Search
Now showing items 1431-1440 of 1850
Probabilistic and Statistical Analysis of Perforated Patterns
(2011-01-19)
We present a new foundation for the analysis and transformation of computer programs.Standard approaches involve the use of logical reasoning to prove that the applied transformation does not change the observable semantics ...
SEEC: A General and Extensible Framework for Self-Aware Computing
(2011-11-07)
Modern systems require applications to balance competing goals, e.g. achieving high performance and low power. Achieving this balance places an unrealistic burden on application programmers who must understand the power ...
Fast and Robust Pyramid-based Image Processing
(2011-11-15)
Multi-scale manipulations are central to image editing but they are also prone to halos. Achieving artifact-free results requires sophisticated edgeaware techniques and careful parameter tuning. These shortcomings were ...
A Benchmark of Computational Models of Saliency to Predict Human Fixations
(2012-01-13)
Many computational models of visual attention have been created from a wide variety of different approaches to predict where people look in images. Each model is usually introduced by demonstrating performances on new ...
Toward a Probabilistic Approach to Acquiring Information from Human Partners Using Language
(2012-01-23)
Our goal is to build robots that can robustly interact with humans using natural language. This problem is extremely challenging because human language is filled with ambiguity, and furthermore, the robot's model of the ...
Structuring Unreliable Radio Networks
(2011-12-22)
In this paper we study the problem of building a connected dominating set with constant degree (CCDS) in the dual graph radio network model. This model includes two types of links: reliable links, which
always deliver ...
Leader Election Using Loneliness Detection
(2011-10-12)
We consider the problem of leader election (LE) in single-hop radio networks with synchronized time slots for transmitting and receiving messages. We assume that the actual number n of processes is unknown, while the size ...
A Frequency Analysis of Monte-Carlo and other Numerical Integration Schemes
(2011-12-14)
The numerical calculation of integrals is central to many computer graphics algorithms such as Monte-Carlo Ray Tracing. We show that such methods can be studied using Fourier analysis. Numerical error is shown to correspond ...
Reasoning about Relaxed Programs
(2011-11-15)
A number of approximate program transformations have recently emerged that enable transformed programs to trade accuracy of their results for increased performance by dynamically and nondeterministically modifying variables ...
CPHash: A Cache-Partitioned Hash Table
(2011-11-26)
CPHash is a concurrent hash table for multicore processors. CPHash partitions its table across the caches of cores and uses message passing to transfer lookups/inserts to a partition. CPHash's message passing avoids the ...