101 - 125 of 957
Number of results to display per page
CreatorTitleDescriptionSubjectDate
101 Boll, Steven F.Application of the saber method for improved spectral analysis of noisy speechA stand alone noise suppression algorithm is described for reducing the spectral effects of acoustically added noise in speech. A fundamental result is developed which shows that the spectral magnitude of speech plus noise can be effectively approximated as the sum of magnitudes of speech and noise....Noise suppression algorithm; SABER method1977
102 Riesenfeld, Richard F.The application of total positivity to computer aided curve and surface designOf particular importance in an interactive curve and surface design system is the interface to the user. The mathematical model employed in the system must be sufficiently flexible for interaction between designer and machine to converge to a satisfactory result. The mathematical theory of Total Pos...interactive curves; total positivity1979
103 Jacobson, Hans; Gopalakrishnan, GaneshApplication specific asynchronous microengines for efficient high-level controlDespite the growing interest in asynchronous circuits programmable asynchronous controllers based on the idea of microprogramming have not been actively pursued Since programmable control is widely used in many commercial ASICs to allow late correction of design errors to easily upgrade product f...Asynchronous microengines1997
104 Jacobson, HansApplication specific asynchronous microgengines for efficient high-level controlDespite the growing interest in asynchronous circuits, programmable asynchronous controllers based on the idea of microprogramming have not been actively pursued. Since programmable control is widely used in many commercial ASICs to allow late correction of design errors, to easily upgrade product ...Asynchronous microgengines; Programmable asynchronous controllers1997
105 Venkatasubramanian, SureshApproximate Bregman near neighbors in sublinear time: beyond the triangle inequalityBregman divergences are important distance measures that are used extensively in data-driven applications such as computer vision, text mining, and speech processing, and are a key focus of interest in machine learning. Answering nearest neighbor (NN) queries under these measures is very important i...2012-01-01
106 Henderson, Thomas C.Arc and path consistency revisitedMackworth and Freuder have analyzed the time complexity of several constraint satisfaction algorithms [4]. We present here new algorithms for arc and path consistency and show that the arc consistency algorithm is optimal in time complexity and of the same order space complexity as the earlier algor...Arc consistency; Path consistency; Constraint satisfaction algorithms1985
107 Wehrli, RobertARCAID: The ARChitects computer graphics AIDARCAID?The ARChitect's Computer Graphics AID?is one part of a two-part research program at the University of Utah under the direction of David C. Evans. ARCAID is a specification for the organization of computer processes including data and procedures for the use of architects, engineers, and other...ARCAID1970
108 Balasubramonian, RajeevArchitecting efficient interconnects for large caches with CACTI 6.0Efficiently executing multithreaded applications on future multicores will require fast intercore communication. Most of this communication happens via reads and writes to large shared caches in the memory hierarchy. Microprocessor performance and power will be strongly influenced by the long inter...Interconnects; CACTI 6.0; Non-uniform cache architectures (NUCA)2008-01
109 Davis, A.L.The architecture of DDMl: a recursively structured data driven machineAn architecture for a highly modular, recursively structured class of machines is presented. DDMl is an instance of such a machine structure, and is capable of executing machine language programs which are data driven (data flow) nets. These nets may represent arbitrary amounts of concurrency as wel...DDMl; machine structure; machine language programs1977
110 Regehr, JohnARMor: fully verified software fault isolationWe have designed and implemented ARMor, a system that uses software fault isolation (SFI) to sandbox application code running on small embedded processors. Sandboxing can be used to protect components such as the RTOS and critical control loops from other, less-trusted components. ARMor guarantees m...2011-01-01
111 Gooch, Bruce; Reinhard, Erik; Moulding, Chris; Shirley, Peter S.Artistic composition for image creationAltering the viewing parameters of a 3D object results in computer graphics images of varying quality. One aspect of image quality is the composition of the image. While the esthetic properties of an image are subjective, some heuristics used by artists to create images can be approximated quanti...Image creation; Image quality2000
112 Shirley, Peter S.; Gooch, BruceArtistic vision: painterly rendering using computer vision techniquesWe present a method that takes a raster image as input and produces a painting-like image composed of strokes rather than pixels. Unlike previous automatic painting methods, we attempt to keep the number of brush-stroke small. This is accomplished by first segmenting the image into features, finding...Painting-like image; Raster image; Painterly rendering2000
113 Carter, John B.AS-COMA: An adaptive hybrid shared memory ArchitectureScalable shared memory multiprocessors traditionally use either a cache coherent nonuniform memory access (CC-NUMA) or simple cache-only memory architecture (S-COMA) memory architecture. Recently, hybrid architectures that combine aspects of both CC-NUMA and S-COMA have emerged. In this paper, we pr...AS-COMA; Hybrid shared memory1998
114 Carter, Tony M.ASSASSIN : a CAD system for self-timed control-unit designMany software systems exist for automatically implementing synchronous state machines . Presented is this paper is a software system -- ASSASSIN -- for the design and automatic layout of self-timed (or speed- independent) control units as integrated circuit modules.ASSASSIN; Self-timed control units1982
115 Sikorski, KrisAsymptotic near optimality of the bisection methodThe bisection method is shown to possess the nearly best rate of convergence for infinitely differentiable functions having zeros of arbitrary multiplicity. If the multiplicity of zeros is bounded, methods are known which have asymptotically at least quadratic rate of convergence.Bisection method1988
116 Gopalakrishnan, GaneshAsynchronous circuit verification using trace theory and CCSWe investigate asynchronous circuit verification using Dill's trace theory as well as Milner's CCS (as mechanized by the Concurrency Workbench). Trace theory is a formalism specifically designed for asynchronous circuit specification and verification. CCS is a general purpose calculus of communicat...Trace theory; Verification; CCS1992
117 Regehr, JohnAtomicity and visibility in tiny embedded systemsVisibility is a property of a programming language's memory model that determines when values stored by one concurrent computation become visible to other computations. Our work exploits the insight that in nesC, a C-like language with explicit atomicity, the traditional way of ensuring timely visib...2006-01-01
118 Regehr, JohnAugmented CPU reservations: towards predictable execution on general-purpose operating systemsOne problem with performing soft real-time computations on general-purpose operating systems is that these OSs may spend significant amounts of time in the kernel instead of performing work on behalf of the application that is nominally scheduled: the OS effectively steals time from the running appl...2001-01-01
119 Zhu, XiaohongAutomatic compensating cleanup operationToday's part geometries are becoming ever more complex and require more accurate tool path to manufacture. Machining process efficiency is also a major consideration for designers as well as manufacturing engineers. Although the current advanced CAD/CAM systems have greatly improved the efficiency ...Part geometries1989
120 Gooch, Bruce; Shirley, Peter S.Automatic image creation via artistic composition principlesMethods for choosing image parameters in both art and computer graphics are currently subjective. The choice of parameters results in images of varying quality. One aspect of image quality is the composition of the image. While the principles underlying composition are somewhat subjective, a portion...Image parameters2000
121 Lee, Hyo JongAutomatic mesh analysis technique by knowledge-based systemThe finite element analysis technique has been recognized as a very important tool to solve various engineering problems, such as structural analysis, heat transfer, and fluid dynamics. The key point to the technique is discretization of the domain of interest into many finite elements. A good resul...Mesh analysis; Mesh generation algorithm1989
122 Shirley, Peter S.; Gooch, BruceAutomatic painting with economized strokesWe present a method that takes a raster image as input and produces a painting-like image composed of strokes rather than pixels. Unlike previous automatic painting methods, we attempt to use very few brush-strokes. This is accomplished by first segmenting the image into features, finding the medial...Raster image; Painting-like image; Automatic painting methods2000
123 Brunvand, Erik L.Automatic rapid prototyping of semi-custom VLSI circuits using actel FPGAsAbstract : We describe a technique for translating semi-custom VLSI circuits automatically into field programmable gate arrays (FPGAs) for rapid prototyping to develop a system. Using an array multiplier as an example of this translation, the VLSI circuits are designed using a cell-matrix based envi...1995
124 Smith, Kent F.Automatic rapid prototyping of semi-custom VLSI circuits using FPGAsWe describe a technique for translating semi-custom VLSI circuits automatically, integrating two design environments, into field programmable gate arrays (FPGAs) for rapid and inexpensive prototyping. The VLSI circuits are designed using a cell-matrix based environment that produces chips with densi...Semi-custom; VLSI circuits1994
125 Cohen, ElaineAutomatic sculptured five-axis milling with check surfacesAn approach to 5-axis milling of B-spline surfaces is presented. Within its domain, it provides better check surface handling than APT. The scheme for tool position generation is based on a B-spline curve refinement method and a set of criteria for tolerance control which allows the tool positions ...B-spline surfaces; 5-axis milling; Tool paths1989
101 - 125 of 957