Browse Dept. of Computer Science by Title

  • He, Wenbo; Huang, Ying; Nahrstedt, Klara; Lee, Whay C. (2007-12)
    Reliable message propagation is an important means of communication in mobile ad hoc networks (MANETs), and serves as a fundamental component for various applications, such as mobile advertising, inter-vehicle safety message ...

    application/pdf

    application/pdfPDF (231Kb)
  • Gu, Randy S. (2011-01-14)
    The growing dependence of society on enormous quantities of information stored electronically has led to a corresponding rise in errors in this information. The stored data can be critically important, necessitating new ...

    application/pdf

    application/pdfPDF (1Mb)
  • Gu, Siyu (2014-05-30)
    This thesis complements the large body of social sensing literature by developing means for augmenting sensing data with inference results that "fill-in" missing pieces. Unlike trend-extrapolation methods, we focus on ...

    application/pdf

    application/pdfPDF (1Mb)Restricted to U of Illinois
  • Yu, Hwan-Jo (2004-05)
    Data is everywhere, abundant, continuously increasing, and heterogeneous. For example, Web pages on the Internet are rapidly growing, data in commercial databases are continuously accumulating, as well as biological data ...

    application/pdf

    application/pdfPDF (3Mb)
  • Berkovsky, Shlomo; Eytani, Yaniv; Kuflik, Tsvi; Ricci, Francesco (2007-02)
    Collaborative Filtering (CF) is an attractive and reliable recommendation technique. CF is typically implemented using a centralized storage of user profiles and this is a severe privacy danger, since an attack to this ...

    application/pdf

    application/pdfPDF (106Kb)
  • Dalton, Steven (2015-01-21)
    Algebraic multigrid methods for large, sparse linear systems are central to many computational simulations. Parallel algorithms for such solvers are generally decomposed into coarse-grain tasks suitable for distributed ...

    application/pdf

    application/pdfPDF (6Mb)
  • Brodman, James C. (2011-05-25)
    Exploiting parallelism in modern machines increases the di culty of developing applications. Thus, new abstractions are needed that facilitate parallel programming and at the same time allow the programmer to control ...

    application/pdf

    application/pdfPDF (9Mb)
  • Mehrotra, Sharad (1996)
    Despite rapid increases in CPU performance, the primary obstacles to achieving higher performance in contemporary processor organizations remain control and data hazards. Primary data cache misses are responsible for the ...

    application/pdf

    application/pdfPDF (7Mb)Restricted to U of Illinois
  • Yamada, Yoji (1995)
    Numerical applications frequently contain nested loop structures that process large arrays of data. The execution of these loop structures often produces memory preference patterns that poorly utilize data caches. Limited ...

    application/pdf

    application/pdfPDF (4Mb)Restricted to U of Illinois
  • Song, Xiaohui (1992)
    This thesis studies the performance of concurrency control algorithms in maintaining temporal consistency of data in hard real-time systems. In our model, a hard real-time system consists of periodic tasks which are either ...

    application/pdf

    application/pdfPDF (7Mb)Restricted to U of Illinois
  • Chen, Wei-Peng (2004-09)
    Distinct from wireless ad hoc networks, wireless sensor networks are data-centric, application-oriented, collaborative, and resource-constrained in nature. Especially, the limited resources on energy, bandwidth and computation ...

    application/pdf

    application/pdfPDF (2Mb)
  • Chu, Sheauyin Iris (1995)
    This research addresses the problems in obtaining efficient database support with good functionality for electronic CAD applications. We believe that performance is a deciding factor in the acceptance of DBMSes as a ...

    application/pdf

    application/pdfPDF (4Mb)Restricted to U of Illinois
  • Kim, Yong-Bin (2010-08-20)
    Top-down proteomics is a revolutionary application for the identification and characterization of protein, known to be one of the most complicated and challenging issues in biology. In top-down proteomics, the quality ...

    application/pdf

    application/pdfPDF (3Mb)
  • Kim, Yong-Bin (2010-07-13)
    Top-down proteomics is a revolutionary application for the identification and characterization of protein, known to be one of the most complicated and challenging issues in biology. In top-down proteomics, the quality ...

    application/pdf

    application/pdfPDF (3Mb)
  • Youngquist, Anne M. (2011-05-25)
    Abstract Stigma in America creates heated controversy and is associated not only with people within defined social groups, but with a variety of products which are used daily. Many products (e.g. assistive walking devices, ...

    application/pdf

    application/pdfPDF (29Mb)
  • Gupta, Abhishek; Preston, Kurt; Rodriguez, Alejandro (2010-10-27)
    The Android operating system runs atop the Linux kernel, yet lacks the ability to natively execute standard Linux desktop applications. Though efforts have been made to enable this functionality, all approaches to date ...

    application/pdf

    application/pdfPDF (339Kb)
  • Gioachin, Filippo (2011-01-14)
    Debugging is a fundamental part of software development, and one of the largest in terms of time spent. When developing parallel applications, debugging becomes much harder due to a whole new set of problems not present ...

    application/pdf

    application/pdfPDF (3Mb)
  • Lee, Yuh-Jeng (1988)
    This dissertation addresses the use of executable specifications in debugging logic programs which are renowned for their clean syntax and well-understood semantics, and for the feature that one can use a single language ...

    application/pdf

    application/pdfPDF (5Mb)Restricted to U of Illinois
  • Kostoulas, Dionysios; Psaltoulis, Dimitrios; Gupta, Indranil; Briman, Ken; Demers, Al (2005-02)
    Large-scale and dynamically changing distributed systems such as the Grid, peer-to-peer overlays, etc., need to collect several kinds of global statistics in a decentralized manner. In this paper, we tackle a specific ...

    application/pdf

    application/pdfPDF (2Mb)
  • Chadha, Rohit; Viswanathan, Mahesh (2007-06)
    We consider the problem of verifying the safety of well-structured transition systems (WSTS) with auxiliary storage. WSTSs with storage are automata that have ( possibly) infinitely many control states along with an auxiliary ...

    application/pdf

    application/pdfPDF (266Kb)