Browse by Subject "Computer Science"

  • Goldstein, Arthur Sander (1992)
    A variation of Kraft's inequality is proven for a unimodal search tree. The inequality is used to prove the near optimality of an algorithm for solving the unbounded discrete unimodal search problem. New results on the ...

    application/pdf

    application/pdfPDF (3MB)Restricted to U of Illinois
  • Vu, Long; Gupta, Indranil; Nahrstedt, Klara; Liang, Jin (2008-09)
    This paper presents results from our measurement and modeling efforts on the large-scale peer- to-peer (p2p) overlay graphs spanned by the PPLive system, the most popular and largest p2p IPTV (Internet Protocol Television) ...

    application/pdf

    application/pdfPDF (437kB)
  • Zhang, Honghai (2005)
    Finally, we study the minimum energy required for transporting packets between two arbitrarily chosen source and destination in a random wireless network. We prove both an upper bound and a lower bound of the minimum ...

    application/pdf

    application/pdfPDF (5MB)Restricted to U of Illinois
  • Jiang, Weihang (2009)
    Nowadays, over 90% new information produced are stored on hard disk drives. The explosion of data is making storage system a strategic investment priority in the enterprise world. The revenue created by storage system ...

    application/pdf

    application/pdfPDF (1MB)Restricted to U of Illinois
  • Lu, Shan (2008)
    The third main contribution is along the lines of exploring concurrent programs' interleaving space and exposing concurrency bugs. This thesis presents a hierarchy of interleaving coverage criteria. This hierarchy includes ...

    application/pdf

    application/pdfPDF (10MB)Restricted to U of Illinois
  • Lu, Shan (2008-12)
    Software is pervasive in our daily lives. Unfortunately, software bugs can severely affect the dependability and security of software systems. Among all types of software bugs, the concurrency bug is one of the most ...

    application/pdf

    application/pdfPDF (1MB)
  • Smets, Martine Marthe Sylvie Arlette (2000)
    This approach has been implemented in Prolog, a language particularly suited for applications based on unification. The contribution of this thesis to the field of computational morphology is discussed and contrasted with ...

    application/pdf

    application/pdfPDF (9MB)Restricted to U of Illinois
  • Mitchell, William F. (1988)
    Many elliptic partial differential equations can be solved numerically with near optimal efficiency through the uses of adaptive refinement and multigrid solution techniques. It is our goal to develop a more unified approach ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Qian, Richard Junqiang (1996)
    In this thesis, we present a unified scheme for image segmentation and object recognition. The scheme unifies image segmentation and object recognition via three serial stages: (1) optimal edge detection and region detection; ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Jana, Soumya (2005)
    In fact, we set distributed source coding problems in a general framework and take a unified structural view of not only the above open problems but any two-terminal problem with noncooperative encoding. The distortion ...

    application/pdf

    application/pdfPDF (3MB)Restricted to U of Illinois
  • application/pdf

    application/pdfPDF (7MB)Restricted to U of Illinois
  • Mahmud, M.M.Hassan (2008-07)
    The aim of transfer learning is to reduce sample complexity required to solve a learning task by using information gained from solving related tasks. Transfer learning has in general been motivated by the observation that ...

    application/pdf

    application/pdfPDF (848kB)
  • Pakin, Scott Dov (2001)
    I have evaluated my new mechanisms on a PC cluster interconnected with a VIA-based network. The specific contributions of my thesis are a quantification of the levels of unresponsiveness in PC clusters and a classification ...

    application/pdf

    application/pdfPDF (8MB)Restricted to U of Illinois
  • Chen, Mei-Qin (1989)
    The Updated Conjugate Subspaces method, an modified quasi-Newton method for solving nonlinear unconstrained minimization problems, has flexibility of choosing different quadratic approximation at each iteration and therefore ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Kamalnath, Vishnu Nath (2013-08-22)
    This thesis deals with incorporating artificial intelligence into a humanoid robot by making a cognitive model of the learning process. The goal is to “teach” a specialized humanoid robot, the iCub robot, to solve any ...

    application/pdf

    application/pdfPDF (2MB)
  • Chang, Hong-Tao Paul (1987)
    The goals of this thesis are to study and demonstrate the advantage of using functional descriptions for fault simulation and test generation. By using functional descriptions, high-level functional modules are treated as ...

    application/pdf

    application/pdfPDF (3MB)Restricted to U of Illinois
  • Cortelazzo, Guido (1984)
    This research explores for the first time the practical applicability of multiple criterion optimization techniques to digital filter design. The potential role of multiple criterion optimization in digital filter design ...

    application/pdf

    application/pdfPDF (10MB)Restricted to U of Illinois
  • Shen, Xuehua (2007)
    Information retrieval systems are critical for overcoming information overload. A major deficiency of existing retrieval systems is that they generally lack user modeling and are not adaptive to individual users. Personalization ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Davis, Paul Rodger (1977)

    application/pdf

    application/pdfPDF (3MB)Restricted to U of Illinois
  • Li, Zhenmin (2006)
    Copy-pasted code is very common in large software, but it is prone to introducing bugs. CP-Miner uses frequent sequence mining to efficiently identify copy-pasted code in large software, and detects copy-paste related bugs. ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois