Browse Research and Tech Reports - Computer Science by Title

  • Wu, Qing; Shi, Lin; Yu, Yizhou (2005-05)
    In neighborhood-based texture synthesis, adjacent local regions need to satisfy color continuity constraints in order to avoid visible seams. Such continuity constraints seriously restrict the variability of synthesized ...

    application/pdf

    application/pdfPDF (434Kb)
  • Zhang, Zhen (2006-12)
    The Web has been rapidly ``deepened'' by myriad searchable databases online, where data are hidden behind query interfaces. Guarding data behind them, such query interfaces are the ``entrances'' or ``doors'' to the deep ...

    application/pdf

    application/pdfPDF (2Mb)
  • Bak, Stanley Z. (2012-05-07)
    Network algorithms are deployed on large networks, and proper algorithm evaluation is necessary to avoid large-scale outages or performance bottlenecks. However, evaluating a network algorithm in a simulator results ...

    application/pdf

    application/pdfPDF (261Kb)
  • Wang, Shun; de Sturler, Eric; Paulino, Glaucio H. (2006-01)
    The computational bottleneck of topology optimization is the solution of a large number of linear systems arising in the finite element analysis. We propose fast iterative solvers for large three-dimensional topology ...

    application/pdf

    application/pdfPDF (4Mb)
  • Fesehaye, Debessay (2013-01-24)
    With the fast growth of (online) content and the need for high quality content services, cloud data centers are increas- ingly becoming the preferred places to store data and re- trieve it from. With a highly variable ...

    application/pdf

    application/pdfPDF (576Kb)
  • Baugh, Lee W.; Zilles, Craig (2006-05)
    Transactional memory (TM) is a compelling alternative to traditional synchronization, and implementing TM primitives directly in hardware offers a potential performance advantage over software-based methods. In this paper, ...

    application/pdf

    application/pdfPDF (200Kb)
  • Yih, Wen-tau (2005-05)
    Information extraction is a process that extracts limited semantic concepts from text documents and presents them in an organized way. Unlike several other natural language tasks, information extraction has a direct impact ...

    application/pdf

    application/pdfPDF (495Kb)
  • Pu, Wen; Choi, Jaesik; Amir, Eyal; Espelage, Dorothy L. (2013-06-25)

    application/pdf

    application/pdfPDF (631Kb)
  • Kushal, Akash M. (2008-10)
    This dissertation addresses the task of detecting instances of object categories in photographs. We propose modeling an object category as a collection of object parts linked together in a deformable configuration. We ...

    application/pdf

    application/pdfPDF (10Mb)
  • Kushal, Akash M. (2008-10)
    This dissertation addresses the task of detecting instances of object categories in photographs. We propose modeling an object category as a collection of object parts linked together in a deformable configuration. We ...

    application/pdf

    application/pdfPDF (10Mb)
  • Chang, Allan; Amir, Eyal (2005-11)
    We present new algorithms for learning a logical model of actions' effects and preconditions in partially observable domains. The algorithms maintain a logical representation of the set of possible action models after each ...

    application/pdf

    application/pdfPDF (197Kb)
  • McHenry, Kenton Guadron (2008-04)
    This dissertation addresses the task of learning to segment images into meaningful material and object categories. With regards to materials we consider the difficult task of segmenting objects made of transparent materials ...

    application/pdf

    application/pdfPDF (7Mb)
  • Vardhan, Abhay; Viswanathan, Mahesh (2005-08)
    We present a new model checking algorithm for verifying computation tree logic (CTL) properties. Our technique is based on using language inference to learn the fixpoints necessary for checking a CTL formula instead of ...

    application/pdf

    application/pdfPDF (232Kb)
  • Vardhan, Abhay; Sen, Koushik; Viswanathan, Mahesh; Agha, Gul A. (2004-06)
    We present a novel approach for verifying safety properties of finite state machines communicating over unbounded FIFO channels that is based on applying machine learning techniques. We assume that we are given a model of ...

    application/pdf

    application/pdfPDF (336Kb)
  • Vardhan, Abhay (2006-02)
    Making high quality and reliable software systems remains a difficult problem. One approach to address this problem is automated verification which attempts to demonstrate algorithmically that a software system meets its ...

    application/pdf

    application/pdfPDF (872Kb)
  • Cai, Deng; He, Xiaofei; Han, Jiawei (2006-04)
    Most of the existing learning algorithms take vectors as their input data. A function is then learned in such a vector space for classification, clustering, or dimensionality reduction. However, in some situations, there ...

    application/pdf

    application/pdfPDF (185Kb)
  • Chen, Chun-cheng (2009-03)
    Wireless networks have raised great attention in the past decades because they provide tether-free connectivity. Although much of the e ort in wireless network research has been spent on reducing the interference among the ...

    application/pdf

    application/pdfPDF (7Mb)
  • Chen, Chun-cheng (2009-03)
    Wireless networks have raised great attention in the past decades because they provide tether-free connectivity. Although much of the e ort in wireless network research has been spent on reducing the interference among the ...

    application/pdf

    application/pdfPDF (7Mb)
  • Vu, Long (2010-06-01)
    This paper presents the detailed design and implementation of the joint Bluetooth/Wifi scanning framework called UIM, which collects both location information and ad hoc contact of the human movement at the University ...

    application/pdf

    application/pdfPDF (282Kb)
  • Bailey, Brian P.; Iqbal, Shamsi T. (2005-08)
    Task interruption often has a significant negative impact on a user's productivity and affective state. Cognitive theorists have argued that interrupting the execution of primary tasks at moments of lower mental workload ...

    application/pdf

    application/pdfPDF (434Kb)