Browse Dept. of Computer Science by Title

  • Yang, Hongseok (2001)
    Programs are called stateful when they manipulate the state of a computer explicitly, for example, by assignment. The main theme of the thesis is reasoning about stateful programs. In fact, for the past 30 years, significant ...

    application/pdf

    application/pdfPDF (11MB)Restricted to U of Illinois
  • Lazebnik, Svetlana (2006-04)
    This dissertation addresses the problems of recognizing textures, objects, and scenes in photographs. We present approaches to these recognition tasks that combine salient local image features with spatial relations and ...

    application/pdf

    application/pdfPDF (19MB)
  • Lazebnik, Svetlana (2006)
    This dissertation addresses the problems of recognizing textures, objects, and scenes in photographs. We present approaches to these recognition tasks that combine salient local image features with spatial relations and ...

    application/pdf

    application/pdfPDF (6MB)Restricted to U of Illinois
  • Sundresh, Sameer; Kwon, YoungMin; Mechitov, Kirill; Kim, Wooyoung; Agha, Gul A. (2005-03)
    Localization is the process by which sensor networks associate spatial position information with individual sensors' measurements. While manual surveying is sufficient for small-scale prototypes, it is too time-consuming ...

    application/pdf

    application/pdfPDF (111kB)
  • Li, Ning (2005)
    Finally, we consider power-efficient broadcast in wireless ad hoc networks as an application of the proposed topology control algorithms, and propose Broadcast on Local Spanning Subgraph (BLSS), which broadcasts in a ...

    application/pdf

    application/pdfPDF (3MB)Restricted to U of Illinois
  • Li, Ning (2005-08)
    Topology control has crucial impact on the system performance of wireless ad hoc networks. We propose several topology control algorithms that can maintain network connectivity while reducing energy consumption and improving ...

    application/pdf

    application/pdfPDF (1MB)
  • Schuster, Stewart Arnold (1973)

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Pan, Peichen (1995)
    Computer-aided design of VLSI circuits is usually carried out in three synthesis steps: high-level synthesis, logic synthesis and layout synthesis. Each synthesis step is further broken into a few optimization problems. ...

    application/pdf

    application/pdfPDF (6MB)Restricted to U of Illinois
  • Hu, Jackson Kwo-Chain (1978)

    application/pdf

    application/pdfPDF (10MB)Restricted to U of Illinois
  • Limqueco, Johnson Chan (1992)
    The logic networks that can be put on a single chip continues to grow in size and complexity. There is thus an increasing need for designers to rely on the assistance of computer-aided design tools to provide a fast design ...

    application/pdf

    application/pdfPDF (12MB)Restricted to U of Illinois
  • Chen, Kuang-Chien (1991)
    As VLSI integration size and chip complexity keep increasing, logic design is becoming more complex and it must be automated. The increasing demand for ASIC (Application Specific Integrated Circuits) also needs design ...

    application/pdf

    application/pdfPDF (11MB)Restricted to U of Illinois
  • Hsieh, Chang-Chao (1998)
    In the optimization phase, the Transduction method and the delay-reducing/delay-restricted Transduction method are employed to minimize the area or delay of the already rectified network. Compatible sets of permissible ...

    application/pdf

    application/pdfPDF (9MB)Restricted to U of Illinois
  • Renner, Scott Alexander (1990)
    There are almost always differences between the behavior intended by a programmer and the behavior actually implemented by his code. These differences are logical errors. The process of locating the cause of these differences ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Amir, Eyal; Russell, Stuart (2005-05)
    Filtering denotes any method whereby an agent updates its belief state - its knowledge of the state of the world - from a sequence of actions and observations. In logical filtering, the belief state is a logical formula ...

    application/pdf

    application/pdfPDF (325kB)
  • Izaguirre Paz, Jesus Antonio (1999)
    In molecular dynamics one solves Newton's equations of motion. This is a challenging problem because the number of particles is large (thousands of atoms) but more importantly because stability severely limits the length ...

    application/pdf

    application/pdfPDF (5MB)Restricted to U of Illinois
  • Shi, Shu (2012-05-22)
    Mobile devices are gradually changing people’s computing behaviors. However, due to the limitations of physical size and power consumption, they are not capable of delivering a 3D graphics rendering experience comparable ...

    application/pdf

    application/pdfPDF (3MB)
  • Kale, Vivek (2015-04-24)
    Application performance can degrade significantly due to node-local load imbalances during application execution on a large number of SMP nodes. These imbalances can arise from the machine, operating system, or the application ...

    application/pdf

    application/pdfPDF (5MB)Restricted to U of Illinois
  • Pellizzoni, Rodolfo; Caccamo, Marco (2006-03)
    Resource reclaiming schemes are applied in reservation-based real-time uniprocessor systems to support efficient reclaiming and sharing of computational resources left unused by early completing tasks, improving the response ...

    application/pdf

    application/pdfPDF (202kB)
  • Zelenko, Dmitry (2003-12)
    The dissertation presents a number of novel machine learning techniques and applies them to information extraction. The study addresses several information extraction subtasks: part of speech tagging, entity extraction, ...

    application/pdf

    application/pdfPDF (921kB)
  • Zelenko, Dmitry (2003)
    The dissertation presents a number of novel machine learning techniques and applies them to information extraction. The study addresses several information extraction subtasks: part of speech tagging, entity extraction, ...

    application/pdf

    application/pdfPDF (6MB)Restricted to U of Illinois