Browsing Department of Computer Science by Title
Now showing items 4766 of 89

The InversionAlgorithm Software
(20091113)The software in this package implements four versions of the Inversion algorithm. Four executable files are produced.These executables are used in much the same way as the FHDL package, but only AND, OR, NAND, NOR, NOT, ... 
The ISCAS85 Benchmarks in FHDL Format
(20091113)The three files that constitute this tech report are ISCAS85.fhdl.zip, ISCAS85.InputVectors.zip, and ISCAS85.VectorGenerators.zip. The first file contains the 10 ISCAS85 benchmarks in FHDL format, plus the smoketest circuit ... 
The ISCAS89 Benchmarks in FHDL Format
(20091113)The .zip file contains each of the ISCAS89 Benchmarks in FHDL format. Also included is a random vector generator file for each circuit. (For what it’s worth.) The generators are written in the DGL language. 
Java bytecode compilation for highperformance, platformindependent logical inference.
(20060511)Automated reasoning systems are powerful computer programs capable of solving complex problems. They are characterized as computationally intensive having high performance requirements. Very few reasoning systems have ... 
Matrix Representations of GF(p[superscript n]) over GF(p)
(20140131)We show that any nonsingular nxn matrix of order p[superscript n]1 over GF(p) is a generator of a matrix representation of GF(p[superscript n]). We also determine the number of matrix representations of GF(p[superscript ... 
Metamorphic programming
(20090415)Metamorphic programming is an effective tool for creating efficient and elegant solutions to many programming problems, at least once you get over the shock of seeing code that violates many of the accepted rules of good ... 
MKWHAT: A CompilerDevelopment Tool for Fast Keyword Recognition
(20091113)Although compiler keywords can be recognized directly in LEX (or flex) these tools are rather slow. MKWHAT is a tool that can be used to generate a keyword recognizer that will recognize key words using a minimal number ... 
Models for rested touchless gestural interaction.
(20150731)Touchless midair gestural interaction has gained mainstream attention with the emergence of offtheshelf commodity devices such as the Leap Motion and the Xbox Kinect. One of the issues with this form of interaction is ... 
MovieOracle System
(20110913)The detailed design document covers the basic theory, related technique, and implementation details of the MovieOracle system. It first provides a highlevel system overview. Then it discusses the usage of Twitter API, ... 
MultiKarma : a fully decentralized virtual multicurrency.
(, 20110914)Participantbased technologies enable users to contribute resources to a shared pool that in the aggregate provides valuable services, such as social networks, massive multiplayer online games, file exchange, etc. Such ... 
The Number of Conjugates of the Standard Representation of Sn in the General Linear Group over GF(2)
(20130920)This report determines the normalizer of the standard representation of Sn in the general linear group of nxn matrices over GF(2). The size of the normalizer is then used to determine the number of classes of conjugate ... 
An OCLbased verification approach to analyzing static properties of a UML model.
(20100623)There is a need for more rigorous analysis techniques that developers can use for verifying the critical properties in UML models. The UMLbased Specification Environment (USE) tool supports verification of invariants, ... 
The Parallel Technique Software Package
(20091113)This is the software described in the technical report “Two New Techniques for UnitDelay Compiled Simulation” available from this archive. This package is part of the FHDL system and must be installed in your FHDL directory. 
The PCSet Method Software Package
(20091113)This is the software described in the technical report “Two New Techniques for UnitDelay Compiled Simulation” available from this archive. This package is part of the FHDL system and must be installed in your FHDL directory. 
Performance improvements to peertopeer file transfers using network coding.
(, 20130916)A common peertopeer approach to large data distribution is to divide the data into blocks. Peers will gather blocks from other peers in parallel. Problems with this approach are that each peer must know which blocks ... 
PGmeans: learning the number of clusters in data.
(20070319)We present a novel algorithm called PGmeans in this thesis. This algorithm is able to determine the number of clusters in a classical Gaussian mixture model automatically. PGmeans uses efficient statistical hypothesis ... 
Primitive Polynomials for the Field GF(2): Degree 2 through Degree 16
(20130920)This report lists the primitive polynomials over GF(2) of degree 2 through 16. These polynomials were generated using a new matrixbased technique I invented. 
Primitive Polynomials for the Field GF(3): Degree 2 through Degree 11
(20130920)This report lists the primitive polynomials over GF(3) of degree 2 through 11. These polynomials were generated using a new matrixbased technique I invented. 
A Quick Algorithm for Identifying Conjugate Groups in GF(2)
(20090218)This report gives the details an algorithm for determining whether two matrix groups are conjugate to one another. Each group is designated by a pair of matrices that generate the group. The algorithm is able to determine ... 
Recommendations Made Easy
(20140623)Fueled by evergrowing data, the need to provide recommendations for consumers, and the considerable domain knowledge required to implement distributed large scale graph solutions we sought to provide recommendations for ...