26 - 50 of 912
Number of results to display per page
CreatorTitleDescriptionSubjectDate
26 Gopalakrishnan, GaneshOvercoming extreme-scale reproducibility challenges through a unified, targeted, and multilevel toolsetReproducibility, the ability to repeat program executions with the same numerical result or code behavior, is crucial for computational science and engineering applications. However, non-determinism in concurrency scheduling often hampers achieving this ability on high performance computing (HPC) sy...2013-01-01
27 Balasubramonian, RajeevQuantifying the relationship between the power delivery network and architectural policies in a 3D-stacked memory deviceMany of the pins on a modern chip are used for power delivery. If fewer pins were used to supply the same current, the wires and pins used for power delivery would have to carry larger currents over longer distances. This results in an "IR-drop" problem, where some of the voltage is dropped across t...2013-01-01
28 Berzins, MartinRadiation modeling using the Uintah heterogeneous CPU/GPU runtime systemThe Uintah Computational Framework was developed to provide an environment for solving fluid-structure interaction problems on structured adaptive grids on large-scale, long-running, data-intensive problems. Uintah uses a combination of fluid-flow solvers and particle-based methods for solids, toget...2012-01-01
29 Regehr, JohnRandom testing of interrupt-driven softwareInterrupt-driven embedded software is hard to thoroughly test since it usually contains a very large number of executable paths. Developers can test more of these paths using random interrupt testing-firing random interrupt handlers at random times. Unfortunately, na¨ıve application of random test...2005-01-01
30 Henderson, Thomas C.Received signal strength based bearing-only robot navigation in a sensor network fieldThis paper presents a low-complexity, novel approach to wireless sensor network (WSN) assisted autonomous mobile robot (AMR) navigation. The goal is to have an AMR navigate to a target location using only the information inherent to WSNs, i.e., topology of the WSN and received signal strength (RSS) ...2014-01-01
31 Venkatasubramanian, SureshSensor network localization for moving sensorsSensor network localization (SNL) is the problem of determining the locations of the sensors given sparse and usually noisy inter-communication distances among them. In this work we propose an iterative algorithm named PLACEMENT to solve the SNL problem. This iterative algorithm requires an initial ...2012-01-01
32 Regehr, JohnThread verification vs. interrupt verificationInterrupts are superficially similar to threads, but there are subtle semantic differences between the two abstractions. This paper compares and contrasts threads and interrupts from the point of view of verifying the absence of race conditions. We identify a small set of extensions that permit thre...2006-01-01
33 Gopalakrishnan, GaneshTowards providing low-overhead data race detection for large OpenMP applicationsNeither static nor dynamic data race detection methods, by themselves, have proven to be sufficient for large HPC applications, as they often result in high runtime overheads and/or low race-checking accuracy. While combined static and dynamic approaches can fare better, creating such combinations, ...2014-01-01
34 Hansen, Charles D.Transfer function design based on user selected samples for intuitive multivariate volume explorationMultivariate volumetric datasets are important to both science and medicine. We propose a transfer function (TF) design approach based on user selected samples in the spatial domain to make multivariate volumetric data visualization more accessible for domain users. Specifically, the user starts the...2013-01-01
35 Venkatasubramanian, SureshTrack estimation using link line crossing information in wireless networksDevice-free or non-cooperative localization uses the changes in signal strength measured on links in a wireless network to estimate a person's position in the network area. Existing methods provide an instantaneous coordinate estimate via radio tomographic imaging or location fingerprinting. In this...2013-01-01
36 Regehr, JohnTwo case studies in predictable application scheduling using Rialto/NTThis paper analyzes the results of two case studies in applying the Rialto/NT scheduler to real Windows 2000 applications. The first study is of a soft modem-a modem whose signal processing work is performed on the host CPU, rather than on a dedicated signal processing chip. The second is of an audi...2001-01-01
37 Berzins, MartinUintah hybrid task-based parallelism algorithmAbstract-Uintah is a software framework that provides an environment for solving large-scale science and engineering problems involving the solution of partial differential equations. Uintah uses a combination of fluid-flow solvers and particle-based methods for solids, together with adaptive meshin...2012-01-01
38 Balasubramonian, RajeevUnderstanding the impact of 3D stacked layouts on ILP3D die-stacked chips can alleviate the penalties imposed by long wires within micro-processor circuits. Many recent studies have attempted to partition each microprocessor structure across three dimensions to reduce their access times. In this paper, we implement each microprocessor structure on a s...2007-01-01
39 Regehr, JohnUnderstanding integer overflow in C/C++Integer overflow bugs in C and C++ programs are difficult to track down and may lead to fatal errors or exploitable vulnerabilities. Although a number of tools for finding these bugs exist, the situation is complicated because not all overflows are bugs. Better tools need to be constructed-but a tho...2012-01-01
40 Pascucci, ValerioVisualizing network traffic to understand the performance of massively parallel simulationsThe performance of massively parallel applications is often heavily impacted by the cost of communication among compute nodes. However, determining how to best use the network is a formidable task, made challenging by the ever increasing size and complexity of modern supercomputers. This paper appli...2012-01-01
41 Regehr, JohnVolatiles are miscompiled, and what to do about itC's volatile qualifier is intended to provide a reliable link between operations at the source-code level and operations at the memory-system level. We tested thirteen production-quality C compilers and, for each, found situations in which the compiler generated incorrect code for accessing volatile...2008-01-01
42 Kasera, Sneha K.Violating privacy through walls by passive monitoring of radio windowsWe investigate the ability of an attacker to passively use an otherwise secure wireless network to detect moving people through walls. We call this attack on privacy of people a "monitoring radio windows" (MRW) attack. We design and implement the MRW attack methodology to reliably detect when a pers...2014-01-01
43 Gopalakrishnan, GaneshVisual analysis of uncertainties in ocean forecasts for planning and operation of off-shore structuresWe present a novel integrated visualization system that enables interactive visual analysis of ensemble simulations used in ocean forecasting, i.e, simulations of sea surface elevation. Our system enables the interactive planning of both the placement and operation of off-shore structures. We illust...2013-01-01
44 Cohen, ElaineVolume rendering with multidimensional peak findingPeak finding provides more accurate classification for direct volume rendering by sampling directly at local maxima in a transfer function, allowing for better reproduction of high-frequency features. However, the 1D peak finding technique does not extend to higherdimensional classification. In this...2012-01-01
45 Wan, YongInteractive extraction of neural structures with user-guided morphological diffusionExtracting neural structures with their fine details fromconfocal volumes is essential to quantitative analysis in neurobiology research. Despite the abundance of various segmentation methods and tools, for complex neural structures, both manual and semi-automatic methods are ineffective either in f...2012-01-01
46 Hansen, Charles D.Interactive rendering and efficient querying for large multivariate seismic volumes on consumer level PCsWe present a volume visualization method that allows interactive rendering and efficient querying of large multivariate seismic volume data on consumer level PCs. The volume rendering pipeline utilizes a virtual memory structure that supports out-of-core mul- tivariate multi-resolution data and a GP...2013-01-01
47 Pascucci, ValerioMapping applications with collectives over sub-communicators on torus networksThe placement of tasks in a parallel application on specific nodes of a supercomputer can significantly impact performance. Traditionally, this task mapping has focused on reducing the distance between communicating tasks on the physical network. This minimizes the number of hops that point-to-point...2012-01-01
48 Kirby, Robert Michael IIElVis: A system for the accurate and interactive visualization of high-order finite element solutionsThis paper presents the Element Visualizer (ElVis), a new, open-source scientific visualization system for use with high order finite element solutions to PDEs in three dimensions. This system is designed to minimize visualization errors of these types of fields by querying the underlying finite ele...2012-01-01
49 Regehr, JohnEfficient memory safety for TinyOSReliable sensor network software is difficult to create: applications are concurrent and distributed, hardware-based memory protection is unavailable, and severe resource constraints necessitate the use of unsafe, low-level languages. Our work improves this situation by providing efficient memory an...2007-01-01
50 Regehr, JohnEliminating the call stack to save RAMMost programming languages support a call stack in the programming model and also in the runtime system.We show that for applications targeting low-power embedded microcontrollers (MCUs), RAM usage can be significantly decreased by partially or completely eliminating the runtime callstack. We presen...2009-01-01
26 - 50 of 912