Browse Dept. of Computer Science by Title

  • Wieting, John (2014-05-30)
    Lexical entailment is a requirement for success in the domains of Recognizing Textual Entailment (RTE) as well as related tasks like Question-Answering and Information Extraction. Previous approaches tend to fall into two ...

    application/pdf

    application/pdfPDF (260kB)
  • Srinivasan, Jayanth (2006)
    Overall, this dissertation lays the basic foundation for microarchitectural analysis of lifetime reliability and provides new tools and techniques to handle this critical emerging technology challenge.

    application/pdf

    application/pdfPDF (3MB)Restricted to U of Illinois
  • Srinivasan, Jayanth (2006-05)
    Ensuring long-term, or ``lifetime'' reliability, as dictated by the hard error rate due to wear-out based failures, is a critical requirement for microprocessor manufacturers. At the same time, the steady increases in CMOS ...

    application/pdf

    application/pdfPDF (1MB)
  • Braz, Rodrigo de Salvo (2007-09)
    There has been a long standing division in AI between logical symbolic and probabilistic reasoning approaches. While probabilistic models can deal well with inherent uncertainty in many real-world domains, they operate on ...

    application/pdf

    application/pdfPDF (839kB)
  • Braz, Rodrigo De Salvo (2007)
    There has been a long standing division in AI between logical symbolic and probabilistic reasoning approaches. While probabilistic models can deal well with inherent uncertainty in many real-world domains, they operate on ...

    application/pdf

    application/pdfPDF (3MB)Restricted to U of Illinois
  • Choi, Jaesik (2012-06-27)
    Probabilistic Graphical Models (PGMs) promise to play a prominent role in many complex real-world systems. Probabilistic Relational Graphical Models (PRGMs) scale the representation and learning of PGMs. Answering questions ...

    application/pdf

    application/pdfPDF (2MB)
  • Pu, Wen (2014-05-30)
    Probabilistic Relational Graphical Model (PRGM) is a popular tool for modeling uncertain relational knowledge, of which the set of uncertain relational knowledge is usually assumed to be independent with the domain of the ...

    application/pdf

    application/pdfPDF (786kB)
  • Choi, Jaesik (2010-09)
    We present a lifted inference algorithm for relational hybrid graphical models. Hybrid graphical models with continuous and discrete variables naturally represent many real-world applications in robotics, financial ...

    application/pdf

    application/pdfPDF (257kB)
  • Dudko, Roman (2013-02-03)
    As real-time embedded systems become more complex, there is a desire to use these systems on higher performance commercial off-the-shelf (COTS) components. However, worst case execution times (WCET) are unreasonably high ...

    application/pdf

    application/pdfPDF (1MB)
  • Zhang, Zhen; He, Bin; Chang, Kevin Chen-Chuan (2004-11)
    The Web has been rapidly ``deepened" by myriad searchable databases online, where data are hidden behind query forms. Helping users query alternative ``deep Web" sources in the same domain (\eg, Books, Airfares) is an ...

    application/pdf

    application/pdfPDF (263kB)
  • Nguyen, Anh (2012-09-18)
    Malicious software is rampant on the Internet and costs billions of dollars each year. Safe and thorough analysis of malware is key to protecting vulnerable systems and cleaning those that have already been infected. Most ...

    application/pdf

    application/pdfPDF (235kB)
  • Lee, Adam J.; Minami, Kazuhiro; Winslett, Marianne (2007-04)
    In distributed proof construction systems, information release policies can make it unlikely that any single node in the system is aware of the complete structure of any particular proof tree. This property makes it difficult ...

    application/pdf

    application/pdfPDF (286kB)
  • Montanari, Mirko (2013-08-22)
    Security monitoring systems have been recognized as a fundamental component of security management, and they provide the fundamental building blocks of future reactive and autonomic systems that can automatically respond ...

    application/pdf

    application/pdfPDF (2MB)
  • Mahmoody, Mohammad; Maji, Hemanta K.; Prabhakaran, Manoj (2011-02-24)
    Random Oracles have proven to be extremely powerful constructs in cryptography and they can be used to realize several useful cryptographic primitives which are, otherwise, impossible in the plain model. In this work, we ...

    application/pdf

    application/pdfPDF (289kB)
  • Moinzadeh, Parya; Mechitov, Kirill A.; Agha, Gul A. (2011-09-02)
    The efficiency of multi-hop communication is a function of the time required for data transfer, or throughput. A key determinant of throughput is the reliability of packet transmission, as measured by the packet reception ...

    application/pdf

    application/pdfPDF (541kB)
  • Hu, Chunyu; Hou, Jennifer C. (2003-12)
    Power management is an important technique to prolong the lifetime of battery-powered wireless ad hoc networks. The fact that the energy consumed in the idle state dominates the total power consumed on wireless network ...

    application/pdf

    application/pdfPDF (195kB)
  • application/pdf

    application/pdfPDF (2MB)Restricted to U of Illinois
  • Cao, Qing (2008-10)
    Wireless sensor networks promise an unprecedented potential for observing the physical world. Their battery life, however, is usually the bottleneck that limits application lifetime, a problem that is exacerbated by the ...

    application/pdf

    application/pdfPDF (3MB)
  • Cao, Qing (2008)
    Because these three problems are closely related to the role played by energy, we call the overall LiteArch architecture energy-centric. The immediate implications of LiteArch is that it can improve the performance of the ...

    application/pdf

    application/pdfPDF (3MB)Restricted to U of Illinois
  • Cao, Qing (2008-10)
    Wireless sensor networks promise an unprecedented potential for observing the physical world. Their battery life, however, is usually the bottleneck that limits application lifetime, a problem that is exacerbated by the ...

    application/pdf

    application/pdfPDF (3MB)