• A calculus of loop invariants for dense linear algebra optimization 

    Low, Tze Meng (2013-11-07)
    Loop invariants have traditionally been used in proofs of correctness (e.g. program verification) and program derivation. Given that a loop invariant is all that is required to derive a provably correct program, the loop ...
  • A collaborative approach to IR evaluation 

    Sheshadri, Aashish (2014-07-09)
    In this thesis we investigate two main problems: 1) inferring consensus from disparate inputs to improve quality of crowd contributed data; and 2) developing a reliable crowd-aided IR evaluation framework. With regard ...
  • A computational model of language pathology in schizophrenia 

    Grasemann, Hans Ulrich (2011-02-07)
    No current laboratory test can reliably identify patients with schizophrenia. Instead, key symptoms are observed via language, including derailment, where patients cannot follow a coherent storyline, and delusions, where ...
  • A new approach to detecting failures in distributed systems 

    Leners, Joshua Blaise; 0000-0002-5937-3237 (2015-09-15)
    Fault-tolerant distributed systems often handle failures in two steps: first, detect the failure and, second, take some recovery action. A common approach to detecting failures is end-to-end timeouts, but using timeouts ...
  • A probabilistic architecture for algorithm portfolios 

    Silverthorn, Bryan Connor (2013-04-05)
    Heuristic algorithms for logical reasoning are increasingly successful on computationally difficult problems such as satisfiability, and these solvers enable applications from circuit verification to software synthesis. ...
  • A proposed memory consistency model for Chapel 

    Srinivasa Murthy, Karthik, 1983- (2010-12-20)
    A memory consistency model for a language defines the order of memory operations performed by each thread in a parallel execution. Such a constraint is necessary to prevent the compiler and hardware optimizations from ...
  • A scalable, resilient, and self-managing layer-2 network 

    Qian, Chen, active 2013 (2013-07-16)
    Large-scale layer-2 Ethernet networks are needed for important future and current applications and services including: metro Ethernet, wide area Ethernet, data center networks, cyber-physical systems, and large data ...
  • A verified framework for symbolic execution in the ACL2 theorem prover 

    Swords, Sol Otis (2011-02-11)
    Mechanized theorem proving is a promising means of formally establishing facts about complex systems. However, in applying theorem proving methodologies to industrial-scale hardware and software systems, a large amount ...
  • Access control in decentralized, distributed systems 

    Kane, Kevin Michael (2008-08-28)
    Not available
  • Action selection in modular reinforcement learning 

    Zhang, Ruohan (2014-09-03)
    Modular reinforcement learning is an approach to resolve the curse of dimensionality problem in traditional reinforcement learning. We design and implement a modular reinforcement learning algorithm, which is based on three ...
  • Active learning and compilation of higher order schema integration queries 

    Barbanson, François Gérard (2008-08-28)
    Not available
  • Active learning of an action detector on untrimmed videos 

    Bandla, Sunil (2013-05-14)
    Collecting and annotating videos of realistic human actions is tedious, yet critical for training action recognition systems. We propose a method to actively request the most useful video annotations among a large set of ...
  • Active visual category learning 

    Vijayanarasimhan, Sudheendra (2011-06-02)
    Visual recognition research develops algorithms and representations to autonomously recognize visual entities such as objects, actions, and attributes. The traditional protocol involves manually collecting training image ...
  • Activity retrieval in closed captioned videos 

    Gupta, Sonal (2010-06-04)
    Recognizing activities in real-world videos is a difficult problem exacerbated by background clutter, changes in camera angle & zoom, occlusion and rapid camera movements. Large corpora of labeled videos can be used to ...
  • Ad hoc : overloading and language design 

    Kilpatrick, Scott Lasater, 1984- (2010-12-20)
    The intricate concepts of ad-hoc polymorphism and overloading permeate the field of programming languages despite their somewhat nebulous definitions. With the perspective afforded by the state of the art, object-oriented ...
  • Adaptive representations for reinforcement learning 

    Whiteson, Shimon Azariah (2008-08-28)
    Not available
  • Adaptive representations for reinforcement learning 

    Whiteson, Shimon Azariah (2011-08-22)
    Not available
  • Adaptive trading agent strategies using market experience 

    Pardoe, David Merrill (2011-06-22)
    Along with the growth of electronic commerce has come an interest in developing autonomous trading agents. Often, such agents must interact directly with other market participants, and so the behavior of these participants ...
  • Adaptive wireless body medical system 

    Zhu, Xiuming (2013-01-14)
    Advances in wireless technologies in the last ten years have created considerable opportunities as well as challenges for wireless body medical systems. The foremost challenge is how to build a reliable system connecting ...
  • Addressing the brittleness of knowledge-based question-answering 

    Chaw, Shaw Yi (2012-04-02)
    Knowledge base systems are brittle when the users of the knowledge base are unfamiliar with its content and structure. Querying a knowledge base requires users to state their questions in precise and complete formal ...