Now showing items 1591-1610 of 2253

    • Portable Self-Describing Binary Data Streams 

      Eisenhauer, Greg Stephen (Georgia Institute of Technology, 1994)
      Storing and transmitting data in binary form is often desirable both to conserve I/O bandwidth and to reduce storage and processing requirements. However, transmission of binary data between machines in heterogeneous ...
    • PORTS: A Parallel, Optimistic, Real-Time Simulator 

      Ghosh, Kaushik; Panesar, Kiran S.; Fujimoto, Richard M.; Schwan, Karsten (Georgia Institute of Technology, 1993)
      This paper describes issues concerning the design of an optimistic parallel discrete event simulation system that executes in environments that impose real-time constraints on the simulator's execution. Two key problems ...
    • PORTS: Experiences with a Scheduler for Dynamic Real-Time Systems 

      Ghosh, Kaushik; Fujimoto, Richard M.; Schwan, Karsten (Georgia Institute of Technology, 1994)
      This paper describes several of our experiences with a real-time scheduler. Using a robot control application program, we motivate the importance of supporting multiple schedulers within the same application program. ...
    • Post-processing Approach for Radiometric Self-Calibration of Video 

      Grundmann, Matthias; McClanahan, Chris; Kang, Sing Bing; Essa, Irfan A. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, 2013-04)
      We present a novel data-driven technique for radiometric self-calibration of video from an unknown camera. Our approach self-calibrates radiometric variations in video, and is applied as a post-process; there is no need ...
    • The Power and Weakness of Randomness (When You are Short on Time) 

      Wigderson, Avi (Georgia Institute of Technology, 2011-11-10)
      Man has grappled with the meaning and utility of randomness for centuries. Research in the Theory of Computation in the last thirty years has enriched this study considerably. I will describe two main aspects of this ...
    • Power Management in Disruption Tolerant Networks 

      Jun, Hyewon (Georgia Institute of Technology, 2007-11-14)
      Disruption Tolerant Networks (DTNs) are mobile wireless networks that are designed to work in highly-challenged environments where the density of nodes is insufficient to support direct end-to-end communication. Recent ...
    • Power Optimization of Embedded Memory Systems via Data Remapping 

      Palem, Krishna V.; Rabbah, Rodric Michel; Mooney, Vincent; Korkmaz, Pinar; Puttaswamy, Kiran (Georgia Institute of Technology, 2002)
      In this paper, we provide a novel compile-time data remapping algorithm that runs in linear time. This remapping algorithm is the first fully automatic approach applicable to pointer-intensive dynamic applications. We ...
    • A Practical Approach for Recognizing Eating Moments With Wrist-Mounted Inertial Sensing 

      Thomaz, Edison; Essa, Irfan; Abowd, Gregory D. (Georgia Institute of TechnologyAssociation for Computing Machinery, 2015)
      Recognizing when eating activities take place is one of the key challenges in automated food intake monitoring. Despite progress over the years, most proposed approaches have been largely impractical for everyday usage, ...
    • A Practical Approach for Zero Downtime in an Operational Information System 

      Gavrilovska, Ada; Schwan, Karsten; Oleson, Van (Georgia Institute of Technology, 2002)
      An Operational Information System (OIS) supports a real-time view of an organization's information critical to its logistical business operations. A central component of an OIS is an engine that integrates data events ...
    • Practical authentication in large-scale internet applications 

      Dacosta, Italo (Georgia Institute of Technology, 2012-07-03)
      Due to their massive user base and request load, large-scale Internet applications have mainly focused on goals such as performance and scalability. As a result, many of these applications rely on weaker but more efficient ...
    • Practical Data-Leak Prevention for Legacy Applications in Enterprise Networks 

      Mundada, Yogesh; Ramachandran, Anirudh; Tariq, Mukarram Bin; Feamster, Nick (Georgia Institute of Technology, 2011)
      Organizations must control where private information spreads; this problem is referred to in the industry as data leak prevention. Commercial solutions for DLP are based on scanning content; these impose high overhead and ...
    • Practical water animation using physics and image based methods 

      Wang, Huamin (Georgia Institute of Technology, 2009-08-21)
      Generating natural phenomena in a virtual world has a number of practical applications. Thanks to the rich and complicated details in the real world, the goal of realistically and efficiently reproducing natural phenomena ...
    • A pre-scheduler and management model for a class of computer-user systems 

      Hoffman, John Marion (Georgia Institute of Technology, 1971-05)
    • Predicting Daily Activities From Egocentric Images Using Deep Learning 

      Castro, Daniel; Hickson, Steven; Bettadapura, Vinay; Thomaz, Edison; Abowd, Gregory; Christensen, Henrik; Essa, Irfan (Georgia Institute of TechnologyAssociation for Computing Machinery, 2015)
      We present a method to analyze images taken from a passive egocentric wearable camera along with the contextual information, such as time and day of week, to learn and predict everyday activities of an individual. We ...
    • Prediction of secondary structures for large RNA molecules 

      Mathuriya, Amrita (Georgia Institute of Technology, 2009-01-12)
      The prediction of correct secondary structures of large RNAs is one of the unsolved challenges of computational molecular biology. Among the major obstacles is the fact that accurate calculations scale as O(n⁴), so the ...
    • Predictive models for online human activities 

      Yang, Shuang-Hong (Georgia Institute of Technology, 2012-04-04)
      The availability and scale of user generated data in online systems raises tremendous challenges and opportunities to analytic study of human activities. Effective modeling of online human activities is not only fundamental ...
    • Prefetching Without Hints: A Cost-Benefit Analysis for Predicted Accesses 

      Vellanki, Vivekanand; Chervenak, Ann L. (Georgia Institute of Technology, 1999)
      Prefetching disk blocks to main memory will become increasingly important to overcome the widening gap between disk access times and processor speeds. We present a prefetching scheme that chooses which blocks to prefetch ...
    • Prefix-Preserving IP Address Anonymization: Measurement-based Security Evaluation and a New Cryptography-based Scheme 

      Xu, Jun; Fan, Jinliang; Ammar, Mostafa H. (Mostafa Hamed); Moon, Sue B. (Georgia Institute of Technology, 2002)
      Real-world traffic traces are crucial for Internet research, but only a very small percentage of traces collected are made public. One major reason why traffic trace owners hesitate to make the traces publicly available ...
    • Preserving Dignity in Patient Caregiver Relationships Using Moral Emotions and Robots 

      Arkin, Ronald C.; Scheutz, Matthias; Tickle-Degnen, Linda (Georgia Institute of Technology, 2014)
      This paper provides an overview of an ongoing NSF project that is intended to improve the long-term quality of care for patients suffering from early stage Parkinson’s disease. Due to facial masking in the patient, a ...
    • Preventing abuse of online communities 

      Irani, Danesh (Georgia Institute of Technology, 2012-07-02)
      Online communities are growing at a phenomenal rate and with the large number of users these communities contain, attackers are drawn to exploit these users. Denial of information (DoI) attacks and information leakage ...