Browse Dept. of Computer Science by Title

  • Neelakantam, Naveen; Zilles, Craig (2007-01)
    In this paper, we advocate for a general-purpose, fine-grain memory protection mechanism for use by applications and software development tools. The hardware component of this mechanism consists of two bits (fault-on-read ...

    application/pdf

    application/pdfPDF (318Kb)
  • Goldstein, Arthur Sander (1992)
    A variation of Kraft's inequality is proven for a unimodal search tree. The inequality is used to prove the near optimality of an algorithm for solving the unbounded discrete unimodal search problem. New results on the ...

    application/pdf

    application/pdfPDF (3Mb)Restricted to U of Illinois
  • Devaraj, Christo; Nagda, Mehwish; Gupta, Indranil; Agha, Gul A. (2005-04)
    We propose localized and decentralized protocols to construct and maintain an underlay for sensor networks. An underlay lies in between overlay operations (e.g., data indexing, multicast, etc.) and the sensor network itself. ...

    application/pdf

    application/pdfPDF (366Kb)
  • Nelson, Samuel C.; Kravets, Robin; Hu, Yih-Chun (2011-03-07)
    With the recent proliferation of wireless communication devices, intermittent connectivity on the edge will quickly become a reality. These disruption tolerant networks derive structure from human-based interaction and ...

    application/pdf

    application/pdfPDF (898Kb)
  • Iqbal, Shamsi T.; Bailey, Brian P. (2006-10)
    The ability to detect and differentiate breakpoints during task execution is critical for enabling defer-to-breakpoint policies within interruption management. In this work, we examine the feasibility of building models ...

    application/pdf

    application/pdfPDF (252Kb)
  • Liang, Yingyi; Campbell, Roy H. (2008-05)
    The recent international standard IEC 61850 proposes a unified solution of the communication aspect of substation automation. However, the standard itself is not easily understood by users other than domain experts. We ...

    application/pdf

    application/pdfPDF (130Kb)
  • Xiao, Li; He, Guanghui; Nahrstedt, Klara (2004-10)
    The reliability and robustness of the Border Gateway Protocol (BGP) play very important roles in achieving highly stable and prompt Internet data communication. The present BGP uses TCP/IP to exchange routing control ...

    application/pdf

    application/pdfPDF (484Kb)
  • Iqbal, Shamsi T.; Adamczyk, Piotr D.; Zheng, Xianjun S.; Bailey, Brian P. (2004-09)
    To contribute to systems that reason about human attention, our work empirically demonstrates how a user's mental workload changes during task execution. We conducted a study where users performed interactive, hierarchical ...

    application/pdf

    application/pdfPDF (327Kb)
  • Blatti, Charles (2015-01-26)
    Genomic researchers commonly study complex phenotypes by identifying experimentally derived sets of functionally related genes with similar transcriptional profiles. These gene sets are then frequently subjected to statistical ...

    application/pdf

    application/pdfPDF (5Mb)
  • Cook, Damon J.; Bailey, Brian P. (2004-10)
    While informal tools can benefit early design, their use requires that a designer give up the richer affordances of physical tools such as paper. To better understand the importance of physical tools for early design, we ...

    application/pdf

    application/pdfPDF (2Mb)
  • Vu, Long; Gupta, Indranil; Nahrstedt, Klara; Liang, Jin (2008-09)
    This paper presents results from our measurement and modeling efforts on the large-scale peer- to-peer (p2p) overlay graphs spanned by the PPLive system, the most popular and largest p2p IPTV (Internet Protocol Television) ...

    application/pdf

    application/pdfPDF (437Kb)
  • Vu, Long; Gupta, Indranil; Nahrstedt, Klara; Liang, Jin (2008-09)
    This paper presents results from our measurement and modeling efforts on the large-scale peer- to-peer (p2p) overlay graphs spanned by the PPLive system, the most popular and largest p2p IPTV (Internet Protocol Television) ...

    application/pdf

    application/pdfPDF (437Kb)
  • Zhang, Honghai (2005-08)
    In this PhD thesis, we study the fundamental limits of the network performance with respect to coverage, connectivity, lifetime, power, energy, and capacity in wireless sensor networks. An interesting finding is that ...

    application/pdf

    application/pdfPDF (1Mb)
  • Khalid, Mariyam (2014-05-30)
    The task of recovering 3D information from 2D images has long been a focus of Computer Vision research. Such information is useful in many applications: from robot navigation, where it allows the robot to understand the ...

    application/pdf

    application/pdfPDF (14Mb)Restricted to U of Illinois
  • Jiang, Weihang (2009)
    Nowadays, over 90% new information produced are stored on hard disk drives. The explosion of data is making storage system a strategic investment priority in the enterprise world. The revenue created by storage system ...

    application/pdf

    application/pdfPDF (1Mb)Restricted to U of Illinois
  • Rozier, Eric (2012-02-06)
    Modern storage systems continue to increase in scale and complexity as they attempt to meet the increasing storage needs of our society. Additionally, increased requirements to comply with government regulation and ...

    application/pdf

    application/pdfPDF (885Kb)
  • Huang, Zixia; Arefin, Md Ahsan; Agarwal, Pooja; Nahrstedt, Klara; Wu, Wanmin (2011-12-12)
    Both comparative category rating (CCR) and degradation category rating (DCR) methods have been heavily employed in the subjective evaluations of media systems. The resulting metrics, comparative mean-opinion-score (CMOS) ...

    application/pdf

    application/pdfPDF (815Kb)
  • Li, Man-Lap; Ramachandran, Pradeep; Adve, Sarita V.; Adve, Vikram S.; Zhou, YuanYuan (2007-02)
    With continued CMOS scaling, future shipped hardware will be increasingly vulnerable to in-the-field faults. To be broadly deployable, the hardware reliability solution must incur low overheads, precluding use of expensive ...

    application/pdf

    application/pdfPDF (271Kb)
  • Zhang, Thomas (2014-09-16)
    Online health forums provide a convenient way for patients to obtain medical information and connect with physicians and peers outside of clinical settings. However, the large quantities of unstructured and diversified ...

    application/pdf

    application/pdfPDF (146Kb)Restricted to U of Illinois
  • Lu, Shan (2008-12)
    Software is pervasive in our daily lives. Unfortunately, software bugs can severely affect the dependability and security of software systems. Among all types of software bugs, the concurrency bug is one of the most ...

    application/pdf

    application/pdfPDF (1Mb)