ravindra; Carter, JohnExploring the value of supporting multiple DSM protocols in Hardware DSM ControllersThe performance of a hardware distributed shared memory (DSM) system is largely dependent on its architect's ability to reduce the number of remote memory misses that occur. Previous attempts to solve this problem have included measures such as supporting both the CC-NUMA and S-COMA architectures is...DSM; Controllers1999
366 Shirley, Peter S.; Thompson, William B.Expressive rendering of mountainous terrainPainters and cartographers have developed artistic landscape rendering techniques for centuries. Such renderings can visualize complex three-dimensional landscapes in a pleasing and understandable way. In this work we examine a particular type of artistic depiction, panorama maps, in terms of fun...panorama maps; Non-photorealistic rendering; Terrain; Texture synthesis2007
367 Lindstrom, Gary E.Fast and accurate NN approach for multi-event annotation of time seriesSimilarity search in time-series subsequences is an important time series data mining task. Searching in time series subsequences for matches for a set of shapes is an extension of this task and is equally important. In this work we propose a simple but efficient approach for finding matches for a g...Time-series subsequences; Nearest neighbor approach; Multi-event2003
368 Tasdizen, Tolga; Whitaker, Ross T.Geometric surface processing via normal mapsThe generalization of signal and image processing to surfaces entails filtering the normals of the surface, rather than filtering the positions of points on a mesh. Using a variational framework, smooth surfaces minimize the norm of the derivative of the surface normals? i.e. total curvature. Pen...Geometric surface processing; Surface models2002-01-17
369 Baker, Jason; Hsieh, Wilson C.Maya: multiple-dispatch syntax extension in JavaWe have designed and implemented Maya, a version of Java that allows programmers to extend and reinterpret its syntax. Maya generalizes macro systems by treating grammar productions as generic functions, and semantic actions on productions as multimethods on the corresponding generic functions. P...Maya; Syntax extension2001-12-11
370 Gopalakrishnan, Ganesh; Henderson, Thomas C.Modeling and verification of distributed control scheme for mobile robotsIn this report we present a sensor-based distributed control scheme for mobile robots. This scheme combines centralized and decentralized control strategies. Each group of sensors is considered to be a process that performs sensing and carries out local control tasks as well. Besides these processes...Distributed control scheme; Sensor-based1995
371 Lindstrom, Gary E.Modular language processors as framework completionsThe conceptual and specificational power of denotational semantics for programming language design has been amply demonstrated. We report here on a language implementation method that is similarly semantically motivated, but is based upon object-oriented design principles, and results in flexible an...Modular language processors; Denotational semantics; Framework completions1993
372 Lindstrom, Gary E.Modules as values in a persistent object storeWe report on an object manager (OM) providing persistent implementations for C ++ classes. Our OM generalizes this problem to that of managing persistent modules, where the module concept is an abstract data type (ADT). This approach permits a powerful suite of module manipulation operations to be ...Object manager; OM; Persistent object store1993
373 Richardson, William F.; Brunvand, Erik L.The NSR processor prototypeThe NSR (Non-Synchronous RISC) processor is a general purpose processor structured as a collection of self-timed units that operate concurrently and communicate over bundled data channels in the style of micropipelines. These units correspond to standard synchronous pipeline stages such as Instructi...Self-timed Systems; Asynchronous systems; Micropipelines; FPGAs; RISC processor; NSR1992
374 Lindstrom, Gary E.Object-oriented programming in scheme with first-class modules and operator-based inheritanceWe characterize object-oriented programming as structuring and manipulating a uniform space of first-class values representing modules, a distillation of the notion of classes. Operators over modules individually achieve effects such as encapsulation, sharing, and static binding. A variety of idioms...First-class modules; Operator-based inheritance1995
375 Gopalakrishnan, GaneshPeephole optimization of asynchronous networks through process composition and burst-mode machine generationIn this paper, we discuss the problem of improving the efficiency of macromodule networks generated through asynchronous high level synthesis. We compose the behaviors of the modules in the sub-network being optimized using Dill's trace-theoretic operators to get a single behavioral description for ...Peephole optimization; Macromodule networks; Process composition; Burst-mode1993
351 - 375 of 561