# Browse by Subject "Computer Science"

• (1995)
The primary contribution of this dissertation is the presentation of a dynamic game-theoretic framework that is used as an analytical tool and unifying perspective for a wide class of problems in robot motion planning. The ...
PDF (11MB)
• (1989)
We study the numerical solution of Hessenberg form differential algebraic equations by variable stepsize generalized backward difference formulae (GBDF). GBDF methods of sufficiently high order are shown to converge for ...
PDF (3MB)
• (1989)
This thesis proposes a decomposition-based algorithmic paradigm, called planning with local experts, where the given global planning problem is decomposed into a set of subproblems that are each solved efficiently in a ...
PDF (6MB)
• (1996)
Macromolecules such as proteins and DNA have complex spatial structures which are often important for their biological functions. The idea of molecular shape and shape complementarity play crucial roles in protein folding, ...
PDF (4MB)
• (1994)
This research explores the representational and computational complexities of qualitative reasoning about time-varying behavior. Traditional techniques employ qualitative simulation (QS) to compute envisionments (i.e. ...
PDF (7MB)
• (1990)
We propose the use of graph grammars as a theory to organize programming of highly-concurrent systems. To understand the interactions among components of a concurrent system it is useful to visualize the system as dynamically ...
PDF (12MB)
• (1992)
A graph H is a minor of another graph G, denoted by $H\ {\prec\sb{m}}\ G,$ if a graph isomorphic to H can be obtained from G by a series of vertex deletions, edge deletions, and edge contractions. Graph minors have been ...
PDF (5MB)
• (1989)
In recent years, there has been an increase in the number of group-based applications composed of cooperative processing entities. Examples include multimedia teleconferencing, distributed databases, distributed operating ...
PDF (5MB)
• (1996)
Reducing memory latency is critical to the performance of large-scale parallel systems. Due to the temporal and spatial locality of memory reference patterns, private caches can eliminate redundant memory accesses and ...
PDF (5MB)
• (1993)
This thesis examines nonloop parallelism at both fine and coarse levels of granularity in numerical FORTRAN programs. Measurements of the extent of this functional parallelism in a number of FORTRAN codes are presented, ...
PDF (10MB)
• (1994)
A central component of expertise is control knowledge which describes the approach to solving a problem. Human experts are capable of utilizing their control knowledge in different contexts. For example, an expert can ...
PDF (8MB)
• (1995)
Field-programmable gate arrays (FPGAs) allow circuit designers to perform quick prototyping and development. In this thesis we attempt to partition and place a hierarchically described system on multiple FPGA chips so as ...
PDF (6MB)
• (1993)
This thesis describes a test environment for evaluating computer system dependability, wherein faults are injected via software and the impact is measured by both software and hardware. The hybrid nature of the environment ...
PDF (5MB)
• (1992)
The primary objective of this research is to widen the range of questions that can be addressed in small group planning situations. This can be accomplished through improved access to tools, media, and group cognition. ...
PDF (8MB)
• (1990)
Previous efforts to integrate Explanation-Based Learning (EBL) and Similarity-Based Learning (SBL) have treated these two methods as distinct interactive processes. In contrast, the synthesis presented here views these ...
PDF (5MB)
• (1996)
Imperative and functional programming are two styles which have long been viewed as incompatible. In particular, the functional property of referential transparency could not be maintained in the face of destructive update, ...
PDF (7MB)
• (1989)
Rewrite systems are directed equations that can be used to compute by repeatedly rewriting an initial term until a final form is obtained. Such systems provide a nondeterministic programming language having convenient ...
PDF (5MB)
• (1996)
The thesis is concerned with the behavior of corrupted real-time control systems and their corrupted trajectories. The difference between the corrupted trajectory and the precise trajectory is called the tracking error. ...
PDF (3MB)
• (1991)
Search is ubiquitous in computer science, but most searches are performed under constraints: time, memory, dependences. We study several cases of constrained search and present methods for improving their performance. ...
PDF (6MB)
• (1994)
A new family of preconditioners for conjugate gradient-like iterative methods applied to large sparse linear least squares problems, $min\Vert Ax-b\Vert\sb2$, is proposed. The family is based on incomplete Gram-Schmidt ...
PDF (10MB)