Browse Dept. of Computer Science by Title

  • Pellizzoni, Rodolfo; Caccamo, Marco (2006-03)
    Resource reclaiming schemes are applied in reservation-based real-time uniprocessor systems to support efficient reclaiming and sharing of computational resources left unused by early completing tasks, improving the response ...

    application/pdf

    application/pdfPDF (202Kb)
  • Zelenko, Dmitry (2003-12)
    The dissertation presents a number of novel machine learning techniques and applies them to information extraction. The study addresses several information extraction subtasks: part of speech tagging, entity extraction, ...

    application/pdf

    application/pdfPDF (921Kb)
  • Li, Xiaoming (2006-08)
    The growing complexity of modern processors has made the generation of highly efficient code increasingly difficult. Manual code generation is very time consuming, but it is often the only choice since the code generated ...

    application/pdf

    application/pdfPDF (857Kb)
  • Ramkumar, Balkrishna (1991)
    Parallel machines are becoming increasingly cheap and more easily available. Commercial companies have already announced MIMD machines with more than 8000 processors. This prompts three questions: Should the programmer ...

    application/pdf

    application/pdfPDF (13Mb)Restricted to U of Illinois
  • Cozzie, Anthony E.; King, Samuel (2012-08-27)
    Current natural language programming systems avoid the difficulties of dealing with abstract and ambiguous concepts by restricting the input words to those comparable to a normal high-level programming language. Our system, ...

    application/pdf

    application/pdfPDF (893Kb)
  • Lattner, Chris A. (2005-05)
    Providing high performance for pointer-intensive programs on modern architectures is an increasingly difficult problem for compilers. Pointer-intensive programs are often bound by memory latency and cache performance, but ...

    application/pdf

    application/pdfPDF (2Mb)
  • Marco Cesati; Renato Mancuso; Emiliano Betti; Marco Caccamo (2015-06-18)
    Tools for memory access detection are widely used, playing an important role especially in real-time systems. For example, on multi-core platforms, the problem of co-scheduling CPU and memory resources with hard real-time ...

    application/pdf

    application/pdfPDF (399Kb)
  • Lu, Ying; Han, Jiawei (2005-07)
    Maintaining frequency counts for data streams has attracted much interest among the research community recently since it provides the base for many stream mining applications. Most existing work followed the same paradigm: ...

    application/pdf

    application/pdfPDF (676Kb)
  • Holder, Lawrence Bruce, Jr (1991)
    The overfit problem in empirical learning and the utility problem in analytical learning both describe a common behavior of machine learning methods: the eventual degradation of performance due to increasing amounts of ...

    application/pdf

    application/pdfPDF (7Mb)Restricted to U of Illinois
  • He, Bin; Chang, Kevin Chen-Chuan (2004-07)
    With the prevalence of databases on the Web, \emph{large scale} integration has become a pressing problem. As an essential task, \emph{holistic schema matching} (i.e., discovering attribute correspondences among many ...

    application/pdf

    application/pdfPDF (304Kb)
  • Jin, Dongyun (2012-09-18)
    Software reliability has become more important than ever in recent years, as a wide spectrum of software solutions are being used on various platforms. To this end, runtime monitoring is one of the most promising and ...

    application/pdf

    application/pdfPDF (2Mb)
  • Mussmann, Samuel (2013-02-03)
    Users want web pages to load quickly. Because modern web pages make connections to many hosts, this requires that small flows complete quickly at high percentiles. We explore how to achieve this goal with protocols that ...

    application/pdf

    application/pdfPDF (478Kb)
  • Mirarab, Siavash; Bayzid, Md Shamsuzzoha; Boussau, Bastien; Warnow, Tandy (2014)

    application/octet-stream

    application/octet-streamUnknown (676bytes)
  • Yang, Der-Shung (1994)
    Computer-Aided Design and Drafting (CADD) systems have become prevalent for producing building design drawings. An ultimate goal of CADD systems is to automate analyses and communication of high-level design information ...

    application/pdf

    application/pdfPDF (10Mb)Restricted to U of Illinois
  • Biehl, Jacob T. (2004-01)
    By enabling users to better manage information across PDAs, laptops, graphics tablets, and large screens, the use of an interactive space could dramatically improve how users share information in collaborative work. To ...

    application/pdf

    application/pdfPDF (415Kb)
  • Smith, Kenneth Paul (1992)
    Traditional databases are viewed as passive repositories of data. We store, retrieve, and alter data in a database, but do not expect a database to respond to actions performed to it. This passive paradigm is now rapidly ...

    application/pdf

    application/pdfPDF (5Mb)Restricted to U of Illinois
  • Lin, Ruei-Sung (2006-05)
    This thesis addresses the problem of learning manifold from time series. We use the mixtures of probabilistic principal component analyzers (MPPCA) to model the nonliner manifold. In addition, we extend the MPPCA model by ...

    application/pdf

    application/pdfPDF (6Mb)
  • Tovar, Benjamin; Freda, Luigi; LaValle, Steven M. (2006-08)
    This paper considers a robot that moves in the plane and is only able to sense the cyclic order of landmarks with respect to its current position. No metric information (e.g., coordinates) is available regarding the robot ...

    application/pdf

    application/pdfPDF (244Kb)
  • Yershova, Anna; Tovar, Benjamin; Ghrist, Robert; LaValle, Steven M. (2009-04-16)
    This paper defines and analyzes a simple robot with local sensors that moves in an unknown polygonal environment. The robot can execute wall-following motions and can traverse the interior of the environment only when ...

    application/pdf

    application/pdfPDF (274Kb)
  • Vu, Long; Gupta, Indranil; Liang, Jin; Nahrstedt, Klara (2006-08)
    While several deployed p2p file sharing overlays have been characterized in the literature, this paper shows that some of their conclusions may be false for p2p applications that stream media instead. Specifically, we ...

    application/pdf

    application/pdfPDF (330Kb)