Browse Dept. of Computer Science by Title

  • Gaonkar, Shravan; Kravets, Robin H.; Magalhaes, Luiz (2004-05)
    The stability of the Internet depends on the presence of well-behaved flows. While TCP forms the majority of the traffic over the Internet, the Internet user community is also dedicated to supporting mobile devices over ...

    application/pdf

    application/pdfPDF (332kB)
  • He, Wenbo (2008-12)
    Wireless sensor networks (WSNs) were originally motivated by military applications, and are becoming integral part of more and more civilian applications to improve quality of life. With current wireless sensor network ...

    application/pdf

    application/pdfPDF (4MB)
  • He, Wenbo (2008-12)
    Wireless sensor networks (WSNs) were originally motivated by military applications, and are becoming integral part of more and more civilian applications to improve quality of life. With current wireless sensor network ...

    application/pdf

    application/pdfPDF (4MB)
  • He, Wenbo (2008)
    To show the efficacy and efficiency of the proposed schemes, I present simulation results of our schemes and compare their performance to a typical data aggregation scheme, Tiny Aggregation protocol (TAG), where no privacy ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Hajishirzi, Hannaneh (2012-02-06)
    This dissertation focuses on modeling stochastic dynamic domains, using representations and algorithms that combine logical AI ideas and probabilistic methods. We introduce new tractable and highly accurate algorithms for ...

    application/pdf

    application/pdfPDF (4MB)
  • Naisbitt, Jeffrey D.; Al-Muhtadi, Jalal F.; Campbell, Roy H. (2005-05)
    Ubiquitous computing environments and the plethora of mobile devices that populate them have led to a global trend for remote collaboration and interaction. This trend demands seamless in-terfaces for remote interaction ...

    application/pdf

    application/pdfPDF (285kB)
  • Chaing, Heien-Kun (1997)
    With the advent of advanced computer network and information technology and the popularity of Internet, computer supported cooperative applications in software and engineering environments have begun to emerge. However, ...

    application/pdf

    application/pdfPDF (5MB)Restricted to U of Illinois
  • Malik, Rahul (2011-01-21)
    With the advent of virtual spaces, there has been a need to integrate physical worlds with virtual spaces. The integration can be achieved by real-time 3D imaging at several geographically distributed locations followed ...

    application/pdf

    application/pdfPDF (33MB)
  • Ren, Shangping (1997)
    This research uses both theoretical and experimental methods. Specifically, an operational semantics based on RTsynchronizers and regular computational objects (modeled as actors) is defined. RTsynchronizers are implemented ...

    application/pdf

    application/pdfPDF (5MB)Restricted to U of Illinois
  • Kwon, YoungMin; Sundresh, Sameer; Mechitov, Kirill; Agha, Gul A. (2005-06)
    We present an actor platform for wireless sensor networks (WSNs). A typical WSN may consist of hundreds to tens of thousands of tiny nodes embdedded in an environment. Hence, manual reprogramming of nodes for development, ...

    application/pdf

    application/pdfPDF (206kB)
  • Hou, I-Hong; Tsai, Yu-En; Abdelzaher, Tarek F.; Gupta, Indranil (2007-07)
    Code updates, such as those for debugging purposes, are frequent and expensive in the early development stages of wireless sensor network applications. We propose AdapCode, a reliable data dissemination protocol that uses ...

    application/pdf

    application/pdfPDF (247kB)
  • Xu, Yang (2014-09-16)
    Atomicity violation is a common kind of concurrency bug in real world projects. PENELOPE is a framework that can detect atomicity violations in a single observed trace, without explicitly examining all traces that result ...

    application/pdf

    application/pdfPDF (292kB)
  • Cook, Damon J.; Biehl, Jacob T.; Metcalf, Heather E.; Bailey, Brian P. (2005-08)
    A key technique for evaluating early design ideas is the use of low-fidelity prototypes. Low-fidelity prototypes allow for rapid iterations that significantly improve the interface design with minimal investment of time ...

    application/pdf

    application/pdfPDF (157kB)
  • Gornish, Edward H. (1995)
    Memory latency has always been a major issue in shared-memory multiprocessors and high-speed systems. This is even more true as the gap between processor and memory speeds continues to grow. Data prefetching has been ...

    application/pdf

    application/pdfPDF (6MB)Restricted to U of Illinois
  • Lim, Swee Boon (1996)
    Effective file system caching reduces local disk accesses and remote file server accesses significantly. Traditional file systems use fixed strategies to control caching. This thesis shows that a file system with adaptive ...

    application/pdf

    application/pdfPDF (10MB)Restricted to U of Illinois
  • Vu, Long; Malik, Rahul; Wang, Qiyan; Nahrstedt, Klara (2009-09-28)
    In this paper, we show that the clustered mobile peer-to-peer (P2P) networks exist in numerous scenarios where mobile users collaborate to improve content distribution services. In order to understand the clustering behavior ...

    application/pdf

    application/pdfPDF (170kB)
  • Nguyen Ba, Canh Son (2015-01-21)
    The CAP theorem says that distributed key-value stores can only provide bounded consistency (C) and availability (A) under the presence of partition (P). Recent work has proposed the ability for applications of such stores ...

    application/pdf

    application/pdfPDF (950kB)Restricted Access
  • Simitci, Huseyin (2000)
    Experimental results verified the accuracy of the developed analytical model in estimating and explaining disk striping performance. Also, experiments with artificial benchmarks and scientific applications showed that, ...

    application/pdf

    application/pdfPDF (8MB)Restricted to U of Illinois
  • Vu, Long; Nahrstedt, Klara (2007-06)
    Efficient information dissemination over Mobile Ad hoc Networks (MANET) for urban Disaster/Recovery (D/R) missions is emerging as a very challenging and important research problem. In this paper, we present an adaptive ...

    application/pdf

    application/pdfPDF (210kB)
  • Chang, Conrad Tze Kong (2002)
    Object-oriented databases can be very useful for applications containing complex data models that are not well served by conventional databases. Although much research has been done on developing concurrency control protocols ...

    application/pdf

    application/pdfPDF (6MB)Restricted to U of Illinois