#### Filter Results:

- Full text PDF available (8)

#### Publication Year

1976

2016

#### Publication Type

#### Co-author

#### Publication Venue

#### Key Phrases

#### Organism

Learn More

- Laura Monroe, Joanne Wendelberger, Sarah Ellen Michalak
- High Performance Graphics
- 2011

We implement here a fast and memory-sparing probabilistic top <i>k</i> selection algorithm on the GPU. The algorithm proceeds via an iterative probabilistic guess-and-check process on pivots for a three-way partition. When the guess is correct, the problem is reduced to selection on a much smaller set. This probabilistic algorithm always gives a correct… (More)

- Laura Monroe
- 2007

In this paper, we provide a simpler proof of a previously known result about greedily generated binary codes. We consider the mapping g: V n ⇒ V m , which sends binary vectors to their g-values obtained from a Bordering. We show that g is a homomorphism via a proof by induction on g-values. The proof depends on a previous result that the set of vectors… (More)

- E S Healey, A Kales, L J Monroe, E O Bixler, K Chamberlin, C R Soldatos
- Psychosomatic medicine
- 1981

During the year their insomnia began, chronic insomniacs experienced a greater number of stressful life events compared with previous or subsequent years and compared with good sleepers. In addition, among the life event categories assessed, insomniacs reported a greater number of undesirable events, particularly events related to losses and to ill health.… (More)

- David Pugmire, Laura Monroe, Carolyn Connor Davenport, Andrew DuBois, David DuBois, Stephen W. Poole
- IEEE Transactions on Visualization and Computer…
- 2007

This paper describes the first use of a network processing unit (NPU) to perform hardware-based image composition in a distributed rendering system. The image composition step is a notorious bottleneck in a clustered rendering system. Furthermore, image compositing algorithms do not necessarily scale as data size and number of nodes increase. Previous… (More)

- Laura Monroe
- Des. Codes Cryptography
- 1996

In this paper, we examine greedily generated self orthogonal codes. We show that they are linear, and discuss several properties which they possess. We also look at specific examples of these codes.

- Nathan DeBardeleben, Sean Blanchard, +4 authors Cornell Wright
- Euro-Par Workshops
- 2013

- Laura Monroe, Vera Pless, N J H J A Conway, Sloane, N J A Sloane
- 1995

We get a Bordering of all binary n-tuples V n by choosing an ordered basis {y 1 ,...,y n } of V n and ordering the n-tuples as follows: 0, y 1 , y 2 , y 2 +y 1 , y 3 , y 3 +y 1 , y 3 +y 2 , y 3 +y 2 +y 1 , y 4 ,... Given a minimum distance d, choose a set of vectors S with the zero vector first, then go through the vectors in their Bordering and choose the… (More)

- A D Bertelson, L J Monroe
- Journal of abnormal child psychology
- 1979

To determine whether poor sleepers have a unique personality constellation significantly different from that of good sleepers, a sample of 162 emotionally disturbed adolescent poor sleepers was compared to a sample of 153 emotionally disturbed adolescent good sleepers on standardized personality instruments. Poor sleepers were found to have a high incidence… (More)

- A White, James Ahrens, +11 authors Kwan-Liu Ma
- 2011

Scope The scope of our working group is scientific visualization and data analysis. Scientific visualization refers to the process of transforming scientific simulation and experimental data into images to facilitate visual understanding. Data analysis refers to the process of transforming data into an information-rich form via mathematical or computational… (More)

- P A Marks, L J Monroe
- Journal of abnormal psychology
- 1976