# Browse by Subject "Computer Science"

• (1995)
The primary contribution of this dissertation is the presentation of a dynamic game-theoretic framework that is used as an analytical tool and unifying perspective for a wide class of problems in robot motion planning. The ...

application/pdf

PDF (11Mb)
• (1988)
Explanation-based learning (EBL) is a learning method which uses existing knowledge of the domain to construct an explanation for why a specific example is a member of a concept or why a specific combination of actions ...

application/pdf

PDF (11Mb)
• (1975)

application/pdf

PDF (3Mb)
• (1992)
The research contribution of this dissertation is a formal, computational model of the semantics of negation in natural language; its major components are two knowledge representation formalisms with Boolean semantics: a ...

application/pdf

PDF (10Mb)
• (1989)
We study the numerical solution of Hessenberg form differential algebraic equations by variable stepsize generalized backward difference formulae (GBDF). GBDF methods of sufficiently high order are shown to converge for ...

application/pdf

PDF (3Mb)
• (1988)
Explanation-based learning is a recently developed approach to concept acquisition by computer. In this type of machine learning, a specific problem's solution is generalized into a form that can later be used to solve ...

application/pdf

PDF (11Mb)
• (1975)

application/pdf

PDF (9Mb)
• (1989)
This thesis proposes a decomposition-based algorithmic paradigm, called planning with local experts, where the given global planning problem is decomposed into a set of subproblems that are each solved efficiently in a ...

application/pdf

PDF (6Mb)
• (1988)
We consider problems in geometric probing, the algorithmic study of determining a geometric structure or some aspect of that structure from the results of a mathematical or physical measuring device. A variety of problems ...

application/pdf

PDF (6Mb)
• (1996)
Macromolecules such as proteins and DNA have complex spatial structures which are often important for their biological functions. The idea of molecular shape and shape complementarity play crucial roles in protein folding, ...

application/pdf

PDF (4Mb)
• (1994)
This research explores the representational and computational complexities of qualitative reasoning about time-varying behavior. Traditional techniques employ qualitative simulation (QS) to compute envisionments (i.e. ...

application/pdf

PDF (7Mb)
• (1990)
We propose the use of graph grammars as a theory to organize programming of highly-concurrent systems. To understand the interactions among components of a concurrent system it is useful to visualize the system as dynamically ...

application/pdf

PDF (12Mb)
• (1988)
Given an ordering of the vertices of a graph around a circle, a page is a collection of edges forming non-crossing chords. A book embedding is a circular permutation of the vertices together with a partition of the edges ...

application/pdf

PDF (3Mb)
• (1992)
A graph H is a minor of another graph G, denoted by $H\ {\prec\sb{m}}\ G,$ if a graph isomorphic to H can be obtained from G by a series of vertex deletions, edge deletions, and edge contractions. Graph minors have been ...

application/pdf

PDF (5Mb)
• (1972)

application/pdf

PDF (4Mb)
• (1976)

application/pdf

PDF (5Mb)
• (1989)
In recent years, there has been an increase in the number of group-based applications composed of cooperative processing entities. Examples include multimedia teleconferencing, distributed databases, distributed operating ...

application/pdf

PDF (5Mb)
• (1993)
This thesis addresses dynamically adaptive bias in an algorithm for deriving classification rules from examples. Whereas prior studies examined either early setting of "global" biases for a specific problem taken ...

application/pdf

PDF (7Mb)
• (1974)

application/pdf

PDF (3Mb)
• (1996)
Reducing memory latency is critical to the performance of large-scale parallel systems. Due to the temporal and spatial locality of memory reference patterns, private caches can eliminate redundant memory accesses and ...

application/pdf

PDF (5Mb)