#### Filter Results:

- Full text PDF available (7)

#### Publication Year

1982

2016

- This year (0)
- Last 5 years (5)
- Last 10 years (9)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

- Laura Monroe, Joanne Wendelberger, Sarah Ellen Michalak
- High Performance Graphics
- 2011

We implement here a fast and memory-sparing probabilistic top <i>k</i> selection algorithm on the GPU. The algorithm proceeds via an iterative probabilistic guess-and-check process on pivots for a three-way partition. When the guess is correct, the problem is reduced to selection on a much smaller set. This probabilistic algorithm always gives a correct… (More)

- David Pugmire, Laura Monroe, Carolyn Connor Davenport, Andrew DuBois, David DuBois, Stephen W. Poole
- IEEE Transactions on Visualization and Computer…
- 2007

This paper describes the first use of a network processing unit (NPU) to perform hardware-based image composition in a distributed rendering system. The image composition step is a notorious bottleneck in a clustered rendering system. Furthermore, image compositing algorithms do not necessarily scale as data size and number of nodes increase. Previous… (More)

- Nathan DeBardeleben, Sean Blanchard, +4 authors Cornell Wright
- Euro-Par Workshops
- 2013

- Laura Monroe
- Des. Codes Cryptography
- 1996

In this paper, we examine greedily generated self orthogonal codes. We show that they are linear, and discuss several properties which they possess. We also look at specific examples of these codes.

- Laura Monroe, Vera Pless, N J H J A Conway, Sloane, N J A Sloane
- 1995

We get a Bordering of all binary n-tuples V n by choosing an ordered basis {y 1 ,...,y n } of V n and ordering the n-tuples as follows: 0, y 1 , y 2 , y 2 +y 1 , y 3 , y 3 +y 1 , y 3 +y 2 , y 3 +y 2 +y 1 , y 4 ,... Given a minimum distance d, choose a set of vectors S with the zero vector first, then go through the vectors in their Bordering and choose the… (More)

- Joerg Meyer, E. Wes Bethel, +11 authors Ian Gorton
- IEEE Transactions on Visualization and Computer…
- 2012

The U.S. Department of Energy's (DOE) Office of Environmental Management (DOE/EM) currently supports an effort to understand and predict the fate of nuclear contaminants and their transport in natural and engineered systems. Geologists, hydrologists, physicists and computer scientists are working together to create models of existing nuclear waste sites, to… (More)

- Laura M Monroe, Linda M Kinney, Mark D Weist, Denise Spriggs Dafeamekpor, Joyce Dantzler, Matthew W Reynolds
- Journal of interpersonal violence
- 2005

A statewide assessment was conducted of assaults, experiences, needs, and recommendations of 125 adult victims receiving care at 19 sexual assault centers (SACs) in the State of Maryland. More than one half of the victims (55.6%) waited years before disclosing, with delays in reporting especially likely if the assault was perpetrated by a family member (the… (More)

Los Alamos National Laboratory (LANL) has deployed a 43-megapixel multi-panel immersive environment, La Cueva Grande (LCG), to be used in visualizing the terabytes of data produced by simulations. This paper briefly discusses some of the technical challenges encountered and overcome during the deployment of a 43-million pixel immersive visualization… (More)

- Laura Monroe
- 2007

In this paper, we provide a simpler proof of a previously known result about greedily generated binary codes. We consider the mapping g: V n ⇒ V m , which sends binary vectors to their g-values obtained from a Bordering. We show that g is a homomorphism via a proof by induction on g-values. The proof depends on a previous result that the set of vectors… (More)

- Bo Fang, Panruo Wu, +6 authors Matei Ripeanu
- 2016 46th Annual IEEE/IFIP International…
- 2016

Silent data corruptions (SDCs) are one of the most critical issues in modern HPC systems, as they are "silent" by definition and raise no warnings to users and application developers that a calculation has been corrupted. A significant amount of effort has been made to characterize, detect, and tolerate SDCs. However, current approaches do not share the… (More)