Browse by Subject "computer science"

  • Lim, Jongwoo (2005-12)
    The images of an object may look very different under different illumination conditions or viewing directions. This thesis considers the problem of clustering images of various objects into disjoint subsets according to ...

    application/pdf

    application/pdfPDF (8Mb)
  • Harris, Albert F., III; Snader, Robin; Kravets, Robin (2006-06)
    Increases in computing capabilities of mobile devices have led to the use of multimedia applications that have high processor and bandwidth resource requirements, each of which consume significant energy. However, battery ...

    application/pdf

    application/pdfPDF (304Kb)
  • Li, Chien-Wei (2006-05)
    To efficiently utilize the emerging heterogeneous multi-core architecture, it is essential to exploit the inherent coarse-grained parallelism in applications. In addition to data parallelism, applications like telecommunication, ...

    application/pdf

    application/pdfPDF (1Mb)
  • Rosu, Grigore (2007-02)
    Various definitions of safety properties as sets of execution traces have been introduced in the literature, some over finite traces, others over infinite traces, yet others over both finite and infinite traces. By employing ...

    application/pdf

    application/pdfPDF (388Kb)
  • Hendrix, Joe; Meseguer, Jos�� (2007-02)
    We propose three different notions of completeness for term rewrite specifications supporting order-sorted signatures, deduction modulo axioms, and context-sensitive rewriting relative to a replacement map mu. Our three ...

    application/pdf

    application/pdfPDF (439Kb)
  • Chadha, Rohit; Sistla, A. Parsad; Viswanathan, Mahesh (2009-02)
    The continuous run-time monitoring of the behavior of a system is a technique that is used both as a complementary approach to formal verification and testing to ensure reliability, as well as a means to discover emergent ...

    application/pdf

    application/pdfPDF (368Kb)
  • Liang, Jin; Gupta, Indranil; Nahrstedt, Klara (2006-06)
    The emergence of large-scale distributed computing clusters such as PlanetLab and Utility Grids has fueled the development of applications ranging from content distribution to name service to large-scale prototype experiments. ...

    application/pdf

    application/pdfPDF (239Kb)
  • Jeon, Won J. (2007-07)
    Multimedia services such video-on-demand service to large number of clients require stable network bandwidth provision and short network delay. In order to achieve these goals, the object replication in overlay P2P networks ...

    application/pdf

    application/pdfPDF (649Kb)
  • d'Amorim, Marcelo; Sobeih, Ahmed A.; Marinov, Darko (2006-06)
    Java PathFinder (JPF) is an explicit-state model checker for Java programs. It explores all executions that a given program can have due to different thread interleavings and nondeterministic choices. JPF implements a ...

    application/pdf

    application/pdfPDF (176Kb)
  • Shankar, Chetan S.; Campbell, Roy H. (2005-11)
    A pervasive system features a plethora of devices, services and applications organized as a large distributed system. One approach to managing such systems is by policies where administrators specify the management action ...

    application/pdf

    application/pdfPDF (192Kb)
  • Chen, Feng; Rosu, Grigore (2007-01)
    Happen-before causal partial order relations have been widely used in concurrent program verification and testing. In this paper, we present a parametric approach to happen-before causal partial orders. All existing variants ...

    application/pdf

    application/pdfPDF (130Kb)
  • Chen, Feng; Rosu, Grigore (2006-04)
    A parametric approach to control dependence is presented, where the parameter is any prefix-invariant property on paths in the control-flow graph. Existing control dependencies, both direct and indirect, can be obtained ...

    application/pdf

    application/pdfPDF (156Kb)
  • Ramasamy, Harigovind Venkatraj (2005-12)
    We consider the subject of tolerance of the most severe kind of faults, namely Byzantine faults, through state machine replication in asynchronous environments such as the Internet. In Byzantine-fault-tolerant (BFT) state ...

    application/pdf

    application/pdfPDF (941Kb)
  • Zhu, Qingbo (2007-08)
    Trends in Internet infrastructure are driving towards using data centers to provide services such as web hosting and outsourced storage. Data centers typically have high power requirements and may require as much electricity ...

    application/pdf

    application/pdfPDF (1Mb)
  • Thompson, Nathanael A.; Luo, Haiyun (2006-07)
    802.11 networks have spread rapidly in residential areas, and it is common for neighbors to receive the signals from each other's home wireless routers. Residents can leverage such an opportunity to improve their Internet ...

    application/pdf

    application/pdfPDF (264Kb)
  • Shankar, Chetan S. (2006-09)
    Policy-based management is an approach in which organization guidelines can be expressed as policies that are enforced by a management system. These rules specify the corrective actions that should be executed in different ...

    application/pdf

    application/pdfPDF (956Kb)
  • Uttamchandani, Sandeep (2005-09)
    Computer systems today are managed by human administrators who are required to continuously observe the system, analyze its behavior, and activate corrective actions (generally referred to as the Observe-Analyze-Act loop). ...

    application/pdf

    application/pdfPDF (850Kb)
  • Siefert, Chris M. (2006-01)
    Generalized saddle point problems arise in a number of applications, ranging from optimization and metal deformation to fluid flow and PDE-governed optimal control. We focus our discussion on the most general case, making ...

    application/pdf

    application/pdfPDF (1Mb)
  • Daniel, Brett; Boshernitsan, Marat (2008-04)
    Automatic white-box test generation is a challenging problem. Many existing tools rely on complex code analyses and heuristics. As a result, structural features of an input program may impact tool effectiveness in ways ...

    application/pdf

    application/pdfPDF (365Kb)
  • Chen, Feng; Rosu, Grigore (2005-11)
    A runtime analysis technique is presented, which can predict errors in multi-threaded systems by examining event traces generated by executions of these systems even when they are successful. The technique is based on a ...

    application/pdf

    application/pdfPDF (268Kb)