# Browse Dept. of Computer Science by Title

• (2019-04-22)
Clothing Retrieval is a task that is increasingly becoming popular with the rise of online shopping and social media’s popularity. We propose to solve the clothing retrieval problem using landmarks based on the clothing ...

application/pdf

PDF (36MB)
• (1992)
This thesis describes CAM (Categories, Agreement, and Morphology), a computer model of several aspects of language acquisition. CAM is based on the Semantic Bootstrapping Hypothesis (Pinker, 1984), and CAM also respects ...

application/pdf

PDF (9MB)
• (1993)
One of the obstacles to be overcome in Natural Language Understanding is the existence of lexical gaps; that is, words or word senses which are not in the lexicon of the system. No lexicon, whether hand-coded or derived ...

application/pdf

PDF (14MB)
• (1982)
One of the problems in building a general purpose operating system is the construction of interfaces between programs that are interdependent but are loaded at different times. This thesis presents a model that generalizes ...

application/pdf

PDF (4MB)
• (2005-05)
In neighborhood-based texture synthesis, adjacent local regions need to satisfy color continuity constraints in order to avoid visible seams. Such continuity constraints seriously restrict the variability of synthesized ...

application/pdf

PDF (434kB)
• (2010-05-19)
This dissertation investigates novel approaches for analysis and visualization of two kinds of graph, scale-free network and rooted hierarchy, at large scales with thousands to millions of nodes. Scale-free network, ...

application/pdf

PDF (13MB)
• (2010-05)
This dissertation investigates novel approaches for analysis and visualization of two kinds of graph, scale-free network and rooted hierarchy, at large scales with thousands to millions of nodes. Scale-free network, ...

application/pdf

PDF (13MB)
• (2012-05-22)
Large lectures are a difficult and complicated area of exploration, both technologically and socially. Here is presented a discussion of existing areas of investigation related to large lectures, including fostering crowd ...

application/pdf

PDF (1MB)
• (2006-12)
The Web has been rapidly deepened'' by myriad searchable databases online, where data are hidden behind query interfaces. Guarding data behind them, such query interfaces are the entrances'' or doors'' to the deep ...

application/pdf

PDF (2MB)
• (2007)
The Web has been rapidly "deepened" by myriad searchable databases online, where data are hidden behind query interfaces. Guarding data behind there, such query interfaces are the "entrances" or "doors" to the deep Web. ...

application/pdf

PDF (5MB)
• (2019-12-01)
Phylogenomic estimation - the science of calculating evolutionary trees from genomic data - is an important biological problem. As the amount of genomic data in biological datasets increases, new methods are needed to ...

application/pdf

PDF (4MB)
• (2013-08-22)
Large-scale networks, such as the Internet, cellular networks, play critical roles in today's life. The advancement of large-scale computer and communication networks heavily depends on the successful transformation from ...

application/pdf

PDF (9MB)
• (2009)
We studied the problem of constraint-based pattern mining for three different data formats, item-set, sequence and graph, and focused on mining patterns of large sizes. Colossal patterns in each data formats are studied ...

application/pdf

PDF (1MB)
• (2012-05-07)
Network algorithms are deployed on large networks, and proper algorithm evaluation is necessary to avoid large-scale outages or performance bottlenecks. However, evaluating a network algorithm in a simulator results ...

application/pdf

PDF (261kB)
• (2006-01)
The computational bottleneck of topology optimization is the solution of a large number of linear systems arising in the finite element analysis. We propose fast iterative solvers for large three-dimensional topology ...

application/pdf

PDF (4MB)
• (2019-07-09)
Accelerating and scaling the training of deep neural networks (DNNs) is critical to keep up with growing datasets, reduce training times, and enable training on memory-constrained problems where parallelism is necessary. ...

application/pdf

PDF (2MB)
• (2015-11-24)
Wide-area Internet links are slow, expensive, and unreliable. This affects applications in two distinct ways. Back-end data processing applications, which need to transfer large amounts of data between data centers across ...

application/pdf

PDF (2MB)
• (2013-01-24)
With the fast growth of (online) content and the need for high quality content services, cloud data centers are increas- ingly becoming the preferred places to store data and re- trieve it from. With a highly variable ...

application/pdf

PDF (576kB)
• (2020-05-12)
One of the main challenges of using integral equation methods (IEM) for solving partial differential equations is evaluating layer potentials with singular kernels. Quadrature by Expansion (QBX) is a quadrature method to ...

application/pdf

PDF (3MB)
• (2001)
ESD design rule checking is different from the conventional design rule checking in that not only different rules have to be applied for different components in the ESD protection circuit, but also style of layout is of ...

application/pdf

PDF (5MB)