Browse Dept. of Computer Science by Title

  • Zou, Bo (2000-05)
    Current multimedia streaming applications, such as video on demand, are "machine- oriented", and do not support user mobility. In this thesis, I designed and implemented a badge-activated application-level handoff protocol, ...

    application/pdf

    application/pdfPDF (20MB)Restricted to U of Illinois
  • Nahrstedt, Klara; Campbell, Roy H.; Gupta, Indranil; Karahalios, Karrie G.; Kravets, Robin; Kamin, Sam; Sanders, William H. (Information Trust Institute, University of Illinois at Urbana-Champaign, 2010-11-15)
    Advances in wireless technologies have allowed users to communicate ubiquitously anywhere and anytime and made it possible for users to access and exchange information through wireless hand-held devices such as cell-phones, ...

    application/pdf

    application/pdfPDF (795kB)
  • Chopra, Danish (2013-05-24)
    Studies have shown that real time collaborative visualizations that are designed to augment a group activity prove to be helpful to participants in general. Visualizations projected on large tabletops or walls that reflect ...

    application/pdf

    application/pdfPDF (4MB)
  • Yi, Seung; Kravets, Robin (2004-12)
    An authentication service is one of the the most fundamental building blocks for providing communication security. In this paper, we present the MOCA (MObile Certificate Authority) key management framework designed to ...

    application/pdf

    application/pdfPDF (173kB)
  • Meyer, Charlie (2009-05)
    Currently, no standards exist for the safe operation and communication between medical devices. By developing these standards, the Medical Device Plug n Play project aims to improve patient safety. Our group was tasked ...

    application/pdf

    application/pdfPDF (800kB)
  • Sen, Koushik; Viswanathan, Mahesh (2006-01)
    In order to make multithreaded programming manageable, programmers often follow a design principle where they break the problem into tasks which are then solved asynchronously and concurrently on different threads. This ...

    application/pdf

    application/pdfPDF (154kB)
  • Yang, Yaling; Wang, Jun; Kravets, Robin (2005-11)
    Predicting the bandwidth achievable by a new flow is crucial for many bandwidth-aware services. In IEEE 802.11 based networks, the achievable bandwidth of a new flow is not necessarily the same as the free bandwidth on the ...

    application/pdf

    application/pdfPDF (300kB)
  • Rukkanchanunt, Thapanapong (2014-05-30)
    Structure from Motion (SfM) is a technique for inferring the underlying 3D geometry of the real world from a set of unordered images using a pinhole camera model. Due to a wider availability of cameras, the availability ...

    application/pdf

    application/pdfPDF (10MB)
  • Sen, Koushik; Viswanathan, Mahesh; Agha, Gul A. (2006-01)
    We investigate the problem of model checking Interval-valued Discrete-time Markov Chains (IDTMC). IDTMCs are discrete-time finite Markov Chains for which the exact transition probabilities are not known. Instead in IDTMCs, ...

    application/pdf

    application/pdfPDF (246kB)
  • Madhusudan, P. Parthasarathy; La Torre, Salvatore; Parlato, Gennaro (Springer, 2010-04-18)
    We consider the verification of parameterized Boolean programs— abstractions of shared-memory concurrent programs with an unbounded number of threads. We propose that such programs can be model-checked by iteratively ...

    application/pdf

    application/pdfPDF (218kB)
  • Liang, Jin; Gu, Xiaohui; Nahrstedt, Klara (2006-02)
    In this paper, we present a model-driven distributed information management system called MDIM that can resolve multi-attribute range queries about large-scale networked systems. Different from previous work, MDIM can ...

    application/pdf

    application/pdfPDF (245kB)
  • Liu, Xue; Heo, Jin; Sha, Lui (2005-05)
    The rapid advancement and deployment of Web services call for a precise yet simple model for capacity planning and analysis purposes. The most widely deployed Web services architecture is the 3-tiered system, which is ...

    application/pdf

    application/pdfPDF (177kB)
  • Tosic, Predrag T. (2006-12)
    This technical report addresses modeling and analysis of the behavior of large-scale multiagent systems. A broad variety of multi-agent systems (MAS) are modeled as appropriate variants of cellular and network automata. ...

    application/pdf

    application/pdfPDF (1MB)
  • Tosic, Predrag (2006)
    Keywords. multi-agent systems, distributed artificial intelligence, theoretical computer science, formal methods, computational complexity, cellular and network automata, agent-based modeling, discrete dynamical systems, ...

    application/pdf

    application/pdfPDF (7MB)Restricted to U of Illinois
  • Li, Kevin Yu (2017-12-06)
    The National Collegiate Athletic Association (NCAA) Men's Division I Basketball Tournament is an annually held basketball tournament between top universities throughout the United States. Along with attracting tens of ...

    application/pdf

    application/pdfPDF (311kB)
  • Kim, Cheolgi; Al-Nayeem, Abdullah; Yun, Heechul; Sha, Lui (2010-07-31)

    application/pdf

    application/pdfPDF (496kB)
  • Gupta, Siddharth (2013-05-24)
    Recent use of Electronic Medical Records in the hospitals has raised many privacy concerns regarding confidential patient information which can be accessed by various users in the hospital's complex and dynamic environment. There ...

    application/pdf

    application/pdfPDF (3MB)
  • Vydiswaran, Vinod (2013-05-24)
    Modeling trustworthiness of information is a key factor in many decision support systems. Decision makers and citizens are highly influenced these days by information they get from online resources, such as news, online ...

    application/pdf

    application/pdfPDF (2MB)
  • Chung, Ki-Seok (1998)
    With the advent of deep submicron technology, the number of transistors in a chip has increased very rapidly. As the complexity of VLSI circuits increases fast, the automation of the VLSI design has become very crucial not ...

    application/pdf

    application/pdfPDF (6MB)Restricted to U of Illinois
  • Cai, Deng; Mei, Qiaozhu; He, Xiaofei; Han, Jiawei (2008-01)
    Topic modeling has been a key problem for document analysis. One of the canonical approaches for topic modeling is Probabilistic Latent Semantic Indexing, which maximizes the joint probability of documents and terms in the ...

    application/pdf

    application/pdfPDF (142kB)