76 - 100 of 1,958
Number of results to display per page
CreatorTitleDescriptionSubjectDate
76 Macleod, Robert S.Sensitivity and specificity of substrate mapping: An in silico framework for the evaluation of electroanatomical substrate mapping strategiesBackground - Voltage mapping is an important tool for characterizing proarrhythmic electrophysiological substrate, yet it is subject to geometric factors that influence bipolar amplitudes and thus compromise performance. The aim of this study was to characterize the impact of catheter orientation on...2014-01-01
77 Venkatasubramanian, SureshSensor network localization for moving sensorsSensor network localization (SNL) is the problem of determining the locations of the sensors given sparse and usually noisy inter-communication distances among them. In this work we propose an iterative algorithm named PLACEMENT to solve the SNL problem. This iterative algorithm requires an initial ...2012-01-01
78 Myers, Chris J.Using decision diagrams to compactly represent the state space for explicit model checkingThe enormous number of states reachable during explicit model checking is the main bottleneck for scalability. This paper presents approaches of using decision diagrams to represent very large state space compactly and efficiently. This is possible for asynchronous systems as two system states conne...2012-01-01
79 Khan, Faisal HabibUse of spread spectrum time domain reflectometry to estimate state of health of power convertersA new online measurement and analysis method has been presented in this paper to identify the state of health of power converter circuits. Using spread spectrum time domain reflectometry (SSTDR), impedance in the various current paths inside the converter as well as any fault can be identified witho...2012-01-01
80 Simpson, Jamesina J.Three-dimensional FDTD modeling of impulsive ELF propagation about the earth-sphereThis paper reports the application of an efficient finite-difference time-domain (FDTD) algorithm to model impulsive extremely low frequency (ELF) propagation within the entire Earth-ionosphere cavity. Periodic boundary conditions are used in conjunction with a three-dimensional latitude-longitude F...2004-01-01
81 Simpson, Jamesina J.Three-dimensional subwavelength confinement of a photonic nanojet using a plasmonic nano-antenna GAPUsing 3-D finite-difference time-domain (FDTD) modeling, a microsphere-generating nanojet and gold nanoantenna gap are optimized to achieve 3-D nanojet confinement to a subwavelength volume of about 0.009 μm3 (wherein the edges of the volume are defined at 1/e2 of the maximum electric-field intensi...2014-01-01
82 Regehr, JohnThread verification vs. interrupt verificationInterrupts are superficially similar to threads, but there are subtle semantic differences between the two abstractions. This paper compares and contrasts threads and interrupts from the point of view of verifying the absence of race conditions. We identify a small set of extensions that permit thre...2006-01-01
83 Tasdizen, TolgaThree-dimensional alignment and merging of confocal microscopy stacksWe describe an efficient, robust, automated method for image alignment and merging of translated, rotated and flipped confocal microscopy stacks. The samples are captured in both directions (top and bottom) to increase the SNR of the individual slices. We identify the overlapping region of the two s...2013-01-01
84 Gopalakrishnan, GaneshTowards providing low-overhead data race detection for large OpenMP applicationsNeither static nor dynamic data race detection methods, by themselves, have proven to be sufficient for large HPC applications, as they often result in high runtime overheads and/or low race-checking accuracy. While combined static and dynamic approaches can fare better, creating such combinations, ...2014-01-01
85 Rieth, Loren WTiO2-WO3 composite nanotubes from co-sputtered thin films on si substrate for enhanced photoelectrochemical water splittingElectrochemical anodization of a Ti-W nano-composite thin films deposited on a Si substrate by simultaneous magnetron sputtering of Ti and W resulted in the formation of TiO2-WO3 nanotubular arrays. A change in the morphology of TiO2-WO3 composite nanotubes with varying percentage of W in Ti-W compo...2014-01-01
86 Liu, FengTopological and electronic transitions in a Sb(111) nanofilm: the interplay between quantum confinement and surface effectWhen the dimension of a solid structure is reduced, there will be two emerging effects, quantum confinement and surface effect, which dominate at nanoscale. Based on first-principles calculations, we demonstrate that due to an intriguing interplay between these two dominating effects, the topologica...2012-01-01
87 Hansen, Charles D.Transfer function design based on user selected samples for intuitive multivariate volume explorationMultivariate volumetric datasets are important to both science and medicine. We propose a transfer function (TF) design approach based on user selected samples in the spatial domain to make multivariate volumetric data visualization more accessible for domain users. Specifically, the user starts the...2013-01-01
88 Venkatasubramanian, SureshTrack estimation using link line crossing information in wireless networksDevice-free or non-cooperative localization uses the changes in signal strength measured on links in a wireless network to estimate a person's position in the network area. Existing methods provide an instantaneous coordinate estimate via radio tomographic imaging or location fingerprinting. In this...2013-01-01
89 Khan, Faisal HabibTransfer function mapping for a grid connected PV system using reverse synthesis techniqueMathematical modeling of power electronic converters is a historical problem. Numerous efforts have been documented in literature to model different converter topologies and their control schemes since the 1940s. Traditional modeling approaches avoid transfer function derivation due to high degree o...2013-01-01
90 Regehr, JohnTwo case studies in predictable application scheduling using Rialto/NTThis paper analyzes the results of two case studies in applying the Rialto/NT scheduler to real Windows 2000 applications. The first study is of a soft modem-a modem whose signal processing work is performed on the host CPU, rather than on a dedicated signal processing chip. The second is of an audi...2001-01-01
91 Liu, FengTuning nucleation density of metal island with charge doping of graphene substrateWe have demonstrated that the island nucleation in the initial stage of epitaxial thin film growth can be tuned by substrate surface charge doping. This charge effect was investigated using spin density functional theory calculation in Fe-deposition on graphene substrate as an example. It was found ...2014-01-01
92 Simpson, Jamesina J.Two-dimensional FDTD model of antipodal ELF propagation and schumann resonance of the earthThis letter reports the initial application of the finitedifference time-domain (FDTD) method to model extremely lowfrequency (ELF) propagation around the entire Earth. Periodic boundary conditions are used in conjunction with a variable-cell two-dimensional TM FDTD grid, which wraps around the comp...2002-01-01
93 Christensen, Douglas A.Ultrasound beam simulations in inhomogeneous tissue geometries using the hybrid angular spectrum methodThe angular spectrum method is a fast, accurate and computationally efficient method for modeling wave propagation. However, the traditional angular spectrum method assumes that the region of propagation has homogenous properties. In this paper, the angular spectrum method is extended to calculate u...2012-01-01
94 Berzins, MartinUintah hybrid task-based parallelism algorithmAbstract-Uintah is a software framework that provides an environment for solving large-scale science and engineering problems involving the solution of partial differential equations. Uintah uses a combination of fluid-flow solvers and particle-based methods for solids, together with adaptive meshin...2012-01-01
95 Balasubramonian, RajeevUnderstanding the impact of 3D stacked layouts on ILP3D die-stacked chips can alleviate the penalties imposed by long wires within micro-processor circuits. Many recent studies have attempted to partition each microprocessor structure across three dimensions to reduce their access times. In this paper, we implement each microprocessor structure on a s...2007-01-01
96 Regehr, JohnUnderstanding integer overflow in C/C++Integer overflow bugs in C and C++ programs are difficult to track down and may lead to fatal errors or exploitable vulnerabilities. Although a number of tools for finding these bugs exist, the situation is complicated because not all overflows are bugs. Better tools need to be constructed-but a tho...2012-01-01
97 Liu, FengUnderstanding graphene production by ionic surfactant exfoliation: a molecular dynamics simulation studyWe have simulated sodium dodecyl sulfate (SDS) surfactant/waterþbilayer graphene mixture system to investigate two mechanisms of graphene exfoliation: changing the interlayer distance and sliding away the relative distance. By calculating the total energy as a function of the interlayer (sliding-aw...2014-01-01
98 Pascucci, ValerioVisualizing network traffic to understand the performance of massively parallel simulationsThe performance of massively parallel applications is often heavily impacted by the cost of communication among compute nodes. However, determining how to best use the network is a formidable task, made challenging by the ever increasing size and complexity of modern supercomputers. This paper appli...2012-01-01
99 Regehr, JohnVolatiles are miscompiled, and what to do about itC's volatile qualifier is intended to provide a reliable link between operations at the source-code level and operations at the memory-system level. We tested thirteen production-quality C compilers and, for each, found situations in which the compiler generated incorrect code for accessing volatile...2008-01-01
100 Kasera, Sneha K.Violating privacy through walls by passive monitoring of radio windowsWe investigate the ability of an attacker to passively use an otherwise secure wireless network to detect moving people through walls. We call this attack on privacy of people a "monitoring radio windows" (MRW) attack. We design and implement the MRW attack methodology to reliably detect when a pers...2014-01-01
76 - 100 of 1,958