Browse by Subject "computer science"

  • Adamczyk, Paul; Hafiz, Munawar; Johnson, Ralph E. (2008-01)
    We studied the most popular websites in the US and around the world and discovered that few of them implement the HTTP standard completely. However, the servers are capable of implementing HTTP correctly; it is the ...

    application/pdf

    application/pdfPDF (578Kb)
  • Cheng, Lei (2007-05)
    CMOS technology has continuously scaled into deep sub-micron regime. With CMOS scaling, many complex design issues arise. The challenges include, but not limited to, the increasing of interconnect delay and power, exponential ...

    application/pdf

    application/pdfPDF (956Kb)
  • Neradt, Hanna Joy (2007-08)
    A linear differential operator often has a nontrivial null space. One consequence for such an operator, L, is that solutions of equations of the form Lu=f are never unique if the null space contains more than the zero ...

    application/pdf

    application/pdfPDF (928Kb)
  • Lim, Jongwoo (2005-12)
    The images of an object may look very different under different illumination conditions or viewing directions. This thesis considers the problem of clustering images of various objects into disjoint subsets according to ...

    application/pdf

    application/pdfPDF (8Mb)
  • Harris, Albert F., III; Snader, Robin; Kravets, Robin (2006-06)
    Increases in computing capabilities of mobile devices have led to the use of multimedia applications that have high processor and bandwidth resource requirements, each of which consume significant energy. However, battery ...

    application/pdf

    application/pdfPDF (304Kb)
  • Li, Chien-Wei (2006-05)
    To efficiently utilize the emerging heterogeneous multi-core architecture, it is essential to exploit the inherent coarse-grained parallelism in applications. In addition to data parallelism, applications like telecommunication, ...

    application/pdf

    application/pdfPDF (1Mb)
  • Rosu, Grigore (2007-02)
    Various definitions of safety properties as sets of execution traces have been introduced in the literature, some over finite traces, others over infinite traces, yet others over both finite and infinite traces. By employing ...

    application/pdf

    application/pdfPDF (388Kb)
  • Hendrix, Joe; Meseguer, Jos�� (2007-02)
    We propose three different notions of completeness for term rewrite specifications supporting order-sorted signatures, deduction modulo axioms, and context-sensitive rewriting relative to a replacement map mu. Our three ...

    application/pdf

    application/pdfPDF (439Kb)
  • Chadha, Rohit; Sistla, A. Parsad; Viswanathan, Mahesh (2009-02)
    The continuous run-time monitoring of the behavior of a system is a technique that is used both as a complementary approach to formal verification and testing to ensure reliability, as well as a means to discover emergent ...

    application/pdf

    application/pdfPDF (368Kb)
  • Liang, Jin; Gupta, Indranil; Nahrstedt, Klara (2006-06)
    The emergence of large-scale distributed computing clusters such as PlanetLab and Utility Grids has fueled the development of applications ranging from content distribution to name service to large-scale prototype experiments. ...

    application/pdf

    application/pdfPDF (239Kb)
  • Jeon, Won J. (2007-07)
    Multimedia services such video-on-demand service to large number of clients require stable network bandwidth provision and short network delay. In order to achieve these goals, the object replication in overlay P2P networks ...

    application/pdf

    application/pdfPDF (649Kb)
  • d'Amorim, Marcelo; Sobeih, Ahmed A.; Marinov, Darko (2006-06)
    Java PathFinder (JPF) is an explicit-state model checker for Java programs. It explores all executions that a given program can have due to different thread interleavings and nondeterministic choices. JPF implements a ...

    application/pdf

    application/pdfPDF (176Kb)
  • Shankar, Chetan S.; Campbell, Roy H. (2005-11)
    A pervasive system features a plethora of devices, services and applications organized as a large distributed system. One approach to managing such systems is by policies where administrators specify the management action ...

    application/pdf

    application/pdfPDF (192Kb)
  • Chen, Feng; Rosu, Grigore (2007-01)
    Happen-before causal partial order relations have been widely used in concurrent program verification and testing. In this paper, we present a parametric approach to happen-before causal partial orders. All existing variants ...

    application/pdf

    application/pdfPDF (130Kb)
  • Chen, Feng; Rosu, Grigore (2006-04)
    A parametric approach to control dependence is presented, where the parameter is any prefix-invariant property on paths in the control-flow graph. Existing control dependencies, both direct and indirect, can be obtained ...

    application/pdf

    application/pdfPDF (156Kb)
  • Ramasamy, Harigovind Venkatraj (2005-12)
    We consider the subject of tolerance of the most severe kind of faults, namely Byzantine faults, through state machine replication in asynchronous environments such as the Internet. In Byzantine-fault-tolerant (BFT) state ...

    application/pdf

    application/pdfPDF (941Kb)
  • Zhu, Qingbo (2007-08)
    Trends in Internet infrastructure are driving towards using data centers to provide services such as web hosting and outsourced storage. Data centers typically have high power requirements and may require as much electricity ...

    application/pdf

    application/pdfPDF (1Mb)
  • Thompson, Nathanael A.; Luo, Haiyun (2006-07)
    802.11 networks have spread rapidly in residential areas, and it is common for neighbors to receive the signals from each other's home wireless routers. Residents can leverage such an opportunity to improve their Internet ...

    application/pdf

    application/pdfPDF (264Kb)
  • Shankar, Chetan S. (2006-09)
    Policy-based management is an approach in which organization guidelines can be expressed as policies that are enforced by a management system. These rules specify the corrective actions that should be executed in different ...

    application/pdf

    application/pdfPDF (956Kb)
  • Uttamchandani, Sandeep (2005-09)
    Computer systems today are managed by human administrators who are required to continuously observe the system, analyze its behavior, and activate corrective actions (generally referred to as the Observe-Analyze-Act loop). ...

    application/pdf

    application/pdfPDF (850Kb)