226 - 250 of 257
Number of results to display per page
CreatorTitleDescriptionSubjectDate
226 Bruderlin, BeatDI - An object-oriented user interface toolbox for modula-2 applicationsThe DI dialog interface tool library for Modula-2 applications described in this paper facilitates the design and implementation of graphical, object-oriented user interfaces for workstations with a graphical screen, a mouse and a keyboard. Much emphasis is put on the portability of the application...DI dialog interface tool1990
227 Balasubramonian, RajeevDynamically managing the communication-parallelism trade-off in future clustered processorsClustered microarchitectures are an attractive alternative to large monolithic superscalar designs due to their potential for higher clock rates in the face of increasingly wire-delay-constrained process technologies. As increasing transistor counts allow an increase in the number of clusters, th...Clustered architectures; Microarchitecture; Decentralized cache; Interconnects2003
228 Balasubramonian, RajeevDynamically tunable memory hierarchyThe widespread use of repeaters in long wires creates the possibility of dynamically sizing regular on-chip structures. We present a tunable cache and translation lookaside buffer (TLB) hierarchy that leverages repeater insertion to dynamically trade off size for speed and power consumption on a per...Microarchitecture; High performance microprocessors; Reconfigurable architectures; Energy and performance of on-chip caches; Translation lookaside buffer (TLB); Tunable cache2003-10
229 Carter, John B.Evaluating the potential of programmable multiprocessor cache controllersThe next generation of scalable parallel systems (e.g., machines by KSR, Convex, and others) will have shared memory supported in hardware, unlike most current generation machines (e.g., offerings by Intel, nCube, and Thinking Machines). However, current shared memory architectures are constrained b...Programmable multiprocessor cache controllers; Scalable parallel systems; Shared memory1994
230 Evans, DavidGraphical man/machine communications: December 1971Semi-Annual Technical Report for period 1 June 1971 to 31 December 1971. This document includes a summary of research activities and facilities at the University of Utah under Contract F30602-70-C-0300. Information conveys important research milestones attained during this period by each of the f...Man/machine communications; Computing systems; Digital waveform processing1971-12
231 Kasera, Sneha K.; Patwari, NealHigh-rate uncorrelated bit extraction for shared secret key generation from channel measurementsSecret keys can be generated and shared between two wireless nodes by measuring and encoding radio channel characteristics without ever revealing the secret key to an eavesdropper at a third location. This paper addresses bit extraction, i.e., the extraction of secret key bits from noisy radio chan...Wireless networks; Multipath fading; Physical layer; Key generation; Secret keys; Bit extraction2010-01
232 Balasubramonian, RajeevIntegrating adaptive on-chip storage structures for reduced dynamic powerEnergy efficiency in microarchitectures has become a necessity. Significant dynamic energy savings can be realized for adaptive storage structures such as caches, issue queues, and register files by disabling unnecessary storage resources. Prior studies have analyzed individual structures and their...Microarchitecture2002
233 Berzins, MartinInvestigating applications portability with the Uintah DAG-based runtime system on PetaScale supercomputersPresent trends in high performance computing present formidable challenges for applications code using multicore nodes possibly with accelerators and/or co-processors and reduced memory while still attaining scalability. Software frameworks that execute machine-independent applications code using a ...2013-01-01
234 Zhang, LixinISIM: The simulator for the impulse adaptable memory systemThis document describes ISIM, the simulator for the Impulse Adaptable Memory System. Impulse adds two new features to a conventional memory system. First, it supports a configurable, extra level of address remapping at the memory controller. Second, it supports prefetching at the memory controller. ...ISIM; Impulse Adaptable Memory System; Memory systems1999
235 Silva, Claudio T.ISP: An optimal out-of-core image-set processing streaming architecture for parallel heterogeneous systemsImage population analysis is the class of statistical methods that plays a central role in understanding the development, evolution, and disease of a population. However, these techniques often require excessive computational power and memory that are compounded with a large number of volumetric inp...2012-01-01
236 Susarla, Sai R.; Carter, JohnKhazana: a flexible wide area data storeKhazana is a peer-to-peer data service that supports efficient sharing and aggressive caching of mutable data across the wide area while giving clients significant control over replica divergence. Previous work on wide-area replicated services focussed on at most two of the following three proper...Khazana; Peer-to-peer data service2003-10-13
237 Susarla, Sai R.; Carter, JohnMiddleware support for locality-aware wide area replicationCoherent wide-area data caching can improve the scalability and responsiveness of distributed services such as wide-area file access, database and directory services, and content distribution. However, distributed services differ widely in the frequency of read/write sharing, the amount of conten...Wide-area data caching; Distributed services2004-11-18
238 Venkatasubramanian, SureshMultiple target tracking with RF sensor networksRF sensor networks are wireless networks that can localize and track people (or targets) without needing them to carry or wear any electronic device. They use the change in the received signal strength (RSS) of the links due to the movements of people to infer their locations. In this paper, we cons...2014-01-01
239 Kasera, Sneha K.On fast and accurate detection of unauthorized wireless access points using clock skewsWe explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind using clock skews is to overcome one of the major limitations of existing solutions-the inability to effectively detect Mediu...Clock skews; Unauthorized access; Medium access control; MAC; Address spoofing; Wireless networks; Time Synchronization Function; TSF2010-03
240 Gardner, Reed M.Patient Monitoring SystemsBiomedical Informatics1990
241 Gardner, Reed M.Patient-Monitoring SystemsBiomedical Informatics2006
242 Gardner, Reed M.Patient-Monitoring SystemsBiomedical Informatics2001
243 Wen, MingPersonal, social, and ecological influences on loneliness and satisfaction among rural-to-urban migrants in Shanghai, ChinaThis study examined personal, social, and ecological influences on loneliness and satisfaction among rural-urban migrants in Shanghai, China. Data used in this study were from the Shanghai Rural-to-Urban Migrant Worker Survey conducted by the Institute of Demographic Research, Fudan University, C...Lonliness; Rural-to-urban migration; Internal migration; Shanghai, China2008-02-02
244 Balasubramonian, RajeevScalable, reliable, power-efficient communication for hardware transactional memoryIn a hardware transactional memory system with lazy versioning and lazy conflict detection, the process of transaction commit can emerge as a bottleneck. This is especially true for a large-scale distributed memory system where multiple transactions may attempt to commit simultaneously and co-ordin...Hardware; Transactional memory; Communication2008
245 Organick, Elliott I.Semiannual technical report transformation of ADA programs into silicon (1 Sept. 1981- 28 Feb. 1982)This report summarizes the first six months work of the research project, "Transformation of Ada Programs into Silicon." Our project has five main objectives: 1. Develop and document elements of a transformation methodology for converting Ada programs, or program constructs, into VLSI systems which ...ADA programs; VLSI1982
246 Kirby, Robert MichaelVerifying volume rendering using discretization error analysisWe propose an approach for verification of volume rendering correctness based on an analysis of the volume rendering integral, the basis of most DVR algorithms. With respect to the most common discretization of this continuous model (Riemann summation), we make assumptions about the impact of parame...2014-01-01
247 Riesenfeld, Richard F.; Smith, Kent F.An experimental system for computer aided geometric designThe main goal of this proposed level-of-effort project is to extend present capabilities in the area of Computer Aided Geometric Design (CAGD) and to develop custom VLSI support for some special geometric functions.Computer aided geometric design; CAGD; VLSI; Very large scale integration1984
248 Wehrli, RobertARCAID: The ARChitects computer graphics AIDARCAID?The ARChitect's Computer Graphics AID?is one part of a two-part research program at the University of Utah under the direction of David C. Evans. ARCAID is a specification for the organization of computer processes including data and procedures for the use of architects, engineers, and other...ARCAID1970
249 Sobh, Tarek M.Autonomous ObservationWe address the problem of observing an agent. We advocate a modeling approach for the visual system and its observer, where a discrete event dynamic system (DEDS) framework is developed and "events" are defined as ranges on parameter subsets. The dynamic recursive context for finite state machines (...Observation; Manipulation process1992
250 Sobh, Tarek M.Autonomous observationWe address the problem of observing an agent?? We advocate a modeling approach for the visual system and its observer where a discrete event dynamic system DEDS framework is developed and events are de ned as ranges on parameter subsets?? The dynamic recursive context for nite state machine...Autonomous observation1992
226 - 250 of 257