Browse Dept. of Computer Science by Title

  • Sukumar, Pritam (2013-08-22)
    This thesis presents an investigation of the Collection of Parts Model for object categorization. Multiclass categorization is performed using the Collections of Parts model. Results using Support Vector Machines, L1 ...

    application/pdf

    application/pdfPDF (934Kb)
  • Zelinka, Stephen David (2005-05)
    Modelling by example has arisen as a powerful paradigm for reducing the artistic skill required for computer graphics. Instead of relying on the user's own modelling skills, a system that models by example allows users to ...

    application/pdf

    application/pdfPDF (79Mb)
  • Pham, Cuong K. (2010-08-20)
    As the web evolves, increasing quantities of structured information is embedded in web pages in disparate formats. For example, a digital camera’s description may include its price and megapixels whereas a professor’s ...

    application/pdf

    application/pdfPDF (567Kb)
  • Xiao, Lun (1995)
    This thesis defines an extensible transaction model and shows that an extensible and customizable transaction system based on the model can be built using an object-oriented framework.

    application/pdf

    application/pdfPDF (5Mb)Restricted to U of Illinois
  • Madany, Peter William (1992)
    File systems are essential components of general purpose operating systems and are highly visible to computer users. To satisfy the growing diversity of persistent storage needs presented by application and system programs, ...

    application/pdf

    application/pdfPDF (7Mb)Restricted to U of Illinois
  • Dykstra, David Wayne (1992)
    Protection is the mechanism employed by operating systems to control access to resources. Object encapsulation in object-based systems requires control of access to every object. The incremental definition of objects through ...

    application/pdf

    application/pdfPDF (6Mb)Restricted to U of Illinois
  • Russo, Vincent Frank (1991)
    This thesis describes an experiment to use object-oriented programming and design techniques to design and implement an operating system. This experiment uses object-oriented techniques to address problems of operating ...

    application/pdf

    application/pdfPDF (8Mb)Restricted to U of Illinois
  • Sum, Robert N., Jr (1991)
    The large size and inherent complexity of modern software products have made it difficult to use strictly manual techniques for the management of software production. In this thesis, object-oriented techniques are used to ...

    application/pdf

    application/pdfPDF (5Mb)Restricted to U of Illinois
  • Wang, Qiyan (2011-04)

    application/pdf

    application/pdfPDF (867Kb)
  • Uddin, Md Yusuf Sarwar; Amin, Md Tanvir Al; Abdelzaher, Tarek; Iyengar, Arun; Govindan, Ramesh (2012-04-25)
    This paper addresses the problem of collection and delivery of a representative subset of pictures, in participatory camera networks, to maximize coverage when a significant portion of the pictures may be redundant or ...

    application/pdf

    application/pdfPDF (504Kb)
  • Cui, Yi; Li, Baochun; Nahrstedt, Klara (2004-04)
    In this paper, we examine the problem of large-volume data dissemination via overlay networks. A natural way to maximize the throughput of an overlay multicast session is to split the traffic and feed them into multiple ...

    application/pdf

    application/pdfPDF (953Kb)
  • Lim, Jongwoo (2005-12)
    The images of an object may look very different under different illumination conditions or viewing directions. This thesis considers the problem of clustering images of various objects into disjoint subsets according to ...

    application/pdf

    application/pdfPDF (8Mb)
  • O'Kane, Jason M.; LaValle, Steven M. (2006-11)
    Robots must complete their tasks in spite of unreliable actuators and limited, noisy sensing. In this paper, we consider the information requirements of such tasks. What sensing and actuation abilities are needed to complete ...

    application/pdf

    application/pdfPDF (354Kb)
  • Ilseman, Michael; Ellison, Chucky M.; Rosu, Grigore (2010-12-14)
    This paper describes a completely automated method for generating efficient and competitive interpreters from formal semantics expressed in Rewriting Logic. The semantics are compiled into OCaml code, which then acts as ...

    application/pdf

    application/pdfPDF (257Kb)
  • Maji, Hemanta K. (2012-02-06)
    In cryptographic protocols, honest parties would prefer that their security is assured even in presence of adversarial parties who have unbounded computational power. Information theoretic secure realization of cryptographic ...

    application/pdf

    application/pdfPDF (1Mb)
  • Stahl, Fred Alan (1974)

    application/pdf

    application/pdfPDF (3Mb)Restricted to U of Illinois
  • Zhang, Honghai (2004-02)
    In this paper, we explore the fundamental limits of sensor network lifetime that all algorithms can possibly achieve. Specifically, under the assumptions that nodes are deployed as a Poisson point process with density ...

    application/pdf

    application/pdfPDF (399Kb)
  • Gratch, Jonathan Matthew (1995)
    Domain independent general purpose problem solving techniques are desirable from the standpoints of software engineering and human computer interaction. They employ declarative and modular knowledge representations and ...

    application/pdf

    application/pdfPDF (10Mb)Restricted to U of Illinois
  • Harris III, Albert F.; Snader, Robin; Kravets, Robin (2006-06)
    Increases in computing capabilities of mobile devices have led to the use of multimedia applications that have high processor and bandwidth resource requirements, each of which consume significant energy. However, battery ...

    application/pdf

    application/pdfPDF (304Kb)
  • Li, Chien-Wei (2006-05)
    To efficiently utilize the emerging heterogeneous multi-core architecture, it is essential to exploit the inherent coarse-grained parallelism in applications. In addition to data parallelism, applications like telecommunication, ...

    application/pdf

    application/pdfPDF (1Mb)