 IDEALS Home
 →
 Browse by Subject
Browse by Subject "Computer Science"
Now showing items 150169 of 433

(1995)The primary contribution of this dissertation is the presentation of a dynamic gametheoretic framework that is used as an analytical tool and unifying perspective for a wide class of problems in robot motion planning. The ...

(1989)We study the numerical solution of Hessenberg form differential algebraic equations by variable stepsize generalized backward difference formulae (GBDF). GBDF methods of sufficiently high order are shown to converge for ...

(1989)This thesis proposes a decompositionbased algorithmic paradigm, called planning with local experts, where the given global planning problem is decomposed into a set of subproblems that are each solved efficiently in a ...

(1996)Macromolecules such as proteins and DNA have complex spatial structures which are often important for their biological functions. The idea of molecular shape and shape complementarity play crucial roles in protein folding, ...

(1994)This research explores the representational and computational complexities of qualitative reasoning about timevarying behavior. Traditional techniques employ qualitative simulation (QS) to compute envisionments (i.e. ...

(1990)We propose the use of graph grammars as a theory to organize programming of highlyconcurrent systems. To understand the interactions among components of a concurrent system it is useful to visualize the system as dynamically ...

(1992)A graph H is a minor of another graph G, denoted by $H\ {\prec\sb{m}}\ G,$ if a graph isomorphic to H can be obtained from G by a series of vertex deletions, edge deletions, and edge contractions. Graph minors have been ...

(1989)In recent years, there has been an increase in the number of groupbased applications composed of cooperative processing entities. Examples include multimedia teleconferencing, distributed databases, distributed operating ...

(1996)Reducing memory latency is critical to the performance of largescale parallel systems. Due to the temporal and spatial locality of memory reference patterns, private caches can eliminate redundant memory accesses and ...

(1993)This thesis examines nonloop parallelism at both fine and coarse levels of granularity in numerical FORTRAN programs. Measurements of the extent of this functional parallelism in a number of FORTRAN codes are presented, ...

(1994)A central component of expertise is control knowledge which describes the approach to solving a problem. Human experts are capable of utilizing their control knowledge in different contexts. For example, an expert can ...

(1995)Fieldprogrammable gate arrays (FPGAs) allow circuit designers to perform quick prototyping and development. In this thesis we attempt to partition and place a hierarchically described system on multiple FPGA chips so as ...

(1993)This thesis describes a test environment for evaluating computer system dependability, wherein faults are injected via software and the impact is measured by both software and hardware. The hybrid nature of the environment ...

(1992)The primary objective of this research is to widen the range of questions that can be addressed in small group planning situations. This can be accomplished through improved access to tools, media, and group cognition. ...

(1990)Previous efforts to integrate ExplanationBased Learning (EBL) and SimilarityBased Learning (SBL) have treated these two methods as distinct interactive processes. In contrast, the synthesis presented here views these ...

(1996)Imperative and functional programming are two styles which have long been viewed as incompatible. In particular, the functional property of referential transparency could not be maintained in the face of destructive update, ...

(1989)Rewrite systems are directed equations that can be used to compute by repeatedly rewriting an initial term until a final form is obtained. Such systems provide a nondeterministic programming language having convenient ...

(1996)The thesis is concerned with the behavior of corrupted realtime control systems and their corrupted trajectories. The difference between the corrupted trajectory and the precise trajectory is called the tracking error. ...

(1991)Search is ubiquitous in computer science, but most searches are performed under constraints: time, memory, dependences. We study several cases of constrained search and present methods for improving their performance. ...

(1994)A new family of preconditioners for conjugate gradientlike iterative methods applied to large sparse linear least squares problems, $min\Vert Axb\Vert\sb2$, is proposed. The family is based on incomplete GramSchmidt ...
Now showing items 150169 of 433