76 - 100 of 957
Number of results to display per page
CreatorTitleDescriptionSubjectDate
76 Pascucci, ValerioFlow visualization with quantified spatial and temporal errors using edge mapsRobust analysis of vector fields has been established as an important tool for deriving insights from the complex systems these fields model. Traditional analysis and visualization techniques rely primarily on computing streamlines through numerical integration. The inherent numerical errors of such...2012-01-01
77 Hansen, Charles D.FluoRender: An application of 2D image space methods for 3D and 4D confocal microscopy data visualization in neurobiology research2D image space methods are processing methods applied after the volumetric data are projected and rendered into the 2D image space, such as 2D filtering, tone mapping and compositing. In the application domain of volume visualization, most 2D image space methods can be carried out more efficiently t...2012-01-01
78 Silva, Claudio T.ISP: An optimal out-of-core image-set processing streaming architecture for parallel heterogeneous systemsImage population analysis is the class of statistical methods that plays a central role in understanding the development, evolution, and disease of a population. However, these techniques often require excessive computational power and memory that are compounded with a large number of volumetric inp...2012-01-01
79 Hibler, Michael J.Isolation of malicious external inputs in a security focused adaptive execution environmentReliable isolation of malicious application inputs is necessary for preventing the future success of an observed novel attack after the initial incident. In this paper we describe, measure and analyze, Input-Reduction, a technique that can quickly isolate malicious external inputs that embody unfore...2013-01-01
80 Regehr, JohnIssues in using commodity operating systems for time-dependent tasks: experiences from a study of windows NTThis paper presents a snapshot of early results from a study of Windows NT aimed at understanding and improving its limitations when used for time-dependent tasks, such as those that arise for audio and video processing. Clearly there are time scales for which it can achieve effectively perfect reli...1998-01-01
81 Gopalakrishnan, GaneshHigh level optimizations in compiling process descriptions to asynchronous circuitsAsynchronous/'Self-Timed designs are beginning to attract attention as promising means of dealing with the complexity of modern VLSI technology. In this paper, we present our views on why asynchronous systems matter. We then present details of our high level synthesis tool SHILPA that can automatic...Self-timed; VLSI1992
82 Gopalakrishnan, GaneshA general compositional approach to verifying hierarchical cache coherence protocolsModern chip multiprocessor (CMP) cache coherence protocols are extremely complex and error prone to design. Modern symbolic methods are unable to provide much leverage for this class of examples. In [1], we presented a method to verify hierarchical and inclusive versions of these protocols using ...Hierarchical cache coherence protocols; Verification2006-11-26
83 Bennion, Scott ThomasA method of solution for hydrodynamics and radiation diffusion as a multi-material problem in one dimensionMulti-material problem1971
84 Chatterjee, Niladrish; Balasubramonian, Rajeev; Davis, Alan L.Rethinking DRAM design and organization for energy-constrained multicoresDRAM vendors have traditionally optimized for low cost and high performance, often making design decisions that incur energy penalties. For example, a single conventional DRAM access activates thousands of bitlines in many chips, to return a single cache line to the CPU. The other bits may be access...DRAM power consumption; Data-center power; Multicore memory; Trapeze Interactive Poster2010-03-15
85 Sobh, Tarek M.; Henderson, Thomas C.URK: Utah robot kit - a three-link robot prototypeIn this paper we will present the stages of designing and building a three-link robot manipulator prototype that was built as part of a research project for establishing a prototyping environment for robot manipulators. Building this robot enabled us determine the required subsystems and interfaces ...URK; Utah robot kit; robot manipulator prototype; prototyping environment; robot manipulators; three-link1994
86 Stark, Michael M.; Martin, William; Cohen, Elaine; Lyche, Tom; Riesenfeld, Richard F.B-splines for physically-based renderingAlthough B-spline curves and surfaces have enjoyed a long established place in the graphics community as constructive modeling tools, the use of B-spline approximation techniques has received relatively little attention in rendering. In this work we explore the use of 4D and 5D tensor product B-s...B-spline curves; Rendering algorithms2002-01-09
87 Sobh, Tarek M.; Henderson, Thomas C.A dynamic recursive structure for intelligent inspectionWe suggest a new approach for inspection and reverse engineering applications. In particular we investigate the use of discrete event dynamic systems DEDS to guide and control the active exploration and sensing of mechanical parts for industrial inspection and reverse engineering?? We introduce...Intelligent inspection; Discrete event dynamic systems; DEDS; Industrial inspection; Dynamic recursive structure1992
88 Richardson, William F.; Brunvand, Erik L.The NSR processor prototypeThe NSR (Non-Synchronous RISC) processor is a general purpose processor structured as a collection of self-timed units that operate concurrently and communicate over bundled data channels in the style of micropipelines. These units correspond to standard synchronous pipeline stages such as Instructi...Self-timed Systems; Asynchronous systems; Micropipelines; FPGAs; RISC processor; NSR1992
89 Boll, Steven F.; Done, William JohnNoise suppression methods for robust speech processing (1 Oct. 1978- 31 Mar. 1981)Robust speech processing in practical operating environments requires effective environmental and processor noise suppression. This report describes the technical findings and accomplishments during this reporting period for period for research program funded to develop real time, compressed speech ...Noise suppression; Compressed speech analysis-synthesis algorithms; Signal contamination1978
90 Carter, John B.Reducing consistency traffic and cache misses in the avalanche multiprocessorFor a parallel architecture to scale effectively, communication latency between processors must be avoided. We have found that the source of a large number of avoidable cache misses is the use of hardwired write-invalidate coherency protocols, which often exhibit high cache miss rates due to exces...Consistency traffic; Cache misses; Parallel architecture; Communication latency1995
91 Henderson, Thomas C.Multisensor knowledge systems: interpreting 3-D structureWe describe an approach which facilitates and makes explicit the organization of the knowledge necessary to map multisensor system requirements onto an appropriate assembly of algorithms, processors, sensors, and actuators. We have previously introduced the Multisensor Kernel System and Logical Sens...Multisensors; Knowledge systems; 3-D structure; Logical Sensors1987
92 Akella, VenkateshhopCP: language definition, semantics and examplesWe describe a formalism for high level modeling of hardware based on flow graphs and nonatomic actions called hopCP. A module is the description of a hardware system in hopCP, which contains a flow graph to model the behavioral aspects and ports which represent the communication links. Operations ar...hopCP1990
93 Gopalakrishnan, GaneshEfficient symbolic simulation based verification using the parametric form of boolean expressions (rev.)We present several new techniques to make symbolic simulation based verification efficient. These techniques hinge on the use of the parametric form of a boolean expression (e.g. the parametric form for the boolean expression XQ V -<xi is the equivalent expression 3a b . (XQ = a V 6) A (xi = b), whe...Symbolic simulation; Verification1991
94 Cohen, ElaineMinimum distance queries for polygonal and parametric modelsCalculation of the minimum distance to a geometric object or the minimum separation between objects is a fundamental problem that has application in a variety of arenas. Minimum separation queries for sculptured surfaces are believed particularly difficult, yet are increasingly important as modeli...Minimum separation; Minimum distance; Virtual prototyping1997
95 Organick, Elliott I.Characteristics of a functional programming languageA programming language kernel is presented where an algorithm is a function defined through a functional expression. The only data structure introduced is an object that may be an atom or a sequence of objects. A number of functional forms are defined, with a notation close to ordinary mathematical ...1980
96 Parker, Steven G.; Hansen, Charles D.Distributed interactive ray tracing for large volume visualizationWe have constructed a distributed parallel ray tracing system that interactively produces isosurface renderings from large data sets on a cluster of commodity PCs. The program was derived from the SCI Institute's interactive ray tracer (*-Ray), which utilizes small to large shared memory platforms, ...Ray tracing; Volume rendering; Large data; Cluster computing; Distributed shared memory2003
97 Regehr, John; Eide, Eric NormanMemory safety and untrusted extensions for TinyOSSensor network applications should be reliable. However, TinyOS, the dominant sensor net OS, lacks basic building blocks for reliable software systems: memory protection, isolation, and safe termination. These features are typically found in general-purpose operating systems but are believed to b...TinyOS2006-06-30
98 Hansen, Charles D.; Whitaker, Ross T.Interactive deformation and visualization of level set surfaces using graphics hardwareDeformable isosurfaces, implemented with level-set methods, have demonstrated a great potential in visualization for applications such as segmentation, surface processing, and surface reconstruction. Their usefulness has been limited, however, by their high computational cost and and reliance on sig...Deformation; Level sets; Deformable models; Image segmentation; Volume visualization; GPU; Streaming computation; Isosurfaces2003
99 Johnson, Robert R.Patterns of patternsPurpose of this Poster is to demonstrate that it takes the patterns of values in all the many dimensions to place each patient in the final patterns shown in each of the 5 charts. The final patterns determine the ability of each technology to identify or distinguish patients in each class. It is p...Gene patterns; Colon cancer; Trapeze Interactive poster2010-03-15
100 Kasera, Sneha K.; Patwari, NealMobility Assisted Secret Key GenerationSignature Based Key Generation. Wireless link signature; multiple paths caused by radio waves; their measurements are good signatures of links; link signatures measured almost symmetrically at two ends of wireless link, but cannot be measured from another location; use for secret key establishment;...
76 - 100 of 957