Browse by Subject "computer science"

  • Lee, Adam J.; Winslett, Marianne (2006-08)
    In trust negotiation and other distributed proving systems, networked entities cooperate to form proofs that are justified by collections of certified attributes. These attributes may be obtained through interactions with ...

    application/pdf

    application/pdfPDF (306Kb)
  • Sen, Koushik (2006-06)
    Testing using manually generated test cases is the primary technique used in industry to improve reliability of software---in fact, such ad hoc testing accounts for over half of the typical cost of software development. ...

    application/pdf

    application/pdfPDF (995Kb)
  • Wang, Xuanhui; Tan, Bin; Shakery, Azadeh; Zhai, ChengXiang (2008-09)
    While current search engines serve known-item search such as homepage finding very well, they generally cannot support exploratory search effectively. In exploratory search, users do not know their information needs precisely ...

    application/pdf

    application/pdfPDF (242Kb)
  • Mei, Qiaozhu; Jiang, Jing; Su, Hang; Zhai, ChengXiang (2007-11)
    This paper presents the duality hypothesis of search and tagging, two important behaviors of web users. The hypothesis states that if a user views a document D in the search results for query Q, the user would tend to ...

    application/pdf

    application/pdfPDF (222Kb)
  • Myagmar, Suvda (2008-04)
    This thesis addresses secure configuration of reconfigurable radio systems such as software defined radio. Software defined radio (SDR) supports integration and co- existence of multiple radio access technologies on a ...

    application/pdf

    application/pdfPDF (2Mb)
  • Popescu, Andrei; Serbanuta, Traian Florin; Rosu, Grigore (2005-05)
    Interpolation results are investigated for various types of formulae. By shifting the focus from syntactic to semantic interpolation, we generate, prove and classify more than twenty interpolation results for first-order ...

    application/pdf

    application/pdfPDF (309Kb)
  • Cai, Deng; He, Xiaofei; Han, Jiawei (2006-07)
    Graph-based approaches for semi-supervised learning have received increasing amount of interest in recent years. Despite their good performance, many pure graph based algorithms do not have explicit functions and can not ...

    application/pdf

    application/pdfPDF (200Kb)
  • Wei, Mingliang (2007-04)
    Many data-intensive applications exhibit poor temporal and spatial locality and perform poorly on commodity processors, due to high cache miss rates. Some due to unsophisticated implementations that do not exploit hardware ...

    application/pdf

    application/pdfPDF (937Kb)
  • Chen, Yixin (2005-09)
    In this dissertation, we propose a general approach that can significantly reduce the complexity in solving discrete, continuous, and mixed constrained nonlinear optimization (NLP) problems. A key observation we have made ...

    application/pdf

    application/pdfPDF (2Mb)
  • Thite, Shripad Vidyadhar (2005-08)
    Important applications in science and engineering, such as modeling traffic flow, seismic waves, electromagnetics, and the simulation of mechanical stresses in materials, require the high-fidelity numerical solution of ...

    application/pdf

    application/pdfPDF (3Mb)
  • Lu, Shan; Zhou, Pin; Liu, Wei; Zhou, YuanYuan; Torrellas, Josep (2005-07)
    Dynamic tools for software bug detection such as Purify are commonly used because they leverage run-time information. However, they suffer from a fundamental limitation, namely the Path Coverage Problem: they detect bugs ...

    application/pdf

    application/pdfPDF (452Kb)
  • Kamin, Samuel; Aktemur, T. Baris; Katelman, Michael (2006-09)
    Program generators are most naturally specified using a quote/antiquote facility; the programmer writes programs with holes which are filled in, at program generation time, by other program fragments. If the programs are ...

    application/pdf

    application/pdfPDF (363Kb)
  • Aktemur, T. Baris; Kamin, Samuel; Katelman, Michael (2008-12)
    Program generators are most naturally specified using a quote/antiquote facility; the programmer writes programs with holes which are filled in, at program generation time, by other program fragments. If the programs are ...

    application/pdf

    application/pdfPDF (384Kb)
  • Kowshik, Sumant Jagadish (2006)
    Embedded systems have proliferated into diverse and complex critical applications with stringent reliability and timeliness requirements. Guaranteeing reliability in the presence of increasing complexity of embedded systems ...

    application/pdf

    application/pdfPDF (4Mb)
  • Farzan, Azadeh (2007-01)
    Concurrency is ubiquitous in modern software. The computing base of systems software, including operating systems and databases, has always been highly concurrent and with the introduction of language- level thread primitives ...

    application/pdf

    application/pdfPDF (3Mb)
  • Rosulek, Michael J. (2009-09-08)
    Secure multi-party computation is a conceptual framework in which distrusting parties engage in a protocol to securely perform a computational task. Depending on the precise model of security, different sets of tasks admit ...

    application/pdf

    application/pdfPDF (1Mb)
  • Hendrix, Joe; Ohsaki, Hitoshi; Meseguer, Jose (2005-09)
    Sufficient completeness means that enough equations have been specified, so that the functions of an equational specification are fully defined on all relevant data. This is important for both debugging and formal reasoning. ...

    application/pdf

    application/pdfPDF (337Kb)
  • Cai, Deng; He, Xiaofei; Wen, Ji-Rong; Han, Jiawei; Ma, Wei-Ying (2006-04)
    We consider the problem of text representation and categorization. Conventionally, a text document is represented by a vector in high dimensional space. Some learning algorithms are then applied in such a vector space for ...

    application/pdf

    application/pdfPDF (220Kb)
  • Cook, Damon J.; Metcalf, Heather E.; Bailey, Brian P. (2005-09)
    As design problems become more complex, there is an increasing need to build tools that support the intersection of collaboration, creativity, and design. Founded on design requirements taken from research in these three ...

    application/pdf

    application/pdfPDF (263Kb)
  • Sadri, Bardia (2006-12)
    The distance function induced by a surface in R^n is known to carry a great deal of topological information about the surface and its embedding in space. It is an important question, from both theoretical and practical ...

    application/pdf

    application/pdfPDF (7Mb)