# Browse Research and Tech Reports - Computer Science by Title

• (2005-05)
In neighborhood-based texture synthesis, adjacent local regions need to satisfy color continuity constraints in order to avoid visible seams. Such continuity constraints seriously restrict the variability of synthesized ...

application/pdf

PDF (434kB)
• (2006-12)
The Web has been rapidly deepened'' by myriad searchable databases online, where data are hidden behind query interfaces. Guarding data behind them, such query interfaces are the entrances'' or doors'' to the deep ...

application/pdf

PDF (2MB)
• (2012-05-07)
Network algorithms are deployed on large networks, and proper algorithm evaluation is necessary to avoid large-scale outages or performance bottlenecks. However, evaluating a network algorithm in a simulator results ...

application/pdf

PDF (261kB)
• (2006-01)
The computational bottleneck of topology optimization is the solution of a large number of linear systems arising in the finite element analysis. We propose fast iterative solvers for large three-dimensional topology ...

application/pdf

PDF (4MB)
• (2013-01-24)
With the fast growth of (online) content and the need for high quality content services, cloud data centers are increas- ingly becoming the preferred places to store data and re- trieve it from. With a highly variable ...

application/pdf

PDF (576kB)
• (2006-05)
Transactional memory (TM) is a compelling alternative to traditional synchronization, and implementing TM primitives directly in hardware offers a potential performance advantage over software-based methods. In this paper, ...

application/pdf

PDF (200kB)
• (2005-05)
Information extraction is a process that extracts limited semantic concepts from text documents and presents them in an organized way. Unlike several other natural language tasks, information extraction has a direct impact ...

application/pdf

PDF (495kB)
• (2013-06-25)

application/pdf

PDF (631kB)
• (2015)
Inductive invariants can be robustly synthesized using a learning model where the teacher is a program verifier who instructs the learner through concrete program configurations, classified as positive, negative, and ...

application/pdf

PDF (597kB)
• (2008-10)
This dissertation addresses the task of detecting instances of object categories in photographs. We propose modeling an object category as a collection of object parts linked together in a deformable configuration. We ...

application/pdf

PDF (10MB)
• (2008-10)
This dissertation addresses the task of detecting instances of object categories in photographs. We propose modeling an object category as a collection of object parts linked together in a deformable configuration. We ...

application/pdf

PDF (10MB)
• (2005-11)
We present new algorithms for learning a logical model of actions' effects and preconditions in partially observable domains. The algorithms maintain a logical representation of the set of possible action models after each ...

application/pdf

PDF (197kB)
• (2008-04)
This dissertation addresses the task of learning to segment images into meaningful material and object categories. With regards to materials we consider the difficult task of segmenting objects made of transparent materials ...

application/pdf

PDF (7MB)
• (2005-08)
We present a new model checking algorithm for verifying computation tree logic (CTL) properties. Our technique is based on using language inference to learn the fixpoints necessary for checking a CTL formula instead of ...

application/pdf

PDF (232kB)
• (2004-06)
We present a novel approach for verifying safety properties of finite state machines communicating over unbounded FIFO channels that is based on applying machine learning techniques. We assume that we are given a model of ...

application/pdf

PDF (336kB)
• (2006-02)
Making high quality and reliable software systems remains a difficult problem. One approach to address this problem is automated verification which attempts to demonstrate algorithmically that a software system meets its ...

application/pdf

PDF (872kB)
• (2006-04)
Most of the existing learning algorithms take vectors as their input data. A function is then learned in such a vector space for classification, clustering, or dimensionality reduction. However, in some situations, there ...

application/pdf

PDF (185kB)
• (2009-03)
Wireless networks have raised great attention in the past decades because they provide tether-free connectivity. Although much of the e ort in wireless network research has been spent on reducing the interference among the ...

application/pdf

PDF (7MB)
• (2009-03)
Wireless networks have raised great attention in the past decades because they provide tether-free connectivity. Although much of the e ort in wireless network research has been spent on reducing the interference among the ...

application/pdf

PDF (7MB)
• (2010-06-01)
This paper presents the detailed design and implementation of the joint Bluetooth/Wifi scanning framework called UIM, which collects both location information and ad hoc contact of the human movement at the University ...

application/pdf

PDF (282kB)