• Login
    Search 
    •   MINDS@UW Home
    • MINDS@UW Madison
    • College of Letters and Science, University of Wisconsin–Madison
    • Department of Computer Sciences, UW-Madison
    • CS Technical Reports
    • Search
    •   MINDS@UW Home
    • MINDS@UW Madison
    • College of Letters and Science, University of Wisconsin–Madison
    • Department of Computer Sciences, UW-Madison
    • CS Technical Reports
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-10 of 19

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    A Decision Procedure for Detecting Atomicity Violations for Communicating Processes with Locks 

    Kidd, Nicholas; Lammich, Peter; Touili, Tayssir; Reps, Thomas (University of Wisconsin-Madison Department of Computer Sciences, 2009)
    We present a new decision procedure for detecting property violations in pushdown models for concurrent programs that use lock-based synchronization, where each thread's lock operations are properly nested (a la ...
    Thumbnail

    Building Cheap and Large CAMs Using BufferHash 

    Anand, Ashok; Kappes, Steven; Akella, Aditya; Nath, Suman (University of Wisconsin-Madison Department of Computer Sciences, 2009)
    We show how to build cheap and large CAMs, or CLAMs, using flash memory. These CLAMs are targeted at an emerging class of networking applications that require massive indexes running into a hundred GB or more, with items ...
    Thumbnail

    On the Effectiveness of Pre-Acceptance Spam Filtering 

    Mori, Tatsuya; Esquivel, Holly; Akella, Aditya; Mao, Z. Morley; Xie, Yinglian; Yu, Fang (University of Wisconsin-Madison Department of Computer Sciences, 2009)
    Modern SMTP servers apply a variety of mechanisms to stem the volume of spam delivered to users. These techniques can be broadly classified into two categories: preacceptance approaches, which apply prior to a message ...
    Thumbnail

    To CMP or not to CMP: Analyzing Packet Classification on Modern and Traditional Network Processors 

    Smith, Randy; Gibson, Dan; Kong, Shijin (University of Wisconsin-Madison Department of Computer Sciences, 2009)
    Packet classification is a central component of modern network functionality, yet satisfactory memory usage and overall performance remains an elusive challenge at the highest speeds. The recent emergence of chip ...
    Thumbnail

    Relational Transfer in Reinforcement Learning 

    Torrey, Lisa (University of Wisconsin-Madison Department of Computer Sciences, 2009)
    Transfer learning is an inherent aspect of human learning. When humans learn to perform a task, we rarely start from scratch. Instead, we recall relevant knowledge from previous learning experiences and apply that knowledge ...
    Thumbnail

    Flexible Lookup Modules for Rapid Deployment of New Protocols in High-speed Routers 

    De Carli, Lorenzo; Pan, Yi; Kumar, Amit; Estan, Cristian; Sankaralingam, Karthikeyan (University of Wisconsin-Madison Department of Computer Sciences, 2009)
    New protocols for the data link and network layer are being proposed to address limitations of current protocols in terms of scalability, security, and manageability. High speed routers and switches that would need to ...
    Thumbnail

    Active Learning Literature Survey 

    Settles, Burr (University of Wisconsin-Madison Department of Computer Sciences, 2009)
    The key idea behind active learning is that a machine learning algorithm can achieve greater accuracy with fewer labeled training instances if it is allowed to choose the training data from which is learns. An active learner ...
    Thumbnail

    RouteBazaar: An Economic Framework for Flexible Routing 

    Esquivel, Holly; Muthukrishnan, Chitra; Niu, Feng; Chawla, Shuchi; Akella, Aditya (University of Wisconsin-Madison Department of Computer Sciences, 2009)
    The Internet?s routing protocol provides users a single end-to-end route that is not guaranteed to be available or to meet user requirements. Our paper addresses this rigidity using an economically grounded approach that ...
    Thumbnail

    Physically-based Animation Rendering with Markov Chain Monte Carlo 

    Lai, Yu-Chi; Liu, Feng; Dyer, Charles (University of Wisconsin-Madison Department of Computer Sciences, 2009)
    Exploring temporal coherence among light transport paths is very important to remove temporally perception-sensitive artifacts in animation rendering. Using the contribution of a light transport path to all frames in an ...
    Thumbnail

    Interprocedural Analysis and the Verification of Concurrent Programs 

    Lal, Akash (University of Wisconsin-Madison Department of Computer Sciences, 2009)
    In the modern world, not only is software getting larger and more complex, it is also becoming pervasive in our daily lives. On the one hand, the advent of multi-core processors is pushing software towards becoming more ...
    • 1
    • 2

    Contact Us | Send Feedback
     

     

    Browse

    All of MINDS@UWCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    Login

    Discover

    AuthorAkella, Aditya (5)Esquivel, Holly (3)Kidd, Nicholas (3)Reps, Thomas (3)Gibson, Dan (2)Lal, Akash (2)Linderoth, Jeff (2)Mori, Tatsuya (2)Anand, Ashok (1)Benson, Theophilus A (1)... View MoreDate Issued
    2009 (19)
    Has File(s)Yes (19)

    Contact Us | Send Feedback