126 - 150 of 912
Number of results to display per page
CreatorTitleDescriptionSubjectDate
126 Freire, JulianaAutomatically extracting form labelsWe describe a machine-learning-based approach for extracting attribute labels from Web form interfaces. Having these labels is a requirement for several techniques that attempt to retrieve and integrate data that reside in online databases and that are hidden behind form interfaces, including schema...Learning classifiers2008
127 Riloff, Ellen M.Automatically generating extraction patterns from untagged textMany corpus-based natural language processing systems rely on text corpora that have been manually annotated with syntactic or semantic tags. In particular, all previous dictionary construction systems for information extraction have used an annotated training corpus or some form of annotated input...Information extraction; Automatically generating; Extraction patterns; Untagged text; Corpus-based; AutoSlog-TS; AutoSlog system; MUC-4; Dictionary construction1996
128 Davis, AlAutomating the design of embedded domain specific acceleratorsDomain specific architecture (DSA) design currently involves a lengthy process that requires significant designer knowledge, experience, and time in arriving at a suitable code generator and architecture for the target application suite. Given the stringent time to market constraints and the dyna...Domain specific architecture; Stall cycle analysis; SCA; Domain specific accelerators2008
129 Sobh, Tarek M.Autonomous ObservationWe address the problem of observing an agent. We advocate a modeling approach for the visual system and its observer, where a discrete event dynamic system (DEDS) framework is developed and "events" are defined as ranges on parameter subsets. The dynamic recursive context for finite state machines (...Observation; Manipulation process1992
130 Sobh, Tarek M.Autonomous observationWe address the problem of observing an agent?? We advocate a modeling approach for the visual system and its observer where a discrete event dynamic system DEDS framework is developed and events are de ned as ranges on parameter subsets?? The dynamic recursive context for nite state machine...Autonomous observation1992
131 Carter, John B.The avalanche myrinet simulation packageThis is a user manual for version 2.0 of the Myrinet simulation package. Users of the V2.0 package can specify arbitrary network topologies composed of Myrinet switches with different number of ports. For example, 4-port and 32-port switches can be used in a single system. Because the V2.0 model sup...Avalanche Myrinet; Simulation Package; User manual; Myrinet switches; port switches1996
132 Carter, John B.The avalanche myrinet simulation package user manual for V2.0This is a user manual for Version 2.0 of the Myrinet simulation package Users of the V2.0 pack age can specify arbitrary network topologies composed of Myrinet switches with different number of ports For example port and 4-port switches can be used in a single system Because the V2.0 model suppor...Avalanche Myrinet; Simulation Package; user manual; Myrinet switches; Port switches1996
133 Carter, John B.; Davis, Al; Kuramkote, Ravindra; Stoller, Leigh B.Avalanche: A communication and memory architecture for scalable parallel computingAs the gap between processor and memory speeds widens?? system designers will inevitably incorpo rate increasingly deep memory hierarchies to maintain the balance between processor and memory system performance At the same time?? most communication subsystems are permitted access only to main m...Avalanche; Communication architecture; Memory architecture1995
134 Carter, John B.Avalanche: A communication and memory architecture for scalable parallel computingAs the gap between processor and memory speeds widens, system designers will inevitably incorporate increasingly deep memory hierarchies to maintain the balance between processor and memory system performance. At the same time, most communication subsystems are permitted access only to main memory ...Avalanche; Computer memory; Memory architecture1995
135 Stark, Michael M.; Martin, William; Cohen, Elaine; Lyche, Tom; Riesenfeld, Richard F.B-splines for physically-based renderingAlthough B-spline curves and surfaces have enjoyed a long established place in the graphics community as constructive modeling tools, the use of B-spline approximation techniques has received relatively little attention in rendering. In this work we explore the use of 4D and 5D tensor product B-s...B-spline curves; Rendering algorithms2002-01-09
136 Lindstrom, Gary E.Backtracking in generalized control settingsBacktracking is a powerful conceptual and practical technique in programming. However, its application in general has been limited to global control over recursive programs. In this paper we explore through several examples the coherence and utility of applying backtracking in more general control s...Backtracking1977
137 Freire, JulianaBeyond depth-first strategies: improving tabled logic programs through alternative schedulingTabled evaluation ensures termination for programs with finite models by keeping track of which subgoals have been called. Given several variant subgoals in an evaluation, only the fi rst one encountered will use program-clause resolution; the rest will resolve with the answers generated by the f...Alternate scheduling; SLG-WAM; Tabled logic programs1998
138 Freire, JulianaBeyond depth-first: improving tabled logic programs through alternative scheduling strategiesTabled evaluations ensure termination of logic programs with fi nite models by keeping track of which subgoals have been called Given several variant subgoals in an evaluation, only the fi rst one encountered will use program clause resolution the rest uses answer resolution This use of answer r...Alternate scheduling; SLG-WAM; Tabled logic programs1996
139 Hansen, Charles D.Binary-swap and shear-warp volume renderer on the T3DLarge parallel machines give today's scientists the ability to compute very large simulations which may generate equally large data. Not only does having visualization tools on the parallel system allow the scientist to take advantage of the large memory to visualize the data, the processing power a...Volume rendering; Binary-swap1995
140 Hansen, Charles D.Binary-swap volumetric rendering on the T3DThis paper presents a data distributed parallel raytraced volume rendering algorithm and its implementation on the CRI T3D. This algorithm distributes the data and the computational load to individual processing units to achieve fast and high-quality rendering of high-resolution data. The volume dat...Volume rendering; Binary-swap; Ray tracing; Parallel rendering1995
141 Johnson, Christopher R.Biomedical visual computing: case studies and challengesAdvances in computational geometric modeling, imaging, and simulation let researchers build and test models of increasing complexity, generating unprecedented amounts of data. As recent research in biomedical applications illustrates, visualization will be critical in making this vast amount of data...2012-01-01
142 Gerpheide, George E.Bit-driven logic: a style of digital logic for VLSI designThis memo describes a new style of low-level digital logic design called Bit-Driven Logic (BDL) which may prove attractive for the design of VLSI chips. BDL is an application of speed-independent, data-flow ideas to a very low level. It has the advantages of good locality, clockless operation, and...Bit-Driven Logic; BDL; Digital logic design; VLSI chips1980
143 Riloff, Ellen M.Bootstrapping for text learning tasksWhen applying text learning algorithms to complex tasks, it is tedious and expensive to hand-label the large amounts of training data necessary for good performance. This paper presents bootstrapping as an alternative approach to learning from large sets of labeled data. Instead of a large quantity ...Bootstrapping; Text learning algorithms; Seed information1999
144 Riloff, Ellen M.Bootstrapping method for learning semantic lexicons using extraction pattern contextsThis paper describes a bootstrapping algorithm called Basilisk that learns high-quality semantic lexicons for multiple categories. Basilisk begins with an unannotated corpus and seed words for each semantic category, which are then bootstrapped to learn new words for each category. Basilisk hypothe...Basilisk; Bootstrapping method; Semantic lexicons2002
145 Hansen, Charles D.Boundary aware reconstruction of scalar fieldsIn visualization, the combined role of data reconstruction and its classification plays a crucial role. In this paper we propose a novel approach that improves classification of different materials and their boundaries by combining information from the classifiers at the reconstruction stage. Our ap...2014-01-01
146 Gopalakrishnan, GaneshBounded transaction model checkingIndustrial cache coherence protocol models often have too many reachable states, preventing full reachability analysis even for small model instances (number of processors, addresses, etc.). Several partial search debugging methods are, therefore, employed, including lossy state compression using...Model checking; Reachability analysis2006-02-27
147 Freire, JulianaBridging the XML-relational divide with LegoDB: a demonstrationWe present LegoDB, a cost-based XML storage mapping engine that automatically explores a space of possible XML-to-relational mappings and selects an efficient mapping for a given application.LegoDB; Storage mappings2003
148 Brandt, Richard C.Building databases for the computer-based memorization systemThe Computer-Based Memorization System (CBMS) consists of eight games used by students to memorize groups of related facts that are stored in an associative network. The instructional design is built into the games. Designing and implementing associative networks for the CBMS is very different from...Computer-Based Memorization System; CBMS1988
149 Starkey, MikeC-RISC A C language reduced instruction set computerThis project is the implementation of a Reduced Instruction Set Computer (RISC) on a tiny chip. RISC technology is based on the idea that a small number of simple instructions can be used to create a fast, flexible computer. Our RISC uses this principle while staying within the confines of the tiny ...RISC; C language1990
150 Weinstein, DavidCache-rings for memory efficient isosurface constructionProcessor speeds continue to increase at faster rates than memory speeds. As this performance gap widens, it becomes increasingly important to develop "memory-conscious" algorithms - programs that still optimize instruction count and algorithmic complexity, but that also integrate optimizations for ...Processor speeds; Memory speeds; Computer memory; Cache-rings1997
126 - 150 of 912