176 - 200 of 989
Number of results to display per page
176 Regehr, JohnEfficient memory safety for TinyOSReliable sensor network software is difficult to create: applications are concurrent and distributed, hardware-based memory protection is unavailable, and severe resource constraints necessitate the use of unsafe, low-level languages. Our work improves this situation by providing efficient memory an...2007-01-01
177 Regehr, JohnHLS: a framework for composing soft real-time schedulersHierarchical CPU scheduling has emerged as a way to (1) support applications with diverse scheduling requirements in open systems, and (2) provide load isolation between applications, users, and other resource principals. Most existing work on hierarchical scheduling has focused on systems that prov...2001-01-01
178 Regehr, JohnEfficient type and memory safety for tiny embedded systemsWe report our experience in implementing type and memory safety in an efficient manner for sensor network nodes running TinyOS: tiny embedded systems running legacy, C-like code. A compiler for a safe language must often insert dynamic checks into the programs it produces; these generally make progr...2006-01-01
179 Regehr, JohnUnderstanding integer overflow in C/C++Integer overflow bugs in C and C++ programs are difficult to track down and may lead to fatal errors or exploitable vulnerabilities. Although a number of tools for finding these bugs exist, the situation is complicated because not all overflows are bugs. Better tools need to be constructed-but a tho...2012-01-01
180 Hansen, Charles D.Penumbra maps: approximate soft shadows in real-timeGenerating soft shadows quickly is difficult. Few techniques have enough flexibility to interactively render soft shadows in scenes with arbitrarily complex occluders and receivers. This paper introduces the penumbra map, which extends current shadow map techniques to interactively approximate soft ...2003-01-01
181 Regehr, JohnPrecise garbage collection for CMagpie is a source-to-source transformation for C programs that enables precise garbage collection, where precise means that integers are not confused with pointers, and the liveness of a pointer is apparent at the source level. Precise GC is primarily useful for long-running programs and programs t...2009-01-01
182 Regehr, JohnEliminating the call stack to save RAMMost programming languages support a call stack in the programming model and also in the runtime system.We show that for applications targeting low-power embedded microcontrollers (MCUs), RAM usage can be significantly decreased by partially or completely eliminating the runtime callstack. We presen...2009-01-01
183 Whitaker, Ross T.A fast iterative method for a class of Hamilton-Jacobi equations on parallel systemsIn this paper we propose a novel computational technique, which we call the Fast Iterative Method (FIM), to solve a class of Hamilton- Jacobi (H-J) equations on massively parallel systems. The proposed method manages the list of active nodes and iteratively updates the solutions on those nodes u...Fast Iterative Method; FIM; Parallel systems2007
184 Mecklenburg, RobertGORP: An object-oriented design for genomic objects, relationships and processesThe Eccles Institute for Human Genetics (EIHG) has developed a genomic database based on a novel level of abstraction. Objects, relationships, and processes are explicitly represented in an object model. This model has been implemented in a traditional relational database management system. Transla...Eccles Institute for Human Genetics; EIHG; GORP; Genomic databases; Object model1996
185 Tasdizen, Tolga; Whitaker, Ross T.Anisotropic diffusion of surface normals for feature preserving surface reconstructionFor 3D surface reconstruction problems with noisy and incomplete range data measured from complex scenes with arbitrary topologies, a low-level representation, such as level set surfaces, is used. Such surface reconstruction is typically accomplished by minimizing a weighted sum of data-model dis...Anisotropic diffusion; Surface reconstruction2003-04-18
186 Riloff, Ellen M.An introduction to the Sundance and AutoSlog systemsThis document describes the Sundance natural language processing system that has been developed at the University of Utah, as well as the AutoSlog and AutoSlog-TS extraction pattern learners that have been implemented on top of Sundance. Sundance is a shallow parser that also includes clause hand...Sundance system; AutoSlog system; Extraction pattern learners2004-11-08
187 Kniss, Joe; Riesenfeld, Richard F.Visual summary statisticsTraditionally, statistical summaries of categorical data often have been visualized using graphical plots of central moments (e.g., mean and standard deviation), or cumulants (e.g., median and quartiles) by box plots. In this work we reexamine the box plot and its relatives and develop a new hyb...Visual summary statistics; categorical data; box plot; hybrid summary plot2007
188 Henderson, Thomas C.; Sikorski, ChristopherComputational sensor networksWe propose Computational Sensor Networks as a methodology to exploit models of physical phenomena in order to better understand the structure of the sensor network. To do so, it is necessary to relate changes in the sensed variables (e.g., temperature) to the aspect of interest in the sensor netw...Computational sensor networks2007
189 Baker, Jason; Hsieh, Wilson C.Maya: multiple-dispatch syntax extension in JavaWe have designed and implemented Maya, a version of Java that allows programmers to extend and reinterpret its syntax. Maya generalizes macro systems by treating grammar productions as generic functions, and semantic actions on productions as multimethods on the corresponding generic functions. P...Maya; Syntax extension2001-12-11
190 Allen, Edgar S.Sensory information processing and symbolic computation (1 Jan. 1975 - 30 June 1975)This research uses digital computation to investigate processes, both linear and nonlinear, for the filtering. restoration, enhancement, bandwidth reduction, distortion immunization and analysis of both visual and auditory information.Sensory information processing; Symbolic computation; Auditory information; Visual information1973
191 Smith, Kent F.Tiler user's guideTiler is a special interactive editor used for designing VLSI circuits using the Path Programmable Logic (PPL) methodology. PPL cells are inserted into a rectangular grid by typing characters that represent the cells. Each available cell will have a character that represents it, but some characters ...Tiler; Interactive editor; VLSI circuits; Design; Path Programmable Logic; PPL1986
192 Brunvand, Erik L.Low latency self-timed flow-through FIFOsSelf-timed flow-through FIFOs are constructed easily using only a single C-element as control for each stage of the FIFO. Throughput can be very high in this type of FIFO as the communication required to send new data to the FIFO is local to only the first element of the FIFO. Circuit density can ...1995
193 Freire, JulianaProvenance in scientific workflow systemsThe automated tracking and storage of provenance information promises to be a major advantage of scientific workflow systems. We discuss issues related to data and workflow provenance, and present techniques for focusing user attention on meaningful provenance through "user views," for managing the ...Workflow systems; Provenance2007
194 Carter, John B.The avalanche myrinet simulation packageThis is a user manual for version 2.0 of the Myrinet simulation package. Users of the V2.0 package can specify arbitrary network topologies composed of Myrinet switches with different number of ports. For example, 4-port and 32-port switches can be used in a single system. Because the V2.0 model sup...Avalanche Myrinet; Simulation Package; User manual; Myrinet switches; port switches1996
195 Freier, Rodney; Thompson, William B.Design-space exploration of most-recent-only communication using myrinet on SGI ccNUMA architecturesSGI's current ccNUMA multiprocessor architectures offer high scalability and performance without sacrificing the ease of use of simpler SMP systems. Although these systems also provide a standard PCI expansion bus, the bridging between PCI and SGI's ccNUMA architecture invalidates the assumptions ty...Most-recent-only communication; Myrinet; SGI; Communications latencies1999
196 Freire, JulianaMetaComm: a meta-directory for telecommunicationsA great deal of corporate data is buried in network devices - such as PBX messaging/email platforms, and data networking equipment - where it is difficult to access and modify. Typically, the data is only available to the device itself for its internal purposes and it must be administered using eith...MetaComm; Meta-Directories; Directory Enabled Networking; Data integration2000
197 Gopalakrishnan, GaneshExplicit-enumeration based verification made memory-efficientWe investigate techniques for reducing the memory requirements of a model checking tool employing explicit enumeration. Two techniques are studied in depth: (1) exploiting symmetries in the model, and (2) exploiting sequential regions in the model. The first technique resulted in a significant reduc...Verification; Model checking tool; Memory-efficient1995
198 Freire, JulianaQuerying the webExpose attendees to key concepts and technologies for finding, querying and integrating information on the Web Identify technical challenges in designing systems that support Web queries Survey recent literature, and discuss interesting research directions.Webbase; Web navigation2000
199 Freire, JulianaBridging the XML-relational divide with LegoDB: a demonstrationWe present LegoDB, a cost-based XML storage mapping engine that automatically explores a space of possible XML-to-relational mappings and selects an efficient mapping for a given application.LegoDB; Storage mappings2003
200 Evans, DavidImproving communication between man and computers: some recent developments1967-10-11
176 - 200 of 989