Browse Dept. of Computer Science by Title

  • So, Jungmin; Kim, Jintae; Gupta, Indranil (2005-08)
    Existing protocols for in-network fusion of data, in wireless sensor networks, are either single-path (i.e., tree-based) or multi-path. Tree-based fusion protocols have small message overhead but low reliability under node ...

    application/pdf

    application/pdfPDF (141kB)
  • Astley, Mark Christopher (1999)
    As an instantiation of the model, we describe an architecture description language called the Distributed Connection Language. DCL allows the specification of distributed architectures which incorporate traditional elements ...

    application/pdf

    application/pdfPDF (6MB)Restricted to U of Illinois
  • Islam, Nayeem (1994)
    Replacing traditional operating systems communication and scheduling implementations with customized implementations increases the performance of parallel and distributed applications. In this thesis, I discuss the design ...

    application/pdf

    application/pdfPDF (8MB)Restricted to U of Illinois
  • Chiang, Bo-Yu (2015-04-24)
    In this thesis, we proposed a customized ranking system that can rank all the entities given a specific user preference. Rank entities by user’s preference is an inevitable strategy of saving user’s time browsing and ...

    application/pdf

    application/pdfPDF (375kB)
  • Zhang, Charles C.; Winslett, Marianne (2007-08)
    When identity-based authorization becomes difficult due to the scalability requirements and highly dynamic nature of open distributed systems, digitally certifiable attributes can be an effective basis for specifying ...

    application/pdf

    application/pdfPDF (236kB)
  • Chang, Po-Hao (2007)
    One approach to support virtualization over heterogeneous platforms is to define and build a traditional middleware. This approach has the disadvantage of requiring the deployment of new software systems and protocols---something ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Chang, Po-Hao (2007-08)
    Although platforms and execution scenarios are constantly evolving, Web applications today are tightly coupled with the specific platforms and execution scenarios that are envisioned at design time. Consequently, these Web ...

    application/pdf

    application/pdfPDF (2MB)
  • Sen, Koushik; Marinov, Darko; Agha, Gul A. (2005-06)
    In unit testing, a program is decomposed into units which are collections of functions. A part of unit can be tested by generating inputs for a single entry function. The entry function may contain pointer arguments, in ...

    application/pdf

    application/pdfPDF (232kB)
  • Ahmadi, Hossein (2012-02-06)
    Proliferation of mobile devices and sensors in common use is anticipated to have a key role in building a smarter planet. The future Internet will be dominated by vast amount of sensing data. This thesis attacks a grand ...

    application/pdf

    application/pdfPDF (2MB)
  • Cheh, Carmen (2015-01-21)
    As the number of security incidents and sophistication of those attacks increase, it is difficult to properly detect and diagnose malicious behavior. We conjecture that detection and diagnosis could be facilitated by an ...

    application/pdf

    application/pdfPDF (2MB)
  • Jamali, Nadeem (2004-08)
    The ubiquity of networked computing devices combined with recent advances in computer networks technology have created the possibility of harnessing the collective computational power of peer computational resources to ...

    application/pdf

    application/pdfPDF (8MB)
  • Jamali, Nadeem (2004)
    A transition system has been developed to concretize the operational semantics of CyberOrgs, and some properties of the model have been examined. A prototype implementation has been developed as an Actor program which ...

    application/pdf

    application/pdfPDF (5MB)Restricted to U of Illinois
  • He, Wenbo; Huang, Ying; Nahrstedt, Klara; Lee, Whay C. (2007-12)
    Reliable message propagation is an important means of communication in mobile ad hoc networks (MANETs), and serves as a fundamental component for various applications, such as mobile advertising, inter-vehicle safety message ...

    application/pdf

    application/pdfPDF (231kB)
  • Gu, Randy S. (2011-01-14)
    The growing dependence of society on enormous quantities of information stored electronically has led to a corresponding rise in errors in this information. The stored data can be critically important, necessitating new ...

    application/pdf

    application/pdfPDF (1MB)
  • Gu, Siyu (2014-05-30)
    This thesis complements the large body of social sensing literature by developing means for augmenting sensing data with inference results that "fill-in" missing pieces. Unlike trend-extrapolation methods, we focus on ...

    application/pdf

    application/pdfPDF (1MB)Restricted to U of Illinois
  • Yu, Hwan-Jo (2004-05)
    Data is everywhere, abundant, continuously increasing, and heterogeneous. For example, Web pages on the Internet are rapidly growing, data in commercial databases are continuously accumulating, as well as biological data ...

    application/pdf

    application/pdfPDF (3MB)
  • Yu, Hwan-Jo (2004)
    KDD (Knowledge Discovery and Data mining) has been extensively studied in the last decade as data is continuously increasing in size and complexity. This thesis introduces three practical data mining problems---(1) classifying ...

    application/pdf

    application/pdfPDF (6MB)Restricted to U of Illinois
  • Berkovsky, Shlomo; Eytani, Yaniv; Kuflik, Tsvi; Ricci, Francesco (2007-02)
    Collaborative Filtering (CF) is an attractive and reliable recommendation technique. CF is typically implemented using a centralized storage of user profiles and this is a severe privacy danger, since an attack to this ...

    application/pdf

    application/pdfPDF (106kB)
  • Dalton, Steven (2015-01-21)
    Algebraic multigrid methods for large, sparse linear systems are central to many computational simulations. Parallel algorithms for such solvers are generally decomposed into coarse-grain tasks suitable for distributed ...

    application/pdf

    application/pdfPDF (6MB)
  • Brodman, James C. (2011-05-25)
    Exploiting parallelism in modern machines increases the di culty of developing applications. Thus, new abstractions are needed that facilitate parallel programming and at the same time allow the programmer to control ...

    application/pdf

    application/pdfPDF (9MB)