搜索结果: 1-15 共查到“计算机科学技术基础学科 using”相关记录63条 . 查询时间(0.307 秒)
Using the Run-Time Sizes of Data Structures to Guide Parallel Thread Creation
Run-Time Sizes Data Structures Guide Parallel Thread Creation
2016/5/24
Dynamic granularity estimation is a new technique for automatically identifying expressions in functional languages for parallel evaluation. Expressions with little computation relative to thread-crea...
Scalable Error Detection using Boolean Satisfiability
Program analysis error detection boolean satisfiability
2016/5/24
We describe a software error-detection tool that exploits recent advances in boolean satisfiability (SAT) solvers. Our analysis is path sensitive, precise down to the bit level, and models pointers an...
Text Entry Using a Dual Joystick Game Controller
Text entry dual joystick dual control pad game controller, game console
2016/5/24
We present a new bimanual text entry technique designed
for today’s dual-joystick game controllers. The left and
right joysticks are used to independently select characters
from the corresponding (...
We propose a method for identifying the sources of problems in complex production systems where, due to the prohibitive costs of instrumentation, the data available for analysis may be noisy or incomp...
Community Epidemic Detection using Time-Correlated Anomalies
epidemic detection anomalies community
2016/5/24
An epidemic is malicious code running on a subset of a community,a homogeneous set of instances of an application. Syzygy is an epidemic detection framework that looks for time-correlated anomalies,i....
Simplifying Loop Invariant Generation Using Splitter Predicates
Static analysis invariant generation decomposition of multiphase loops
2016/5/24
We present a novel static analysis technique that substantially improves the quality of invariants inferred by standard loop invariant generation techniques. Our technique decomposes multi-phase loops...
Automated Error Diagnosis Using Abductive Inference
Error diagnosis abductive inference static analysis
2016/5/24
When program verification tools fail to verify a program, either the program is buggy or the report is a false alarm. In this situation, the burden is on the user to manually classify the report, but ...
From Invariant Checking to Invariant Inference Using Randomized Search
Invariant Checking Invariant Inference Randomized Search
2016/5/24
We describe a general framework c2i for generating an invariant inference procedure from an invariant checking procedure. Given a checker and a language of possible invariants, c2i generates an infere...
City Forensics: Using Visual Elements to Predict Non-Visual City Attributes
Data mining big data computational geography visual processing
2016/5/24
We present a method for automatically identifying and validating predictive relationships between the visual appearance
of a city and its non-visual attributes (e.g. crime statistics, housing prices,...
Towards Asynchornous Many-Task In Situ Data Analysis Using Legion
Programming Models Asynchronous ManyTask Parallel Computing Computational Statistics
2016/5/24
We explore the use of asynchronous many-task (AMT) programming models for the implementation of in situ analysis towards the goal of maximizing programmer productivity and overall performance on next ...
Saturn: A Scalable Framework for Error Detection using Boolean Satisfiability
Program analysis error detection boolean satisfiability
2016/5/24
This article presents Saturn, a general framework for building precise and scalable static error detection systems. Saturn exploits recent advances in boolean satisfiability (SAT) solvers and is path ...
Multiple Target Counting and Tracking using Binary Proximity Sensors: Bounds, Coloring, and Filter
Multiple Target Counting Tracking using Binary Proximity Sensors Bounds Coloring Filter
2016/1/22
Binary proximity sensors (BPS) provide extremely low cost and privacy preserving features for tracking mobile targets in smart environment, but great challenges are posed for track-ing multiple target...
mulated annealing is a computational heuristic for obtaining approximate solutions to combinatorial optimization problems. It is used to construct good source codes, error-correcting codes, and spheri...
Reducing Shoulder-surfing by Using Gaze-based Password Entry
Gaze-based Password Entry Shoulder-surfing
2015/8/5
Shoulder-surfing --- using direct observation techniques, such as looking over someone's shoulder, to get passwords, PINs and other sensitive personal information --- is a well known weakness of passw...
Detection of Cognitive States from fMRI data using Machine Learning Techniques
Sequence Learning fMRI visuomotor Naive Bayes Classifier Support Vector machine Nearest neighbour classification
2015/7/29
Over the past decade functional Magnetic Resonance Imaging (fMRI) has emerged as a powerful technique to locate activity of human brain while engaged in a particular task or cognitive state. We consid...