Browsing Computer Science (CS) by Title
Now showing items 1-20 of 104
-
Abnormality Detection in Retinal Images
(2004-01)The implementation of data mining techniques in the medical area has generated great interest because of its potential for more efficient, economic and robust performance when compared to physicians. In this paper, we focus ... -
Acceptability-Oriented Computing
(2004-01)We discuss a new approach to the construction of software systems. Instead of attempting to build a system that is as free of errors as possible, the designer instead identifies key properties that the execution must satisfy ... -
Activity Recognition from Physiological Data using Conditional Random Fields
(2006-01)We describe the application of conditional random fields (CRF) to physiological data modeling for the application of activity recognition. We use the data provided by the Physiological Data Modeling Contest (PDMC), a ... -
Ad-hoc Collaborative Document Annotation on a Tablet PC
(2004-01)The use of technology as an effective educational tool has been an elusive goal in the past. Specifically, previous attempts at using small personal computers in the classroom to aid students as collaborative and note-taking ... -
Adaptive Cache-Oblivious All-to-All Operation
(2004-01)Modern processors rely on cache memories to reduce the latency of data accesses. Extensive cache misses would thus compromise the usefulness of the scheme. Cache-aware algorithms make use of the knowledge about the cache, ... -
Adaptive Distributed Resource Allocation in Wireless Sensor Networks
(2006-01)Wireless sensor networks have emerged as a promising technology for a wide range of important applications. A major research challenge in this field is the distributed resource allocation problem, which concerns how the ... -
Adaptively Parallel Processor Allocation for Cilk Jobs
(2004-01)The problem of allocating processor resources fairly and efficiently to parallel jobs has been studied extensively in the past. Most of this work, however, assumes that the instantaneous parallelism of the jobs is known ... -
Addressing the Challenges of Aggregational and Temporal Ontological Heterogeneity
(2006-01)In this paper, we first identify semantic heterogeneities that, when not resolved, often cause serious data quality problems. We discuss the especially challenging problems of temporal and aggregational ontological ... -
Adversarial Analyses of Window Backoff Strategies for Simple Multiple-Access Channels
(2004-01)Backoff strategies have typically been analyzed by making statistical assumptions on the distribution of problem inputs. Although these analyses have provided valuable insights into the efficacy of various backoff strategies, ... -
ALiCE: A Java-based Grid Computing System
(2003-01)A computational grid is a hardware and software infrastructure that provides dependable, consistent, pervasive, and inexpensive access to high-end computational capabilities. This talk is divided into three parts. Firstly, ... -
All learning is local: Multi-agent learning in global reward games
(2004-01)In large multiagent games, partial observability, coordination, and credit assignment persistently plague attempts to design good learning algorithms. We provide a simple and efficient algorithm that in part uses a linear ... -
Ameliorating the Overhead of Dynamic Optimization
(2005-01)Dynamic optimization has several key advantages. This includes the ability to work on binary code in the absence of sources and to perform optimization across module boundaries. However, it has a significant disadvantage ... -
Automated Information Extraction to Support Biomedical Decision Model Construction: A Preliminary Design
(2004-01)We propose an information extraction framework to support automated construction of decision models in biomedicine. Our proposed technique classifies text-based documents from a large biomedical literature repository, e.g., ... -
Automated Verification of Shape and Size
(2007-01)Despite their popularity and importance, pointer based programs remain a major challenge for program verification. In this paper, we propose an automated verification system that is concise, precise and expressive for ... -
BATON: A Balanced Tree Structure for Peer-to-Peer Networks
(2006-01)We propose a balanced tree structure overlay on a peer-to-peer network capable of supporting both exact queries and range queries efficiently. In spite of the tree structure causing distinctions to be made between nodes ... -
Bit-Packing Optimization for StreamIt
(2003-01)StreamIt is a language specifically designed for modern streaming applications. A certain important class of these applications operates on streams of bits. This paper presents the motivation for a bit-packing optimization ... -
Bit-Width Analysis for General Applications
(2005-01)It has been widely known that a significant part of the bits are useless or even unused during the program execution. Bit-width analysis targets at finding the minimum bits needed for each variable in the program, which ... -
Characterizing Protein Conformation Space
(2007-01)In this work, we propose a radical approach for exploring the space of all possible protein structures. We present techniques to explore the clash-free conformation space, which comprises all protein structures whose atoms ... -
Collaborative Data Publishing and Searching System
(2007-01)In this paper, we present a folksonomy-based collaborative data publishing and searching system. The system accepts data objects described with user-created metadata, called data units. The system supports flexible structure ... -
commanimation: Creating and managing animations via speech
(2004-01)A speech controlled animation system is both a useful application program as well as a laboratory in which to investigate context aware applications as well as controlling errors. The user need not have prior knowledge or ...