Browse Dept. of Computer Science by Title

  • Ha, Rhan (1995)
    In multiprocessor and distributed real-time systems, scheduling jobs dynamically on processors is likely to achieve better performance. However, analytical and efficient validation methods for determining whether all the ...

    application/pdf

    application/pdfPDF (5MB)Restricted to U of Illinois
  • Walsh, Jonathan; Chase, Lila (Lawrence Livermore National Laboratory Technical Report, 2010-08-12)
    A means for translating MCNP5 input files into a form that can be run by Mercury, a modern Monte Carlo particle transport code, will allow MCNP5 users to more easily take advantage of the high-performance computing benefits ...

    application/pdf

    application/pdfPDF (612kB)
  • Escobar, Santiago; Meseguer, José; Sasse, Ralf (2007-10)
    Narrowing is a well-known complete procedure for equational E-unification when E can be decomposed as a union E = \Delta \uplus B with B a set of axioms for which a finitary unification algorithm exists, and \Delta a set ...

    application/pdf

    application/pdfPDF (309kB)
  • Escobar, Santiago; Meseguer, José; Sasse, Ralf (2009-03)
    For narrowing with a set of rules \Delta modulo a set of axioms B almost nothing is known about terminating narrowing strategies, and basic narrowing is known to be incomplete for B=AC. In this work we ask and answer the ...

    application/pdf

    application/pdfPDF (312kB)
  • Escobar, Santiago; Meseguer, José; Sasse, Ralf (2009-03)
    For narrowing with a set of rules \Delta modulo a set of axioms B almost nothing is known about terminating narrowing strategies, and basic narrowing is known to be incomplete for B=AC. In this work we ask and answer the ...

    application/pdf

    application/pdfPDF (312kB)
  • Jose Meseguer (2015-11)
    Although different satisfiability decision procedures can be combined by algorithms such as those of Nelson-Oppen or Shostak, current tools typically can only support a finite number of theories to use in such ...

    application/pdf

    application/pdfPDF (656kB)
  • Cholewa, Andrew; Meseguer, José; Escobar, Santiago (2014-02-11)
    Variants and the finite variant property were originally introduced about a decade ago by Hurbert Comon-Lundh and Stephanie Delaune to reason about equational theories that commonly appear in cryptographic protocol analysis. ...

    application/pdf

    application/pdfPDF (340kB)
  • Fang, Hui (2006-05)
    Both the measurement and simulation of unsteady flow yield huge datasets of time-varying volumetric vector fields. Flow dynamics researchers face the very difficult task of finding, extracting and analyzing important flow ...

    application/pdf

    application/pdfPDF (31MB)
  • Fang, Hui (2006)
    We propose an image editing system that decouples feature position from pixel color generation to achieve a morph that preserves texture detail and orientation near the dragged silhouette, synthesized using the original ...

    application/pdf

    application/pdfPDF (6MB)Restricted to U of Illinois
  • Bak, Stanley (2013-05-24)
    Cyber-physical systems (CPS) use networked control software to interact with and manipulate the physical world. Examples of cyber-physical systems include smart buildings, power distribution networks, and fleets of autonomous ...

    application/pdf

    application/pdfPDF (4MB)
  • Komuravelli, Rakesh (2011-01-14)
    With the advent of multicores, parallel programming has gained a lot of importance. For parallel programming to be viable for the predicted hundreds of cores per chip, shared memory programming languages and environments ...

    application/pdf

    application/pdfPDF (328kB)
  • Sobeih, Ahmed A. (2008-08)
    Verifiation and Validation (V&V) is a critically important phase in the development life cycle of a simulation model. In the context of network simulation, traditional network simulators perform well in using a simulation ...

    application/pdf

    application/pdfPDF (829kB)
  • Sobeih, Ahmed A. (2008-08)
    Verifiation and Validation (V&V) is a critically important phase in the development life cycle of a simulation model. In the context of network simulation, traditional network simulators perform well in using a simulation ...

    application/pdf

    application/pdfPDF (829kB)
  • Sobeih, Ahmed Adel (2008)
    Finally, we present incremental state space exploration (ISSE), a technique that aims to provide a speedup in the state space exploration time of evolving simulation models; i.e., simulation models whose code changes from ...

    application/pdf

    application/pdfPDF (9MB)Restricted to U of Illinois
  • Sobeih, Ahmed A.; d'Amorim, Marcelo; Viswanathan, Mahesh; Marinov, Darko; Hou, Jennifer C. (2007-08)
    Verification and Validation (V&V) is a critically important phase in the development life cycle of a simulation model. In the context of network simulation, traditional network simulators perform well in using a simulation ...

    application/pdf

    application/pdfPDF (298kB)
  • Chen, Zhongbo (2014-09-16)
    Computer Networks are complex and prone to bugs. Most existing tools designed to fix these problems run offline and can only fix the problems after they occur. Those tools often run at the timescale of seconds to hours. ...

    application/pdf

    application/pdfPDF (691kB)
  • Kanevsky, Arkady (1988)
    This thesis concerns several problems concerning vertex connectivity of undirected graphs and presents new bounds and algorithms for these problems.

    application/pdf

    application/pdfPDF (5MB)Restricted to U of Illinois
  • Zilouchian Moghaddam, Roshanak (2009)
    Multiple Display Environments (MDEs) facilitate collaborative activities that involve the use of electronic task artifacts. Supporting interactions and infrastructures have matured in recent years, allowing researchers ...

    application/pdf

    application/pdfPDF (2MB)
  • Yu, Yizhou; Wu, Qing (2004-05)
    Metamorphosis is generally known as the continuous evolution of a source into a target. There is frame-to-frame camera or object motion most of the time when either the source or the target is an image sequence. It would ...

    application/pdf

    application/pdfPDF (258kB)
  • Lee, Kihwal (2006)
    We examined the performance of VEER by comparing the existing real-time embedded systems and the migrated and reorganized version of the same systems. The performance overhead of RT-VMM is about 1.7% if self-contained, or ...

    application/pdf

    application/pdfPDF (3MB)Restricted to U of Illinois