# Browse Dept. of Computer Science by Title

• (2006-02)
Many real-world applications increasingly involve both structured data and text. A given real-world entity is often referred to in different ways, such as Helen Hunt'', and Mrs. H. E. Hunt'', both within and across the ...

application/pdf

PDF (295kB)
• (1986)
This thesis describes the mediated object construct. Mediated objects support synchronization and scheduling for systems programming within distributed systems. Mediated objects are based on a resource view of systems, and ...

application/pdf

PDF (4MB)
• (1990)
This thesis examines memory management and rollback recovery in parallel architectures. Three memory management strategies for rapid rollback recovery are studied in this thesis. The first is a cache-based error recovery ...

application/pdf

PDF (4MB)
• (1973)

application/pdf

PDF (3MB)
• (1988)
This dissertation describes Mentat, a prototype object-oriented macro data flow system designed to address the problem of exploiting idle processor resources in loosely coupled distributed systems. The system is conducive ...

application/pdf

PDF (6MB)
• (1979)

application/pdf

PDF (4MB)
• (2012-09-18)
Multicore chips have become the standard building blocks for all current and future massively parallel machines. Much work has been done in scientific and engineering HPC applications to exploit shared-memory multicore ...

application/pdf

PDF (3MB)
• (2012-05-22)
With the dawn of petascale, and with exascale in the near future, it has become significantly difficult to write parallel applications that fully exploit the processing power, and scale to large systems. Load imbalance, ...

application/pdf

PDF (465kB)
• (2012-02-06)
This dissertation perceives a similarity between two activities: that of coordinating the search for simulation traces toward reaching verification closure, and that of coordinating the search for a proof within a theorem ...

application/pdf

PDF (826kB)
• (2012-03-12)
Efficient namespace metadata management is becoming more important as next-generation file systems are designed for the peta and exascale era. A number of new metadata management schemes have been proposed. However, ...

application/pdf

PDF (136kB)
• (2011-01-14)
Photos are an important means of sharing and reviewing personal history. As an individual act, photo browsing contributes to the formation and reinforcement of personal identity. As a social act, such as a visual aid for ...

application/pdf

PDF (5MB)
• (1972)

application/pdf

PDF (4MB)
• (1979)

application/pdf

PDF (6MB)
• (1978)

application/pdf

PDF (3MB)
• (1986)
One method in solving the VLSI layout problems is a library of standard cells which are used as standard building blocks. Therefore, the design problem is partitioned into two subproblems: (a) decomposition of design into ...

application/pdf

PDF (4MB)
• (2006-05)
Motivation: Unsupervised learning or clustering is frequently used to explore gene expression profiles for insight into both regulation and function. However, the quality of clustering results is often difficult to assess ...

application/pdf

PDF (912kB)
• (2006)
Results. We evaluate this method using both artificial and yeast microarray data. By choosing parameters settings that minimize FCS values and maximize CS values we show major advantages over other clustering methods in ...

application/pdf

PDF (3MB)
• (2006-08)
This work concerns appropriate metrics for evaluating microarchitectural enhancements to improve processor lifetime reliability. The most commonly used reliability metric is mean time to failure (MTTF). However, MTTF does ...

application/pdf

PDF (595kB)
• (2001)
Workflow technology and process support lies at the center of modern information systems architectures. But despite the large number of commercial workflow systems, object-oriented developers implement their business, ...

application/pdf

PDF (10MB)
• (2011-11-29)
Near-Threshold Voltage Computing (NTC), where the supply voltage is only slightly higher than the transistors’ threshold voltage, is a promising approach to push back the many-core power wall. A key NTC shortcoming is the ...

application/pdf

PDF (514kB)