# Browse Dept. of Computer Science by Title

• (2004-12)
This dissertation addresses the scalability problem of context-sensitive pointer analysis based on Andersen's inclusion-based approach. The key observation is that procedures without any observable effects on callers, ...

application/pdf

PDF (587kB)
• (2007-10)
As the Web has evolved into an entity abundant repository, with the standard page view'', current search engines are becoming increasingly inadequate for a wide range of query tasks. Entity search, a significant departure ...

application/pdf

PDF (309kB)
• (2010-01-06)
With the dramatic growth of text information, there is an increasing need for powerful text mining systems that can automatically discover useful knowledge from text. Text is generally associated with all kinds of contextual ...

application/pdf

PDF (3MB)
• (2011-01-14)
We develop a theory of syntax with bindings, focusing on: - methodological issues concerning the convenient representation of syntax; - techniques for recursive definitions and inductive reasoning. Our approach ...

application/pdf

PDF (1MB)
• (2004-05)
This paper addresses the problem of controlling the density and dynamics of smoke (a gas phenomenon) so that the synthetic appearance of the smoke (gas) resembles a still or moving object. Both the smoke region and the ...

application/pdf

PDF (391kB)
• (2003)
For larger languages, this technique generalizes to the composition of many small functions, each of which handles a certain aspect or implements a specific heuristic of partial evaluation. A new behavior can be implemented ...

application/pdf

PDF (4MB)
• (1994)
Many recent computer applications seek to support or even participate in structured collaborations with humans. Examples range from computer-supported collaborative work to interactive music systems. This thesis presents ...

application/pdf

PDF (4MB)
• (1993)
ConversationBuilder is a prototype of a new class of design support system based on a conversationally oriented model of design. This document describes the conversational theory underlying the model of design and the ...

application/pdf

PDF (19MB)
• (1972)

application/pdf

PDF (3MB)
• (2014)
Parallel libraries continuously evolve from low-level to higher-level abstractions. However, developers are not up-to-date with these higher-level abstractions, thus their parallel code might be hard to read, slow, and ...

application/pdf

PDF (468kB)
• (1996)
Circular membranes and circular plates are used in several types of equipments. For the better design of these equipments an accurate computation of the stresses and the displacements in circular membranes and circular ...

application/pdf

PDF (4MB)
• (2004-09)
A mobile ad hoc network (MANET) is formed by a group of mobile nodes connected by wireless links. The nodes can talk to each other by direct peer-to-peer wireless communication when they are close to each other. When the ...

application/pdf

PDF (3MB)
• (2004)
Traditionally, flow control has been studied in a cooperative network environment. Such cooperative behavior is not a realistic assumption in a public MANET formed by a random group of strangers. Users in this network are ...

application/pdf

PDF (7MB)
• (2004-12)
Traditional data caching, such as web caching, only focuses on how to boost the hit rate of requested objects in caches, and therefore, how to reduce the initial delay for object retrieval. However, for multimedia objects, ...

application/pdf

PDF (153kB)
• (2011-05-25)
Power Grid Digital Communication networks are needed for the delivery of Phasor Measurement Unit (PMU) sensor data with real time guarantees to the control centers for timely decisions. Present day network systems are ...

application/pdf

PDF (1MB)
• (1999)
This work describes and tests eight point-to-point send operations that are implemented using Cooperative Data Transfer. Several global communication operations are also presented that reduce synchronization costs even for ...

application/pdf

PDF (9MB)
• (1997)
To grasp a better understanding of activities taken by the human engineers in the real world, an experiment with human engineers in action in the field of aircraft design has been undertaken for the thesis. Several facts ...

application/pdf

PDF (8MB)
• (2011-08-25)
With the abundance of cell phones today and the rapid increase in the amount of smart phones and mobile computers available, more and more people have access to communication devices with wireless connectivity. In fact, ...

application/pdf

PDF (477kB)
• (2007-07)
The transmit power and the carrier sense threshold are two major MAC/PHY parameters in CSMA/CA wireless networks. The problem of transmit power control has been extensively studied in the context of graph-theoretic topology ...

application/pdf

PDF (178kB)
• (2002)
Because of soft-state control packets delivering per-flow QoS requirements, and the stateless core routers equipped with a look-ahead fair rate allocation scheme, Corelite provides Intserv-like rate services to a diverse ...

application/pdf

PDF (6MB)