151 - 175 of 989
Number of results to display per page
CreatorTitleDescriptionSubjectDate
151 Kasera, Sneha K.; Patwari, NealMobility Assisted Secret Key GenerationSignature Based Key Generation. Wireless link signature; multiple paths caused by radio waves; their measurements are good signatures of links; link signatures measured almost symmetrically at two ends of wireless link, but cannot be measured from another location; use for secret key establishment;...
152 Grosset, Andre Vincent Pascal; Pascucci, ValerioInfinite ZoomAny image (apart from a fractal) has a finite resolution. On zooming in, we eventually see pixels. The aim of this project is to allow users to infinitely zoom in on an image.2010-10-06
153 Pascucci, ValerioMorse theory and its applicationDiscussion of Morse TheoryMorse; Morse-Smale; Topology; Algorithms; Terrain; Analysis
154 Kumar, Sidharth; Pascucci, ValerioRemote visualizationGeneralized Architecture and pipeline for a remote site
155 Fletcher, Preston Thomas; Moeller, John Henry; Phillips, Jeffrey; Venkatasubramanian, SureshComputing hulls in positive definite spaceP(n): a Riemannian manifold Definition: symmetric positive-definite (n) (n) matrices Applications: Diffusion Tensor MRI (DT-MRI) Flow through voxel modeled in P(3) Elasticity Tensors Modeled by elements of P(6) Machine Learning Used in kernels Convex Hulls Data on P(n): Want to analyze...2010-10-06
156 Yang, Xuejun; Chen, Yang; Eide, Eric; Regehr, JohnFinding compiler bugs with random testingUndefined behavior (such as divide by 0) or unspecified behavior (such as order of evaluation) gives compilers freedom to diverge, causing failure to our voting mechanism Control Flow Analysis • a control flow analyzer that can handle abnormal edges created by jump statements (goto / break ...
157 Pugsley, Seth H; Spjut, Josef Bo; Nellans, David W; Balasubramonian, RajeevSWEL: hardware cache coherence protocols to map shared data onto shared cachesIn chip multiprocessors, replication of cache lines is allowed to reduce the latency each core has to access a cache line. Because of this replication, it is possible for one copy of data to become out of date if another copy of that data is modified. How a MESI protocol accomplishes this: ? K...
158 Gilbert, Nathan Alan; Riloff, Ellen M.Exploring Knowledge-Rich Solutions to Noun Phrase Coreference ResolutionCoreference resolution is the task of identifying coreferent expressions in text. Accurate coreference resolution can improve other tasks such as machine translation, information retrievel and document summarization. Currently, the best approaches involve some form of supervised Machine Learni...
159 Bhatia, Harsh; Jadhav, Shreeraj Digambar; Norgard, Greg; Bremer, Peer-Timo; Pascucci, ValerioHelmholtz-Hodge Decomposition of vector fields on 2-manifoldsA Morse-like Decomposition ? - Morse-Smale decomposition for gradient (of scalar) fields is an interesting way of decomposing the domain into regions of unidirectional flow (from a source to a sink ). - But works for gradient fields, which are conservative (irrotational), only. - Can such a de...
160 Pascucci, Valerio; Swank, William LorenzoScalable scientific dataQuestion Hierarchial Z-Order Evaluation How can we present hundreds or thousands of gigabytes of scientific data to a user for analysis and interpretation? • The Scientific Computing and Imaging Institute is responsible for helping scientists visualize massive amounts of data. • Sources ...2010-02-26
161 Kasera, Sneha K.Enhancing covert communications with multiple colluding receiversTraditional (single receiver) system setup: ? Choose exploit field (e.g. last byte of TCP Timestamp) ? Alice: probabilistically inject parts of coded message into field ? Bob: extract symbols from field, decode to correct errors ?Warden: assume full knowledge of system and keys Can we create un...2010-10-06
162 Nguyen, Hoa Thanh; Nguyen, Thanh Hoang; Freire, JulianaDeepPeep: A Form Search EngineWe present DeepPeep (http://www.deeppeep.org), a new search engine specialized in Web forms. DeepPeep uses a scalable infrastructure for discovering, organizing and analyzing Web forms which serve as entry points to hidden-Web sites. DeepPeep provides an intuitive interface that allows users t...
163 Regehr, JohnPoster abstract: TinyOS 2.1 adding threads and memory protection to tinyOSThe release of TinyOS 2.0 two years ago was motivated by the need for greater platform flexibility, improved robustness and reliability, and a move towards service oriented application development. Since this time, we have seen the community embrace these efforts and add support for additional hardw...2008-01-01
164 Chatterjee, Niladrish; Balasubramonian, Rajeev; Davis, Alan L.Rethinking DRAM design and organization for energy-constrained multicoresDRAM vendors have traditionally optimized for low cost and high performance, often making design decisions that incur energy penalties. For example, a single conventional DRAM access activates thousands of bitlines in many chips, to return a single cache line to the CPU. The other bits may be access...DRAM power consumption; Data-center power; Multicore memory; Trapeze Interactive Poster2010-03-15
165 Mates, Phillip Lopes; Silva, Claudio T.crowdLabs: a provenance enabled web repositoryThe National Science Foundation Science and Technology Center for Coastal Margin Observation and Prediction (CMPO) is a multi-institutional center dedicated to coastal margins, which are regions consisting of very productive ecosystems that play an important role in global elemental cycles. CMPO ma...CrowdLabs; Web repository; Coastal margins; Trapeze Interactive Poster2010-03-15
166 Joshi, Sarang; Venkatasubramanian, SureshMatching shapes using the current distanceCurrent Distance: It was introduced by Vaillant and Glaunès as a way of comparing shapes (point sets, curves, surfaces). This distance measure is defined by viewing a shape as a linear operator on a k-form field, and constructing a (dual) norm on the space of shapes. Shape Matching: Given two s...
167 Li, Peng; Regehr, JohnT-check: bug finding for sensor networksA safety property is true if something bad never happens. If any state in an execution violates the safety property, the entire execution violates that property. A liveness property holds if something good will eventually happen. An execution satisfies a liveness property if the execution will en...2010-02-26
168 Regehr, John; Pagariya, Rohit PannalaljiDirect equivalence testingTesting embedded software is difficult. • Further complicated by presence of memory and type safety errors in software. • Compiler contain various known bugs. Developers are skeptical to upgrade the compilers. • Is your embedded software affected by memory safety and compilation erro...
169 Musuvathy, Suraj Ravi; Cohen, ElaineTracing ridges on B-Spline surfacesWon Best Paper Award at SIAM/ACM Joint Conference on Geometric and Physical Modeling, San Francisco, 20092010-02-26
170 Tripathi, Abhishek; Bremer, Peer-Timo; Pascucci, ValerioUnderstanding global climate changeWhat is Climate Modeling? Use of quantitative methods to simulate the interactions of the atmosphere, oceans, land surface, and ice. Average Global Temperatures indicate a warming trend but that alone does not explain why it is happening.
171 Chen, Yang; Regehr, JohnA code size microbenchmark for CMotivation ? No compilers could always generate smaller code than others ? Hand-optimized code is often hard to understand ? Programmers tend to write readable code and trust compilers generate fast and compact code for them ? There is a plenty of room for improving compiler optimizations Our ...
172 Berzins, MartinAdaptive high-order discontinuous galerkin solution of elastohydrodynamic lubrication point contact problemsThis paper describes an adaptive implementation of a high order Discontinuous Galerkin (DG) method for the solution of elastohydrodynamic lubrication (EHL) point contact problems. These problems arise when modelling the thin lubricating film between contacts which are under sufficiently high pressur...2012-01-01
173 Regehr, JohnAtomicity and visibility in tiny embedded systemsVisibility is a property of a programming language's memory model that determines when values stored by one concurrent computation become visible to other computations. Our work exploits the insight that in nesC, a C-like language with explicit atomicity, the traditional way of ensuring timely visib...2006-01-01
174 Regehr, JohnEliminating stack overflow by abstract interpretationAn important correctness criterion for software running on embedded microcontrollers is stack safety: a guarantee that the call stack does not overflow. Our first contribution is a method for statically guaranteeing stack safety of interrupt-driven embedded software using an approach based on contex...2005-01-01
175 Regehr, JohnEvolving real-time systems using hierarchical scheduling and concurrency analysisWe have developed a new way to look at real-time and embedded software: as a collection of execution environments created by a hierarchy of schedulers. Common schedulers include those that run interrupts, bottom-half handlers, threads, and events. We have created algorithms for deriving response tim...2003-01-01
151 - 175 of 989