Skip to main content
Emerging storage technologies such as flash memories, phase-change memories, and spin-transfer torque memories are poised to close the enormous performance gap between disk-based storage and main memory. We evaluate several approaches to... more
    • by 
    •   6  
      Flash memoryNon-Volatile Memory TechnologiesHigh performanceFile System
To determine the presence of FSH in unextracted urine of perimenopausal women using a microparticle enzyme immunoassay kit on an AxSYM random access immunoassay analyzer.
    • by 
    •   11  
      CryopreservationLinear modelsFertility and SterilityClinical Sciences
    • by  and +1
    •   6  
      Biomedical EngineeringSpace flightRadiation EffectRandom Access
    • by 
    •   6  
      DatabasesMultimedia DatabaseQuery processingRandom Access
A new image compression algorithm is proposed, based on independent Embedded Block Coding with Optimized Truncation of the embedded bit-streams (EBCOT). The algorithm exhibits state-of-the-art compression performance while producing a... more
    • by 
    •   19  
      PsychologyCognitive ScienceData CompressionImage compression
We consider a model for random-access communication in networks of arbitrary topology. We characterize the efficient (Pareto) boundary of the network throughput region as the family of solutions optimizing weighted proportional fairness... more
    • by 
    •   8  
      Resource AllocationWireless networksThroughputInterference
The use of large-scale electrophysiology to obtain high spatiotemporal resolution brain recordings (>100 channels) capable of probing the range of neural activity from local field potential oscillations to single neuron action potentials... more
    • by 
    •   33  
      Information SystemsNeuroscienceCognitive ScienceElectrophysiology
We provide a general tool to improve the real time performance of a broad class of Union-Find algorithms. This is done by minimizing the random access memory that is used and thus to avoid the well-known yon Neumann bottleneck of... more
    • by 
    •   6  
      Computer ScienceMemory ManagementImage segmentationRandom access memory
Flash memory solid-state disks (SSDs) are replacing hard disk drives (HDDs) in mobile computing systems because of their lower power consumption, faster random access, and greater shock resistance. We describe Hydra, a high-performance... more
    • by 
    •   12  
      Distributed ComputingComputer HardwarePerformance EvaluationFPGA implementation
    • by 
    •   15  
      Software TestingQueueing theoryData StructureCase Study
We compared a new assay for Toxoplasma IgM on the Access™ analyzer (Beckman Coulter, Inc., Chaska, MN, USA), a random access instrument based on the principle of paramagnetic particle enzyme immunoassay with an enzyme-linked immunosorbent... more
    • by 
    •   8  
      MicrobiologyMedical MicrobiologyToxoplasma gondiiClinical Sciences
The isomorphism problem for graphs G 1 and G 2 is to determine if there exists a oneto-one mapping of the vertices of G 1 onto the vertices of G 2 such that two vertices of G 1 are adjacent if and only if their images in G 2 are adjacent.
    • by 
    •   2  
      Random AccessLinear-time algorithm
Interactive video in an e-learning system allows proactive and random access to video content. Our empirical study examined the influence of interactive video on learning outcome and learner satisfaction in e-learning environments. Four... more
    • by 
    •   13  
      Information SystemsInstructional DesignEducational TechnologyInformation Management
Optical phased arrays represent an enabling new technology that makes possible simple, affordable, lightweight, optical sensors offering very precise stabilization, random-access pointing, programmable multiple simultaneous beams, a... more
    • by  and +1
    •   12  
      Biomedical EngineeringNew TechnologyOptical SensorRefractive Index
The resistance switching behaviour of several materials has recently attracted considerable attention for its application in non-volatile memory (NVM) devices, popularly described as resistive random access memories (RRAMs). RRAM is a... more
    • by 
    •   8  
      SemiconductorsTransition-Metal OxidesMathematical SciencesPhysical sciences
Interactive video in an e-learning system allows proactive and random access to video content. Our empirical study examined the influence of interactive video on learning outcome and learner satisfaction in e-learning environments. Four... more
    • by 
    •   13  
      Information SystemsInstructional DesignEducational TechnologyInformation Management
Nonmechanical steering of optical beams will enable revolutionary systems with random access pointing, similar to microwave radar phased arrays. An early approach was birefringent liquid crystals writing a sawtooth phase profile in one... more
    • by 
    •   8  
      Spatial Light ModulatorPhased ArrayBeam steeringLiquid Crystal
A family of CMOS-based active pixel image sensors (APS's) that are inherently compatible with the integration of onchip signal processing circuitry is reported. The image sensors were fabricated using commercially available 2-m CMOS... more
    • by 
    •   7  
      Signal ProcessingSolid State Devices and CircuitsRandom AccessFill Factor
Abstrut-A large number of terminals transmitting data packets over a common radio channel to a central base station is studied. In inhibit sense multiple access (ISMA), the base station broadcasts a busy signal when an incoming packet is... more
    • by 
    •   22  
      Stochastic ProcessPacket SwitchingDensity-functional theoryStochastic processes
We demonstrated that an Al/p-type amorphous silicon ͑p-a-Si͒/Al switching device exhibits stable, nonvolatile resistive switching characteristics as well as reliable data retention at 85°C. It is directly observed that the conducting... more
    • by 
    •   7  
      EngineeringApplied PhysicsSemiconductor DevicesDigital Circuits
A novel fuzzy video rate control algorithm (RCA) with delay and quality constraints is proposed for video streaming over DVB-H (Digital Video Broadcasting for Handheld terminals) application. In this application a variable bit rate (VBR)... more
    • by 
    •   7  
      Video CompressionFuzzy ControlVideo StreamingInformation Hiding
Multiple -output transmitter implementation based on Direct Digital Synthesis (DDS) architecture is presented and investigated. A particular number of identical and independent units compose the proposed device. DDS technology is applied... more
    • by 
    •   8  
      Digital CircuitsDigital ControlStandard DeviationDirect Digital Synthesis
The possibility of deleting a piece of information is very convenient in many programming frameworks. However, this feature is not available in constraint languages such as Constraint Logic Programming or Concurrent Constraint... more
    • by 
    •   4  
      Shared memoryTime ComplexityConcurrent Constraint ProgrammingRandom Access
We present a design-space feasibility region, as a function of magnetic tunnel junction (MTJ) characteristics and target memory specifications, to explore the design margin of a one-transistor–one-magnetic-tunnel-junction (1T-1MTJ) memory... more
    • by 
    •   15  
      Computer ArchitectureDecision Support SystemsSensitivity AnalysisDecision support system
Two-dimensional microshutter arrays (MSAs) are being developed at the NASA Goddard Space Flight Center for the James Webb Space Telescope (JWST) for use as a programmable aperture mask for object selection for the Near Infrared... more
    • by 
    •   10  
      Quantum PhysicsNear InfraredMagnetic fieldSilicon Nitride
There is intensive attention on improving random media access control protocols in wireless environments. This paper proposes low-complexity, portable and flexible development of the wireless transmitter employing Random Access (RA)... more
    • by  and +1
    •   2  
      Wireless networksRandom Access
MPI-2’s One-sided communication interface is being explored in scientific applications. One of the important operations in a one sided model is read-modify-write. MPI-2 semantics provide MPI_Put, MPI_Get and MPI_Accumulate operations... more
    • by 
    •   2  
      Case StudyRandom Access
The finite battery power of mobile computers represents one of the greatest limitations to the utility of portable computers. Furthermore, portable computers often need to perform power consuming activities, such as transmitting and... more
    • by 
    •   12  
      Distributed ComputingPerformance EvaluationWireless NetworkNegative Affect
Aurivillius type bismuth layered materials have received a lot of attention because of their application in ferroelectric non-volatile random access memories. Among bismuth layer structured ferroelectric ceramics SrBi2Ta2O9... more
    • by 
    •   10  
      Materials EngineeringElectroceramicsDielectric PropertiesDielectric Relaxation
Cognitive Radio (CR) technology is envisaged to solve the problems in wireless networks resulting from the limited available spectrum and the inefficiency in the spectrum usage by exploiting the existing wireless spectrum... more
    • by 
    •   37  
      EngineeringGame TheoryTechnologyCognitive Radio Networks
tests in both batch and random access mode are performed. The evaluation studies performed included within-run and between-run precision at four analyte concentrations, method linearity and relative accuracy (comparison studies).
    • by 
    •   5  
      BioinformaticsAnalytical ChemistryLife SciencesBiomedical Research
Random access is a desirable feature in many video communication systems. Intra pictures have been conventionally used as random access points, but correct picture content can also be recovered gradually within a range of pictures... more
    • by 
    •   3  
      Visual CommunicationRandom AccessVideo Communication
Cognitive Radio (CR) technology is envisaged to solve the problems in wireless networks resulting from the limited available spectrum and the inefficiency in the spectrum usage by exploiting the existing wireless spectrum... more
    • by 
    •   36  
      EngineeringGame TheoryTechnologyCognitive Radio Networks
Multiple access methods in a wireless network allow multiple nodes to share a set of available channels for data transmission. The nodes can either compete or cooperate with each other to access the channel(s) so that either an individual... more
    • by 
    •   10  
      Distributed ComputingGame TheoryWireless NetworkNash Equilibrium
    • by 
    •   16  
      Mechanical EngineeringApplied MathematicsProbability TheoryMarkov Processes
Cognitive Radio (CR) technology is envisaged to solve the problems in wireless networks resulting from the limited available spectrum and the inefficiency in the spectrum usage by exploiting the existing wireless spectrum... more
    • by 
    •   37  
      EngineeringGame TheoryTechnologyCognitive Radio Networks
Various automated chemiluminescence immunoassay (CLIA) analyzers for the detection of antibodies to hepatitis C virus (HCV) are now commercially available in clinical laboratories and are replacing conventional enzyme immunoassays. We... more
    • by 
    •   23  
      MicrobiologyHepatitis CClinical MicrobiologyBiological Sciences
This paper presents and analyzes a new near-optimum medium access control (MAC) protocol. The proposed access scheme is suitable for a CDMA mobile communication environment, and keeps under control and upper bounded the number of... more
    • by 
    •   13  
      Distributed ComputingQueueing theoryMobile CommunicationDelays
    • by 
    •   5  
      Information SystemsComputer ScienceData StructureTime Complexity
This paper examines the impact of having access to a home computer on child and adolescent outcomes. To avoid the bias due to non-random access to home computers, we exploit a unique government program which provided vouchers towards the... more
    • by 
    •   6  
      Computer EducationRegression DiscontinuityRandom AccessHousehold Survey
Optical phased arrays represent an enabling new technology that makes possible simple, affordable, lightweight, optical sensors offering very precise stabilization, random-access pointing, programmable multiple simultaneous beams, a... more
    • by 
    •   12  
      Biomedical EngineeringNew TechnologyOptical SensorRefractive Index
Enterprise WLANs have made a dramatic shift towards centralized architectures in the recent past. The reasons for such a change have been ease of management and better design of various control and security functions. The data path of... more
    • by 
    • Random Access
The Micro-Modem is a compact, low-power, underwater acoustic communications and navigation subsystem. It has the capability to perform low-rate frequency-hopping frequency-shift keying (FH-FSK), variable rate phase-coherent keying (PSK),... more
    • by 
    •   9  
      Acoustic CommunicationUser InterfaceNavigationLow Power
In this paper, we demonstrate that multiple concurrent asynchronous and uncoordinated Single-Input Multiple-Output (SIMO) transmissions can successfully take place even though the respective receivers do not explicitly null out... more
    • by 
    •   6  
      Distributed ComputingWireless networksNetwork PerformanceRandom Access
The continuos improving of CMOS technology allows the realization of digital circuits and in particular Static Random Access Memories that, compared with previous technologies, contain an impressive number of transistors. The use of new... more
    • by 
    •   4  
      Continuous ImprovementDigital CircuitsRandom AccessNew Products
    • by 
    •   13  
      Game TheoryBroadbandWireless NetworkBroadband Networks
Basic data flow patterns which we call idioms, such as stream, transpose, reduction, random access and stencil, are common in scientific numerical applications. We hypothesize that a small number of idioms can cover most programming... more
    • by 
    •   8  
      Computer ScienceOpen SourcePerformance AnalysisIdioms
The basic forms of random accessing problems encountered in designing computer communications networks are explored in terms of the Bernoulli finite user model. The problems are classified according to the available channel feedback... more
    • by 
    •   17  
      Distributed ComputingSatellite CommunicationComputer NetworkFeedback