Browse by Subject "computer science"

  • Chakravorty, Sayantan (2008-01)
    Large machines with tens or even hundreds of thousands of processors are currently in use. As the number of components increases, the mean time between failure will decrease further. Fault tolerance is an important issue ...

    application/pdf

    application/pdfPDF (2Mb)
  • Rocha, Camilo; Meseguer, Jose (2007-02)
    We present four equational theories that are isomorphic to the traditional Boolean theory and show that each one of them gives rise to a canonical rewrite system modulo associativity, thus providing four decision procedures ...

    application/pdf

    application/pdfPDF (658Kb)
  • Meredith, Patrick O'Neil; Hills, Mark; Roşu, Grigore (2007-07)
    This paper presents a formal definition of Scheme (based on the informal definition given in the R5RS report R5RS. The definition is purely equational, so it can be regarded as an algebraic denotational specification with ...

    application/pdf

    application/pdfPDF (234Kb)
  • Iqbal, Shamsi T. (2008-07)
    Interruptions in the workplace are becoming increasingly prevalent due to the proliferation of proactive behavior within communication applications and collaborative practices. Interruptions caused by notifications from ...

    application/pdf

    application/pdfPDF (6Mb)
  • Popescu, Andrei (2009-03)
    Combining traces, coalgebra and lazy-filtering channel configurations for parallel composition, we give a fully-abstract denotational semantics for the pi-calculus under weak early bisimilarity.

    application/pdf

    application/pdfPDF (627Kb)
  • Popescu, Andrei; Rosu, Grigore (2006-07)
    Generic first-order logic (GFOL) is a first-order logic parameterized with terms defined axiomatically (rather than constructively), by requiring them to only provide generic notions of free variable and substitution ...

    application/pdf

    application/pdfPDF (567Kb)
  • Liu, Che-Bin (2006-05)
    This thesis considers the problem of modeling and analysis of continuous, locally-linear, multi-dimensional spatio-temporal data. Our work extends the previously reported theoretical work on the global coordination model ...

    application/pdf

    application/pdfPDF (3Mb)
  • Furukawa, Yasutaka (2008-05)
    Image-based modeling is the process of automatically acquiring geometric object and scene models from photographs or video clips. This dissertation addresses three core problems in image-based modeling: static scene ...

    application/pdf

    application/pdfPDF (90Mb)
  • He, Bin (2006-06)
    Schema matching is a critical problem for integrating heterogeneous information sources. Traditionally, the problem of matching multiple schemas has essentially relied on finding pairwise attribute correspondences in ...

    application/pdf

    application/pdfPDF (1Mb)
  • Goldman, Ken; Gross, Paul; Heeren, Cinda; Herman, Geoffrey; Kaczmarczyk, Lisa; Loui, Michael C.; Zilles, Craig (2007-11)
    A Delphi process is a structured multi-step process that uses a group of experts to achieve a consensus opinion. We present the results of three Delphi processes to identify topics that are important and difficult in each ...

    application/pdf

    application/pdfPDF (462Kb)
  • Tao, Tao (2007-11)
    The performance of statistical language modeling retrieval is directly determined by the estimation of document model £D, query model £Q, and the similarly between those two models. In this thesis, we propose to improve ...

    application/postscript

    application/postscriptPostscript (10Mb)
  • Biehl, Jacob T.; Bailey, Brian P. (2005-11)
    Productive collaboration in a Multiple-Device Environment (MDE) requires an effective interface to efficiently manage applications among devices. Though many interfaces exist, there is little empirical understanding of how ...

    application/pdf

    application/pdfPDF (411Kb)
  • Sobeih, Ahmed A.; Lauterburg, Steven (2007-09)
    In this report, we present an incremental state space exploration technique that aims to provide a speedup in exploring the state space created by the execution of the simulation model of a network protocol for the purpose ...

    application/pdf

    application/pdfPDF (272Kb)
  • Vakilian, Mohsen; Dig, Danny; Bocchino, Robert L., Jr.; Overbey, Jeffrey; Adve, Vikram S.; Johnson, Ralph (2009)
    Effect systems are important for reasoning about the side effects of a program. Although effect systems have been around for decades, they have not been widely adopted in practice because of the large number of annotations ...

    application/pdf

    application/pdfPDF (205Kb)
  • Wu, Wensheng (2006-07)
    A large number of data sources on the Web (e.g., Amazon.com) are only accessible through their query interfaces. These sources are commonly known as Deep Web sources. For any domain of interest, there may be many such ...

    application/pdf

    application/pdfPDF (952Kb)
  • Biehl, Jacob T. (2008-09)
    In today's workplace, there is a continual increase in the size and complexity of the problems that knowledge workers are challenged to solve. This often requires workers with different expertise to come together to ...

    application/pdf

    application/pdfPDF (2Mb)
  • Zhou, Yuan (2007-09)
    Computational simulations frequently generate solutions defined over very large tetrahedral volume meshes containing many millions of elements. Furthermore, solutions over these meshes may often be expressed using non-linear ...

    application/pdf

    application/pdfPDF (6Mb)
  • Cai, Deng; He, Xiaofei; Han, Jiawei (2006-07)
    Recently the problem of dimensionality reduction has received a lot of interests in many fields of information processing, including data mining, information retrieval, and pattern recognition. We consider the case where ...

    application/pdf

    application/pdfPDF (819Kb)
  • Patel, Jay A.; Gupta, Indranil; Contractor, Noshir (2006-03)
    Gossip protocols provide probabilistic reliability and scalability, but their inherent randomness may lead to high variation in (received) message overheads at different nodes. This paper presents techniques that leverages ...

    application/pdf

    application/pdfPDF (419Kb)
  • Choi, Heekyung (2008-02-28)
    Many institutions of higher education in the US are offering an information technology (IT) education program at an undergraduate level. So far, not many studies about this young academic program have explored students’ ...

    application/msword

    application/mswordMicrosoft Word (81Kb)