Browse Dept. of Computer Science by Title

  • Hu, Jackson Kwo-Chain (1978)

    application/pdf

    application/pdfPDF (10MB)Restricted to U of Illinois
  • Limqueco, Johnson Chan (1992)
    The logic networks that can be put on a single chip continues to grow in size and complexity. There is thus an increasing need for designers to rely on the assistance of computer-aided design tools to provide a fast design ...

    application/pdf

    application/pdfPDF (12MB)Restricted to U of Illinois
  • Chen, Kuang-Chien (1991)
    As VLSI integration size and chip complexity keep increasing, logic design is becoming more complex and it must be automated. The increasing demand for ASIC (Application Specific Integrated Circuits) also needs design ...

    application/pdf

    application/pdfPDF (11MB)Restricted to U of Illinois
  • Hsieh, Chang-Chao (1998)
    In the optimization phase, the Transduction method and the delay-reducing/delay-restricted Transduction method are employed to minimize the area or delay of the already rectified network. Compatible sets of permissible ...

    application/pdf

    application/pdfPDF (9MB)Restricted to U of Illinois
  • Renner, Scott Alexander (1990)
    There are almost always differences between the behavior intended by a programmer and the behavior actually implemented by his code. These differences are logical errors. The process of locating the cause of these differences ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Amir, Eyal; Russell, Stuart (2005-05)
    Filtering denotes any method whereby an agent updates its belief state - its knowledge of the state of the world - from a sequence of actions and observations. In logical filtering, the belief state is a logical formula ...

    application/pdf

    application/pdfPDF (325kB)
  • Izaguirre Paz, Jesus Antonio (1999)
    In molecular dynamics one solves Newton's equations of motion. This is a challenging problem because the number of particles is large (thousands of atoms) but more importantly because stability severely limits the length ...

    application/pdf

    application/pdfPDF (5MB)Restricted to U of Illinois
  • Shi, Shu (2012-05-22)
    Mobile devices are gradually changing people’s computing behaviors. However, due to the limitations of physical size and power consumption, they are not capable of delivering a 3D graphics rendering experience comparable ...

    application/pdf

    application/pdfPDF (3MB)
  • Bello-Maldonado, Pedro David (2016-12-07)
    High-order spectral element methods (SEM) while very accurate for computational fluid dynamics (CFD) simulations can be prohibitively expensive for meshes with difficult geometries. Controlling the number of iterations in ...

    application/pdf

    application/pdfPDF (773kB)
  • Kale, Vivek (2015-04-24)
    Application performance can degrade significantly due to node-local load imbalances during application execution on a large number of SMP nodes. These imbalances can arise from the machine, operating system, or the application ...

    application/pdf

    application/pdfPDF (5MB)
  • Pellizzoni, Rodolfo; Caccamo, Marco (2006-03)
    Resource reclaiming schemes are applied in reservation-based real-time uniprocessor systems to support efficient reclaiming and sharing of computational resources left unused by early completing tasks, improving the response ...

    application/pdf

    application/pdfPDF (202kB)
  • Zelenko, Dmitry (2003-12)
    The dissertation presents a number of novel machine learning techniques and applies them to information extraction. The study addresses several information extraction subtasks: part of speech tagging, entity extraction, ...

    application/pdf

    application/pdfPDF (921kB)
  • Zelenko, Dmitry (2003)
    The dissertation presents a number of novel machine learning techniques and applies them to information extraction. The study addresses several information extraction subtasks: part of speech tagging, entity extraction, ...

    application/pdf

    application/pdfPDF (6MB)Restricted to U of Illinois
  • Li, Xiaoming (2006-08)
    The growing complexity of modern processors has made the generation of highly efficient code increasingly difficult. Manual code generation is very time consuming, but it is often the only choice since the code generated ...

    application/pdf

    application/pdfPDF (857kB)
  • Li, Xiaoming (2006)
    We follow a similar approach and use a classifier learning system to generate high performance libraries for matrix-matrix multiplication. Our library generator produces matrix multiplication routines that use recursive ...

    application/pdf

    application/pdfPDF (3MB)Restricted to U of Illinois
  • Ramkumar, Balkrishna (1991)
    Parallel machines are becoming increasingly cheap and more easily available. Commercial companies have already announced MIMD machines with more than 8000 processors. This prompts three questions: Should the programmer ...

    application/pdf

    application/pdfPDF (13MB)Restricted to U of Illinois
  • Cozzie, Anthony E.; King, Samuel (2012-08-27)
    Current natural language programming systems avoid the difficulties of dealing with abstract and ambiguous concepts by restricting the input words to those comparable to a normal high-level programming language. Our system, ...

    application/pdf

    application/pdfPDF (893kB)
  • Lattner, Christopher Arthur (2005)
    This thesis describes the approach, analysis, and transformation of programs with macroscopic techniques, and evaluates the net performance impact of the transformations. Finally, it describes a large class of potential ...

    application/pdf

    application/pdfPDF (10MB)Restricted to U of Illinois
  • Lattner, Chris A. (2005-05)
    Providing high performance for pointer-intensive programs on modern architectures is an increasingly difficult problem for compilers. Pointer-intensive programs are often bound by memory latency and cache performance, but ...

    application/pdf

    application/pdfPDF (2MB)
  • Marco Cesati; Mancuso, Renato; Betti, Emiliano; Caccamo, Marco (2015-06-18)
    Tools for memory access detection are widely used, playing an important role especially in real-time systems. For example, on multi-core platforms, the problem of co-scheduling CPU and memory resources with hard real-time ...

    application/pdf

    application/pdfPDF (399kB)