Browse Dept. of Computer Science by Title

  • Hardy, David Joseph (2006)
    This thesis provides the most thorough investigation to date of the multilevel summation method and its use for computing electrostatic interactions. The mathematical and algorithmic details are presented along with a ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Hardy, David Joseph (2006-05)
    The multilevel summation method computes an approximation to the pairwise electrostatic interaction potential and respective forces. The scalar potential is smoothly split into a short-range part computed exactly and a ...

    application/pdf

    application/pdfPDF (1MB)
  • Tan, See-Mong (1999)
    An implementation in the network subsystem of the uChoices object-oriented operating system, as well as an implementation within the x-Sim protocol simulator, shows that a properly designed networking architecture effectively ...

    application/pdf

    application/pdfPDF (9MB)Restricted to U of Illinois
  • Qiao, Lintian (1998)
    In particular, we have designed and implemented the Encryption Algorithm, which utilizes the statistical behavior of MPEG compressed video. The statistical analysis of MPEG compressed video streams shows that the plain-text ...

    application/pdf

    application/pdfPDF (3MB)Restricted to U of Illinois
  • Dave, Mihika (2018-04-25)
    Over the past few years, there has been a lot of progress being made in machine translation through deep learning networks. But there is relatively lesser progress made in using images to catalyze the translation tasks. ...

    application/pdf

    application/pdfPDF (11MB)Restricted Access
  • Borges, Jose A. (1990)
    Successful visual programming languages are all specialized, and general-purpose visual programming languages are unsuccessful. One of the reasons is that visual programming languages are usually based on a single programming ...

    application/pdf

    application/pdfPDF (6MB)Restricted to U of Illinois
  • Zhang, Charles C.; Winslett, Marianne (2008-07)
    Automated trust negotiation (ATN) is a promising approach to establishing trust between two entities without any prior knowledge of each other. However, real-world authorization processes often involve online input from ...

    application/pdf

    application/pdfPDF (186kB)
  • Zhang, Charles C.; Winslett, Marianne (2008-07)
    Automated trust negotiation (ATN) is a promising approach to establishing trust between two entities without any prior knowledge of each other. However, real-world authorization processes often involve online input from ...

    application/pdf

    application/pdfPDF (186kB)
  • Veneris, Andreas Georgios (1998)
    Our experimental results show that our algorithms have good error resolution and run-time performance as they are able to rectify designs with one, two and three errors within minutes of CPU time. In addition, our experiments ...

    application/pdf

    application/pdfPDF (5MB)Restricted to U of Illinois
  • Cha, Charles Wei-Yuan (1974)

    application/pdf

    application/pdfPDF (3MB)Restricted to U of Illinois
  • Alebiosu, Oreoluwa (2017-04-26)
    Machine Learning (ML) software, used to implement an ML algorithm, is widely used in many application domains such as financial, business, and engineering domains. Faults in ML software can cause substantial losses in these ...

    application/pdf

    application/pdfPDF (452kB)
  • Alebiosu, Oreoluwa; Srisakaokul, Siwakorn; Astorga, Angello; Xie, Tao (2016-10-10)
    Machine learning (ML) software, used to implement an ML algorithm, is widely used in many application domains such as financial, business, and engineering domains. Faults in ML software can cause substantial losses in these ...

    application/pdf

    application/pdfPDF (184kB)
  • Hsu, Tsun-yuk (1992)
    The performance evaluation of multiprocessor interconnects cannot be divorced from issues of traffic modeling and implementational constraints. In this dissertation, we examine these issues and present new perspectives of ...

    application/pdf

    application/pdfPDF (7MB)Restricted to U of Illinois
  • Davis, Edward Willmore, Jr. (1972)

    application/pdf

    application/pdfPDF (6MB)Restricted to U of Illinois
  • Berry, Michael Waitsel (1991)
    In this thesis, we develop four numerical methods for computing the singular value decomposition (SVD) of large sparse matrices on a multiprocessor architecture. We particularly consider the SVD of unstructured sparse ...

    application/pdf

    application/pdfPDF (5MB)Restricted to U of Illinois
  • Mel, Bartlett W. (1989)
    Many aspects of intelligent animal behavior require an understanding of the complex spatial relationships between the body and its parts and the coordinate systems of the external world. This thesis deals specifically with ...

    application/pdf

    application/pdfPDF (7MB)Restricted to U of Illinois
  • Tkach, Nadia N. (2011-08-25)
    Computer system performance depends on the efficiency and precision of all of its components. When it comes to software, the primary goal is to ensure the most effective use of the hardware resources while maintaining the ...

    application/pdf

    application/pdfPDF (1MB)
  • Sengul, Cigdem; Kravets, Robin (2006-10)
    Energy management remains a critical problem in ad hoc networks since battery technology cannot keep up with rising expectations in wireless communications. Current approaches to energy conservation focus on reducing the ...

    application/pdf

    application/pdfPDF (155kB)
  • Yu, Bin (2006-09)
    Recent years witnessed the emergence of more .multi-stream. Multimedia applications, such as multi-site distributed video conferencing, multi-perspective IPTV, and virtual touring of 3D digital worlds from multiple view ...

    application/pdf

    application/pdfPDF (2MB)
  • Yu, Bin (2006)
    We have built a lecture recording and broadcasting system on top of the ConferenceXP platform to evaluate our solution. Results from both simulation experiments and user study have confirmed the functional correctness and ...

    application/pdf

    application/pdfPDF (6MB)Restricted to U of Illinois