Browse Dept. of Computer Science by Title

  • Kim, Jung-Eun; Yoon, Man-Ki; Im, Sungjin; Bradford, Richard; Sha, Lui (2012-05)
    Integrated Modular Avionics (IMA) architecture has been widely adopted by the avionics industry due to its strong temporal and spatial isolation capability for safety-critical real-time systems. Although multi-core systems ...

    application/pdf

    application/pdfPDF (162kB)
  • Rahmaniheris, Maryam (2011-05-25)
    Safety-critical embedded-system designs are typically both complex and expensive. Domains, such as medical devices, however, require safety but also demand affordability. However, conventional safety and reliability ...

    application/pdf

    application/pdfPDF (552kB)
  • Gupta, Abhishek (2012-02-01)
    High performance parallel machines with hundreds of thousands of processors and petascale performance are already in use, and even larger Exa flops scale computing systems which may have hundreds of millions of cores ...

    application/pdf

    application/pdfPDF (351kB)
  • Guzman Rivera, Abner (2014-09-16)
    Real-world applications of Machine Learning (ML) require modeling and reasoning about complex, heterogeneous and high-dimensional data. Probabilistic Inference and Structured-Output Prediction (SOP) are frameworks within ...

    application/pdf

    application/pdfPDF (26MB)
  • Yang, Zhenyu (2007-09)
    Three-dimensional tele-immersive (3DTI) environments have great potential to promote collaborative work among geographically distributed participants. However, extensive application of 3DTI environments is still hindered ...

    application/pdf

    application/pdfPDF (10MB)
  • Yang, Zhenyu (2007)
    We propose an innovative cross-layer hierarchical and distributed multi-stream management middleware framework for QoS provisioning to fully enable multi-party 3DTI communication over general delivery infrastructure. The ...

    application/pdf

    application/pdfPDF (3MB)Restricted to U of Illinois
  • Lee, Kang-Won (2000)
    In order to speedily deploy these new multicast services, this dissertation promotes the idea of a virtual overlay architecture, which provides a common framework for both IRMA and MHPF. In this framework, a virtual network ...

    application/pdf

    application/pdfPDF (7MB)Restricted to U of Illinois
  • Hossain, Ashfaq (1997)
    In addition to the development of Video Server and Video Client applications, we have designed and implemented a novel ATM Network Video Interface Module. This module receives ATM cells from an ATM switch port, performs ...

    application/pdf

    application/pdfPDF (6MB)Restricted to U of Illinois
  • Berger-Wolf, Yonit (2002)
    Depending on the type of data, error measure, and type of failure, the problem of designing these encoding schemes is equivalent to several classical problems in graph theory. For example, no-redundancy encodings that ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Kyasanur, Pradeep N. (2006-08)
    Recent years have seen significant interest in using the multihop wireless networking paradigm for building mesh networks, ad hoc networks, and sensor networks. A key challenge in multihop wireless networks is to provision ...

    application/pdf

    application/pdfPDF (948kB)
  • Kyasanur, Pradeep Narayanaswamy (2006)
    In this dissertation, we have established the asymptotic capacity of multichannel wireless networks with varying number of channels and interfaces. Capacity analysis has shown that it is feasible to effectively use a large ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Horton, Kurt Harold (1984)
    This thesis surveys existing processor-memory interconnection structures and investigates the word-parallel ring network in detail. It proposes a design for constructing a multimicrocomputer using such a network. The ring ...

    application/pdf

    application/pdfPDF (3MB)Restricted to U of Illinois
  • Lu, Victor (2014-01-16)
    The k-d tree is widely used in graphics and vision applications for accelerating retrieval from large sets of geometric entities in R^k. Despite speeding up an otherwise brute force search, the time to construct and traverse ...

    application/pdf

    application/pdfPDF (5MB)
  • Li, Xiaolei (2008-04)
    The collection of historical or real-time data on moving objects is quickly becoming a ubiquitous task. With the help of GPS devices, RFID sensors, RADAR, satellites, and other technologies, mobile objects of all sizes, ...

    application/pdf

    application/pdfPDF (1MB)
  • Li, Xiaolei (2008)
    To this end, we present our studies in this thesis. With regards to anomaly detection, we present three models to automatically detect moving object anomaly, traffic anomaly, and subspace anomaly. The last of which detects ...

    application/pdf

    application/pdfPDF (2MB)Restricted to U of Illinois
  • Teodorescu, Mircea-Radu (2008-08)
    As integrated-circuit technology continues to scale, process variation is becoming an issue that cannot be ignored at the microarchitecture and system levels. Process variation is particularly detrimental to a processor's ...

    application/pdf

    application/pdfPDF (2MB)
  • Teodorescu, Mircea-Radu (2008-08)
    As integrated-circuit technology continues to scale, process variation is becoming an issue that cannot be ignored at the microarchitecture and system levels. Process variation is particularly detrimental to a processor's ...

    application/pdf

    application/pdfPDF (2MB)
  • Teodorescu, Mircea-Radu (2008)
    Within-die process variation causes individual cores in a Chip Multiprocessor (CMP) to differ substantially in both static power consumed and maximum frequency supported. In this environment, ignoring variation effects ...

    application/pdf

    application/pdfPDF (5MB)Restricted to U of Illinois
  • Xiang, Xuequn (1990)
    This thesis consists of two parts. In the first part, we have discussed a multilevel network synthesis system, SYLON-XTRANS, which is an extension of the original Transduction method. In Chapter 1, we have discussed how ...

    application/pdf

    application/pdfPDF (9MB)Restricted to U of Illinois
  • Holst, Michael Jay (1993)
    We consider the numerical solution of the Poisson-Boltzmann equation (PBE), a three-dimensional second order nonlinear elliptic partial differential equation arising in biophysics. This problem has several interesting ...

    application/pdf

    application/pdfPDF (14MB)Restricted to U of Illinois