201 - 225 of 912
Number of results to display per page
CreatorTitleDescriptionSubjectDate
201 Riloff, Ellen M.Corpus-based identification of non-anaphoric noun phrasesCoreference resolution involves finding antecedents for anaphoric discourse entities, such as definite noun phrases. But many definite noun phrases are not anaphoric because their meaning can be understood from general world knowledge (e.g., "the White House" or "the news media"). We have develope...Corpus-based identification; Non-anaphoric noun phrases; Coreference resolution; MUC-4; Discourse entity; DE1999
202 Riloff, Ellen M.Corpus-based semantic lexicon induction with web-based corroborationVarious techniques have been developed to automatically induce semantic dictionaries from text corpora and from the Web. Our research combines corpus-based semantic lexicon induction with statistics acquired from the Web to improve the accuracy of automatically acquired domain-specific dictionari...Corpus-based; Text corpora; Domain-specific dictionaries; Bootstrapping algorithm2009
203 Regehr, JohnCorrectness proofs for device drivers in embedded systemsComputer systems do not exist in isolation: they must interact with the world through I/O devices. Our work, which focuses on constrained embedded systems, provides a framework for verifying device driver software at the machine code level. We created an abstract device model that can be plugged...2010
204 Hansen, Charles D.Cost-effective data-parallel load balancingLoad balancing algorithms improve a program's performance on unbalanced datasets, but can degrade performance on balanced datasets, because unnecessary load redistributions occur. This paper presents a cost-effective data-parallel load balancing algorithm which performs load redistributions only...Load balancing1995
205 Tasdizen, Tolga; Whitaker, Ross T.Cramer-Rao bounds for nonparametric surface reconstruction from range dataThe Cramer-Rao error bound provides a fundamental limit on the expected performance of a statistical estimator. The error bound depends on the general properties of the system, but not on the specific properties of the estimator or the solution. The Cramer-Rao error bound has been applied to scal...Cramer-Rao bounds; Error bounds; 3D reconstruction2003-04-18
206 Brunvand, Erik L.Critical hazard free test generation for asynchronous circuitsWe describe a technique to generate critical hazard-free tests for self-timed control circuits build using a macromodule library, in a partial scan based DFT environment. We propose a 6 valued algebra to generate these tests which are guaranteed to be critical hazard free under an unbounded delay m...1997
207 Whitaker, Ross T.Curve boxplot: Generalization of boxplot for ensembles of curvesIn simulation science, computational scientists often study the behavior of their simulations by repeated solutions with variations in parameters and/or boundary values or initial conditions. Through such simulation ensembles, one can try to understand or quantify the variability or uncertainty in a...2014-01-01
208 Seror, Denis D.D.C.P.L. - A distributed control programming languageIn this thesis, a computation is considered a system of asynchronously cooperating "independent" programs (coroutines) linked by paths of in formation along which messages are sent. A programming language called DCPL, a Distributed Control Programming Language, in which such computations may be ex...Distributed control programming language; DCPL1970
209 Berzins, MartinDAG-based software frameworks for PDEsThe task-based approach to software and parallelism is well-known and has been proposed as a potential candidate, named the silver model, for exas-cale software. This approach is not yet widely used in the large-scale multi-core parallel computing of complex systems of partial differential equations...2012-01-01
210 Brunvand, Erik L.DFT for fast testing of self-timed control circuitsIn this paper, we present a methodology to perform fast testing of the control path of self-timed circuits [91]. The speedup is achieved by testing all the execution paths in the control simultaneously. The circuits considered in this paper are those designed using an OCCAM based circuit compile...1995
211 Bruderlin, BeatDI - An object-oriented user interface toolbox for modula-2 applicationsThe DI dialog interface tool library for Modula-2 applications described in this paper facilitates the design and implementation of graphical, object-oriented user interfaces for workstations with a graphical screen, a mouse and a keyboard. Much emphasis is put on the portability of the application...DI dialog interface tool1990
212 Evans, JohnDPOS programming manualThis manual describes the basic concepts of the DPOS Metalanguage and the programming language DPOS Scheme.DPOS; Programming manual1990
213 Kessler, Robert R.DPOS: A metalanguage and programming environment for parallel processorsThe complexity and diversity of parallel programming languages and computer architectures hinders programmers in developing programs and greatly limits program portability. All MIMD parallel programming systems, however, address common requirements for process creation, process management, and inte...DPOS; MIMD parallel programming1990
214 Lepreau, JayDRAFT: work in progress - - - comments solicited evolving Mach 3.0 to use migrating threadsLike most operating systems, Mach 3.0 views threads as statically associated with a single task. An alternative model is that of migrating threads, in which a single thread abstraction moves between tasks with the logical flow of control, and "server" code is passively executed. We have compatibly r...DRAFT1993
215 Berzins, MartinData and range-bounded polynomials in ENO methodsEssentially Non-Oscillatory (ENO) methods and Weighted Essentially Non- Oscillatory (WENO) methods are of fundamental importance in the numerical solution of hyperbolic equations. A key property of such equations is that the solution must remain positive or lie between bounds. A modification of the ...2012-01-01
216 Hansen, Charles D.Data distributed, parallel algorithm for ray-traced volume renderingThis paper presents a divide-and-conquer ray-traced volume rendering algorithm and a parallel image compositing method, along with their implementation and performance on the connection Machine CM-5, and networked workstations. This algorithm distributes both the data and the computations to individ...Volume rendering; Ray tracing; ; Computer algorithms; Scientific visualization; Network computing; Massively parallel processing1993
217 Hansen, Charles D.Data distributed, parallel algorithm for ray-traced volume renderingThis paper presents a divide-and-conquer ray-traced volume rendering algorithm and a parallel image compositing method, along with their implementation and performance on the Connection Machine CM-5, and networked workstations. This algorithm distributes both the data and the computations to individ...Volume rendering; Ray tracing; ; Computer algorithms; Scientific visualization; Network computing; Massively parallel processing1993
218 Davis, Alan L.Data driven nets: a maximally concurrent, procedural, parallel process representation for distributed control systemsA procedural parallel process representation, known as data-driven nets is described. The sequencing mechanism of the data-driven representation is based on the principle of data dependency. Operations are driven into action by the arrival of the required working set of input operands. Execution of ...Data driven nets1978
219 Susarla, Sai R.; Carter, JohnDataStations: ubiquitous transient storage for mobile usersIn this paper, we describe DataStations, an architecture that provides ubiquitous transient storage to arbitrary mobile applications. Mobile users can utilize a nearby DataStation as a proxy cache for their remote home file servers, as a file server to meet transient storage needs, and as a platf...DataStations; Ubiquitous transient storage; Proxy cache2003-11-14
220 Davis, A.L.Dataflow computers: a tutorial and surveyThe demand for very high performance computer has encouraged some researchers in the computer science field to consider alternatives to the conventional notions of program and computer organization. The dataflow computer is one attempt to form a new collection of consistent systems ideas to improve ...Dataflow computers1980
221 Gopalakrishnan, GaneshDecomposing the proof of correctness of pipelined microprocessorsWe present a systematic approach to decompose and incrementally build the proof of correctness of pipelined microprocessors. The central idea is to construct the abstraction function using completion functions, one per unfinished instruction, each of which specify the effect (on the observables) of ...Pipelined microprocessors; Proof of correctness1998
222 Nguyen, Hoa Thanh; Nguyen, Thanh Hoang; Freire, JulianaDeepPeep: A Form Search EngineWe present DeepPeep (http://www.deeppeep.org), a new search engine specialized in Web forms. DeepPeep uses a scalable infrastructure for discovering, organizing and analyzing Web forms which serve as entry points to hidden-Web sites. DeepPeep provides an intuitive interface that allows users t...
223 Bargteil, Adam WadeDeformation embedding for point-based elastoplastic simulationWe present a straightforward, easy-to-implement, point-based approach for animating elastoplastic materials. The core idea of our approach is the introduction of embedded space-the least-squares best fit of the material's rest state into three dimensions. Nearest neighbor queries in the embedded spa...2014-01-01
224 Regehr, JohnDeriving abstract transfer functions for analyzing embedded softwareThis paper addresses the problem of creating abstract transfer functions supporting dataflow analyses. Writing these functions by hand is problematic: transfer functions are difficult to understand, difficult to make precise, and difficult to debug. Bugs in transfer functions are particularly seriou...2006-01-01
225 Gopalakrishnan, GaneshDeriving efficient cache coherence protocols through refinementWe address the problem of developing efficient cache coherence protocols for use in distributed systems implementing distributed shared memory (DSM) using message passing. A serious drawback of traditional approaches to this problem is that the users are required to state the desired coherence prot...Cache coherence protocols; DSM; Message passing1997
201 - 225 of 912