Search For:

Displaying 1-50 out of 439 total
Gesture controllers
Found in: ACM Transactions on Graphics (TOG)
By Philipp Krahenbuhl, Sebastian Thrun, Sergey Levine, Vladlen Koltun, Philipp Krahenbuhl, Sebastian Thrun, Sergey Levine, Vladlen Koltun, Philipp Krahenbuhl, Sebastian Thrun, Sergey Levine, Vladlen Koltun, Philipp Kra
Issue Date:July 2010
pp. 1-10
We introduce gesture controllers, a method for animating the body language of avatars engaged in live spoken conversation. A gesture controller is an optimal-policy controller that schedules gesture animations in real time based on acoustic features in the...
     
HYDRA: the kernel of a multiprocessor operating system
Found in: Communications of the ACM
By A. Jones, C. Pierson, C. Pierson, C. Pierson, E. Cohen, E. Cohen, E. Cohen, F. Pollack, F. Pollack, F. Pollack, R. Levin, R. Levin, R. Levin, W. Corwin, W. Corwin, W. Corwin, W. Wulf, W. Wulf, W. Wulf
Issue Date:June 1974
pp. 337-345
This paper describes the design philosophy of HYDRA—the kernel of an operating system for C.mmp, the Carnegie-Mellon Multi-Mini-Processor. This philosophy is realized through the introduction of a generalized notion of “resource,” both ph...
     
SAGE: whitebox fuzzing for security testing
Found in: Communications of the ACM
By David Molnar, Michael Y. Levin, Michael Y. Levin, Patrice Godefroid, Patrice Godefroid
Issue Date:March 2012
pp. 40-44
SAGE has had a remarkable impact at Microsoft.
     
Real-time prosody-driven synthesis of body language
Found in: ACM Transactions on Graphics (TOG)
By Christian Theobalt, Sergey Levine, Vladlen Koltun, Christian Theobalt, Sergey Levine, Vladlen Koltun
Issue Date:December 2009
pp. 1-2
Human communication involves not only speech, but also a wide variety of gestures and body motions. Interactions in virtual environments often lack this multi-modal aspect of communication. We present a method for automatically synthesizing body language a...
     
NEAT-o-Games: blending physical activity and fun in the daily routine
Found in: Computers in Entertainment (CIE)
By Colin Puri, Ioannis Pavlidis, James Levine, Konstantinos Kazakos, Pradeep Buddharaju, Yuichi Fujiki, Colin Puri, Ioannis Pavlidis, James Levine, Konstantinos Kazakos, Pradeep Buddharaju, Yuichi Fujiki
Issue Date:July 2008
pp. 1-8
This article describes research that aims to encourage physical activity through a novel pervasive gaming paradigm. Data from a wearable accelerometer are logged wirelessly to a cell phone and control the animation of an avatar that represents the player i...
     
CTER Online: Evaluation of an Online Master of Education Focusing on Curriculum, Technology and Education Reform
Found in: Hawaii International Conference on System Sciences
By S. Levin, J. Levin, G. Waddoups
Issue Date:January 2001
pp. 1008
No summary available.
   
A switched parametric and transform audio coder
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By S.N. Levine, S.N. Levine
Issue Date:March 1999
pp. 985-988
In this paper, we present a system of sines+transients+noise modeling techniques that dynamically switches between parametric representations and transform coding based representations. The sines and noise are represented by parametric models using multire...
 
Fully Automated Recognition of Spontaneous Facial Expressions in Videos Using Random Forest Classifiers
Found in: IEEE Transactions on Affective Computing
By Mostafa K. Abd El Meguid,Martin D. Levine
Issue Date:April 2014
pp. 1-1
This paper discusses the design and implementation of a fully automated comprehensive facial expression detection and classification framework. It uses a proprietary face detector (PittPatt) and a novel classifier consisting of a set of Random Forests pair...
 
Efficient Tagging of Remote Peers During Child Pornography Investigations
Found in: IEEE Transactions on Dependable and Secure Computing
By Marc Liberatore,Brian Levine,Clay Shields,Brian Lynn
Issue Date:March 2014
pp. 1
Measurements of the Internet for law enforcement purposes must be forensically valid. We examine the problems inherent in using various network- and application-level identifiers in the context of forensic measurement, as exemplified in the policing of pee...
 
Lattice Cleaving: A Multimaterial Tetrahedral Meshing Algorithm with Guarantees
Found in: IEEE Transactions on Visualization and Computer Graphics
By Jonathan Bronson,Joshua A. Levine,Ross Whitaker
Issue Date:February 2014
pp. 223-237
We introduce a new algorithm for generating tetrahedral meshes that conform to physical boundaries in volumetric domains consisting of multiple materials. The proposed method allows for an arbitrary number of materials, produces high-quality tetrahedral me...
 
Automating Discovery of Dominance in Synchronous Computer-Mediated Communication
Found in: 2014 47th Hawaii International Conference on System Sciences (HICSS)
By Jim Samuel,Richard Holowczak,Raquel Benbunan-Fich,Ilan Levine
Issue Date:January 2014
pp. 1804-1812
With the advent of electronic interaction, dominance (or the assertion of control over others) has acquired new dimensions. This study investigates the dynamics and characteristics of dominance in virtual interaction by analyzing electronic chat transcript...
   
Accurate Blur Models vs. Image Priors in Single Image Super-resolution
Found in: 2013 IEEE International Conference on Computer Vision (ICCV)
By Netalee Efrat,Daniel Glasner,Alexander Apartsin,Boaz Nadler,Anat Levin
Issue Date:December 2013
pp. 2832-2839
Over the past decade, single image Super-Resolution (SR) research has focused on developing sophisticated image priors, leading to significant advances. Estimating and incorporating the blur model, that relates the high-res and low-res images, has received...
 
Inverse volume rendering with material dictionaries
Found in: ACM Transactions on Graphics (TOG)
By Anat Levin, Ioannis Gkioulekas, Shuang Zhao, Todd Zickler, Kavita Bala
Issue Date:November 2013
pp. 1-13
Translucent materials are ubiquitous, and simulating their appearance requires accurate physical parameters. However, physically-accurate parameters for scattering materials are difficult to acquire. We introduce an optimization framework for measuring bul...
     
SIDR: structure-aware intelligent data routing in Hadoop
Found in: Proceedings of SC13: International Conference for High Performance Computing, Networking, Storage and Analysis (SC '13)
By Aaron Torres, Adam Crume, Greg Levin, Joe Buck, Noah Watkins, Carlos Maltzahn, Kleoni Ioannidou, Neoklis Polyzotis, Scott Brandt
Issue Date:November 2013
pp. 1-12
The MapReduce framework is being extended for domains quite different from the web applications for which it was designed, including the processing of big structured data, e.g., scientific and financial data. Previous work using MapReduce to process scient...
     
Shape Deformation via Interior RBF
Found in: IEEE Transactions on Visualization and Computer Graphics
By Zohar Levi,David Levin
Issue Date:November 2013
pp. 1
We present a new framework for real-time shape deformation with local shape preservation and volume control. Given a 3D object, in any form, one would like to manipulate the object using convenient handles, so that the resulting shape is a natural variatio...
 
Shape Deformation via Interior RBF
Found in: IEEE Transactions on Visualization and Computer Graphics
By Zohar Levi,David Levin
Issue Date:November 2013
pp. 1
We present a new framework for real-time shape deformation with local shape preservation and volume control. Given a 3D object, in any form, one would like to manipulate the object using convenient handles, so that the resulting shape is a natural variatio...
 
Understanding US Trade Controls
Found in: Computer
By Brian M. Gaff,David J. Levine,Raymond Gabriel
Issue Date:November 2013
pp. 10-13
US trade controls, including export controls and trade sanctions, impose complex and ever-changing requirements and restrictions on transactions and transfers of goods, technology, software, and services.
 
OFF-set: one-pass factorization of feature sets for online recommendation in persistent cold start settings
Found in: Proceedings of the 7th ACM conference on Recommender systems (RecSys '13)
By Edward Bortnikov, Liron Levin, Michal Aharon, Natalie Aizenberg, Ohad Serfaty, Ran Roth, Roi Adadi, Ronny Lempel, Tomer Benyamini
Issue Date:October 2013
pp. 375-378
One of the most challenging recommendation tasks is recommending to a new, previously unseen user. This is known as the user cold start problem. Assuming certain features or attributes of users are known, one approach for handling new users is to initially...
     
Efficient Tagging of Remote Peers During Child Pornography Investigations
Found in: IEEE Transactions on Dependable and Secure Computing
By Marc Liberatore,Brian Neil Levine,Clay Shields,Brian Lynn
Issue Date:October 2013
pp. 1
Measurements of the Internet for law enforcement purposes must be forensically valid. We examine the problems inherent in using various network- and application-level identifiers in the context of forensic measurement, as exemplified in the policing of pee...
 
A slick control plane for network middleboxes
Found in: Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking (HotSDN '13)
By Bilal Anwer, Dave Levin, Jennifer Rexford, Nick Feamster, Theophilus Benson
Issue Date:August 2013
pp. 147-148
We provide a brief overview of the vulnerabilities present in the OpenFlow protocol as it is currently deployed by hardware and software vendors. We identify a widespread failure to adopt TLS for the OpenFlow control channel by both controller and switch v...
     
Software transactional networking: concurrent and consistent policy composition
Found in: Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking (HotSDN '13)
By Dan Levin, Marco Canini, Petr Kuznetsov, Stefan Schmid
Issue Date:August 2013
pp. 1-6
It seems natural to imagine that SDN policy specification and control is distributed, and this paper focuses on the resulting concurrency issues. Indeed, conflicts among concurrent policy updates may result in serious inconsistencies on the data plane, eve...
     
Incremental SDN deployment in enterprise networks
Found in: Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM (SIGCOMM '13)
By Anja Feldmann, Dan Levin, Marco Canini, Stefan Schmid
Issue Date:August 2013
pp. 473-474
Numerous smart devices are deployed in smart grid for state measurement, decision-making and remote control. The security issues of smart devices attract more and more attention. In our work, the communication protocol, storage mechanism and authentication...
     
Spec2Fab: a reducer-tuner model for translating specifications to 3D prints
Found in: ACM Transactions on Graphics (TOG)
By David I. W. Levin, Desai Chen, Piotr Didyk, Pitchaya Sitthi-Amorn, Wojciech Matusik
Issue Date:July 2013
pp. 1-10
Multi-material 3D printing allows objects to be composed of complex, heterogenous arrangements of materials. It is often more natural to define a functional goal than to define the material composition of an object. Translating these functional requirement...
     
Fabricating BRDFs at high spatial resolution using wave optics
Found in: ACM Transactions on Graphics (TOG)
By Anat Levin, Daniel Glasner, Frédo Durand, Todd Zickler, William Freeman, Wojciech Matusik, Ying Xiong
Issue Date:July 2013
pp. 1-14
Recent attempts to fabricate surfaces with custom reflectance functions boast impressive angular resolution, yet their spatial resolution is limited. In this paper we present a method to construct spatially varying reflectance at a high resolution of up to...
     
Eulerian-on-lagrangian simulation
Found in: ACM Transactions on Graphics (TOG)
By David I. W. Levin, Dinesh K. Pai, Joshua Litven, Ye Fan
Issue Date:June 2013
pp. 1-9
We describe an Eulerian-on-Lagrangian solid simulator that reduces or eliminates many of the problems experienced by fully Eulerian methods but retains their advantages. Our method does not require the construction of an explicit object discretization and ...
     
Fighting internet-based sexual exploitation crimes against children
Found in: Proceedings of the 6th International Systems and Storage Conference (SYSTOR '13)
By Brian Levine
Issue Date:June 2013
pp. 1-1
Working with law enforcement and criminologists, my research group has been developing strategies to fight online child sexual exploitation. Investigators in the US and other countries have been using our Internet-based tools daily, acquiring evidence that...
     
Multivariate difference-differential dimension polynomials and new invariants of difference-differential field extensions
Found in: Proceedings of the 38th international symposium on International symposium on symbolic and algebraic computation (ISSAC '13)
By Alexander B. Levin
Issue Date:June 2013
pp. 267-274
We introduce a method of characteristic sets with respect to several term orderings for difference-differential polynomials. Using this technique, we obtain a method of computation of multivariate dimension polynomials of finitely generated difference-diff...
     
Agent based simulation for training and assessing students in the field of anesthesiology
Found in: 2013 IEEE 26th International Symposium on Computer-Based Medical Systems (CBMS)
By Jason H. Epstein,Matthew Levin,Mark S. Jowell
Issue Date:June 2013
pp. 332-336
Preoperative evaluation is a critical skill for anesthesiologists. Training and assessing the performance of residents with standardized patients is expensive, time consuming and resource intensive. In certain cases, virtual humans may provide more fidelit...
   
Online Dominant and Anomalous Behavior Detection in Videos
Found in: 2013 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Mehrsan Javan Roshtkhari,Martin D. Levine
Issue Date:June 2013
pp. 2611-2618
We present a novel approach for video parsing and simultaneous online learning of dominant and anomalous behaviors in surveillance videos. Dominant behaviors are those occurring frequently in videos and hence, usually do not attract much attention. They ca...
 
A benchmark for surface reconstruction
Found in: ACM Transactions on Graphics (TOG)
By Claudio T. Silva, Gabriel Taubin, Joshua A. Levine, Luis Gustavo Nonato, Matthew Berger
Issue Date:April 2013
pp. 1-17
We present a benchmark for the evaluation and comparison of algorithms which reconstruct a surface from point cloud data. Although a substantial amount of effort has been dedicated to the problem of surface reconstruction, a comprehensive means of evaluati...
     
Forbidden information
Found in: Journal of the ACM (JACM)
By Leonid A. Levin
Issue Date:April 2013
pp. 1-9
Gödel Incompleteness Theorem leaves open a way around it, vaguely perceived for a long time but not clearly identified. (Thus, Gödel believed informal arguments can answer any math question.) Closing this loophole does not seem obvious and involv...
     
Visual Saliency Based on Scale-Space Analysis in the Frequency Domain
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Jian Li,M. D. Levine, Xiangjing An, Xin Xu, Hangen He
Issue Date:April 2013
pp. 996-1010
We address the issue of visual saliency from three perspectives. First, we consider saliency detection as a frequency domain analysis problem. Second, we achieve this by employing the concept of nonsaliency. Third, we simultaneously consider the detection ...
 
Approximation Algorithms for a Minimization Variant of the Order-Preserving Submatrices and for Biclustering Problems
Found in: ACM Transactions on Algorithms (TALG)
By Asaf Levin, Dorit S. Hochbaum
Issue Date:March 2013
pp. 1-12
Finding a largest Order-Preserving SubMatrix, OPSM, is an important problem arising in the discovery of patterns in gene expression. Ben-Dor et al. formulated the problem in Ben-Dor et al. [2003]. They further showed that the problem is NP-complete and pro...
     
Toward Order Set Optimization Using Click Cost Criteria in the Pediatric Environment
Found in: 2013 46th Hawaii International Conference on System Sciences (HICSS)
By Yiye Zhang,James E. Levin,Rema Padman
Issue Date:January 2013
pp. 2575-2584
Order sets as part of computerized provider order entry (CPOE) have the potential to improve care delivery by making it faster and easier for physicians to enter orders and by guiding care according to known best practices. Currently, order sets are not ut...
   
Visualizing Network Traffic to Understand the Performance of Massively Parallel Simulations
Found in: IEEE Transactions on Visualization and Computer Graphics
By A. G. Landge,J. A. Levine,A. Bhatele,K. E. Isaacs,T. Gamblin,M. Schulz,S. H. Langer,Peer-Timo Bremer,V. Pascucci
Issue Date:December 2012
pp. 2467-2476
The performance of massively parallel applications is often heavily impacted by the cost of communication among compute nodes. However, determining how to best use the network is a formidable task, made challenging by the ever increasing size and complexit...
 
Interactive traffic-aware route search on smartphones
Found in: Proceedings of the First ACM SIGSPATIAL International Workshop on Mobile Geographic Information Systems (MobiGIS '12)
By Roy Levin, Yaron Kanza
Issue Date:November 2012
pp. 1-8
Route search is an application for planning an efficient route via points of interest specified by search terms. Essentially, the search requires to find the fastest route, from the location of the user to a specified destination, through geographical enti...
     
Concurrent and robust topological map matching
Found in: Proceedings of the 20th International Conference on Advances in Geographic Information Systems (SIGSPATIAL '12)
By Elad Kravi, Roy Levin, Yaron Kanza
Issue Date:November 2012
pp. 617-620
Offline map matching is a process of associating a sequence of GPS location readings measured with a device held by a traveling user, to the real-world roads that were presumably traveled by the user. The main goals in map matching are (1) to provide an as...
     
Efficient data restructuring and aggregation for I/O acceleration in PIDX
Found in: 2012 SC - International Conference for High Performance Computing, Networking, Storage and Analysis
By Sidharth Kumar,Venkatram Vishwanath,Philip Carns,Joshua A. Levine,Robert Latham,Giorgio Scorzelli,Hemanth Kolla,Ray Grout,Robert Ross,Michael E. Papka,Jacqueline Chen,Valerio Pascucci
Issue Date:November 2012
pp. 1-11
Hierarchical, multiresolution data representations enable interactive analysis and visualization of large-scale simulations. One promising application of these techniques is to store high performance computing simulation output in a hierarchical Z (HZ) ord...
 
Mapping applications with collectives over sub-communicators on torus networks
Found in: 2012 SC - International Conference for High Performance Computing, Networking, Storage and Analysis
By Abhinav Bhatele,Todd Gamblin,Steven H. Langer,Peer-Timo Bremer,Erik W. Draeger,Bernd Hamann,Katherine E. Isaacs,Aaditya G. Landge,Joshua A. Levine,Valerio Pascucci,Martin Schulz,Charles H. Still
Issue Date:November 2012
pp. 1-11
The placement of tasks in a parallel application on specific nodes of a supercomputer can significantly impact performance. Traditionally, this task mapping has focused on reducing the distance between communicating tasks on the physical network. This mini...
 
Rarity for Semimeasures
Found in: 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science (FOCS)
By Leonid A. Levin
Issue Date:October 2012
pp. 510-513
The notion of Kolmogorov-Martin-Lof Random sequences is extended from computable to enumerable distributions. This allows definitions of various other properties, such as mutual information in infinite sequences. Enumerable distributions (as well as distri...
 
Mesh Processing in Medical-Image Analysis—a Tutorial
Found in: IEEE Computer Graphics and Applications
By J. A. Levine,R. R. Paulsen, Yongjie Zhang
Issue Date:September 2012
pp. 22-28
Medical-image analysis requires an understanding of sophisticated scanning modalities, constructing geometric models, building meshes to represent domains, and downstream biological applications. These four steps form an image-to-mesh pipeline. For researc...
 
An Ensemble Architecture for Learning Complex Problem-Solving Techniques from Demonstration
Found in: ACM Transactions on Intelligent Systems and Technology (TIST)
By Anton Rebguns, Ashwin Ram, Bhavesh Shrestha, Charles Parker, Chongjie Zhang, Daniel Corkill, Daniel McFarlane, Darren Scott Appling, Deborah L. McGuinness, Derek Green, Diana Spears, Elizabeth T. Whitaker, Ethan B. Trewhitt, Geoff Levine, Gerald DeJong, Hala Mostafa, Huzaifa Zafar, Jainarayan Radhakrishnan, James A. Hendler, James R. Michaelis, Janardhan Rao Doppa, Jinhong K. Guo, Kenneth Whitebread, Li Ding, Martin O. Hofmann, Phillip DiBona, Prasad Tadepalli, Reid L. MacTavish, Santiago Ontañón, Subbarao Kambhampati, Sungwook Yoon, Thomas G. Dietterich, Ugur Kuter, Victor Lesser, Weng-Keen Wong, Xiaoqin Shelley Zhang, Zhexuan Song
Issue Date:September 2012
pp. 1-38
We present a novel ensemble architecture for learning problem-solving techniques from a very small number of expert solutions and demonstrate its effectiveness in a complex real-world domain. The key feature of our “Generalized Integrated Learning Ar...
     
Flow Visualization with Quantified Spatial and Temporal Errors Using Edge Maps
Found in: IEEE Transactions on Visualization and Computer Graphics
By H. Bhatia,S. Jadhav,P. Bremer, Guoning Chen,J. A. Levine,L. G. Nonato,V. Pascucci
Issue Date:September 2012
pp. 1383-1396
Robust analysis of vector fields has been established as an important tool for deriving insights from the complex systems these fields model. Traditional analysis and visualization techniques rely primarily on computing streamlines through numerical integr...
 
A secure content network in space
Found in: Proceedings of the seventh ACM international workshop on Challenged networks (CHANTS '12)
By Craig Partridge, David Levin, Derrick Kong, Gregory Lauer, John Lowry, Joseph Loyall, Matthew Gillen, Michael Paulitsch, Robert Walsh, W. Timothy Strayer
Issue Date:August 2012
pp. 43-50
We present a content network architecture for a cluster of satellites flying in low Earth orbit. The cluster uses a dynamic wireless network to interconnect the satellites and has an intermittent link to the ground. Even though a cluster of satellites fly ...
     
Logically centralized?: state distribution trade-offs in software defined networks
Found in: Proceedings of the first workshop on Hot topics in software defined networks (HotSDN '12)
By Andreas Wundsam, Anja Feldmann, Brandon Heller, Dan Levin, Nikhil Handigol
Issue Date:August 2012
pp. 1-6
Software Defined Networks (SDN) give network designers freedom to refactor the network control plane. One core benefit of SDN is that it enables the network control logic to be designed and operated on a global network view, as though it were a centralized...
     
Continuous character control with low-dimensional embeddings
Found in: ACM Transactions on Graphics (TOG)
By Alexis Haraux, Jack M. Wang, Sergey Levine, Vladlen Koltun, Zoran Popović
Issue Date:July 2012
pp. 1-10
Interactive, task-guided character controllers must be agile and responsive to user input, while retaining the flexibility to be readily authored and modified by the designer. Central to a method's ease of use is its capacity to synthesize character motion...
     
The data supercell
Found in: Proceedings of the 1st Conference of the Extreme Science and Engineering Discovery Environment: Bridging from the eXtreme to the campus and beyond (XSEDE '12)
By J. Ray Scott, Jared Yanovich, Jason Sommerfield, Michael Levine, Paul Nowoczynski, Zhihui Zhang
Issue Date:July 2012
pp. 1-11
The Data SuperCell (DSC) is a new, disk-based data archive deployed and in production at the Pittsburgh Supercomputing Center (PSC). It specifically deals with the archival demands of large data processing in an economic way. DSC incorporates PSCs SLASH2, ...
     
Real-Time Semantics-Based Detection of Suspicious Activities in Public Spaces
Found in: 2012 Canadian Conference on Computer and Robot Vision
By Mohannad Elhamod,Martin D. Levine
Issue Date:May 2012
pp. 268-275
Behaviour recognition and video understanding are core components of video surveillance and its real life applications. Recently there has been much effort to devise automated real-time high accuracy video surveillance systems. In this paper, we introduce ...
 
A Multi-Scale Hierarchical Codebook Method for Human Action Recognition in Videos Using a Single Example
Found in: 2012 Canadian Conference on Computer and Robot Vision
By M. J. Roshtkhari,M. D. Levine
Issue Date:May 2012
pp. 182-189
This paper presents a novel action matching method based on a hierarchical codebook of local spatio-temporal video volumes (STVs). Given a single example of an activity as a query video, the proposed method finds similar videos to the query in a video data...
 
Redefining, Reinventing, and Rebuilding Schools for the 21st Century
Found in: eLearn
By Jennifer Levin-Goldberg
Issue Date:April 2012
pp. 19-29
In the words of acclaimed author, Thomas Freidman, our world has gone flat. The workforce has gone global galvanizing international competition. The billion dollar question is Do our students have the skills to succeed and excel in this 21st century market...
     
 1  2 Next >>