Browsing LCS Publications by Title
Now showing items 1123-1142 of 1163
-
The Use of Distinctive Features for Automatic Speech Recognition
(1991-09)One of the most critical and yet unsolved problems in phonetic recognition is the transformation of the continuous speech signal to a discrete representation for accessing words in the lexicon. In order to find an efficient ... -
Use of High Level Languages for Sytems Programming
(1970-09)(This paper is a slightly edited version of a transcript so that it still contains the colloquial flavor of the oral presentation.) I'm going to talk about languages for systems programming what they can do for us, and ... -
The Use of Queues in the Parallel Data Flow Evaluation of "If-Then-While" Programs
(1978-05)A property of a model of parallel computation is analyzed. We show that the use of queues may speed-up the execution of well formed data flow schemas by an arbitrarily large factor. A general model of data flow computation ... -
The Use of the Domain Name System for Dynamic References in an Online Library
(1994-05)Persistent, dynamic references (or links) to remove documents are an essential part of an online library. This thesis examines two distributed database systems, X.500 and the Domain Name System(DNS), upon which to build ... -
A User's Guide to the Macro Control Language
(1973-12) -
Using Cycles and Scaling in Parallel Algorithms
(1989-08)We introduce the technique of decomposing an undirected graph by finding a maximal set of edge-disjoint cycles. We give a parallel algorithm to find this decomposition in O(log n) time on (m+ n)/log n processors. We ... -
Using Interactive Graphics in Simulating the Hospital Emergency Room
(1974-05)The hospital emergency room is a complex system having many interrelated factors contributing to its operation. The emergency room administrator has limited control over certain of these factors: numbers of beds, nurses, ... -
Using Non-interactive Proofs to Achieve Independence Efficiently and Securely
(1994-11)Independence or simultaneous broadcast is a fundamental tool to achieve security in fault tolerant distributed computing. It allows n players to commit to independently chosen values. In this paper we present a constant ... -
Using Specifications to Check Source Code
(1994-06) -
Using Type Extension to Organize Virtual Memory Mechanisms
(1976-09)Much effort is currently being devoted to producing systems that are easy to understand, to verify and to develop. The general methodology for designing such a system consists of decomposing it into a structured set of ... -
Using Untypes Lambda Calculus to Computer with Atoms
(1984-02)Axioms and verification rules are given for typeless A -calculus with a conditional test for equality between atoms. A semantic completeness theorem is proved and a deterministic evaluator is proposed. -
VAL- A Value-oriented Algorithmic Language: Preliminary Reference Manual
(1979-06)The programming language VAL (Value-Oriented Algorithmic Language) is designed for expressing algorithms for execution on computers capable of highly concurrent operation. More specifically, the application area to be ... -
Verbal and Graphical Language for the AED System: A Progress Report
(1964-05)For Computer-Aided Design, use of time-sharing a single language which can take either verbal or graphical form is required. This paper describes how a single language processing technique, which is in turn a special ... -
Verifiable Secret Sharing as Secure Computation
(1994-03)We present a stronger notion of verifiable secret sharing and exhibit a protocol implementing it. We show that our new notion is preferable to the old ones whenever verifiable secret sharing is used as a tool within larger ... -
Verification of Programs Operating on Structured Data
(1974-03)The major method for verifying the correctness of computer program is the inductive assertion approach. This approach has been limited in the past by the lack of techniques for handling data structures. In particular, ... -
Verification of the Randomized Consensus Algorithm of Aspnes and Herlihy: a Case Study*
(1997-06)The Probabilistic I/O Automaton model of [20] is used as the basis for a formal presentation and proof of the randomized consensus algorithm of Aspnes and Herlihy. The algorithm guarantees termination within expected ... -
The Vidboard:A Video Capture and Processing Peripheral for the ViewStation System
(1992-09)With the growth of multimedia applications, video is increasingly being handled within the computing environment. Since video presents serious technological challenges to the current generation of personal computers and ... -
Video Coding and the Application Level Framing Protocol Architecture
(1992-06)As networks and computers become faster, real time video transmission is expected to become common. Variable bit rate video coders will be used in order to take advantage of the statistical multiplexing gain and bandwidth ...