Browse Dept. of Computer Science by Title

  • Chen, Wei-Peng (2004-09)
    Distinct from wireless ad hoc networks, wireless sensor networks are data-centric, application-oriented, collaborative, and resource-constrained in nature. Especially, the limited resources on energy, bandwidth and computation ...

    application/pdf

    application/pdfPDF (2MB)
  • Chu, Sheauyin Iris (1995)
    This research addresses the problems in obtaining efficient database support with good functionality for electronic CAD applications. We believe that performance is a deciding factor in the acceptance of DBMSes as a ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Porkaew, Kriengkrai (2000)
    Increasingly emerging applications require data management systems to support novel access mechanisms over complex data types. This dissertation studies two such access mechanisms---similarity queries and queries over ...

    application/pdf

    application/pdfPDF (6MB)Restricted to U of Illinois
  • Kim, Yong-Bin (2010-07-13)
    Top-down proteomics is a revolutionary application for the identification and characterization of protein, known to be one of the most complicated and challenging issues in biology. In top-down proteomics, the quality ...

    application/pdf

    application/pdfPDF (3MB)
  • Kim, Yong-Bin (2010-08-20)
    Top-down proteomics is a revolutionary application for the identification and characterization of protein, known to be one of the most complicated and challenging issues in biology. In top-down proteomics, the quality ...

    application/pdf

    application/pdfPDF (3MB)
  • Youngquist, Anne M. (2011-05-25)
    Abstract Stigma in America creates heated controversy and is associated not only with people within defined social groups, but with a variety of products which are used daily. Many products (e.g. assistive walking devices, ...

    application/pdf

    application/pdfPDF (29MB)
  • Gupta, Abhishek; Preston, Kurt; Rodriguez, Alejandro (2010-10-27)
    The Android operating system runs atop the Linux kernel, yet lacks the ability to natively execute standard Linux desktop applications. Though efforts have been made to enable this functionality, all approaches to date ...

    application/pdf

    application/pdfPDF (339kB)
  • Gioachin, Filippo (2011-01-14)
    Debugging is a fundamental part of software development, and one of the largest in terms of time spent. When developing parallel applications, debugging becomes much harder due to a whole new set of problems not present ...

    application/pdf

    application/pdfPDF (3MB)
  • Giochin, Filippo (2010)
    In this thesis, we explore a new approach based on a tight integration between the debugger and the application's underlying parallel runtime system. The debugger is responsible for interacting with the user and receiving ...

    application/pdf

    application/pdfPDF (2MB)Restricted to U of Illinois
  • Lee, Yuh-Jeng (1988)
    This dissertation addresses the use of executable specifications in debugging logic programs which are renowned for their clean syntax and well-understood semantics, and for the feature that one can use a single language ...

    application/pdf

    application/pdfPDF (5MB)Restricted to U of Illinois
  • Kostoulas, Dionysios; Psaltoulis, Dimitrios; Gupta, Indranil; Briman, Ken; Demers, Al (2005-02)
    Large-scale and dynamically changing distributed systems such as the Grid, peer-to-peer overlays, etc., need to collect several kinds of global statistics in a decentralized manner. In this paper, we tackle a specific ...

    application/pdf

    application/pdfPDF (2MB)
  • Chadha, Rohit; Viswanathan, Mahesh (2007-06)
    We consider the problem of verifying the safety of well-structured transition systems (WSTS) with auxiliary storage. WSTSs with storage are automata that have ( possibly) infinitely many control states along with an auxiliary ...

    application/pdf

    application/pdfPDF (266kB)
  • Prabhakar, Pavithra; Vladimerou, Vladimeros; Viswanathan, Mahesh; Dullerud, Geir E. (2008-01)
    The paper shows the decidability of the reachability problem for planar, monotonic, linear hybrid automata without resets. These automata are a special class of linear hybrid automata with only two variables, whose flows ...

    application/pdf

    application/pdfPDF (193kB)
  • Hendrix, Joseph D. (2008)
    Each of these theoretical topics have lead to the development of new libraries and tools. Two of the tools have already been used in external projects including our tree automata library's integration into the ACTAS protocol ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Hendrix, Joseph D. (2008-09)
    This work develops new automated reasoning techniques for verifying the correctness of equationally specified programs. These techniques are not just theoretical, but have been implemented, and applied to actual program ...

    application/pdf

    application/pdfPDF (1MB)
  • Hendrix, Joseph D. (2008-09)
    This work develops new automated reasoning techniques for verifying the correctness of equationally specified programs. These techniques are not just theoretical, but have been implemented, and applied to actual program ...

    application/pdf

    application/pdfPDF (1MB)
  • Baugh, Lee W.; Zilles, Craig (2005-10)
    Because they are based on large content-addressable memories, load-store queues (LSQs) present implementation challenges in superscalar processors, especially as issue width and number of in-flight instructions are scaled. ...

    application/pdf

    application/pdfPDF (198kB)
  • Khirwadkar, Tanmay S. (2011-05-25)
    As Internet has become ubiquitous, the risk posed by network attacks has greatly increased. Network attacks have been used to achieve a wide gamut of objectives ranging from overloading a website to accessing classified ...

    application/pdf

    application/pdfPDF (736kB)
  • Lin, Chia-Chi; Jalaparti, Virajith; Caesar, Matthew; Van der Merwe, Jacobus (USENIX, 2013)
    Large-scale networks are among the most complex software infrastructures in existence. Unfortunately, the extreme complexity of their basis, the control-plane software, leads to a rich variety of nondeterministic failure ...

    application/pdf

    application/pdfPDF (755kB)
  • Ellison, Chucky M.; Rosu, Grigore (2012-04-27)
    This paper investigates undefined behavior in C and offers a few simple techniques for operationally specifying such behavior formally. A semantics-based undefinedness checker for C is developed using these techniques, as ...

    application/pdf

    application/pdfPDF (257kB)