201 - 225 of 989
Number of results to display per page
CreatorTitleDescriptionSubjectDate
201 Sikorski, KrisComplexity of computing topological degree of Lipschitz functions in n dimensionsWe find lower and upper bounds on the complexity, comp(deg), of computing t h e topological degree of functions defined on the n-dimensional unit cube Cn, f : ?Cn Rn,n ? 2, which satisfy a Lipschitz condition with constant K and whose infinity norm at each point on t h e boundary of Cn is at least d...Lipschitz functions1986
202 Brandt, Richard C.Building databases for the computer-based memorization systemThe Computer-Based Memorization System (CBMS) consists of eight games used by students to memorize groups of related facts that are stored in an associative network. The instructional design is built into the games. Designing and implementing associative networks for the CBMS is very different from...Computer-Based Memorization System; CBMS1988
203 Hansen, Charles D.Cost-effective data-parallel load balancingLoad balancing algorithms improve a program's performance on unbalanced datasets, but can degrade performance on balanced datasets, because unnecessary load redistributions occur. This paper presents a cost-effective data-parallel load balancing algorithm which performs load redistributions only...Load balancing1995
204 Bruderlin, BeatRobust solid modeling by avoiding redundancy for manifold objects in boundary representationThis paper describes a new approach to the robustness problem in solid modeling. We identify as t h e main cause of t h e lack of robustness that interdependent topological relations are derived from approximate data. Disregarding the interdependencies very likely violates basic properties, such as...Robust solid modeling; Manifold objects; Boundary representation; Robustness problem1993
205 Sobh, Tarek M.Active inspection and reverse engineeringWe propose a new design for inspection and reverse engineering environments. In particular, we investigate the use of discrete event dynamic systems (DEDS) to guide and control the active exploration and sensing of mechanical parts for industrial inspection and reverse engineering. We introduce dyn...Discrete event dynamic systems; DEDS; Industrial inspection1993
206 Hansen, Charles D.; Henderson, Thomas C.CAD-based roboticsWe describe an approach which facilitates and makes explicit the organization of the knowledge necessary to map robotic system requirements onto an appropriate assembly of algorithms, processors, sensor, and actuators. In order to achieve this mapping, several kinds of knowledge are needed. In this ...CAD-based robotics; CAD-based vision; CAGD System1987
207 Gopalakrishnan, GaneshPrecision on demand: an improvement in probabilistic hashingIn explicit state (enumerative) model checking, state vectors are often represented in a compressed form in order to reduce storage needs, typically employing fingerprints, bithashes, or state signatures. When using this kind of techniques, it could happen that the compressed image of a nonvisite...Probabilistic hashing; Model checking2007
208 Subrahmanyam, P.A.A new approach to specifying and handling exceptionsAn operation generally exhibits different patterns of behavior over different parts of its domain. Depending upon the context, such behavior may either be conceived of as "normal" or as an "exception." Thus, the behavior of an operation Is quite naturally characterized by the set of partial operatio...Computer operations; Exceptions; Exception handling1980
209 Back, Godmar V.Processes in KaffeOS: lsolation, resource management, and sharing in JavaSingle-language runtime systems, in the form of Java virtual machines, are widely deployed platforms for executing untrusted mobile code. These runtimes provide some of the features that operating systems provide: inter-application memory protection and basic system services. They do not. however, p...KaffeOS; Single-language; Java virtual machines; Mobile code; Runtimes2000
210 Weinstein, DavidStream bundles - cohesive advection through flow fieldsStreamline advection has proven an effective method for visualizing vector flow field data. Traditional streamlines do not, however, provide for investigating the coarsergrained features of complex datasets, such as the white matter tracts in the brain or the thermal conveyor belts in the ocean. In ...Stream bundles; advection; Streamline advection; vector flow field data1999
211 Henderson, Thomas C.Multisensor knowledge systemsWe describe an approach which facilitates and makes explicit the organization of the knowledge necessary to map multisensor system requirements onto an appropriate assembly of algorithms, processors, sensors, and actuators. We have previously introduced the Multisensor Kernel System and Logical Sen...Multisensors; Multisensor Kernel System; Multisensor systems1986
212 Yang, Yue; Gopalakrishnan, Ganesh; Lindstrom, Gary E.A generic operational memory model specification framework for multithreaded program verificationGiven the complicated nature of modern architectural and language level memory model designs, it is vital to have a systematic ap- proach for specifying memory consistency requirements that can support verification and promote understanding. In this paper, we develop a spec- ification methodolog...Multithreaded program verification2003
213 Balasubramonian, RajeevInterconnect-aware coherence protocols for chip multiprocessorsImprovements in semiconductor technology have made it possible to include multiple processor cores on a single die. Chip Multi-Processors (CMP) are an attractive choice for future billion transistor architectures due to their low design complexity, high clock frequency, and high throughput. In a...Interconnects; Chip multiprocessors; Coherence2006
214 Henderson, Thomas C.Instrumented sensor system - practiceIn previous work, we introduced the notion of Instrumented Logical Sensor Systems (ILSS) that are derived from a modeling and design methodology [4, 2]. The instrumented sensor approach is based on a sensori-computational model which defines the components of the sensor system in terms of their func...Instrumented Logical Sensor Systems; ILSS1997
215 Hansen, Charles D.Knowledge-based out-of-core algorithms for data management in visualizationData management is the very first issue in handling very large datasets. Many existing out-of-core algorithms used in visualization are closely coupled with application-specific logic. This paper presents two knowledgebased out-of-core prefetching algorithms that do not use hard-coded rendering-re...2006
216 Henderson, Thomas C.Parallel path consistencyFiltering algorithms are well accepted as a means of speeding up the solution of the consistent labeling problem (CLP). Despite the fact that path consistency does a better job of filtering than arc consistency, AC is still the preferred technique because it has a much lower time complexity. We ar...Filtering algorithms; Parallel paths; Consistency; Consistent labeling problem; CLP1991
217 Riloff, Ellen M.Information extraction as a stepping stone toward story understandingHistorically story understanding systems have depended on a great deal of handcrafted knowledge. Natural language understanding systems that use conceptual knowledge structures (Schank and Abelson 1977; Cullingford 1978; Wilensky 1978; Carbonell 1979; Lehnert 1981; Kolodner 1983) typically rely on ...Information extraction; Story understanding1999
218 Ashton, Alan ConwayElectronics, music and computersElectronic and computer technology has had and will continue to have a marked effect in the field of music. Through the years scientists, engineers, and musicians have applied available technology to new musical instruments, innovative musical sound production, sound analysis, and musicology. At the...Computers; Music1971
219 Hansen, Charles D.Multidimensional transfer functions for interactive volume renderingAbstract-Most direct volume renderings produced today employ one-dimensional transfer functions which assign color and opacity to the volume based solely on the single scalar quantity which comprises the data set. Though they have not received widespread attention, multidimensional transfer function...2002-07
220 Gopalakrishnan, GaneshTiming constraints for high speed counterflow-clocked pipeliningWith the escalation of clock frequencies and the increasing ratio of wire- to gate-delays, clock skew is a major problem to be overcome in tomorrow's high-speed VLSI chips. Also, with an increasing number of stages switching simultaneously comes the problem of higher peak power consumption. In our ...Timing constraints; clock frequencies; clock skew; high-speed; VLSI chips; counterflow-clocked pipelining1995
221 Smith, Kent F.PPL quick reference guide (NMOS)This work was supported in part by Defense Research Projects Agency under Contract Number DAAK1184K0017. All opinions, findings, conclusions or recommendations expressed in this document are those of the author(s) and do not necessarily reflect the view of DARPA.NMOS1986
222 Seeley, DonnA tour of the wormOn the evening of November 2, 1988, a self-replicating program was released upon the Internet 1. This program (a worm) invaded VAX and Sun-3 computers running versions of Berkeley UNIX, and used their sources to attack still more computers2. Within the space of hours this program had spread aacross ...Computer worm1989
223 Free form surface analysis using a hybrid of symbolic and numeric computationDetailed analysis of many mathematical properties of sculptured models has been hindered by the fact that the properties do not have the same representation as the surface For example unit tangents surface normals and principal curvatures are typically computed at prede??ned discrete sets of ...Surface analysis1992
224 Gopalakrishnan, GaneshPeephole optimization of asynchronous networks through process composition and burst-mode machine generationIn this paper, we discuss the problem of improving the efficiency of macromodule networks generated through asynchronous high level synthesis. We compose the behaviors of the modules in the sub-network being optimized using Dill's trace-theoretic operators to get a single behavioral description for ...Peephole optimization; Macromodule networks; Process composition; Burst-mode1993
225 Bhanu, BirShape matching of two-dimensional objectsIn this paper we present results in the areas of shape matching of nonoccluded and occluded two-dimensional objects. Shape matching is viewed as a "segment matching" problem. Unlike the previous work, the technique is based on a stochastic labeling procedure which explicitly maximizes a criterion ...Shape matching; Two-dimensional objects; Segment matching1984
201 - 225 of 989