- IDEALS Home
- →
- College of Engineering
- →
- Dept. of Computer Science
- →
- Browse Dept. of Computer Science by Title
Browse Dept. of Computer Science by Title
Now showing items 1319-1338 of 2889
-
(1992)This thesis describes CAM (Categories, Agreement, and Morphology), a computer model of several aspects of language acquisition. CAM is based on the Semantic Bootstrapping Hypothesis (Pinker, 1984), and CAM also respects ...
application/pdf
PDF (9MB)
-
(1993)One of the obstacles to be overcome in Natural Language Understanding is the existence of lexical gaps; that is, words or word senses which are not in the lexicon of the system. No lexicon, whether hand-coded or derived ...
application/pdf
PDF (14MB)
-
(1982)One of the problems in building a general purpose operating system is the construction of interfaces between programs that are interdependent but are loaded at different times. This thesis presents a model that generalizes ...
application/pdf
PDF (4MB)
-
(2005-05)In neighborhood-based texture synthesis, adjacent local regions need to satisfy color continuity constraints in order to avoid visible seams. Such continuity constraints seriously restrict the variability of synthesized ...
application/pdf
PDF (434kB)
-
(2010-05)This dissertation investigates novel approaches for analysis and visualization of two kinds of graph, scale-free network and rooted hierarchy, at large scales with thousands to millions of nodes. Scale-free network, ...
application/pdf
PDF (13MB)
-
(2010-05-19)This dissertation investigates novel approaches for analysis and visualization of two kinds of graph, scale-free network and rooted hierarchy, at large scales with thousands to millions of nodes. Scale-free network, ...
application/pdf
PDF (13MB)
-
(2012-05-22)Large lectures are a difficult and complicated area of exploration, both technologically and socially. Here is presented a discussion of existing areas of investigation related to large lectures, including fostering crowd ...
application/pdf
PDF (1MB)
-
(2007)The Web has been rapidly "deepened" by myriad searchable databases online, where data are hidden behind query interfaces. Guarding data behind there, such query interfaces are the "entrances" or "doors" to the deep Web. ...
application/pdf
PDF (5MB)
-
(2006-12)The Web has been rapidly ``deepened'' by myriad searchable databases online, where data are hidden behind query interfaces. Guarding data behind them, such query interfaces are the ``entrances'' or ``doors'' to the deep ...
application/pdf
PDF (2MB)
-
(2013-08-22)Large-scale networks, such as the Internet, cellular networks, play critical roles in today's life. The advancement of large-scale computer and communication networks heavily depends on the successful transformation from ...
application/pdf
PDF (9MB)
-
(2009)We studied the problem of constraint-based pattern mining for three different data formats, item-set, sequence and graph, and focused on mining patterns of large sizes. Colossal patterns in each data formats are studied ...
application/pdf
PDF (1MB)
-
(2012-05-07)Network algorithms are deployed on large networks, and proper algorithm evaluation is necessary to avoid large-scale outages or performance bottlenecks. However, evaluating a network algorithm in a simulator results ...
application/pdf
PDF (261kB)
-
(2006-01)The computational bottleneck of topology optimization is the solution of a large number of linear systems arising in the finite element analysis. We propose fast iterative solvers for large three-dimensional topology ...
application/pdf
PDF (4MB)
-
(2015-11-24)Wide-area Internet links are slow, expensive, and unreliable. This affects applications in two distinct ways. Back-end data processing applications, which need to transfer large amounts of data between data centers across ...
application/pdf
PDF (2MB)
-
(2013-01-24)With the fast growth of (online) content and the need for high quality content services, cloud data centers are increas- ingly becoming the preferred places to store data and re- trieve it from. With a highly variable ...
application/pdf
PDF (576kB)
-
(2001)ESD design rule checking is different from the conventional design rule checking in that not only different rules have to be applied for different components in the ESD protection circuit, but also style of layout is of ...
application/pdf
PDF (5MB)
-
(1983)The NMOS Gate-Cell, a regular structure that supports gate level implementations of random logic is introduced. It is an extension of the Weinberger array, where allowing input/output terminals on all four edges resulted ...
application/pdf
PDF (4MB)
-
(2006-05)Transactional memory (TM) is a compelling alternative to traditional synchronization, and implementing TM primitives directly in hardware offers a potential performance advantage over software-based methods. In this paper, ...
application/pdf
PDF (200kB)
-
(2018-04-15)A key requirement for any agent that wishes to interact with the visual world is the ability to understand the behavior of objects in the scene, primarily through visual means. We humans, through our cognitive system, are ...
application/pdf
PDF (49MB)
-
(2005)The proposed learning and inference frameworks have been applied to a variety of information extraction tasks, including entity extraction, entity/relation recognition, and semantic role labeling.
application/pdf
PDF (3MB)
Now showing items 1319-1338 of 2889