Browse Dept. of Computer Science by Title

  • Sundresh, Sameer; Kwon, YoungMin; Mechitov, Kirill; Kim, Wooyoung; Agha, Gul A. (2005-03)
    Localization is the process by which sensor networks associate spatial position information with individual sensors' measurements. While manual surveying is sufficient for small-scale prototypes, it is too time-consuming ...

    application/pdf

    application/pdfPDF (111kB)
  • Li, Ning (2005)
    Finally, we consider power-efficient broadcast in wireless ad hoc networks as an application of the proposed topology control algorithms, and propose Broadcast on Local Spanning Subgraph (BLSS), which broadcasts in a ...

    application/pdf

    application/pdfPDF (3MB)Restricted to U of Illinois
  • Li, Ning (2005-08)
    Topology control has crucial impact on the system performance of wireless ad hoc networks. We propose several topology control algorithms that can maintain network connectivity while reducing energy consumption and improving ...

    application/pdf

    application/pdfPDF (1MB)
  • Schuster, Stewart Arnold (1973)

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Pan, Peichen (1995)
    Computer-aided design of VLSI circuits is usually carried out in three synthesis steps: high-level synthesis, logic synthesis and layout synthesis. Each synthesis step is further broken into a few optimization problems. ...

    application/pdf

    application/pdfPDF (6MB)Restricted to U of Illinois
  • Hu, Jackson Kwo-Chain (1978)

    application/pdf

    application/pdfPDF (10MB)Restricted to U of Illinois
  • Limqueco, Johnson Chan (1992)
    The logic networks that can be put on a single chip continues to grow in size and complexity. There is thus an increasing need for designers to rely on the assistance of computer-aided design tools to provide a fast design ...

    application/pdf

    application/pdfPDF (12MB)Restricted to U of Illinois
  • Chen, Kuang-Chien (1991)
    As VLSI integration size and chip complexity keep increasing, logic design is becoming more complex and it must be automated. The increasing demand for ASIC (Application Specific Integrated Circuits) also needs design ...

    application/pdf

    application/pdfPDF (11MB)Restricted to U of Illinois
  • Hsieh, Chang-Chao (1998)
    In the optimization phase, the Transduction method and the delay-reducing/delay-restricted Transduction method are employed to minimize the area or delay of the already rectified network. Compatible sets of permissible ...

    application/pdf

    application/pdfPDF (9MB)Restricted to U of Illinois
  • Renner, Scott Alexander (1990)
    There are almost always differences between the behavior intended by a programmer and the behavior actually implemented by his code. These differences are logical errors. The process of locating the cause of these differences ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Amir, Eyal; Russell, Stuart (2005-05)
    Filtering denotes any method whereby an agent updates its belief state - its knowledge of the state of the world - from a sequence of actions and observations. In logical filtering, the belief state is a logical formula ...

    application/pdf

    application/pdfPDF (325kB)
  • Izaguirre Paz, Jesus Antonio (1999)
    In molecular dynamics one solves Newton's equations of motion. This is a challenging problem because the number of particles is large (thousands of atoms) but more importantly because stability severely limits the length ...

    application/pdf

    application/pdfPDF (5MB)Restricted to U of Illinois
  • Shi, Shu (2012-05-22)
    Mobile devices are gradually changing people’s computing behaviors. However, due to the limitations of physical size and power consumption, they are not capable of delivering a 3D graphics rendering experience comparable ...

    application/pdf

    application/pdfPDF (3MB)
  • Kale, Vivek (2015-04-24)
    Application performance can degrade significantly due to node-local load imbalances during application execution on a large number of SMP nodes. These imbalances can arise from the machine, operating system, or the application ...

    application/pdf

    application/pdfPDF (5MB)Restricted to U of Illinois
  • Pellizzoni, Rodolfo; Caccamo, Marco (2006-03)
    Resource reclaiming schemes are applied in reservation-based real-time uniprocessor systems to support efficient reclaiming and sharing of computational resources left unused by early completing tasks, improving the response ...

    application/pdf

    application/pdfPDF (202kB)
  • Zelenko, Dmitry (2003-12)
    The dissertation presents a number of novel machine learning techniques and applies them to information extraction. The study addresses several information extraction subtasks: part of speech tagging, entity extraction, ...

    application/pdf

    application/pdfPDF (921kB)
  • Zelenko, Dmitry (2003)
    The dissertation presents a number of novel machine learning techniques and applies them to information extraction. The study addresses several information extraction subtasks: part of speech tagging, entity extraction, ...

    application/pdf

    application/pdfPDF (6MB)Restricted to U of Illinois
  • Li, Xiaoming (2006)
    We follow a similar approach and use a classifier learning system to generate high performance libraries for matrix-matrix multiplication. Our library generator produces matrix multiplication routines that use recursive ...

    application/pdf

    application/pdfPDF (3MB)Restricted to U of Illinois
  • Li, Xiaoming (2006-08)
    The growing complexity of modern processors has made the generation of highly efficient code increasingly difficult. Manual code generation is very time consuming, but it is often the only choice since the code generated ...

    application/pdf

    application/pdfPDF (857kB)
  • Ramkumar, Balkrishna (1991)
    Parallel machines are becoming increasingly cheap and more easily available. Commercial companies have already announced MIMD machines with more than 8000 processors. This prompts three questions: Should the programmer ...

    application/pdf

    application/pdfPDF (13MB)Restricted to U of Illinois