Browse Dept. of Computer Science by Title

  • Kushal, Akash M. (2008-10)
    This dissertation addresses the task of detecting instances of object categories in photographs. We propose modeling an object category as a collection of object parts linked together in a deformable configuration. We ...

    application/pdf

    application/pdfPDF (10MB)
  • Kushal, Akash M. (2008)
    We also propose two different approaches for modeling the inter-part relations and algorithms for efficiently learning the model parameters. The first approach uses a generative model that models the joint probability ...

    application/pdf

    application/pdfPDF (2MB)Restricted to U of Illinois
  • Chang, Allan; Amir, Eyal (2005-11)
    We present new algorithms for learning a logical model of actions' effects and preconditions in partially observable domains. The algorithms maintain a logical representation of the set of possible action models after each ...

    application/pdf

    application/pdfPDF (197kB)
  • Singh, Saurabh (2016-10-19)
    The world is full of tiny but useful objects such as the door handle of a car or the light switch in a room. Such objects are barely visible in an image and can be well approximated by a single point. We refer to these ...

    application/pdf

    application/pdfPDF (8MB)
  • McHenry, Kenton Guadron (2008)
    This dissertation addresses the task of learning to segment images into meaningful material and object categories. With regards to materials we consider the difficult task of segmenting objects made of transparent materials ...

    application/pdf

    application/pdfPDF (2MB)Restricted to U of Illinois
  • McHenry, Kenton Guadron (2008-04)
    This dissertation addresses the task of learning to segment images into meaningful material and object categories. With regards to materials we consider the difficult task of segmenting objects made of transparent materials ...

    application/pdf

    application/pdfPDF (7MB)
  • Vardhan, Abhay; Viswanathan, Mahesh (2005-08)
    We present a new model checking algorithm for verifying computation tree logic (CTL) properties. Our technique is based on using language inference to learn the fixpoints necessary for checking a CTL formula instead of ...

    application/pdf

    application/pdfPDF (232kB)
  • Vardhan, Abhay; Sen, Koushik; Viswanathan, Mahesh; Agha, Gul A. (2004-06)
    We present a novel approach for verifying safety properties of finite state machines communicating over unbounded FIFO channels that is based on applying machine learning techniques. We assume that we are given a model of ...

    application/pdf

    application/pdfPDF (336kB)
  • Vardhan, Abhay (2006)
    We show how the learning-based verification paradigm can be applied to a number of systems and for different kinds of specifications. First, we use learning to verify safety properties of finite state machines communicating ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Vardhan, Abhay (2006-02)
    Making high quality and reliable software systems remains a difficult problem. One approach to address this problem is automated verification which attempts to demonstrate algorithmically that a software system meets its ...

    application/pdf

    application/pdfPDF (872kB)
  • Shin, Daeyun (2017-07-20)
    The goal of this study is to determine the effectiveness of different 3D shape representations in learning to generate volumetric shapes using deep neural networks. We propose to automatically reconstruct a 3D model from ...

    application/pdf

    application/pdfPDF (1MB)
  • Shih, Kevin Jonathan (2017-07-11)
    Knowing where to look in an image can significantly improve performance in computer vision tasks by eliminating irrelevant information from the rest of the input image, and by breaking down complex scenes into simpler and ...

    application/pdf

    application/pdfPDF (36MB)
  • Klementiev, Alexandre A. (2010-01-06)
    Recent technological advances have facilitated the collection and distribution of a plethora of increasingly diverse and complex data. Supervised learning has been able to provide the toolbox of choice for exploiting it ...

    application/pdf

    application/pdfPDF (4MB)
  • Cai, Deng; He, Xiaofei; Han, Jiawei (2006-04)
    Most of the existing learning algorithms take vectors as their input data. A function is then learned in such a vector space for classification, clustering, or dimensionality reduction. However, in some situations, there ...

    application/pdf

    application/pdfPDF (185kB)
  • Garg, Pranav (2015-07-14)
    The problem of synthesizing adequate inductive invariants to prove a program correct lies at the heart of automated program verification. We investigate, herein, learning approaches to synthesize inductive invariants of ...

    application/pdf

    application/pdfPDF (2MB)
  • Chen, Chun-cheng (2009-03)
    Wireless networks have raised great attention in the past decades because they provide tether-free connectivity. Although much of the e ort in wireless network research has been spent on reducing the interference among the ...

    application/pdf

    application/pdfPDF (7MB)
  • Chen, Chun-cheng (2009-03)
    Wireless networks have raised great attention in the past decades because they provide tether-free connectivity. Although much of the e ort in wireless network research has been spent on reducing the interference among the ...

    application/pdf

    application/pdfPDF (7MB)
  • Chen, Chun-cheng (2009)
    Wireless networks have raised great attention in the past decades because they provide tether-free connectivity. Although much of the effort in wireless network research has been spent on reducing the interference among ...

    application/pdf

    application/pdfPDF (5MB)Restricted to U of Illinois
  • Vakilian, Mohsen (2014-09-16)
    Software rapidly evolves. A refactoring is a code change that preserves the behavior of the program. There has been much interest in automation to make refactoring more efficient and reliable. Although modern Integrated ...

    application/pdf

    application/pdfPDF (1MB)
  • Vu, Long (2010-06-01)
    This paper presents the detailed design and implementation of the joint Bluetooth/Wifi scanning framework called UIM, which collects both location information and ad hoc contact of the human movement at the University ...

    application/pdf

    application/pdfPDF (282kB)