Research Output 1970 2020

Filter
Paper
Paper

A bandwidth management framework for wireless camera array

Yang, Z. & Nahrstedt, K., Dec 1 2005, p. 147-152. 6 p.

Research output: Contribution to conferencePaper

Cameras
Bandwidth
Frequency allocation
Wireless ad hoc networks
Quality of service

Abstract-device interface for implementing portable parallel-I/O interfaces

Thakur, R., Gropp, W. D. & Lusk, E., Dec 1 1996, p. 180-187. 8 p.

Research output: Contribution to conferencePaper

Application programming interfaces (API)

Accelerating nonconvex learning via replica exchange Langevin diffusion

Chen, Y., Chen, J., Dong, J., Peng, J. & Wang, Z., Jan 1 2019.

Research output: Contribution to conferencePaper

learning
Temperature
divergence
exploitation
regime

Acceleration of an asynchronous message driven programming paradigm on IBM Blue Gene/Q

Kumar, S., Sun, Y. & Kalé, L. V., Oct 7 2013, p. 689-699. 11 p.

Research output: Contribution to conferencePaper

Genes
Communication
Hardware
Parallel programming
Fast Fourier transforms

A cross-cultural study of mood in K-pop songs

Hu, X., Lee, J. H., Choi, K. & Downie, J. S., Jan 1 2014, p. 385-390. 6 p.

Research output: Contribution to conferencePaper

Information retrieval
Testbeds
Mood
Cross-cultural Studies
Pop Songs

Action-dependent control variates for policy optimization via Stein’s identity

Liu, H., Feng, Y., Mao, Y., Zhou, D., Peng, J. & Liu, Q., Jan 1 2018.

Research output: Contribution to conferencePaper

Gradient methods
Reinforcement learning
efficiency
policy approach
reinforcement

Adaptive offloading inference for delivering applications in pervasive computing environments

Gu, X., Nahrstedt, K., Messer, A., Greenberg, I. & Milojicic, D., Dec 1 2003, p. 107-114. 8 p.

Research output: Contribution to conferencePaper

Ubiquitous computing
Inference engines
Personal digital assistants
Fuzzy control
Mobile devices

A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities

Chen, S., Kalbarczyk, Z., Xu, J. & Iyer, R. K., Dec 1 2003, p. 605-614. 10 p.

Research output: Contribution to conferencePaper

Finite automata
Demonstrations
Inspection

A feature information based approach for enhancing score-level fusion in multi-sample biometric systems

Satheesan, S. P., Tulyakov, S. & Govindaraju, V., 2013.

Research output: Contribution to conferencePaper

Biometrics
Fusion reactions
Experiments

A framework for adaptive algorithm selection in STAPL

Thomas, N., Tanase, G., Tkachyshyn, O., Perdue, J., Amato, N. M. & Rauchwerger, L., Dec 1 2005, p. 277-288. 12 p.

Research output: Contribution to conferencePaper

Adaptive algorithms
Sorting
Parallel algorithms
Learning systems

Alya: Towards Exascale for Engineering Simulation Codes

Vazquez, M., Houzeaux, G., Koric, S., Artigues, A., Aguado-Sierra, J., Aris, R., Mira, D., Calmet, H., Cucchietti, F., Owen, H., Taha, A. & Cela, J. M., Apr 18 2014. 20 p.

Research output: Contribution to conferencePaper

Supercomputers
Physics
Respiratory system
Incompressible flow
Kilns

An adaptive framework for 'single shot' motion planning

Vallejo, D. R., Jones, C. & Amato, N. M., Dec 1 2000, p. 1722-1727. 6 p.

Research output: Contribution to conferencePaper

Motion planning
Computer aided design
Maintainability
Switches
Robots

Analytical and computational analysis of strength properties of geopolymer composites

Kataruka, A., Guleryuz, E., Koric, S., M. Kriven, W. & Akono, A-T., Jun 26 2017.

Research output: Contribution to conferencePaper

Geopolymers
Composite materials
Fillers
Volume fraction
Compressive strength

An architectural framework for providing reliability and security support

Nakka, N., Kalbarczyk, Z. T., Iyer, R. K. & Xu, J., Oct 1 2004, p. 585-594. 10 p.

Research output: Contribution to conferencePaper

Engines
Data storage equipment
Hardware
Error detection
Flow control

An evaluation of ZooKeeper for high availability in system S

Pham, C. M., Kalbarczyk, Z. T., Iyer, R. K., Dogaru, V., Wagle, R. & Venkatramani, C., Jan 1 2014, p. 209-217. 9 p.

Research output: Contribution to conferencePaper

Availability

An orchestration language for parallel objects

Kale, L. V., Hills, M. & Huang, C., Dec 1 2004.

Research output: Contribution to conferencePaper

Adaptive systems
Dynamic loads
Application programs
Resource allocation

Anumerical methodology for Anaeroelastic SBLI flow

Wood, B., Loth, E., Geubelle, P. & McIlwaintt, S., Dec 1 2000.

Research output: Contribution to conferencePaper

Flow interactions
transpiration
Transpiration
boundary layers
Boundary layers

A power-measurement methodology for large-scale, high-performance computing

Scogland, T. R. W., Steffen, C. P., Wilde, T., Parent, F., Coghlan, S., Bates, N., Feng, W. C. & Strohmaier, E., Jan 1 2014, p. 149-159. 11 p.

Research output: Contribution to conferencePaper

Level measurement
Supercomputers
Energy efficiency

Application acceleration with the explicitly parallel operations system - The EPOS processor

Papakonstantinou, A., Chen, D. & Hwu, W-M. W., Sep 29 2008, p. 20-25. 6 p.

Research output: Contribution to conferencePaper

Data flow graphs
High level languages
Wire
Engines
Hardware

Applying component technology to improve global supply chain network management

Tan, G. W. & Shaw, M. J-P., Dec 13 1998, p. 296-301. 6 p.

Research output: Contribution to conferencePaper

Network management
Supply chains
Information systems
Supply chain management
Encapsulation

Approaches to multimedia and security

Nahrstedt, K., Dittmann, J. & Wohlmacher, P., Dec 1 2000, p. 1275-1278. 4 p.

Research output: Contribution to conferencePaper

Multimedia systems
Digital watermarking

Approximate convex decomposition of polygons

Lien, J. M. & Amato, N. M., Sep 29 2004, p. 17-26. 10 p.

Research output: Contribution to conferencePaper

Convex Decomposition
Polygon
Decomposition
Notch
Decompose

A Preemptive Deterministic Scheduling Algorithm for Multithreaded Replicas

Basile, C., Kalbarczyk, Z. T. & Iyer, R. K., Dec 1 2003, p. 149-158. 10 p.

Research output: Contribution to conferencePaper

Scheduling algorithms
Scheduling
Synchronization
Fires
Throughput

A programming framework for quality-aware ubiquitous multimedia applications

Wichadakul, D., Gu, X. & Nahrstedt, K., Dec 1 2002, p. 631-640. 10 p.

Research output: Contribution to conferencePaper

Computer programming
Metadata
Specifications
Video on demand
Ubiquitous computing

A simulation framework to evaluate virtual CPU scheduling algorithms

Pham, C., Li, Q., Estrada, Z., Kalbarczyk, Z. T. & Iyer, R. K., Dec 1 2013, p. 138-143. 6 p.

Research output: Contribution to conferencePaper

Scheduling algorithms
Program processors
Consolidation
Processing
Virtualization

A space-time finite element formulation for fluid-structure interaction

Masud, A., Jan 1 1996, p. 633-641. 9 p.

Research output: Contribution to conferencePaper

Plates (structural components)
Crystallography
Fluid structure interaction
Galerkin methods
Projectiles

Automated extraction of information from building information models into a semantic logic-based representation

Zhang, J. & El-Gohary, N., Jan 1 2015, p. 173-180. 8 p.

Research output: Contribution to conferencePaper

Semantics
Automation
Processing
Industry
Compliance

A voxel-based parallel collision detection algorithm

Lawlor, O. S. & Kale, L. V., Jan 1 2002, p. 285-293. 9 p.

Research output: Contribution to conferencePaper

Behavior of a computer based interlocking system under transient hardware faults

Romano, L., Kalbarczyk, Z., Iyer, R. K., Mazzeo, A. & Mazzocca, N., Dec 1 1997, p. 174-179. 6 p.

Research output: Contribution to conferencePaper

Railroad traffic control
Interlocking signals
Real time systems
Computer hardware
Failure analysis

Bending of viscoelastic beams under piezoelectric control--analytical and massively parallel computational simulations

Beldica, C. E., Hilton, H. H. & Koric, S., 1999.

Research output: Contribution to conferencePaper

mesh
simulation

Blood flow analysis in arteries with atherosclerosis

Masud, A. & Masud, M., Jan 1 1995, p. 525-526. 2 p.

Research output: Contribution to conferencePaper

Cardiovascular system
Pulsatile flow
Navier Stokes equations
Reynolds number
Blood

Boosting the actor with dual critic

Dai, B., Shaw, A., He, N., Li, L. & Song, L., Jan 1 2018.

Research output: Contribution to conferencePaper

critic
Concretes
learning
performance

Characterization of Linux Kernel Behavior under Errors

Gu, W., Kalbarczyk, Z. T., Iyer, R. K. & Yang, Z., Dec 1 2003, p. 459-468. 10 p.

Research output: Contribution to conferencePaper

Linux
Experiments

Checkpointing of control structures in main memory database systems

Wang, L., Kalbarczyk, Z. T., Iyer, R. K., Vora, H. & Chahande, T., Oct 1 2004, p. 687-692. 6 p.

Research output: Contribution to conferencePaper

Availability
Data storage equipment
Recovery

CIRCUIT PARTITIONING WITH SIZE AND CONNECTION CONSTRAINTS (EXTENDED ABSTRACT).

Perl, Y. & Snir, M., Dec 1 1982, p. 80-84. 5 p.

Research output: Contribution to conferencePaper

Networks (circuits)
Dynamic programming
Polynomials

Classifying behavior to elucidate elegant problem solving in an educational game

Malkiewich, L., Baker, R. S., Shute, V., Kai, S. & Paquette, L., Jan 1 2016, p. 448-453. 6 p.

Research output: Contribution to conferencePaper

Students
Data mining
Silver
Gold
Data storage equipment
Computer systems

Computational assessment of flow through a high-flow nacelle bypass

Jain, N., Jambunathan, R. & Bodony, D. J., Dec 1 2012.

Research output: Contribution to conferencePaper

Turbulence models
Engines
Secondary flow
Aviation
Turbulence

Computational design and performance assessment of microvascular composite panels for battery cooling

Tan, M. H. Y., Pety, S. J., Najafi, A. R., White, S. R. & Geubelle, P. H., Jan 1 2015.

Research output: Contribution to conferencePaper

Cooling
Composite materials
Interfaces (computer)
Packaging
Finite element method

Computational fluid dynamics on parallel processors

Gropp, W. D. & Smith, D. B., Jan 1 1988.

Research output: Contribution to conferencePaper

Computational fluid dynamics
Parallel architectures
Computer architecture
Data storage equipment
Experiments

Computer simulations of damage formation and propagation in composites

Starzewski, M. O., Jan 1 1995, p. 802-805. 4 p.

Research output: Contribution to conferencePaper

Computer simulation
Composite materials
Crystals
Microstructure

Computing the arrangement of curve segments: Divide-and-conquer algorithms via sampling

Amato, N. M., Goodrich, M. T. & Ramos, E. A., Jan 1 2000, p. 705-706. 2 p.

Research output: Contribution to conferencePaper

Divide-and-conquer Algorithm
Geometric Algorithms
Arrangement
Divide and conquer
Deterministic Algorithm

Convergence Analyses for Fluid-Structure Interaction Simulation in a Thin Hyper-elastic Pipe

Lu, Q., Guleryuz, E., Vellakal, M., Taha, A., Koric, S. & Cordoba, P., 2018. 14 p.

Research output: Contribution to conferencePaper

Fluid structure interaction
Data transfer
Pipe
Fluids
Geometry

Conversation clusters: Human-computer dialog for topic extraction

Bergstrom, T. & Karahalios, K. G., Dec 8 2008, p. 2829-2834. 6 p.

Research output: Contribution to conferencePaper

Transcription
Speech recognition
Computer systems
Visualization

Coping with errors: The importance of process data in robust sociotechnical systems

Twidale, M. B. & Marty, P. F., Dec 1 2000, p. 269-278. 10 p.

Research output: Contribution to conferencePaper

Information analysis
Data handling
Museums
Materials handling
Information management

Coupled Visco-Plastic Thermo-Mechanical Models of Steel Solidification

Koric, S., Hibbeler, L. C. & Thomas, B. G., 2009. 3 p.

Research output: Contribution to conferencePaper

ABAQUS
Solidification
Plastics
Steel
Subroutines
observatory
glacial-interglacial cycle
residual soil
bedrock
mineral

Damaris/Viz: A nonintrusive, adaptable and user-friendly in situ visualization framework

Dorier, M., Sisneros, R., Peterka, T., Antoniu, G. & Semeraro, D., Jan 1 2013, p. 67-75. 9 p.

Research output: Contribution to conferencePaper

Visualization
Data storage equipment
Middleware
Information management
Computational fluid dynamics

Defeating memory corruption attacks via pointer taintedness detection

Chen, S., Xu, J., Nakka, N., Kalbarczyk, Z. & Iyer, R. K., Nov 9 2005, p. 378-387. 10 p.

Research output: Contribution to conferencePaper

Data storage equipment
Security systems
Simulators

DEFINE: a distributed fault injection and monitoring environment

Kao, W. L. & Iyer, R. K., Dec 1 1995, p. 252-259. 8 p.

Research output: Contribution to conferencePaper

Computer testing
Program debugging
Fault tolerant computer systems
Computer workstations
Error detection