176 - 200 of 912
Number of results to display per page
CreatorTitleDescriptionSubjectDate
176 Riloff, Ellen M.Learning extraction patterns for subjective expressionsThis paper presents a bootstrapping process that learns linguistically rich extraction patterns for subjective (opinionated) expressions. High-precision classifiers label unannotated data to automatically create a large training set, which is then given to an extraction pattern learning algorithm. T...Bootstrapping process; Extraction patterns; Subjective expressions; Opinions2003
177 Hansen, Charles D.; Johnson, Christopher R.Constraint-based technique for haptic volume explorationWe present a haptic rendering technique that uses directional constraints to facilitate enhanced exploration modes for volumetric datasets. The algorithm restricts user motion in certain directions by incrementally moving a proxy point along the axes of a local reference frame. Reaction forces are g...Haptic rendering; Immersive visualization; Human-computer interaction2003
178 Henderson, Thomas C.RobotShare: a framework for robot knowledge sharingKnowledge representation is a traditional field in artificial intelligence. Researchers have developed various ways to represent and share information among intelligent agents. Agents that share resources, data, information, and knowledge perform better than agents working alone. However, previou...RobotShare; Robot knowledge sharing2007
179 Henderson, Thomas C.Reaction-diffusion processes as a computational paradigmTuring introduced reaction diffusion systems (RD-systems) as a mechanism which made possible the differentiation of morphological structure. We have shown how these systems can be used to provide an information network for smart sensor systems. However, we propose here that reaction diffusion system...Reaction diffusion systems; RD-systems; Computational paradigm2000
180 Beazley, David. M.SWIG users manual (version 1.1)SWIG is a tool for solving problems. More specifically, SWIG is a simple tool for building interactive C, C++, or Objective-C programs with common scripting languages such as Tel, Perl, and Python. Of course, more importantly, SWIG is a tool for making C programming more enjoyable and promoting lazi...SWIG; C programs; C++ programs; Objective-C programs; User manual; Interactive programs1997
181 Balasubramonian, RajeevPower efficient approaches to redundant multithreadingNoise and radiation-induced soft errors (transient faults) in computer systems have increased significantly over the last few years and are expected to increase even more as we move toward smaller transistor sizes and lower supply voltages. Fault detection and recovery can be achieved through redund...Reliability; Power; Transient faults; Soft errors; Redundant multithreading (RMT); Heterogeneous chip multiprocessors dynamic frequency scaling2007-08
182 Lindstrom, Gary E.ETYMA: a framework for modular systemsModularity, i.e. support for the flexible construction, adaptation, and combination of units of software, is an important goal in many systems. In most cases, however, systems achieve only a few aspects of modularity. The problem can be traced to the inflexibility, or the limited view of modularity ...ETYMA; Modularity; Modular systems1994
183 Riloff, Ellen M.Empirical approach to conceptual case frame acquisitionConceptual natural language processing systems usually rely on case frame instantiation to recognize events and role objects in text. But generating a good set of case frames for a domain is time-consuming, tedious, and prone to errors of omission. We have developed a corpus-based algorithm for a...Conceptual case frame acquisition; Case frame instantiation; Corpus-based algorithm1998
184 Kessler, Robert R.Persistence is hard, then you die! or compiler and runtime support for a persistent common Lisp.Integrating persistence into an existing programming language is a serious undertaking. Preserving the essence of t h e existing language, adequately supporting persistence, and maintaining efficiency require low-level support from the compiler and runtime systems. Pervasive, low-level changes were ...Persistence; Programming language; Lisp compiler; Persistent Lisp1994
185 Davis, A.L.Dataflow computers: a tutorial and surveyThe demand for very high performance computer has encouraged some researchers in the computer science field to consider alternatives to the conventional notions of program and computer organization. The dataflow computer is one attempt to form a new collection of consistent systems ideas to improve ...Dataflow computers1980
186 Hansen, Charles D.Case study of isosurface extraction algorithm performanceIsosurface extraction is an important and useful visualization method. Over the past ten years, the field has seen numerous isosurface techniques published, leaving the user in a quandary about which one should be used. Some papers have published complexity analysis of the techniques, yet empirical...Isosurfaces; Contours2000
187 Riloff, Ellen M.Empirical study of automated dictionary construction for information extraction in three domainsA primary goal of natural language processing researchers is to develop a knowledge-based natural language processing (NLP) system that is portable across domains. However, most knowledge-based NLP systems rely on a domain-specific dictionary of concepts, which represents a substantial knowledge-en...Information extraction; AutoSlog; Across domains1996
188 Li, Peng; Regehr, JohnT-check: bug finding for sensor networksA safety property is true if something bad never happens. If any state in an execution violates the safety property, the entire execution violates that property. A liveness property holds if something good will eventually happen. An execution satisfies a liveness property if the execution will en...2010-02-26
189 Regehr, John; Pagariya, Rohit PannalaljiDirect equivalence testingTesting embedded software is difficult. • Further complicated by presence of memory and type safety errors in software. • Compiler contain various known bugs. Developers are skeptical to upgrade the compilers. • Is your embedded software affected by memory safety and compilation erro...
190 Baxter, Brent S.Image processing in the human visual systemThis work extends the multiplicative visual model to include image texture as suggested by experiments [Campbell, Weisel] linking a low resolution Fourier analysis with neurons in certain parts of the visual cortex. The new model takes image texture into account in the sense that weak texture is acc...Human visual system; Image texture1975
191 Henderson, Thomas C.Monte Carlo sensor networksBiswas et al. [1] introduced a probabilistic approach to inference with limited information in sensor networks. They represented the sensor network as a Bayesian network and performed approximate inference using Markov Chain Monte Carlo (MCMC). The goal is to robustly answer queries even under no...Monte Carlo sensor networks; Markov Chain Monte Carlo; MCMC2005-01-20
192 Stoller, Leigh B.PPE interface and functional specificationThis document describes the interface and functional specification of a Protocol Processing Engine (PPE) for workstation clusters. The PPE is intended to provide the support necessary to implement low latency protocols requiring only low resource (cpu and bus bandwidth) consumption.Protocol Processing Engine; PPE; Workstation clusters1995
193 Warnock, John E.A hidden line algorithm for halftone picture representationIn exploring applications in computer graphics, one finds quickly that the representation of three dimensional objects in picture form is both a desirable and necessary capability. Applications dealing with any form of spatial design or with visual environment simulation need the ability to represen...Halftone picture representation; Spatial design1968
194 Bruderlin, BeatAn interactive N-Dimensional constraint systemIn this paper, we present a graph-based approach to geometric constraint solving. Geometric primitives (points, lines, circles, planes, etc.) possess intrinsic degrees of freedom in their embedding space. Constraints reduce the degrees of freedom of a set of objects. A constraint graph is created wi...Geometric constraint solving1994
195 Bruderlin, BeatDetecting ambiguities: an optimistic approach to robustness problems in computational geometryComputational geometry algorithms deal with geometric objects, usually represented by coordinates in an n-dimensional Euclidean space. Most efficient algorithms implement geometric operations as floating point arithmetic operations on the coordinates. Since floating point numbers can only approxima...Ambiguities; Computational geometry; Robustness problems1990
196 Brunvand, Erik L.A partial scan methodology for testing self-timed circuitsThis paper presents a partial scan method for testing control sections of macromodule based self-timed circuits for stuck-at faults. In comparison with other proposed test methods for self-timed circuits, this technique offers better fault coverage than methods using self-checking techniques, and ...1995
197 Organick, Elliott I.Semiannual technical report transformation of ADA programs into silicon (1 Sept. 1981- 28 Feb. 1982)This report summarizes the first six months work of the research project, "Transformation of Ada Programs into Silicon." Our project has five main objectives: 1. Develop and document elements of a transformation methodology for converting Ada programs, or program constructs, into VLSI systems which ...ADA programs; VLSI1982
198 Freire, JulianaIntegrated scientific workflow management for the Emulab network testbedThe main forces that shaped current network testbeds were the needs for realism and scale. Now that several testbeds support large and complex experiments, management of experimentation processes and results has become more difficult and a barrier to high-quality systems research. The popularity o...Workflow management; Data exploration; Emulab; Network testbeds2006
199 Shirley, Peter S.; Gooch, BruceArtistic vision: painterly rendering using computer vision techniquesWe present a method that takes a raster image as input and produces a painting-like image composed of strokes rather than pixels. Unlike previous automatic painting methods, we attempt to keep the number of brush-stroke small. This is accomplished by first segmenting the image into features, finding...Painting-like image; Raster image; Painterly rendering2000
200 Henderson, Thomas C.A study of Pierce's group generatorPierce describes an approach to map learning with uninterpreted sensors and effectors. As part of that, he describes a sensor grouping generator operator that attempts to arrange similar sensors into groups. Here we review that work and place it in a more strenuous statistical validation framewor...Pierce's group; Map learning; Sensor grouping generator2010
176 - 200 of 912