# Browse Research and Tech Reports - Computer Science by Title

• (Lawrence Livermore National Laboratory Technical Report, 2010-08-12)
A means for translating MCNP5 input files into a form that can be run by Mercury, a modern Monte Carlo particle transport code, will allow MCNP5 users to more easily take advantage of the high-performance computing benefits ...

application/pdf

PDF (612Kb)
• (2007-10)
Narrowing is a well-known complete procedure for equational E-unification when E can be decomposed as a union E = \Delta \uplus B with B a set of axioms for which a finitary unification algorithm exists, and \Delta a set ...

application/pdf

PDF (309Kb)
• (2009-03)
For narrowing with a set of rules \Delta modulo a set of axioms B almost nothing is known about terminating narrowing strategies, and basic narrowing is known to be incomplete for B=AC. In this work we ask and answer the ...

application/pdf

PDF (312Kb)
• (2009-03)
For narrowing with a set of rules \Delta modulo a set of axioms B almost nothing is known about terminating narrowing strategies, and basic narrowing is known to be incomplete for B=AC. In this work we ask and answer the ...

application/pdf

PDF (312Kb)
• (2014-02-11)
Variants and the finite variant property were originally introduced about a decade ago by Hurbert Comon-Lundh and Stephanie Delaune to reason about equational theories that commonly appear in cryptographic protocol analysis. ...

application/pdf

PDF (340Kb)
• (2006-05)
Both the measurement and simulation of unsteady flow yield huge datasets of time-varying volumetric vector fields. Flow dynamics researchers face the very difficult task of finding, extracting and analyzing important flow ...

application/pdf

PDF (31Mb)
• (2008-08)
Verifiation and Validation (V&V) is a critically important phase in the development life cycle of a simulation model. In the context of network simulation, traditional network simulators perform well in using a simulation ...

application/pdf

PDF (829Kb)
• (2008-08)
Verifiation and Validation (V&V) is a critically important phase in the development life cycle of a simulation model. In the context of network simulation, traditional network simulators perform well in using a simulation ...

application/pdf

PDF (829Kb)
• (2007-08)
Verification and Validation (V&V) is a critically important phase in the development life cycle of a simulation model. In the context of network simulation, traditional network simulators perform well in using a simulation ...

application/pdf

PDF (298Kb)
• (2004-05)
Metamorphosis is generally known as the continuous evolution of a source into a target. There is frame-to-frame camera or object motion most of the time when either the source or the target is an image sequence. It would ...

application/pdf

PDF (258Kb)
• (2006-12)
Increasing demand for more features and bigger roles of software makes software more and more complex. Unfortunately, increase in the logical and organizational complexity of software generally leads to more bugs. Real-time ...

application/pdf

PDF (468Kb)
• (2006-02)
The lack of available identity information in attribute-based trust management systems complicates the design of the audit and incident response systems, anomaly detection algorithms, collusion detection/prevention mechanisms, ...

application/pdf

PDF (348Kb)
• (2012-08-20)
3D Tele-Immersion (3DTI) system brings 3D data of people from geographically distributed locations into the same virtual space to enable interaction in 3D space. One main obstacle of designing 3DTI system is to overcome ...

application/pdf

PDF (502Kb)
• (2008-04)
This paper proposes novel methods for visualizing specifically the large power-law graphs that arise in sociology and the sciences. In such cases a large portion of edges can be shown to be less important and removed while ...

application/pdf

PDF (5Mb)
• (2008-12)
In face-to-face group situations, social pressure and organizational hierarchy relegate the less outspoken into silence, often resulting in fewer voices, fewer ideas, and group-think. However, in mediated interaction, such ...

application/pdf

PDF (3Mb)
• (2009-12)
In face-to-face group situations, social pressure and organizational hierarchy relegate the less outspoken into silence, often resulting in fewer voices, fewer ideas, and group-think. However, in mediated interaction, such ...

application/pdf

PDF (3Mb)
• (2004-08)
This paper presents the design, analysis and performance evaluation of VRing, a novel application-layer multicast (ALM) protocol that establishes a virtual ring as an overlay network among the multicast group members in a ...

application/pdf

PDF (274Kb)
• (2009-03-31)
Popular products often attract an astonishing number of user reviews. Sifting through them by the thousands can be quite a headache, one that has inspired solutions like unique phrase identification (e.g., Yelp) and ...

application/pdf

PDF (574Kb)
• (2011-05)
In recent years, multicore processors have been receiving a significant amount of attention from avionic and automotive industries as the demand for high-end real-time applications drastically increases. However, the ...

application/pdf

PDF (802Kb)
• (2004-11)
With its sheer amount of information, the Web is clearly an important frontier for data mining. While Web mining must start with content on the Web, there is no effective search-based'' mechanism to help sifting through ...

application/pdf

PDF (319Kb)