Browse Dept. of Computer Science by Title

  • Fesehaye, Debessay; Gupta, Indranil; Nahrstedt, Klara (2008-11)
    Distributed systems have been widely deployed and used in different fields. The Internet itself with all the challenges it brings is one of the successful distributed systems. There have been a lot of research in the ...

    application/pdf

    application/pdfPDF (218kB)
  • Fesehaye, Debessay; Gupta, Indranil; Nahrstedt, Klara (2008-11)
    Distributed systems have been widely deployed and used in different fields. The Internet itself with all the challenges it brings is one of the successful distributed systems. There have been a lot of research in the ...

    application/pdf

    application/pdfPDF (218kB)
  • Alkaff, Hilfi (2014-09-16)
    Today, application schedulers are decoupled from routing level schedulers, leading to sub-optimal throughput for cloud computing platforms. In this thesis, we propose a cross-layer scheduling framework that bridges the ...

    application/pdf

    application/pdfPDF (1MB)
  • Agrawal, Shashank (2015-12-01)
    Over the last decade or so, thanks to remarkable breakthroughs in cryptographic techniques, a wave of ''cryptographic objects'' -- identity-based encryption, fully-homomorphic encryption, functional encryption, and most ...

    application/pdf

    application/pdfPDF (857kB)Restricted to U of Illinois
  • Rosu, Grigore (2003-12)
    This report contains the complete lecture notes for CS322, Programming Language Design, taught by Grigore Rosu in the Fall 2003 semester at the University of Illinois at Urbana Champaign. This large PDF document has been ...

    application/pdf

    application/pdfPDF (2MB)
  • Mahmud, M.M.Hassan; Ray, Sylvian R. (2005-01)
    In this paper we propose a Cumulative Learning System for artificial agents that ses the idea of Functional Similarity between states. The general idea of Cumulative Learning is to build a cognitive architecture for an ...

    application/pdf

    application/pdfPDF (238kB)
  • Swarup, Samarth; Mahmud, M.M.Hassan; Lakkaraju, Kiran; Ray, Sylvian R. (2005-02)
    Cognitive architectures should be designed with learning performance as a central goal. A critical feature of intelligence is the ability to apply the knowledge learned in one context to a new context. A cognitive agent ...

    application/pdf

    application/pdfPDF (530kB)
  • Mallya, Arun (2014-09-16)
    The task of finding objects belonging to classes of interest in images has long been a focus of Computer Vision research. The ability to localize objects is useful in many applications: from self-driving cars, where it ...

    application/pdf

    application/pdfPDF (13MB)Restricted Access
  • So, Jungmin; Kim, Jintae; Gupta, Indranil (2005-08)
    Existing protocols for in-network fusion of data, in wireless sensor networks, are either single-path (i.e., tree-based) or multi-path. Tree-based fusion protocols have small message overhead but low reliability under node ...

    application/pdf

    application/pdfPDF (141kB)
  • Astley, Mark Christopher (1999)
    As an instantiation of the model, we describe an architecture description language called the Distributed Connection Language. DCL allows the specification of distributed architectures which incorporate traditional elements ...

    application/pdf

    application/pdfPDF (6MB)Restricted to U of Illinois
  • Islam, Nayeem (1994)
    Replacing traditional operating systems communication and scheduling implementations with customized implementations increases the performance of parallel and distributed applications. In this thesis, I discuss the design ...

    application/pdf

    application/pdfPDF (8MB)Restricted to U of Illinois
  • Chiang, Bo-Yu (2015-04-24)
    In this thesis, we proposed a customized ranking system that can rank all the entities given a specific user preference. Rank entities by user’s preference is an inevitable strategy of saving user’s time browsing and ...

    application/pdf

    application/pdfPDF (375kB)
  • Zhang, Charles C.; Winslett, Marianne (2007-08)
    When identity-based authorization becomes difficult due to the scalability requirements and highly dynamic nature of open distributed systems, digitally certifiable attributes can be an effective basis for specifying ...

    application/pdf

    application/pdfPDF (236kB)
  • Chang, Po-Hao (2007-08)
    Although platforms and execution scenarios are constantly evolving, Web applications today are tightly coupled with the specific platforms and execution scenarios that are envisioned at design time. Consequently, these Web ...

    application/pdf

    application/pdfPDF (2MB)
  • Chang, Po-Hao (2007)
    One approach to support virtualization over heterogeneous platforms is to define and build a traditional middleware. This approach has the disadvantage of requiring the deployment of new software systems and protocols---something ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Sen, Koushik; Marinov, Darko; Agha, Gul A. (2005-06)
    In unit testing, a program is decomposed into units which are collections of functions. A part of unit can be tested by generating inputs for a single entry function. The entry function may contain pointer arguments, in ...

    application/pdf

    application/pdfPDF (232kB)
  • Ahmadi, Hossein (2012-02-06)
    Proliferation of mobile devices and sensors in common use is anticipated to have a key role in building a smarter planet. The future Internet will be dominated by vast amount of sensing data. This thesis attacks a grand ...

    application/pdf

    application/pdfPDF (2MB)
  • Cheh, Carmen (2015-01-21)
    As the number of security incidents and sophistication of those attacks increase, it is difficult to properly detect and diagnose malicious behavior. We conjecture that detection and diagnosis could be facilitated by an ...

    application/pdf

    application/pdfPDF (2MB)
  • Jamali, Nadeem (2004-08)
    The ubiquity of networked computing devices combined with recent advances in computer networks technology have created the possibility of harnessing the collective computational power of peer computational resources to ...

    application/pdf

    application/pdfPDF (8MB)
  • Jamali, Nadeem (2004)
    A transition system has been developed to concretize the operational semantics of CyberOrgs, and some properties of the model have been examined. A prototype implementation has been developed as an Actor program which ...

    application/pdf

    application/pdfPDF (5MB)Restricted to U of Illinois