Browse Dept. of Computer Science by Title

  • Ha, Rhan (1995)
    In multiprocessor and distributed real-time systems, scheduling jobs dynamically on processors is likely to achieve better performance. However, analytical and efficient validation methods for determining whether all the ...

    application/pdf

    application/pdfPDF (5Mb)Restricted to U of Illinois
  • Walsh, Jonathan; Chase, Lila (Lawrence Livermore National Laboratory Technical Report, 2010-08-12)
    A means for translating MCNP5 input files into a form that can be run by Mercury, a modern Monte Carlo particle transport code, will allow MCNP5 users to more easily take advantage of the high-performance computing benefits ...

    application/pdf

    application/pdfPDF (612Kb)
  • Escobar, Santiago; Meseguer, Jos��; Sasse, Ralf (2007-10)
    Narrowing is a well-known complete procedure for equational E-unification when E can be decomposed as a union E = \Delta \uplus B with B a set of axioms for which a finitary unification algorithm exists, and \Delta a set ...

    application/pdf

    application/pdfPDF (309Kb)
  • Escobar, Santiago; Meseguer, Jos��; Sasse, Ralf (2009-03)
    For narrowing with a set of rules \Delta modulo a set of axioms B almost nothing is known about terminating narrowing strategies, and basic narrowing is known to be incomplete for B=AC. In this work we ask and answer the ...

    application/pdf

    application/pdfPDF (312Kb)
  • Escobar, Santiago; Meseguer, Jos��; Sasse, Ralf (2009-03)
    For narrowing with a set of rules \Delta modulo a set of axioms B almost nothing is known about terminating narrowing strategies, and basic narrowing is known to be incomplete for B=AC. In this work we ask and answer the ...

    application/pdf

    application/pdfPDF (312Kb)
  • Cholewa, Andrew; Meseguer, Jos��; Escobar, Santiago (2014-02-11)
    Variants and the finite variant property were originally introduced about a decade ago by Hurbert Comon-Lundh and Stephanie Delaune to reason about equational theories that commonly appear in cryptographic protocol analysis. ...

    application/pdf

    application/pdfPDF (340Kb)
  • Fang, Hui (2006-05)
    Both the measurement and simulation of unsteady flow yield huge datasets of time-varying volumetric vector fields. Flow dynamics researchers face the very difficult task of finding, extracting and analyzing important flow ...

    application/pdf

    application/pdfPDF (31Mb)
  • Bak, Stanley (2013-05-24)
    Cyber-physical systems (CPS) use networked control software to interact with and manipulate the physical world. Examples of cyber-physical systems include smart buildings, power distribution networks, and fleets of autonomous ...

    application/pdf

    application/pdfPDF (4Mb)
  • Komuravelli, Rakesh (2011-01-14)
    With the advent of multicores, parallel programming has gained a lot of importance. For parallel programming to be viable for the predicted hundreds of cores per chip, shared memory programming languages and environments ...

    application/pdf

    application/pdfPDF (328Kb)
  • Sobeih, Ahmed A. (2008-08)
    Verifiation and Validation (V&V) is a critically important phase in the development life cycle of a simulation model. In the context of network simulation, traditional network simulators perform well in using a simulation ...

    application/pdf

    application/pdfPDF (829Kb)
  • Sobeih, Ahmed A. (2008-08)
    Verifiation and Validation (V&V) is a critically important phase in the development life cycle of a simulation model. In the context of network simulation, traditional network simulators perform well in using a simulation ...

    application/pdf

    application/pdfPDF (829Kb)
  • Sobeih, Ahmed A.; d'Amorim, Marcelo; Viswanathan, Mahesh; Marinov, Darko; Hou, Jennifer C. (2007-08)
    Verification and Validation (V&V) is a critically important phase in the development life cycle of a simulation model. In the context of network simulation, traditional network simulators perform well in using a simulation ...

    application/pdf

    application/pdfPDF (298Kb)
  • Chen, Zhongbo (2014-09-16)
    Computer Networks are complex and prone to bugs. Most existing tools designed to fix these problems run offline and can only fix the problems after they occur. Those tools often run at the timescale of seconds to hours. ...

    application/pdf

    application/pdfPDF (691Kb)
  • Kanevsky, Arkady (1988)
    This thesis concerns several problems concerning vertex connectivity of undirected graphs and presents new bounds and algorithms for these problems.

    application/pdf

    application/pdfPDF (5Mb)Restricted to U of Illinois
  • Zilouchian Moghaddam, Roshanak (2009)
    Multiple Display Environments (MDEs) facilitate collaborative activities that involve the use of electronic task artifacts. Supporting interactions and infrastructures have matured in recent years, allowing researchers ...

    application/pdf

    application/pdfPDF (2Mb)
  • Yu, Yizhou; Wu, Qing (2004-05)
    Metamorphosis is generally known as the continuous evolution of a source into a target. There is frame-to-frame camera or object motion most of the time when either the source or the target is an image sequence. It would ...

    application/pdf

    application/pdfPDF (258Kb)
  • Lee, Kihwal (2006-12)
    Increasing demand for more features and bigger roles of software makes software more and more complex. Unfortunately, increase in the logical and organizational complexity of software generally leads to more bugs. Real-time ...

    application/pdf

    application/pdfPDF (468Kb)
  • Lee, Adam J.; Winslett, Marianne (2006-02)
    The lack of available identity information in attribute-based trust management systems complicates the design of the audit and incident response systems, anomaly detection algorithms, collusion detection/prevention mechanisms, ...

    application/pdf

    application/pdfPDF (348Kb)
  • Erickson, Lawrence (2014-05-30)
    This thesis introduces and examines the chromatic art gallery problem. The chromatic art gallery problem asks for the minimum number of landmark classes required to ensure that every point in an input polygon sees at least ...

    application/pdf

    application/pdfPDF (1Mb)
  • Xia, Pengye; Nahrstedt, Klara (2012-08-20)
    3D Tele-Immersion (3DTI) system brings 3D data of people from geographically distributed locations into the same virtual space to enable interaction in 3D space. One main obstacle of designing 3DTI system is to overcome ...

    application/pdf

    application/pdfPDF (502Kb)