Browse Dept. of Computer Science by Title

  • Gao, Yan (2012-02-06)
    Interference is one of the foremost problems in wireless communication which leads to various unique design challenges for wireless networks. Wireless medium access control (MAC) has to be specifically designed to resolve ...

    application/pdf

    application/pdfPDF (4MB)
  • Harris, Albert F., III (2006-03)
    Advances in computing technology have resulted in high-end mobile devices with extensive computational capabilities that enable complex applications such as video encoding or lossless data compression. However, the energy ...

    application/pdf

    application/pdfPDF (667kB)
  • Kang, Kyungtae; Jeon, Won J.; Park, Kyung-Joon; Campbell, Roy H.; Nahrstedt, Klara (2009-03)
    The recent development of high-speed data transmission over wireless cellular networks has enabled the delivery of multimedia broadcasting services to mobile users. These services involve a range of interactions among ...

    application/pdf

    application/pdfPDF (2MB)
  • Kang, Kyungtae; Jeon, Won J.; Park, Kyung-Joon; Campbell, Roy H.; Nahrstedt, Klara (2009-03)
    The recent development of high-speed data transmission over wireless cellular networks has enabled the delivery of multimedia broadcasting services to mobile users. These services involve a range of interactions among ...

    application/pdf

    application/pdfPDF (2MB)
  • Fesehaye, Debessay; Gupta, Indranil; Nahrstedt, Klara (2008-11)
    Distributed systems have been widely deployed and used in different fields. The Internet itself with all the challenges it brings is one of the successful distributed systems. There have been a lot of research in the ...

    application/pdf

    application/pdfPDF (218kB)
  • Fesehaye, Debessay; Gupta, Indranil; Nahrstedt, Klara (2008-11)
    Distributed systems have been widely deployed and used in different fields. The Internet itself with all the challenges it brings is one of the successful distributed systems. There have been a lot of research in the ...

    application/pdf

    application/pdfPDF (218kB)
  • Alkaff, Hilfi (2014-09-16)
    Today, application schedulers are decoupled from routing level schedulers, leading to sub-optimal throughput for cloud computing platforms. In this thesis, we propose a cross-layer scheduling framework that bridges the ...

    application/pdf

    application/pdfPDF (1MB)
  • Agrawal, Shashank (2015-12-01)
    Over the last decade or so, thanks to remarkable breakthroughs in cryptographic techniques, a wave of ''cryptographic objects'' -- identity-based encryption, fully-homomorphic encryption, functional encryption, and most ...

    application/pdf

    application/pdfPDF (857kB)Restricted to U of Illinois
  • Rosu, Grigore (2003-12)
    This report contains the complete lecture notes for CS322, Programming Language Design, taught by Grigore Rosu in the Fall 2003 semester at the University of Illinois at Urbana Champaign. This large PDF document has been ...

    application/pdf

    application/pdfPDF (2MB)
  • Mahmud, M.M.Hassan; Ray, Sylvian R. (2005-01)
    In this paper we propose a Cumulative Learning System for artificial agents that ses the idea of Functional Similarity between states. The general idea of Cumulative Learning is to build a cognitive architecture for an ...

    application/pdf

    application/pdfPDF (238kB)
  • Swarup, Samarth; Mahmud, M.M.Hassan; Lakkaraju, Kiran; Ray, Sylvian R. (2005-02)
    Cognitive architectures should be designed with learning performance as a central goal. A critical feature of intelligence is the ability to apply the knowledge learned in one context to a new context. A cognitive agent ...

    application/pdf

    application/pdfPDF (530kB)
  • Mallya, Arun (2014-09-16)
    The task of finding objects belonging to classes of interest in images has long been a focus of Computer Vision research. The ability to localize objects is useful in many applications: from self-driving cars, where it ...

    application/pdf

    application/pdfPDF (13MB)
  • So, Jungmin; Kim, Jintae; Gupta, Indranil (2005-08)
    Existing protocols for in-network fusion of data, in wireless sensor networks, are either single-path (i.e., tree-based) or multi-path. Tree-based fusion protocols have small message overhead but low reliability under node ...

    application/pdf

    application/pdfPDF (141kB)
  • Astley, Mark Christopher (1999)
    As an instantiation of the model, we describe an architecture description language called the Distributed Connection Language. DCL allows the specification of distributed architectures which incorporate traditional elements ...

    application/pdf

    application/pdfPDF (6MB)Restricted to U of Illinois
  • Islam, Nayeem (1994)
    Replacing traditional operating systems communication and scheduling implementations with customized implementations increases the performance of parallel and distributed applications. In this thesis, I discuss the design ...

    application/pdf

    application/pdfPDF (8MB)Restricted to U of Illinois
  • Chiang, Bo-Yu (2015-04-24)
    In this thesis, we proposed a customized ranking system that can rank all the entities given a specific user preference. Rank entities by user’s preference is an inevitable strategy of saving user’s time browsing and ...

    application/pdf

    application/pdfPDF (375kB)
  • Zhang, Charles C.; Winslett, Marianne (2007-08)
    When identity-based authorization becomes difficult due to the scalability requirements and highly dynamic nature of open distributed systems, digitally certifiable attributes can be an effective basis for specifying ...

    application/pdf

    application/pdfPDF (236kB)
  • Chang, Po-Hao (2007-08)
    Although platforms and execution scenarios are constantly evolving, Web applications today are tightly coupled with the specific platforms and execution scenarios that are envisioned at design time. Consequently, these Web ...

    application/pdf

    application/pdfPDF (2MB)
  • Chang, Po-Hao (2007)
    One approach to support virtualization over heterogeneous platforms is to define and build a traditional middleware. This approach has the disadvantage of requiring the deployment of new software systems and protocols---something ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Sen, Koushik; Marinov, Darko; Agha, Gul A. (2005-06)
    In unit testing, a program is decomposed into units which are collections of functions. A part of unit can be tested by generating inputs for a single entry function. The entry function may contain pointer arguments, in ...

    application/pdf

    application/pdfPDF (232kB)