Open Access Repositories: Recent submissions

Now showing items 1901-1920 of 4204

  • Interactive Visual Histories for Vector Graphics 

    Unknown author (2009-06-24)
    Presentation and graphics software enables users to experiment with variations of illustrations. They can revisit recent editing operations using the ubiquitous undo command, but they are limited to sequential exploration. ...

  • Enhanced Visual Authoring Using Operation History 

    Unknown author (2009-06-24)
    Graphical editors have introduced great flexibility to the designer's workflow, providing powerful digital tools and enabling the creation of complex and compelling designs. This thesis presents methods for improving these ...

  • An integrated model of visual attention using shape-based features 

    Unknown author (2009-06-20)
    Apart from helping shed some light on human perceptual mechanisms, modeling visual attention has important applications in computer vision. It has been shown to be useful in priming object detection, pruning interest points, ...

  • An Overview of MOOS-IvP and a Brief Users Guide to the IvP Helm Autonomy Software 

    Unknown author (2009-06-18)
    This document describes the IvP Helm - an Open Source behavior-based autonomy application for unmanned vehicles. IvP is short for interval programming - a technique for representing and solving multi-objective optimizations ...

  • Keeping Mobile Robots Connected 

    Unknown author (2009-06-17)
    Designing robust algorithms for mobile agents with reliable communication is difficult due to the distributed nature of computation, in mobile ad hoc networks (MANETs) the matter is exacerbated by the need to ensure ...

  • Partitioning Strategies for Concurrent Programming 

    Unknown author (2009-06-16)
    This work presents four partitioning strategies, or patterns, useful for decomposing a serial application into multiple concurrently executing parts. These partitioning strategies augment the commonly used task and data ...

  • A Useful Homomorphic Encryption Method 

    Unknown author (2009-06-15)

  • Simple LCD Transmitter Camera Receiver Data Link 

    Unknown author (2009-06-15)
    We demonstrate a freespace optical system using a consumer camera and projector in indoor environments using available devices for visual computing. Through design, prototype and experimentation with this commodity hardware, ...

  • Coherent Reaction 

    Unknown author (2009-06-12)
    Side effects are both the essence and bane of imperative programming. The programmer must carefully coordinate actions to manage their side effects upon each other. Such coordination is complex, error-prone, and fragile. ...

  • The Measurement of Visual Motion 

    Unknown author (1982-12-01)
    The analysis of visual motion divides naturally into two stages: the first is the measurement of motion, for example, the assignment of direction and magnitude of velocity to elements in the image, on the basis of the ...

  • Modeling Radio Networks 

    Unknown author (2009-06-04)
    We describe a modeling framework and collection of foundational composition results for the study of probabilistic distributed algorithms in synchronous radio networks. Existing results in this setting rely on informal ...

  • Gradient Clock Synchronization in Dynamic Networks 

    Unknown author (2009-05-29)
    Over the last years, large-scale decentralized computer networks such as peer-to-peer and mobile ad hoc networks have become increasingly prevalent. The topologies of many of these networks are often highly dynamic. This ...

  • Sepia: a Framework for Natural Language Semantics 

    Unknown author (2009-05-28)
    To help explore linguistic semantics in the context of computational natural language understanding, Sepia provides a realization the central theoretical idea of categorial grammar: linking words and phrases to compositional ...

  • Scene Classification with a Biologically Inspired Method 

    Unknown author (2009-05-10)
    We present a biologically motivated method for scene image classification. The core of the method is to use shape based image property that is provided by a hierarchical feedforward model of the visual cortex [18]. Edge ...

  • The Abstract MAC Layer 

    Unknown author (2009-05-11)
    A diversity of possible communication assumptions complicates the study of algorithms and lower bounds for radio networks. We address this problem by defining an Abstract MAC Layer. This service provides reliable local ...

  • 4D Frequency Analysis of Computational Cameras for Depth of Field Extension 

    Unknown author (2009-05-08)
    Depth of field (DOF), the range of scene depths that appear sharp in a photograph, poses a fundamental tradeoff in photography---wide apertures are important to reduce imaging noise, but they also increase defocus blur. ...

  • ATAC: A Manycore Processor with On-Chip Optical Network 

    Unknown author (2009-05-05)
    Ever since industry has turned to parallelism instead of frequency scaling to improve processor performance, multicore processors have continued to scale to larger and larger numbers of cores. Some believe that multicores ...

  • Remote Store Programming: Mechanisms and Performance 

    Unknown author (2009-05-05)
    This paper presents remote store programming (RSP). This paradigm combines usability and efficiency through the exploitation of a simple hardware mechanism, the remote store, which can easily be added to existing ...

  • Risk Allocation for Multi-agent Systems using Tatonnement 

    Unknown author (2009-04-22)
    This paper proposes a new market-based distributed planning algorithm for multi-agent systems under uncertainty, called MIRA (Market-based Iterative Risk Allocation). In large coordination problems, from power grid management ...

  • Computing Network Coordinates in the Presence of Byzantine Faults 

    Unknown author (2009-04-16)
    Network coordinate systems allow for efficient construction of large-scale distributed systems on the Internet. Coordinates provide locality information in a compact way, without requiring each node to contact every potential ...