Browse by Subject "Computer Science"

  • Rothganger, Fredrick H. (2004)
    *This dissertation is a compound document (contains both a paper copy and a CD as part of the dissertation). The CD requires the following system requirements: Windows MediaPlayer or RealPlayer.

    application/pdf

    application/pdfPDF (16MB)Restricted to U of Illinois
  • Koob, Gary Michael (1987)
    Traditional theories measure the complexity of a function as a lower bound on the cost of its implementation. Since the results of the theory are biased by the chosen implementation paradigm and its associated cost measure, ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Healey, Steven Thomas (1987)
    This thesis describes a module planner for decomposing arbitrary functional specifications of any complexity into abstract cells for custom-VLSI module generation. A graph representing random logic is partitioned and the ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Hoberock, Jared (2008)
    This dissertation investigates novel methods of accelerating the central computations of physically-based light transport algorithms. We present novel mappings of the crucial primitive operations of ray tracing and shading ...

    application/pdf

    application/pdfPDF (2MB)Restricted to U of Illinois
  • Sampemane, Geetanjali (2005)
    We evaluate our model on the criteria of expressiveness, performance and usability. The model is sufficiently expressive for applications used in our Active Space. The performance overhead of our access control is demonstrated ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Jones, Vicki Ellen (1997)
    This thesis shows how to obtain efficient, fine-grained (object-level) control over user access to ODB data. We present a target access control model for ODB applications and delineate the trust assumptions required for ...

    application/pdf

    application/pdfPDF (6MB)Restricted to U of Illinois
  • Chen, Huei-Huang (1984)
    In evaluating a query using a network database, the links need to either be followed or be saved. Most of the previous approaches follow the links in evaluating a query using a network database. Actually, it is not always ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Laha, Subhasis (1988)
    Trace-driven simulation is a simple way of evaluating cache memory systems with varying hardware parameters. But to evaluate realistic workloads, simulating even a few million addresses is not adequate and such large scale ...

    application/pdf

    application/pdfPDF (3MB)Restricted to U of Illinois
  • Zheng, Gengbin (2005)
    We further motivate the need for next generation load balancing strategies for petaflops class machines. We explore a novel design of a scalable hierarchical load balancing scheme, which incorporates an explicit memory ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • He, Wenbo (2008-12)
    Wireless sensor networks (WSNs) were originally motivated by military applications, and are becoming integral part of more and more civilian applications to improve quality of life. With current wireless sensor network ...

    application/pdf

    application/pdfPDF (4MB)
  • He, Wenbo (2008)
    To show the efficacy and efficiency of the proposed schemes, I present simulation results of our schemes and compare their performance to a typical data aggregation scheme, Tiny Aggregation protocol (TAG), where no privacy ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Ren, Shangping (1997)
    This research uses both theoretical and experimental methods. Specifically, an operational semantics based on RTsynchronizers and regular computational objects (modeled as actors) is defined. RTsynchronizers are implemented ...

    application/pdf

    application/pdfPDF (5MB)Restricted to U of Illinois
  • Gornish, Edward H. (1995)
    Memory latency has always been a major issue in shared-memory multiprocessors and high-speed systems. This is even more true as the gap between processor and memory speeds continues to grow. Data prefetching has been ...

    application/pdf

    application/pdfPDF (6MB)Restricted to U of Illinois
  • Lim, Swee Boon (1996)
    Effective file system caching reduces local disk accesses and remote file server accesses significantly. Traditional file systems use fixed strategies to control caching. This thesis shows that a file system with adaptive ...

    application/pdf

    application/pdfPDF (10MB)Restricted to U of Illinois
  • Simitci, Huseyin (2000)
    Experimental results verified the accuracy of the developed analytical model in estimating and explaining disk striping performance. Also, experiments with artificial benchmarks and scientific applications showed that, ...

    application/pdf

    application/pdfPDF (8MB)Restricted to U of Illinois
  • Dwyer, Dane Steven (1998)
    This dissertation presents the Mobile File and Adaptation System (MFAS), the first file system to be designed specially for partially connected operation. While MFAS supports the extreme modes of full connection and ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Payne, Jeremy Roy (2000)
    Sensory systems generally exhibit a common class of signal processing features employed to filter primary sensory data before it is interpreted by higher brain structures, removing unwanted noise, suppressing reafferent ...

    application/pdf

    application/pdfPDF (7MB)Restricted to U of Illinois
  • Sandberg, Stuart Daniel (1990)
    We investigate various methods for making efficient use of the time-varying power received by radio reflection from meteor trails, including applications of variable-rate coding and variable-rate transmission. For variable-rate ...

    application/pdf

    application/pdfPDF (5MB)Restricted to U of Illinois
  • Chang, Conrad Tze Kong (2002)
    Object-oriented databases can be very useful for applications containing complex data models that are not well served by conventional databases. Although much research has been done on developing concurrency control protocols ...

    application/pdf

    application/pdfPDF (6MB)Restricted to U of Illinois
  • Waldby, Julian Francis (2001)
    For delay-sensitive applications, two complementary sets of results are obtained. The first set of results are regarding the Redundancy Estimation Protocol (REP), which provides adaptive error recovery using a forward error ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois