Search For:

Displaying 1-50 out of 2,264 total
Specifying and using a partitionable group communication service
Found in: ACM Transactions on Computer Systems (TOCS)
By Alan Fekete, Alex Shvartsman, Alex Shvartsman, Alex Shvartsman, Nancy Lynch, Nancy Lynch, Nancy Lynch
Issue Date:February 1992
pp. 171-216
Group communication services are becoming accepted as effective building blocks for the construction of fault-tolerant distributed applications. Many specifications for group communication services have been proposed. However, there is still no agreement a...
     
3D Disaster Scene Reconstruction Using a Canine-Mounted RGB-D Sensor
Found in: 2013 International Conference on Computer and Robot Vision (CRV)
By Jimmy Tran,Alex Ufkes,Alex Ferworn,Mark Fiala
Issue Date:May 2013
pp. 23-28
A 3D map of the interior of a disaster site that pinpoints the location of trapped victims would greatly aid search and rescue efforts. We propose using a canine-mounted RGB-D sensor, a trained rescue dog can carry an image sensor through the site to build...
 
Identification of Key Energy Harvesting Parameters through Monte Carlo Simulations
Found in: Computer Modeling and Simulation, International Conference on
By James Docherty,Alex Bystrov,Alex Yakovlev
Issue Date:March 2012
pp. 486-490
As the number of embedded systems increases, so do the demands placed upon them. Current algorithms are capable of creating adequate schedules under ideal conditions, but can be considered inadequate when many variables must be regarded. End users are dema...
 
Semantic colorization with internet images
Found in: ACM Transactions on Graphics (TOG)
By Alex Yong-Sang Chia, Ping Tan, Raj Kumar Gupta, Shaojie Zhuo, Siu-Yeung Cho, Stephen Lin, Yu-Wing Tai, Alex Yong-Sang Chia, Ping Tan, Raj Kumar Gupta, Shaojie Zhuo, Siu-Yeung Cho, Stephen Lin, Yu-Wing Tai
Issue Date:December 2011
pp. 1-15
Colorization of a grayscale photograph often requires considerable effort from the user, either by placing numerous color scribbles over the image to initialize a color propagation algorithm, or by looking for a suitable reference image from which color in...
     
CRANE: Failure Prediction, Change Analysis and Test Prioritization in Practice -- Experiences from Windows
Found in: Software Testing, Verification, and Validation, 2008 International Conference on
By Jacek Czerwonka, Rajiv Das, Nachiappan Nagappan, Alex Tarvo, Alex Teterev
Issue Date:March 2011
pp. 357-366
Building large software systems is difficult. Maintaining large systems is equally hard. Making post-release changes requires not only thorough understanding of the architecture of a software component about to be changed but also its dependencies and inte...
 
ThinSight: a thin form-factor interactive surface technology
Found in: Communications of the ACM
By Alban Rrustemi, Alex Butler, Alex Butler, Darren West, Darren West, Mike Molloy, Mike Molloy, Shahram Izadi, Shahram Izadi, Steve Hodges, Steve Hodges, William Buxton, William Buxton
Issue Date:December 2009
pp. 90-98
We introduce Plushie, an interactive system that allows nonprofessional users to design their own original plush toys. To design a plush toy, one needs to construct an appropriate two-dimensional (2D) pattern. However, it is difficult for nonprofessional u...
     
(P)REVIEWFrom interface to experience
Found in: interactions
By Alex Wright, Marc Rettig, Alex Wright, Marc Rettig
Issue Date:November 2009
pp. 24-27
Editor's Note: This article proposes several models of community, including a model of "mobile community"---an extension of physical community merged with online community. The authors also provide examples of how these models have contributed to the devel...
     
Efficient simulation of large-scale Spiking Neural Networks using CUDA graphics processors
Found in: Neural Networks, IEEE - INNS - ENNS International Joint Conference on
By Jayram Moorkanikara Nageswaran, Nikil Dutt, Jeffrey L. Krichmar, Alex Nicolau, Alex Veidenbaum
Issue Date:June 2009
pp. 2145-2152
Neural network simulators that take into account the spiking behavior of neurons are useful for studying brain mechanisms and for engineering applications. Spiking Neural Network (SNN) simulators have been traditionally simulated on large-scale clusters, s...
 
A taxonomy for denial of service attacks in content-based publish/subscribe systems
Found in: Proceedings of the 2007 inaugural international conference on Distributed event-based systems (DEBS '07)
By Alex Cheung, Alex Wun, Hans-Arno Jacobsen
Issue Date:June 2007
pp. 116-127
Denial of Service (DoS) attacks continue to affect the availability of critical systems on the Internet. The existing DoS problem is enough to merit significant research dedicated to analyzing and classifying DoS attacks in the Internet context. However, n...
     
Delay/Phase Regeneration Circuits
Found in: Asynchronous Circuits and Systems, International Symposium on
By Crescenzo D'Alessandro, Andrey Mokhov, Alex Bystrov, Alex Yakovlev
Issue Date:March 2007
pp. 105-116
Designs which require a phase relationship between two signals to be maintained along a link benefit from the use of repeaters which actively regenerate this relationship. This paper discusses some implementations of phaseregeneration circuits and attempts...
 
Accelerating Brain Circuit Simulations of Object Recognition with CELL Processors
Found in: Innovative Architecture for Future Generation High-Performance Processors and Systems, International Workshop on
By Andrew Felch, Jayram Moorkanikara Nageswaran, Ashok Chandrashekar, Jeff Furlong, Nikil Dutt, Richard Granger, Alex Nicolau, Alex Veidenbaum
Issue Date:January 2007
pp. 33-42
Humans outperform computers on many natural tasks including vision. Given the human ability to recognize objects rapidly and almost effortlessly, it is pragmatically sensible to study and attempt to imitate algorithms used by the brain. Analysis of the ana...
 
Service-aware Overlay Adaptation in Ambient Networks
Found in: Computing in the Global Information Technology, International Multi-Conference on
By Lawrence Cheng, Kerry Jean, Roel Ocampo, Alex x Alex Galis
Issue Date:August 2006
pp. 21
Developing service-aware self-adaptation systems in heterogeneous and rapidly changing wireless networks such as Ambient Networks is a challenging issue. Key research areas are adaptation policy definition, network context monitoring, and adaptation policy...
 
Online Testing by Protocol Decomposition
Found in: On-Line Testing Symposium, IEEE International
By Deepali Koppad, Danil Sokolov, Alex Bystrov, Alex Yakovlev
Issue Date:July 2006
pp. 263-268
Comparison between synchronous and asynchronous models leads to a protocol-based fault model for asynchronous circuits. Protocol monitoring of the control path is separated from data comparison in the data path. A novel protocol decomposition technique is ...
 
Multiple-Rail Phase-Encoding for NoC
Found in: Asynchronous Circuits and Systems, International Symposium on
By Crescenzo D'Alessandro, Delong Shang, Alex Bystrov, Alex Yakovlev, Oleg Maevsky
Issue Date:March 2006
pp. 107-116
A novel self-timed communication protocol is based upon phase-modulation of a reference signal. The reference and the data are sent on the same transmission lines and the data can be recovered observing the sequence of events on the same lines. Employing s...
 
A Floor Sensor System for Gait Recognition
Found in: Automatic Identification Advanced Technologies, IEEE Workshop on
By Lee Middleton, Alex A. Buss, Alex Bazin, Mark S. Nixon
Issue Date:October 2005
pp. 171-176
This paper describes the development of a prototype floor sensor as a gait recognition system. This could eventually find deployment as a standalone system (eg. a burglar alarm system) or as part of a multimodal biometric system. The new sensor consists of...
 
Optimal Placement of Access Point in WLAN Based on a New Algorithm
Found in: Mobile Business, International Conference on
By S. Kouhbor, Julien Ugon, Alex Kruger, Alex Rubinov
Issue Date:July 2005
pp. 592-598
When designing wireless communication systems, it is very important to know the optimum numbers and locations for the access points (APs). The impact of incorrect placement of APs is significant. If they are placed too far apart, they will generate a cover...
 
Power-Balanced Self Checking Circuits for Cryptographic Chips
Found in: On-Line Testing Symposium, IEEE International
By Julian Murphy, Alex Bystrov, Alex Yakovlev
Issue Date:July 2005
pp. 157-162
Cryptographic chips are highly susceptible to fault injection and power analysis attacks, which easily lets an attacker gain secret keys intended to be secure. In addition to these issues, testability circuitry is frequently manipulated to induce faults an...
 
Dynamic run-time architecture techniques for enabling continuous optimization
Found in: Proceedings of the 2nd conference on Computing frontiers (CF '05)
By Alex Settle, Alex Shye, Dan Fay, Daniel A. Connors, David Hodgdon, Dirk Grunwald, Joshua L. Kihm, Matthew Iyer, Tipp Moseley, Vijay Janapa Reddi
Issue Date:May 2005
pp. 211-220
Future computer systems will integrate tens of multithreaded processor cores on a single chip die, resulting in hundreds of concurrent program threads sharing system resources. These designs will be the cornerstone of improving throughput in high-performan...
     
Caching Values in the Load Store Queue
Found in: Modeling, Analysis, and Simulation of Computer Systems, International Symposium on
By Dan Nicolaescu, Alex Veidenbaum, Alex Nicolau
Issue Date:October 2004
pp. 580-587
The latency of an L1 data cache continues to grow with increasing clock frequency, cache size and associativity. The increased latency is an important source of performance loss in high-performance processors. This paper proposes to cache data utilizing th...
 
This Year in the MOVES Institute
Found in: Cyberworlds, International Conference on
By Michael Zyda, Don Brutzman, Rudy Darken, John Hiles, Ted Lewis, Alex Mayberry, Russell Shilling, Joe Sullivan, Alex Callahan, Margaret Davis
Issue Date:December 2003
pp. xxxii
The MOVES Institute's mission is research, application, and education in the grand challenges of modeling, virtual environments, and simulation. Specialties are 3D visual simulation, networked virtual environments, computer-generated autonomy, human-perfor...
 
Dynamically Adaptive Fetch Size Prediction for Data Caches
Found in: Innovative Architecture for Future Generation High-Performance Processors and Systems, International Workshop on
By Weiyu Tang, Alex Veidenbaum, Alex Nicolau
Issue Date:July 2003
pp. 40
Cache line size has a significant impact on cache and overall CPU performance. This size is typically fixed at design time and may not be optimal for a given program or even within a program. Past attempts to achieve an effect of dynamic line size require ...
 
Reducing Power Consumption for High-Associativity Data Caches in Embedded Processors
Found in: Design, Automation and Test in Europe Conference and Exhibition
By Dan Nicolaescu, Alex Veidenbaum, Alex Nicolau
Issue Date:March 2003
pp. 11064
Modern embedded processors use data caches with higher and higher degrees of associativity in order to increase performance. A set-associative data cache consumes a significant fraction of the total power budget in such embedded processors. This paper desc...
 
Visualization and Resolution of Coding Conflicts in Asynchronous Circuit Design
Found in: Design, Automation and Test in Europe Conference and Exhibition
By Agnes Madalinski, Alex Bystrov, Victor Khomenko, Alex Yakovlev
Issue Date:March 2003
pp. 10926
Synthesis of asynchronous circuits from Signal Transition Graphs (STGs) involves resolving state coding conflicts. The refinement process is generally done automatically using heuristics and often produces sub-optimal solutions, which have to be corrected ...
 
Guest Editors' Introduction: Application-Specific Microprocessors
Found in: IEEE Design and Test of Computers
By Alex Orailoglu, Alex Veidenbaum
Issue Date:January 2003
pp. 6-7
No summary available.
 
Architectural and Compiler Strategies for Dynamic Power Management in the COPPER Project
Found in: Innovative Architecture for Future Generation High-Performance Processors and Systems, International Workshop on
By Ana Azevedo, Radu Comnea, Ilya Issenin, Rajesh Gupta, Nikil Dutt, Alex Nicolau, Alex Veidenbaum
Issue Date:January 2001
pp. 0025
Abstract: For a range of embedded system applications in mission critical and energy constrained scenarios it is important to be able to dynamically control power consumption in response to changing power availability. In this paper, we present our approac...
 
Lazy transition systems: application to timing optimization of asynchronous circuits
Found in: Proceedings of the 1998 IEEE/ACM international conference on Computer-aided design (ICCAD '98)
By Alex Kondratyev, Alex Yakovlev, Alexander Taubin, Jordi Cortadella, Luciano Lavagno, Michael Kishinevsky
Issue Date:November 1998
pp. 324-331
This work falls within the field of Model-Based Legal Information Retrieval. We were brought to conceive new types of interfaces after having evaluated a legal database available on the Internet. Although legally validated, this legal database JURISQUE-1 w...
     
Lazy Transition Systems: Application to Timing Optimization of Asynchronous Circuits
Found in: Computer-Aided Design, International Conference on
By Alex Kondratyev, Alex Yakovlev, Alexander Taubin, Luciano Lavagno, Michael Kishinevsky, Jordi Cortadella
Issue Date:November 1998
pp. 324-331
The paper introduces Lazy Transitions Systems (LzTSs). The notion of laziness explicitly distinguishes between the enabling and the firing of an event in a transition system. LzTSs can be effectively used to model the behavior of asynchronous circuits in w...
 
Identifying State Coding Conflicts in Asynchronous System Specifications Using Petri Net Unfoldings
Found in: Application of Concurrency to System Design, International Conference on
By Alex Kondratyev, Jordi Cortadella, Michael Kishinevsky, Luciano Lavagno, Alexander Taubin, Alex Yakovlev
Issue Date:March 1998
pp. 152
Yakovlev State coding conflict detection is a fundamental part of synthesis of asynchronous concurrent systems from their specifications as Signal Transition Graphs (STGs), which are a special kind of labelled Petri nets. The paper develops a method for id...
 
Partial order based approach to synthesis of speed-independent circuits.
Found in: Asynchronous Circuits and Systems, International Symposium on
By Alex Semenov, Alex Yakovlev, Enric Pastor, Marco A. Peña, Jordi Cortadella, Luciano Lavagno
Issue Date:April 1997
pp. 254
This paper introduces a novel technique for synthesis of speed-independent circuits from their Signal Transition Graph specifications. The new method uses partial order in the form of the STG-unfolding segment to derive the logic implementation using appro...
 
Technology Mapping for Speed-Independent Circuits: Decomposition and Resynthesis
Found in: Asynchronous Circuits and Systems, International Symposium on
By Alex Kondratyev, Michael Kishinevsky, Jordi Cortadella, Luciano Lavagno, Alex Yakovlev
Issue Date:April 1997
pp. 240
This paper presents theory and practical implementation of a method for multi-level logic synthesis of speed-independent circuits. An initial circuit implementation is assumed to satisfy the monotonous cover conditions but is technology independent. The pr...
 
Technology Mapping of Speed-Independent Circuits Based on Combinational Decomposition and Resynthesis
Found in: European Design and Test Conference
By Jordi Cortadella, Michael Kishinevsky, Alex Kondratyev, Luciano Lavagno, Alex Yakovlev
Issue Date:March 1997
pp. 98
This paper presents a solution to the problem of sequential multi-level logic synthesis of asynchronous speed-independent circuits. The starting point is a technology-independent speed-independent circuit obtained using, e.g., the monotonous cover conditio...
 
Methodology and tools for state encoding in asynchronous circuit synthesis
Found in: Proceedings of the 33rd annual conference on Design automation conference (DAC '96)
By Alex Kondratyev, Alex Yakovlev, Jordi Cortadella, Luciano Lavagno, Michael Kishinevsky
Issue Date:June 1996
pp. 63-66
A new gridless router accelerated by Content Addressable Memory (CAM) is presented. A gridless version of the line-expansion algorithm is implemented, which always finds a path if one exists. The router runs in linear time by means of the CAM-based acceler...
     
Methodology and Tools for State Encoding in Asynchronous Circuit Synthesis
Found in: Design Automation Conference
By Jordi Cortadella, Michael Kishinevsky, Alex Kondratyev, Luciano Lavagno, Alex Yakovlev
Issue Date:June 1996
pp. 63-66
This paper proposes a state encoding method for asynchronous circuits based on the theory of regions. A region in a Transition System is a set of states that
 
Complete State Encoding Based on the Theory of Regions
Found in: Asynchronous Circuits and Systems, International Symposium on
By Jordi Cortadella, Michael Kishinevsky, Alex Kondratyev, Luciano Lavagno, Alex Yakovlev
Issue Date:March 1996
pp. 36
Synthesis of asynchronous circuits from Signal Transition Graphs (STGs) and/or State Graphs (SGs) involves solving state coding problems. A well-known example of such problems is that of Complete State Coding (CSC), which happens when a pair of different s...
 
On hazard-free implementation of speed-independent circuits
Found in: Proceedings of the conference on Asia Pacific design automation conference (CD-ROM) (ASP-DAC '95)
By Alex Kondratyev, Alex Yakovlev, Michael Kishinevsky
Issue Date:August 1995
pp. 38-es
Statisticians and data analysts have always used pictorial representations of data (graphs and charts) to discover and explore relationships between variables, and to communicate their results to other people. Developments in computer hardware and software...
     
Basic gate implementation of speed-independent circuits
Found in: Proceedings of the 31st annual conference on Design automation conference (DAC '94)
By Alex Kondratyev, Alex Yakovlev, Bill Lin, Michael Kishinevsky, Peter Vanbekbergen
Issue Date:June 1994
pp. 56-62
A new gridless router accelerated by Content Addressable Memory (CAM) is presented. A gridless version of the line-expansion algorithm is implemented, which always finds a path if one exists. The router runs in linear time by means of the CAM-based acceler...
     
On the truthfulness and the approximation for scheduling selfish tasks
Found in: Proceedings of the nineteenth annual ACM symposium on Parallel algorithms and architectures (SPAA '07)
By Alex-Ariel Tchetgnia, Eric Angel, Evripidis Bampis, Fanny Pascual
Issue Date:June 2207
pp. 196-197
Balls-into-bins processes are a useful and common abstraction for many load-balancing related problems. A well known paradigm for load balancing in distributed or parallel servers is the "multiple choice paradigm" where an item (ball) is put in the less lo...
     
Topological Transformation Approaches To Database Query Processing
Found in: IEEE Transactions on Knowledge and Data Engineering
By Alok Watve,Sakti Pramanik,Salman Shahid,Chad R. Meiners,Alex Liu
Issue Date:February 2015
pp. 1
This paper presents a novel approach that transforms the feature space into a new feature space such that a range query in the original space is mapped into an equivalent box query in the transformed space. Since box queries are axis aligned, there are sev...
 
Improving Retrieval Efficacy of Homology Searches using the False Discovery Rate
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics
By Hyrum Carroll,Alex Williams,Anthony Davis,John Spouge
Issue Date:February 2015
pp. 1
Over the past few decades, discovery based on sequence homology has become a widely accepted practice. Consequently, comparative accuracy of retrieval algorithms (e.g., BLAST) has been rigorously studied for improvement. Unlike most components of retrieval...
 
Finding Waldo: Learning about Users from their Interactions
Found in: IEEE Transactions on Visualization and Computer Graphics
By Eli T. Brown,Alvitta Ottley,Helen Zhao,Quan Lin,Richard Souvenir,Alex Endert,Remco Chang
Issue Date:February 2015
pp. 1
Visual analytics is inherently a collaboration between human and computer. However, in current visual analytics systems, the computer has limited means of knowing about its users and their analysis processes. While existing research has shown that a user’s...
 
A Practical Data Classification Framework for Scalable and High Performance Chip-Multiprocessors
Found in: IEEE Transactions on Computers
By Yong Li,Rami Melhem,Alex K. Jones
Issue Date:December 2014
pp. 2905-2918
State-of-the-art chip multiprocessor (CMP) proposals emphasize general optimizations designed to deliver computing power for many types of applications. Potentially, significant performance improvements that leverage application-specific characteristics su...
 
High-Speed Datacenter Interconnects [Guest editors' introduction]
Found in: IEEE Micro
By George Porter,Alex C. Snoeren,George Papen
Issue Date:September 2014
pp. 6-7
This introduction to the special issue discusses the challenges surrounding high-speed datacenter interconnects and presents five articles that have novel approaches to achieving efficient, scalable datacenter designs.
   
Heuristics for Designing and Evaluating Socio-technical Agent-Oriented Behaviour Models with Coloured Petri Nets
Found in: 2014 IEEE 38th International Computer Software and Applications Conference Workshops (COMPSACW)
By Msury Mahunnah,Alex Norta,Lixin Ma,Kuldar Taveter
Issue Date:July 2014
pp. 438-443
Software agents are a means to support socio-technical decentralised systems that increase the complexity of daily life. Designing multi-agent systems involves modelling methods for which it is currently not possible to check for soundness before a technic...
 
Semantic Interaction for Visual Analytics: Toward Coupling Cognition and Computation
Found in: IEEE Computer Graphics and Applications
By Alex Endert
Issue Date:July 2014
pp. 8-15
Alex Endert's dissertation "Semantic Interaction for Visual Analytics: Inferring Analytical Reasoning for Model Steering" described semantic interaction, a user interaction methodology for visual analytics (VA). It showed that user interaction em...
 
Camouflaging an Object from Many Viewpoints
Found in: 2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Andrew Owens,Connelly Barnes,Alex Flint,Hanumant Singh,William Freeman
Issue Date:June 2014
pp. 2782-2789
We address the problem of camouflaging a 3D object from the many viewpoints that one might see it from. Given photographs of an object's surroundings, we produce a surface texture that will make the object difficult for a human to detect. To do this, we in...
 
Designing a Contractual Choreography Language for Automating Cross-organizational Business Collaboration
Found in: 2014 IEEE World Congress on Services (SERVICES)
By Alex Norta,Lixin Ma,Yucong Duan
Issue Date:June 2014
pp. 338-345
Automating business collaboration promises efficiency and effectiveness increases with means of service-oriented cloud computing. For automating cross-organizationally connected business processes operation, existing choreography languages are typically te...
 
An Agent-Oriented Method for Designing Large Socio-technical Service-Ecosystems
Found in: 2014 IEEE World Congress on Services (SERVICES)
By Alex Norta,Msury Mahunnah,Tanel Tenso,Kuldar Taveter,Nanjangud C. Narendra
Issue Date:June 2014
pp. 242-249
The development of large socio-technical systems is now more feasible with the availability of service-oriented cloud computing although this results in a higher complexity level with respect to security and dependability in service-ecosystems. Additionall...
 
Automatically Fixing C Buffer Overflows Using Program Transformations
Found in: 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
By Alex Shaw,Dusten Doggett,Munawar Hafiz
Issue Date:June 2014
pp. 124-135
Fixing C buffer overflows at source code level remains a manual activity, at best semi-automated. We present an automated approach to fix buffer overflows by describing two program transformations that automatically introduce two well-known security soluti...
 
Enabling preemptive multiprogramming on GPUs
Found in: 2014 ACM/IEEE 41st International Symposium on Computer Architecture (ISCA)
By Ivan Tanasic,Isaac Gelado,Javier Cabezas,Alex Ramirez,Nacho Navarro,Mateo Valero
Issue Date:June 2014
pp. 193-204
GPUs are being increasingly adopted as compute accelerators in many domains, spanning environments from mobile systems to cloud computing. These systems are usually running multiple applications, from one or several users. However GPUs do not provide the s...
   
ViPZonE: Hardware Power Variability-Aware Virtual Memory Management for Energy Savings
Found in: IEEE Transactions on Computers
By Mark Gottscho,Luis Bathen,Nikil Dutt,Alex Nicolau,Puneet Gupta
Issue Date:June 2014
pp. 1
Hardware variability is predicted to increase dramatically over the coming years as a consequence of continued technology scaling. In this paper, we apply the Underdesigned and Opportunistic Computing (UnO) paradigm by exposing system-level power variabili...
 
 1  2 Next >>