176 - 200 of 561
Number of results to display per page
CreatorTitleDescriptionSubjectDate
176 Lindstrom, Gary E.Using a functional language and graph reduction to program multiprocessor machines or functional control of imperative programsThis paper describes an effective means for programming shared memory multiprocessors whereby a set of sequential activities are linked together for execution in parallel. The glue for this linkage is provided by a functional language implemented via graph reduction and demand evaluation. The full ...shared memory multiprocessors; Programming; functional language; graph reduction; Demand evaluation1991
177 Van Uitert, Robert; Weinstein, David; Johnson, Christopher R.Volume currents in forward and inverse MEG simulations using realistic head modelsMany magnetoencephalography (MEG) forward and inverse simulation models employ spheres, a singular shape which does not require consideration of volume currents. With more realistic, inhomogenous, anisotropic, non-spherical head models, volume currents cannot be ignored. We verify the accuracy of ...Forward MEG, Inverse MEG, Source localization, Volume currents, Finite element method2001
178 Seeley, DonnA tour of the wormOn the evening of November 2, 1988, a self-replicating program was released upon the Internet 1. This program (a worm) invaded VAX and Sun-3 computers running versions of Berkeley UNIX, and used their sources to attack still more computers2. Within the space of hours this program had spread aacross ...Computer worm1989
179 Mecklenburg, RobertA dossier driven persistent objects facilityWe describe the design and implementation of a persistent object storage facility based on a dossier driven approach. Objects are characterized by dossiers which describe both their language defined and "extra-linguistic" properties. These dossiers are generated by a C+-f- preprocessor in concert ...Persistent object storage facility; Dossier driven1994
180 Cohen, ElaineAdaptive isocurves based rendering for freeform surfacesFreeform surface rendering is traditionally performed by approximating the surface with polygons and then rendering the polygons This approach is extremely common because of the complexity in accurately rendering the surfaces directly Recently?? several papers presented methods to render surface...Freeform surface rendering; Isocurves1992
181 Tasdizen, Tolga; Whitaker, Ross T.Anisotropic diffusion of surface normals for feature preserving surface reconstructionFor 3D surface reconstruction problems with noisy and incomplete range data measure d from complex scenes with arbitrary topologies, a low-level representation, such as level set surfaces, is used. Such surface reconstruction is typically accomplished by minimizing a weighted sum of data-model discr...2003
182 Tasdizen, Tolga; Whitaker, Ross T.Anisotropic diffusion of surface normals for feature preserving surface reconstructionFor 3D surface reconstruction problems with noisy and incomplete range data measured from complex scenes with arbitrary topologies, a low-level representation, such as level set surfaces, is used. Such surface reconstruction is typically accomplished by minimizing a weighted sum of data-model discre...2003
183 Lindstrom, Gary E.Backtracking in generalized control settingsBacktracking is a powerful conceptual and practical technique in programming. However, its application in general has been limited to global control over recursive programs. In this paper we explore through several examples the coherence and utility of applying backtracking in more general control s...Backtracking1977
184 Gopalakrishnan, GaneshCase studies in symbolic model checkingThe need to formally verify hardware and software systems before they are deployed the real world has been recognized for several decades now. This is especially true of concurrent systems that are even more difficult to debug than sequential systems. For example, many of the protocols that get emp...Symbolic model checking; Hardware verification; Software verification1994
185 Gopalakrishnan, GaneshDecomposing the proof of correctness of pipelined microprocessorsWe present a systematic approach to decompose and incrementally build the proof of correctness of pipelined microprocessors. The central idea is to construct the abstraction function using completion functions, one per unfinished instruction, each of which specify the effect (on the observables) of ...Pipelined microprocessors; Proof of correctness1998
186 Gopalakrishnan, GaneshDynamic reordering of high latency transactions in time-warp simulation using a modified micropipelineTime warp based simulation of discrete-event systems is an efficient way to overcome the synchronization overhead during distributed simulation. As computations may proceed beyond synchronization barriers in time warp, multiple checkpoints of state need to be maintained to be able to rollback inva...Asynchronous design; Micropipelines; Dynamic instruction reordering; Time warp simulations1992
187 Kopta, Daniel M.; Kensler, Andrew Erin; Spjut, Josef Bo; Brunvand, Erik L.; Davis, AlFast, effective BVH updates for dynamic ray-traced scenes using tree rotationsBounding volume hierarchies are a popular choice for ray tracing animated scenes due to the relative simplicity of refitting bounding volumes around moving geometry. However, the quality of such a refitted tree can degrade rapidly if objects in the scene deform or rearrange significantly as the ...Ray tracing; Acceleration structures; Bounding volume hierarchies; Tree rotations; Dynamic scenes; Parallel update2011
188 Thompson, William B.Feature-based reverse engineering of mechanical partsReverse engineering of mechanical parts requires extraction of information about an instance of a particular part sufficient to replicate the part using appropriate manufacturing techniques. This is important in a wide variety of situations, since functioning CAD models are often unavailable or unus...Mechanical parts1995
189 Chatterjee, Prosenjit; Gopalakrishnan, GaneshFormally specifying memory consistency models and automatically generating executable specificationsMemory ordering properties of shared memory multiprocessors are more subtle and less well understood than cache coherence. These properties tend to be processor or platform specific and are not always formally specified. It is difficult to compare even those platforms whose memory ordering propert...Computer memory; Memory consistency models; Memory ordering; Shared memory multiprocessors2001
190 Awate, Suyash P.; Whitaker, Ross T.Higher-order image statistics for unsupervised, information-theoretic, adaptive, image filteringThe restoration of images is an important and widely studied problem in computer vision and image processing. Various image filtering strategies have been effective, but invariably make strong assumptions about the properties of the signal and/or degradation. Therefore, these methods typically la...Image filtering; Image restoration2005-04-15
191 Sikorski, ChristopherThe method of generated solutions for numerical verification of ICE codeMethod of Manufactured Solutions (MMS) is a widely used technique to verify convergence and possible coding errors in numerical algorithms. This method involves designing analytical solutions satisfying the governing equations that are solved by the numerical algorithm. The solutions investigated...Method of Manufactured Solutions; MMS; Convergence; Verification; numerical Algorithms; ICE code; Numerical verification2007
192 Henderson, Thomas C.Monte Carlo sensor networksBiswas et al. [1] introduced a probabilistic approach to inference with limited information in sensor networks. They represented the sensor network as a Bayesian network and performed approximate inference using Markov Chain Monte Carlo (MCMC). The goal is to robustly answer queries even under no...Monte Carlo sensor networks; Markov Chain Monte Carlo; MCMC2005-01-20
193 Yang, Yue; Gopalakrishnan, Ganesh; Lindstrom, Gary E.; Slind, Konrad LeeNemos: a framework for axiomatic and executable specifications of memory consistency modelsConforming to the underlying memory consistency rules is a fundamental require- ment for implementing shared memory systems and writing multiprocessor programs. In order to promote understanding and enable automated verification, it is highly desir- able that a memory model specification be both ...Nemos; Shared memory systems2003
194 Fujimoto, Richard M.On synthesizing systolic arrays from recurrence equations with linear dependenciesWe present a technique for synthesizing systolic architectures from Recurrence Equations. A class of such equations (Recurrence Equations with Linear Dependencies) is defined and and the problem of mapping such equations onto a two dimensional architecture is studied. We show that such a mapping is ...Recurrence equations1986
195 Lindstrom, Gary E.The schema coercion problemOver the past decade, the ability to incorporate data from a wide variety of sources has become increasingly important to database users. To meet this need, significant effort has been expended in automatic database schema manipulation. However, to date this effort has focused on two aspects of this...Schema coercion; Database schema manipulation; Schema integration1997
196 Fujimoto, Richard M.Systolic array synthesis by static analysis of program dependenciesWe present a technique for mapping recurrence equations to systolic arrays. While this problem has been studied in fairly great detail, the recurrence equations that are analysed here are a generalization of those studied previously. In a n earlier paper (14] we have showed how systolic arrays can b...Systolic array synthesis; static analysis; program dependencies; recurrence equations1986
197 Gopalakrishnan, GaneshTowards a verification technique for large synchronous circuitsWe present a symbolic simulation based veri cation approach which can be applied to large synchronous circuits A new technique to encode the state and input constraints as parametric Boolean expressions over the state and input variables is used to make our symbolic simulation based veri cation...symbolic simulation; verification1992
198 Gopalakrishnan, GaneshTowards a verification technique for large synchronous circuitsWe present a symbolic simulation based verification approach which can be applied to large synchronous circuits. A new technique to encode the state and input constraints as parametric Boolean expressions over the state and input variables is used to make our symbolic simulation based verification...Verification; symbolic simulation1992
199 Subrahmanyam, P.A.TRACIS: transformations on Ada for circuit synthesis a report on the methodology for a silicon compilerThis report describes in detail, the ongoing design and implementation of a transformation system, for compiling specifications of integrated circuits into silicon. There are many levels in this process, and the area that we focus on produces target specifications of asynchronous and synchronous con...TRACIS; transformation system1983
200 Lindstrom, Gary E.Type-safe composition of object modulesWe describe a facility that enables routine type-checking during the linkage of external declarations and definitions of separately compiled programs in ANSI C. The primary advantage of our server-style type-checked linkage facility is the ability to program the combination of object modules via a s...object modules; ANSI C; Type-safe; type-checking1994
176 - 200 of 561