Now showing items 89-108 of 141

    • Motif-based mining of protein sequences 

      Liu, Agatha H (2002)
      We introduce CASTOR, an automatic, unsupervised system for protein motif discovery and classification. Given amino acid sequences for a group of proteins, CASTOR generates statistically significant motifs and constructs a ...
    • Multi-versioned Data Storage and Iterative Processing in a Parallel Array Database Engine 

      Soroush, Emad
      Scientists today are able to generate data at an unprecedented scale and rate. For example the Sloan Digital Sky Survey (SDSS) generates 200GB of data containing millions of objects on each night on its routine operation. ...
    • New Techniques in Deep Representation Learning 

      Andrew, Galen Michael
      The choice of feature representation can have a large impact on the success of a machine learning algorithm at solving a given problem. Although human engineers employing task-specific domain knowledge still play a key ...
    • Object Recognition and Semantic Scene Labeling for RGB-D Data 

      Lai, Kevin Kar Wai (2014-02-24)
      The availability of RGB-D (Kinect-like) cameras has led to an explosive growth of research on robot perception. RGB-D cameras provide high resolution (640 x 480) synchronized videos of both color (RGB) and depth (D) at 30 ...
    • On profit maximization in mechanism design 

      Cary, Matthew, 1974- (2007)
      Mechanism design is a subfield of game theory and microeconomics focused on incentive engineering. A mechanism is a protocol, typically taking the form of an auction, that is explicitly designed so that rational but ...
    • On the use and performance of communication primitives in software controlled cache-coherent cluster architectures 

      Qin, Xiaohan, 1964- (1997)
      Two recent trends are affecting the design of medium-scale shared-memory multi-processors. The first is the use of nodes which themselves consist of clusters of processors. Clusters, already available as commodity parts, ...
    • Open Data Kit: Technologies for Mobile Data Collection and Deployment Experiences in Developing Regions 

      Hartung, Carl (2012-09-13)
      Gathering information accurately and quickly is essential for enabling organizations working in low-resource settings to have timely and sustainable impact. Due to insufficient infrastructure, many organizations currently ...
    • Open Question Answering 

      Fader, Anthony
      For the past fifteen years, search engines like Google have been the dominant way of finding information online. However, search engines break down when presented with complex information needs expressed as natural language ...
    • Opening up the Collaborative Problem-Solving Process to Solvers 

      Robison, Tyler (2013-07-23)
      In software systems, having features of openness means that some of the internal components of the system are made available for examination by users. Researchers have looked at different effects of open systems a great ...
    • Parallel prefetching and caching 

      Kimbrel, Tracy (1997)
      High-performance I/O systems depend on prefetching and caching to deliver good performance to applications. These two techniques have generally been considered in isolation, even though there are significant interactions ...
    • Photo-Realistic Scene Modeling and Visualization using Online Photo Collections 

      Shan, Qi
      Reconstructing 3D scenes from online photo collections has attracted a tremendous amount of interest from both academia and industry. The progress in the past decade has been exceptional, in terms of scale and reconstruction ...
    • Pixel-Based Reverse Engineering of Graphical Interfaces 

      Dixon, Morgan Emory
      User interface software is often large, complex, rigid, and difficult to implement. In fact, most of the development time and effort in a typical application is dedicated to the user interface. Not only do interfaces require ...
    • Practical, Usable, and Secure Authentication and Authorization on the Web 

      Czeskis, Alexei (2013-11-14)
      User authentication and authorization are two of the most critical aspects of computer security and privacy on the web. However, despite their importance, <italic>in practice</italic>, authentication and authorization are ...
    • Privacy and Performance in Social Overlay Networks 

      Isdal, Tomas (2012-09-13)
      The core Internet protocols were not designed to protect the privacy of content or the identities of communicating users, thus making censorship and surveillance easy. The same problem persists at higher level protocols, ...
    • Program Synthesis Without Full Specifications for Novel Applications 

      Perelman, Daniel Adam
      Program synthesis is a family of techniques that generate programs from a description of what the program should do but not how it should do it. By designing a program synthesis algorithm together with the user interaction ...
    • Programming by demonstration: a machine learning approach 

      Lau, Tessa (2001)
      Programming by demonstration (PBD) enables users to construct programs to automate repetitive tasks without writing a line of code. The key idea in PBD is to generalize from the user's demonstration of the program on a ...
    • Quantum Computation and Isomorphism Testing 

      Rosenbaum, David Jeffrey
      In this thesis, we study quantum computation and algorithms for isomorphism problems. Some of the problems that we cover are fundamentally quantum and therefore require quantum techniques. For other problems, classical ...
    • Query Processing for Massively Parallel Systems 

      Koutris, Paraschos
      The need to analyze and understand big data has changed the landscape of data management over the last years. To process the large amounts of data available to users in both industry and science, many modern data management ...
    • Reconstruction and Visualization of Architectural Scenes 

      Kushal, Avanish
      Can we experience a scene virtually, such as the Colosseum in Rome, without ever having to visit it? Such an experience should replicate the feeling of being physically present, in terms of being able to visualize the scene ...
    • Reducing the Usability Barrier to Specification and Verification 

      Schiller, Todd Wademan
      A program specification is a contract between a client and a program, which describes how the program can or will behave given input from the client. In practice, formal (machine-verified) specifications take more effort ...