# Browse by Subject "computer science"

• (2007-11)
A Delphi process is a structured multi-step process that uses a group of experts to achieve a consensus opinion. We present the results of three Delphi processes to identify topics that are important and difficult in each ...

application/pdf

PDF (462Kb)
• (2007-11)
The performance of statistical language modeling retrieval is directly determined by the estimation of document model £D, query model £Q, and the similarly between those two models. In this thesis, we propose to improve ...

application/postscript

Postscript (10Mb)
• (2005-11)
Productive collaboration in a Multiple-Device Environment (MDE) requires an effective interface to efficiently manage applications among devices. Though many interfaces exist, there is little empirical understanding of how ...

application/pdf

PDF (411Kb)
• (2007-09)
In this report, we present an incremental state space exploration technique that aims to provide a speedup in exploring the state space created by the execution of the simulation model of a network protocol for the purpose ...

application/pdf

PDF (272Kb)
• (2009)
Effect systems are important for reasoning about the side effects of a program. Although effect systems have been around for decades, they have not been widely adopted in practice because of the large number of annotations ...

application/pdf

PDF (205Kb)
• (2006-07)
A large number of data sources on the Web (e.g., Amazon.com) are only accessible through their query interfaces. These sources are commonly known as Deep Web sources. For any domain of interest, there may be many such ...

application/pdf

PDF (952Kb)
• (2008-09)
In today's workplace, there is a continual increase in the size and complexity of the problems that knowledge workers are challenged to solve. This often requires workers with different expertise to come together to ...

application/pdf

PDF (2Mb)
• (2007-09)
Computational simulations frequently generate solutions defined over very large tetrahedral volume meshes containing many millions of elements. Furthermore, solutions over these meshes may often be expressed using non-linear ...

application/pdf

PDF (6Mb)
• (2006-07)
Recently the problem of dimensionality reduction has received a lot of interests in many fields of information processing, including data mining, information retrieval, and pattern recognition. We consider the case where ...

application/pdf

PDF (819Kb)
• (2006-03)
Gossip protocols provide probabilistic reliability and scalability, but their inherent randomness may lead to high variation in (received) message overheads at different nodes. This paper presents techniques that leverages ...

application/pdf

PDF (419Kb)
• (2008-02-28)
Many institutions of higher education in the US are offering an information technology (IT) education program at an undergraduate level. So far, not many studies about this young academic program have explored students’ ...

application/msword

Microsoft Word (81Kb)
• (2007-09)
Topology optimization is a powerful tool for global and multiscale design of structures, microstructures, and materials. The computational bottleneck of topology optimization is the solution of a large number of extremely ...

application/pdf

PDF (5Mb)
• (2006-12)
The Web has been rapidly deepened'' by myriad searchable databases online, where data are hidden behind query interfaces. Guarding data behind them, such query interfaces are the entrances'' or doors'' to the deep ...

application/pdf

PDF (2Mb)
• (2006-01)
The computational bottleneck of topology optimization is the solution of a large number of linear systems arising in the finite element analysis. We propose fast iterative solvers for large three-dimensional topology ...

application/pdf

PDF (4Mb)
• (2006-05)
Transactional memory (TM) is a compelling alternative to traditional synchronization, and implementing TM primitives directly in hardware offers a potential performance advantage over software-based methods. In this paper, ...

application/pdf

PDF (200Kb)
• (2008-10)
This dissertation addresses the task of detecting instances of object categories in photographs. We propose modeling an object category as a collection of object parts linked together in a deformable configuration. We ...

application/pdf

PDF (10Mb)
• (2008-04)
This dissertation addresses the task of learning to segment images into meaningful material and object categories. With regards to materials we consider the difficult task of segmenting objects made of transparent materials ...

application/pdf

PDF (7Mb)
• (2005-08)
We present a new model checking algorithm for verifying computation tree logic (CTL) properties. Our technique is based on using language inference to learn the fixpoints necessary for checking a CTL formula instead of ...

application/pdf

PDF (232Kb)
• (2006-02)
Making high quality and reliable software systems remains a difficult problem. One approach to address this problem is automated verification which attempts to demonstrate algorithmically that a software system meets its ...

application/pdf

PDF (872Kb)
• (2005-09)
A challenge in building interruption reasoning systems is to compute an accurate cost of interruption (COI). Prior work has used non task-specific cues to predict COI, but ignore characteristics related to the /structure/ ...

application/pdf

PDF (215Kb)