Browse Dept. of Computer Science by Title

• (2011-01-14)
The advent of computerized medical devices has resulted in better accuracy and increased safety for patients and clinicians, yet medical accidents are still not uncommon. With the computerized medical devices and their ...

application/pdf

PDF (682kB)
• (2006)
This thesis describes the main ideas, insights, and the approach that SAFECode system uses to achieve the goal of providing safety guarantees to software written in unsafe languages. This thesis also evaluates the SAFECode ...

application/pdf

PDF (5MB)
• (2006-09)
Many computing systems today are written in weakly typed languages such as C and C++. These languages are known to be unsafe'' as they do not prevent or detect common memory errors like array bounds violations, pointer ...

application/pdf

PDF (745kB)
• (2006-08)
In trust negotiation and other distributed proving systems, networked entities cooperate to form proofs that are justified by collections of certified attributes. These attributes may be obtained through interactions with ...

application/pdf

PDF (306kB)
• (2019-04-19)
The number of embedded controllers in charge of physical systems has rapidly increased over the past years. Embedded controllers are present in every aspect of our lives, from our homes to our vehicles and factories. The ...

application/pdf

PDF (8MB)
• (2019-07-09)
This dissertation addresses the questions of how to ensure safety in medical Cyber-Physical-Human System (CPHS) development from various perspectives including (1) System Design for Networked Medical CPHS, (2) Safety-driven ...

application/pdf

PDF (2MB)
• (1986)
The research described in this dissertation supports the thesis that a language-oriented editor for full programming languages, and other languages specifiable with context-free LR(1) grammars, can be based upon an incremental ...

application/pdf

PDF (6MB)
• (2008-10)
In its original formulation, the motion planning problem considers the search of a robot path from an initial to a goal configuration. The study of motion planning has advanced significantly in recent years, in large part ...

application/pdf

PDF (2MB)
• (2008)
In its original conception, the motion planning problem considered the search of a robot path from an initial to a goal configuration. The study of motion planning has advanced significantly in recent years, in large part ...

application/pdf

PDF (2MB)
• (2008-10)
In its original formulation, the motion planning problem considers the search of a robot path from an initial to a goal configuration. The study of motion planning has advanced significantly in recent years, in large part ...

application/pdf

PDF (2MB)
• (2006-02)
Data mining is an emerging research area, whose goal is to discover potentially useful information embedded in databases. Due to the wide availability of huge amounts of data and the imminent need for turning such data ...

application/pdf

PDF (3MB)
• (2006)
We implemented parallel algorithms for mining frequent itemsets, sequential patterns and closed-sequential patterns following our framework. A comprehensive performance study has been conducted in our experiments on both ...

application/pdf

PDF (2MB)
• (2005)
Since differential constraints which restrict admissible velocities and accelerations of robotic systems are ignored in path planning, solutions for kinodynamic and non-holonomic planning problems from classical methods ...

application/pdf

PDF (5MB)
• (2005-08)
Kinodynamic and nonholonomic planning problems have differential constraints which restrict admissible velocities and accelerations of robotic systems. Since these differential constraints are ignored in the path planning ...

application/pdf

PDF (2MB)
• (1988)
A new domain decomposition method for the efficient and parallelizable numerical handling of plate bending and three dimensional elasticity problem is developed via the discovery of two special classes of matrices. The ...

application/pdf

PDF (3MB)
• (2013-02-03)
In today's data-intensive cloud systems, there is a tension between resource limitations and strict requirements. In an effort to scale up in the cloud, many systems today have unfortunately forced users to relax their ...

application/pdf

PDF (4MB)
• (2013-08-22)
Multicore machines have become pervasive and, as a result, parallel programming has received renewed interest. Unfortunately, writing correct parallel programs is notoriously hard. Looking ahead, multicore designs should ...

application/pdf

PDF (2MB)
• (2018-04-24)
Connectivity in a graph is a well-studied problem. Various parallel algorithms to detect and label connected components exist, many of which are optimized for a shared-memory environment. However, scientific and engineering ...

application/pdf

PDF (669kB)
• (2006-06)
Testing using manually generated test cases is the primary technique used in industry to improve reliability of software---in fact, such ad hoc testing accounts for over half of the typical cost of software development. ...

application/pdf

PDF (995kB)
• (2006)
Based on the above methods we have developed tools for testing both C and Java programs. We have used the tools to find bugs in several real-world software systems including SGLIB, a popular C data structure library used ...

application/pdf

PDF (5MB)