Skip to main content

Showing 1–16 of 16 results for author: Herman, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2105.06278  [pdf, other

    cs.SI

    Modeling and Evaluation of Clustering Patient Care into Bubbles

    Authors: D. M. Hasibul Hasan, Alex Rohwer, Hankyu Jang, Ted Herman, Philip M. Polgreen, Daniel K. Sewell, Bijaya Adhikari, Sriram V. Pemmaraju

    Abstract: COVID-19 has caused an enormous burden on healthcare facilities around the world. Cohorting patients and healthcare professionals (HCPs) into "bubbles" has been proposed as an infection-control mechanism. In this paper, we present a novel and flexible model for clustering patient care in healthcare facilities into bubbles in order to minimize infection spread. Our model aims to control a variety o… ▽ More

    Submitted 13 May, 2021; originally announced May 2021.

    Comments: To appear in IEEE ICHI 2021

  2. arXiv:2011.02322  [pdf, other

    eess.SP cs.LG eess.IV

    Fast Data-Driven Learning of MRI Sampling Pattern for Large Scale Problems

    Authors: Marcelo V. W. Zibetti, Gabor T. Herman, Ravinder R. Regatte

    Abstract: Purpose: A fast data-driven optimization approach, named bias-accelerated subset selection (BASS), is proposed for learning efficacious sampling patterns (SPs) with the purpose of reducing scan time in large-dimensional parallel MRI. Methods: BASS is applicable when Cartesian fully-sampled k-space data of specific anatomy is available for training and the reconstruction method is specified, learni… ▽ More

    Submitted 4 November, 2020; originally announced November 2020.

    Comments: 18 pages, 7 figures, 1 algorithm. Submitted to Magnetic Resonance in Medicine

  3. arXiv:2008.09214  [pdf, other

    cs.NI

    Recorp: Receiver-Oriented Policies for Industrial Wireless Networks

    Authors: Ryan Brummet, Md Kowsar Hossain, Octav Chipara, Ted Herman, David E. Steward

    Abstract: Future Industrial Internet-of-Things (IIoT) systems will require wireless solutions to connect sensors, actuators, and controllers as part of high data rate feedback-control loops over real-time flows. A key challenge in such networks is to provide predictable performance and adaptability in response to link quality variations. We address this challenge by developing RECeiver ORiented Policies (Re… ▽ More

    Submitted 6 June, 2021; v1 submitted 20 August, 2020; originally announced August 2020.

  4. The Discrete Fourier Transform for Golden Angle Linogram Sampling

    Authors: Elias S. Helou, Marcelo V. W. Zibetti, Leon Axel, Kai Tobias Block, Ravinder R. Regatte, Gabor T. Herman

    Abstract: Estimation of the Discrete-Time Fourier Transform (DTFT) at points of a finite domain arises in many imaging applications. A new approach to this task, the Golden Angle Linogram Fourier Domain (GALFD), is presented, together with a computationally fast and accurate tool, named Golden Angle Linogram Evaluation (GALE), for approximating the DTFT at points of a GALFD. A GALFD resembles a Linogram Fou… ▽ More

    Submitted 6 September, 2019; v1 submitted 1 April, 2019; originally announced April 2019.

    MSC Class: 65T50; 94A08; 97N40

  5. arXiv:1608.06668  [pdf, other

    physics.med-ph cs.CV

    Computerized Tomography with Total Variation and with Shearlets

    Authors: Edgar Garduño, Gabor T. Herman

    Abstract: To reduce the x-ray dose in computerized tomography (CT), many constrained optimization approaches have been proposed aiming at minimizing a regularizing function that measures lack of consistency with some prior knowledge about the object that is being imaged, subject to a (predetermined) level of consistency with the detected attenuation of x-rays. Proponents of the shearlet transform in the reg… ▽ More

    Submitted 23 August, 2016; originally announced August 2016.

    Comments: 25 pages, 7 figures, Special Issue on Superiorization, Inverse Problems 2016

  6. arXiv:1101.1680  [pdf, ps, other

    cs.DC

    Safe Register Token Transfer in a Ring

    Authors: Ted Herman

    Abstract: A token ring is an arrangement of N processors that take turns engaging in an activity which must be controlled. A token confers the right to engage in the controlled activity. Processors communicate with neighbors in the ring to obtain and release a token. The communication mechanism investigated in this paper is the safe register abstraction, which may arbitrarily corrupt a value that a processo… ▽ More

    Submitted 9 January, 2011; originally announced January 2011.

    Comments: 22 pages

    Report number: TR-11-01 ACM Class: H.3.4; D.1.3; D.4.1

  7. arXiv:1005.0069  [pdf, ps, other

    math.OC cs.CV physics.med-ph

    Perturbation Resilience and Superiorization of Iterative Algorithms

    Authors: Y. Censor, R. Davidi, G. T. Herman

    Abstract: Iterative algorithms aimed at solving some problems are discussed. For certain problems, such as finding a common point in the intersection of a finite number of convex sets, there often exist iterative algorithms that impose very little demand on computer resources. For other problems, such as finding that point in the intersection at which the value of a given function is optimal, algorithms ten… ▽ More

    Submitted 1 May, 2010; originally announced May 2010.

    Comments: Accepted for publication in Inverse Problems, 2010

    Journal ref: Inverse Problems, 26 (2010) 065008 (12pp)

  8. Separation of Circulating Tokens

    Authors: Kajari Ghosh Dastidar, Ted Herman

    Abstract: Self-stabilizing distributed control is often modeled by token abstractions. A system with a single token may implement mutual exclusion; a system with multiple tokens may ensure that immediate neighbors do not simultaneously enjoy a privilege. For a cyber-physical system, tokens may represent physical objects whose movement is controlled. The problem studied in this paper is to ensure that a sy… ▽ More

    Submitted 10 October, 2009; v1 submitted 12 August, 2009; originally announced August 2009.

    Comments: 22 pages, 7 figures, epsf and pstricks in LaTeX

    Report number: TR09-02 ACM Class: C.2.4; D.1.3; D.2.2; C.3

  9. arXiv:0806.1768  [pdf, ps, other

    cs.OS cs.DC

    Local Read-Write Operations in Sensor Networks

    Authors: Ted Herman, Morten Mjelde

    Abstract: Designing protocols and formulating convenient programming units of abstraction for sensor networks is challenging due to communication errors and platform constraints. This paper investigates properties and implementation reliability for a \emph{local read-write} abstraction. Local read-write is inspired by the class of read-modify-write operations defined for shared-memory multiprocessor archi… ▽ More

    Submitted 10 June, 2008; originally announced June 2008.

    Comments: 19 pages, 16 figures (using pstricks)

    Report number: TR08-02 ACM Class: C.2.4; D.1.3; C.3

  10. arXiv:cs/0601111  [pdf, ps, other

    cs.DC

    Localization in Wireless Sensor Grids

    Authors: Chen Zhang, Ted Herman

    Abstract: This work reports experiences on using radio ranging to position sensors in a grid topology. The implementation is simple, efficient, and could be practically distributed. The paper describes an implementation and experimental result based on RSSI distance estimation. Novel techniques such as fuzzy membership functions and table lookup are used to obtain more accurate result and simplify the com… ▽ More

    Submitted 25 January, 2006; originally announced January 2006.

    Comments: 17 pages, 6 figures

    Report number: TR01-06 ACM Class: C.2.4; C.3; J.7

  11. arXiv:cs/0512021  [pdf, ps, other

    cs.DC cs.DS

    The Poster Session of SSS 2005

    Authors: Brahim Hamid, Ted Herman, Morten Mjelde

    Abstract: This technical report documents the poster session of SSS 2005, the Symposium on Self-Stabilizing Systems published by Springer as LNCS volume 3764. The poster session included five presentations. Two of these presentations are summarized in brief abstracts contained in this technical report.

    Submitted 5 December, 2005; originally announced December 2005.

    Comments: 3 pages, related to Springer LNCS 3764, Proceedings of Symposium on Self-Stabilizing Systems

    Report number: TR-05-13 ACM Class: D.4.5

  12. arXiv:cs/0405042  [pdf, ps, other

    cs.DC cs.NI

    A Distributed TDMA Slot Assignment Algorithm for Wireless Sensor Networks

    Authors: T. Herman, S. Tixeuil

    Abstract: Wireless sensor networks benefit from communication protocols that reduce power requirements by avoiding frame collision. Time Division Media Access methods schedule transmission in slots to avoid collision, however these methods often lack scalability when implemented in \emph{ad hoc} networks subject to node failures and dynamic topology. This paper reports a distributed algorithm for TDMA slo… ▽ More

    Submitted 19 May, 2004; v1 submitted 12 May, 2004; originally announced May 2004.

    Report number: TR04-02 University of Iowa Department of Computer Science ACM Class: C.2.1; C.2.5; H.3.4

  13. arXiv:cs/0105013  [pdf, ps, other

    cs.DC

    Dijkstra's Self-Stabilizing Algorithm in Unsupportive Environments

    Authors: Shlomi Dolev, Ted Herman

    Abstract: The first self-stabilizing algorithm [Dij73] assumed the existence of a central daemon, that activates one processor at time to change state as a function of its own state and the state of a neighbor. Subsequent research has reconsidered this algorithm without the assumption of a central daemon, and under different forms of communication, such as the model of link registers. In all of these inve… ▽ More

    Submitted 7 May, 2001; originally announced May 2001.

    Comments: 12 pages, uses eepic.sty

    Report number: TR-01-03 ACM Class: D.1.3; B.1.3; B.8.1; D.4.5

  14. arXiv:cs/0012001  [pdf, ps, other

    cs.DC cs.DS

    Available and Stabilizing 2-3 Trees

    Authors: Ted Herman, Toshimitsu Masuzawa

    Abstract: Transient faults corrupt the content and organization of data structures. A recovery technique dealing with such faults is stabilization, which guarantees, following some number of operations on the data structure, that content of the data structure is legitimate. Another notion of fault tolerance is availability, which is the property that operations continue to be applied during the period of… ▽ More

    Submitted 1 December, 2000; originally announced December 2000.

    Comments: 22 pages, 5 figures

    Report number: University of Iowa Department of Computer Science TR 00-04 ACM Class: D.4.5; E.1; C.4

  15. arXiv:cs/0011046  [pdf, ps, other

    cs.DC cs.DS

    Available Stabilizing Heaps

    Authors: Ted Herman, Toshimitsu Masuzawa

    Abstract: This paper describes a heap construction that supports insert and delete operations in arbitrary (possibly illegitimate) states. After any sequence of at most O(m) heap operations, the heap state is guarantee to be legitimate, where m is the initial number of items in the heap. The response from each operation is consistent with its effect on the data structure, even for illegitimate states. The… ▽ More

    Submitted 30 November, 2000; originally announced November 2000.

    Comments: 10 pages

    Report number: University of Iowa Department of Computer Science TR 00-03 ACM Class: C.2.4; D.1.3; D.3.3; E.2; C.4

  16. arXiv:cs/0007015  [pdf, ps, other

    cs.DC

    Phase Clocks for Transient Fault Repair

    Authors: Ted Herman

    Abstract: Phase clocks are synchronization tools that implement a form of logical time in distributed systems. For systems tolerating transient faults by self-repair of damaged data, phase clocks can enable reasoning about the progress of distributed repair procedures. This paper presents a phase clock algorithm suited to the model of transient memory faults in asynchronous systems with read/write registe… ▽ More

    Submitted 10 July, 2000; originally announced July 2000.

    Comments: 22 pages, LaTeX

    Report number: TR99-08 ACM Class: C.2.4; D.4.5