276 - 300 of 588
Number of results to display per page
CreatorTitleDescriptionSubjectDate
276 Shirley, Peter S.; Gooch, BruceArtistic vision: painterly rendering using computer vision techniquesWe present a method that takes a raster image as input and produces a painting-like image composed of strokes rather than pixels. Unlike previous automatic painting methods, we attempt to keep the number of brush-stroke small. This is accomplished by first segmenting the image into features, finding...Painting-like image; Raster image; Painterly rendering2000
277 Carter, John; Susarla, Sai R.Khazana An infrastructure for building distributed servicesEssentially all distributed systems?? applications?? and services at some level boil down to the problem of man aging distributed shared state Unfortunately?? while the problem of managing distributed shared state is shared by many applications?? there is no common means of managing the data ...Khazana; Distributed shared state1998
278 Sobh, Tarek M.A graphical environment and applications for discrete event and hybrid systems in robotics and automationIn this paper we present an overview for the development of a graphical environment for simulating, analyzing, synthesizing, monitoring, and controlling complex discrete event and hybrid systems within the robotics, automation, and intelligent system domain. We start by presenting an overview of di...Intelligent system domain; Graphical environment1994
279 Regehr, John; Eide, Eric NormanMemory safety and untrusted extensions for TinyOSSensor network applications should be reliable. However, TinyOS, the dominant sensor net OS, lacks basic building blocks for reliable software systems: memory protection, isolation, and safe termination. These features are typically found in general-purpose operating systems but are believed to b...TinyOS2006-06-30
280 Susarla, Sai R.; Carter, JohnMiddleware support for locality-aware wide area replicationCoherent wide-area data caching can improve the scalability and responsiveness of distributed services such as wide-area file access, database and directory services, and content distribution. However, distributed services differ widely in the frequency of read/write sharing, the amount of conten...Wide-area data caching; Distributed services2004-11-18
281 Thompson, Cynthia A.A personalized system for conversational recommendationsIncreased computing power and theWeb have made information widely accessible. In turn, this has encouraged the development of recommendation systems that help users find items of interest, such as books or restaurants. Such systems are more useful when they personalize themselves to each user?s p...Adaptive Place Advisor; Recommendation systems2002-06-26
282 Riesenfeld, Richard F.Computer aided designThe report is based on the proposal submitted to the National Science Foundation in September 1981, as part of the Coordinated Experimental Computer Science Research Program. The sections covering the budget and biographical data on the senior research personnel have not been included. Also, the sec...1984
283 Cohen, ElaineAdaptive isocurves based rendering for freeform surfacesFreeform surface rendering is traditionally performed by approximating the surface with polygons and then rendering the polygons. This approach is extremely common because of the complexity in accurately rendering the surfaces directly. Recently, several papers presented methods to render surfaces ...Freeform surface rendering; Isocurves1992
284 Cohen, ElaineConstant scallop height tool path generationAn approach for the automatic generation of constant scallop height tool paths is presented. An example is shown generated from a B-spline model, although it can be used with many types of sculptured surfaces. The approach utilizes surface subdivision techniques and a new algorithm for tool path gen...Scallop height; Tool path generation; B-spline model1989
285 Morelli, RobertFormal aspects of anonymityWe present a formal definition of anonymity in the context of concurrent processes. The definition is given in category theoretic terms. Moreover, the concept of a split cofibration is shown to both simplify the analysis of anonymity as well as to increase the framework's expressiveness. Because ...Anonymity; Concurrent processes2002-01-15
286 Baker, Jason; Hsieh, Wilson C.Runtime aspect weaving through metaprogrammingWe describe an extension to the Java language, Handi-Wrap, that supports weaving aspects into code at runtime. Aspects in Handi-Wrap take the form of method wrappers, which allow aspect code to be inserted around method bodies like advice in AspectJ. Handi- Wrap offers several advantages over sta...Metaprogramming; Runtime; Handi-Wrap2001
287 Gopalakrishnan, GaneshThe 'Test model-checking' approach to the verification of formal memory models of multiprocessorsWe offer a solution to the problem of verifying formal memory models of processors by combining the strengths of model-checking and a formal testing procedure for parallel machines. We characterize the formal basis for abstracting the tests into test automata and associated memory rule safety proper...Test Model-checking; Formal memory; Verification1998
288 Brunvand, Erik L.A cell set for self-timed design using actel FPGAsAsynchronous or self-timed systems that do not rely on a global clock to keep system components synchronized can offer significant advantages over traditional clocked circuits in a variety of applications. However, these systems require that suitable self-timed circuit primitives are available for b...Self-timed systems; Actel field programmable gate arrays; FPGA1991
289 Brunvand, Erik L.A comparison of modular self-timed design stylesState-machine sequencing methods in modular 2-phase and 4-phase asynchronous handshake control are compared. Design styles are discussed, and the sequencers are tested against each other using a medium-scale minicomputer test design implemented in FPGAs. Seven 4-phase sequencers are tested. In these...Self-timed; State-machine sequencing; Asynchronous handshake control1995
290 Keller, Robert M.Denotational models for parallel programs with indeterminate operatorsSeveral approaches to networks of concurrently-operating modules involving indeterminacy are discussed. Techniques for representing the denotational semantics of such networks, and for verifying properties of them, are presented, including an oracle approach, an axiomatic approach, a data-type reduc...Denotational models; Indeterminate operators1977
291 Gopalakrishnan, GaneshDeriving efficient cache coherence protocols through refinementWe address the problem of developing efficient cache coherence protocols for use in distributed systems implementing distributed shared memory (DSM) using message passing. A serious drawback of traditional approaches to this problem is that the users are required to state the desired coherence prot...Cache coherence protocols; DSM; Message passing1997
292 Henderson, Thomas C.Multisensor knowledge systems: interpreting 3-D structureWe describe an approach which facilitates and makes explicit the organization of the knowledge necessary to map multisensor system requirements onto an appropriate assembly of algorithms, processors, sensors, and actuators. We have previously introduced the Multisensor Kernel System and Logical Sens...Multisensors; Knowledge systems; 3-D structure; Logical Sensors1987
293 Gopalakrishnan, GaneshPerformance studies of PV: an On-the-fly model-checker for LTL-X featuring selective caching and partial order reductionWe present an enumerative model-checker PV that uses a new partial order reduction algorithm called Twophase. This algorithm does not use the in-stack check to implement the proviso, making the combination of Twophase with on-the-fly LTL-X model-checking based on nested depth-first search, as well a...Model-checker; PV; Performance; On-the-fly; Partial order reduction algorithm;' Twophase2001
294 Keller, Robert M.Rediflow architecture prospectusRediflow is intended as a multi-function (symbolic and numeric) multiprocessor, demonstrating techniques for achieving speedup for Lisp-coded problems through the use of advanced programming concepts, high-speed communication, and dynamic load-distribution, in a manner suitable for scaling to upward...Rediflow; Multi-function multiprocessors; Lisp-coded problems1985
295 Lindstrom, Gary E.Abstract semantics for functional constraint programmingA denotational semantics is given for a lazy functional language with monotonic side-effects arising from the unification of singly-bound logical variables. The semantics is based on a Scott-style information system, which elegantly captures the notion of "constraint additin" inherent in unificati...Abstract semantics1989
296 Gopalakrishnan, GaneshAsynchronous circuit verification using trace theory and CCSWe investigate asynchronous circuit verification using Dill's trace theory as well as Milner's CCS (as mechanized by the Concurrency Workbench). Trace theory is a formalism specifically designed for asynchronous circuit specification and verification. CCS is a general purpose calculus of communicat...Trace theory; Verification; CCS1992
297 Weinstein, DavidCache-rings for memory efficient isosurface constructionProcessor speeds continue to increase at faster rates than memory speeds. As this performance gap widens, it becomes increasingly important to develop "memory-conscious" algorithms - programs that still optimize instruction count and algorithmic complexity, but that also integrate optimizations for ...Processor speeds; Memory speeds; Computer memory; Cache-rings1997
298 Smith, Kent F.Simppl user's guideThis work was supported in part by Defense Research Projects Agency under Contract Number DAAK1184K0017. All opinions, findings, conclusions or recommendations expressed in this document are those of the author(s) and do not necessarily reflect the view of DARPA.SIMPPL; User guide1986
299 Evans, DavidGraphical man/machine communications: December 1972The object of the graphical man/machine communication effort is the development of computers and computing techniques the people may use interactively in real time to extend their problem-solving capability, and to work cooperatively by means of improved communications via computer. This report summ...Waveform processing; Symbolic computation; Man/machine communications1972-12
300 Gopalakrishnan, Ganesh; Kirby, Robert Michael IIRuntime model checking of multithreaded C/C++ programsWe present inspect, a tool for model checking safety prop- erties of multithreaded C/C++ programs where threads in- teract through shared variables and synchronization primi- tives. The given program is mechanically transformed into an instrumented version that yields control to a centralized s...Dynamic partial order reduction; Multithreaded; C/C++; Runtime model checking2007
276 - 300 of 588