Browse Dept. of Computer Science by Title

  • Li, Zhenmin (2006-12)
    Reliability has become ever important. Unfortunately, software errors continue to be frequent and account for the major causes of system failures. Further, detecting and fixing bugs is one of the most time-consuming and ...

    application/pdf

    application/pdfPDF (1MB)
  • Li, Zhenmin (2006)
    Copy-pasted code is very common in large software, but it is prone to introducing bugs. CP-Miner uses frequent sequence mining to efficiently identify copy-pasted code in large software, and detects copy-paste related bugs. ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Evans, Graham C. (2016-11-17)
    Vectorization is key to performance on modern hardware. Almost all architectures include some form of vector instructions and the size of the instructions has been growing with newer designs. To take advantage of the ...

    application/pdf

    application/pdfPDF (1MB)
  • Balaguer, Federico (2008)
    This dissertation presents an approach to document and build complex framework architectures by extending a framework using another existing framework. The result of the extension development is a Layered Architecture where ...

    application/pdf

    application/pdfPDF (8MB)Restricted to U of Illinois
  • Cai, Deng; He, Xiaofei; Han, Jiawei (2005-09)
    Previous work has demonstrated that the image variations of many objects (human faces in particular) under variable lighting can be effectively modelled by low dimensional linear spaces. The typical methods for learning a ...

    application/pdf

    application/pdfPDF (494kB)
  • Wang, Dong; Amin, Md Tanvir Al; Li, Shen; Kaplan, Lance; Gu, Siyu; Pan, Chenji; Liu, Hengchang; Aggarwal, Charu; Ganti, Raghu K.; Wang, Xinlei; Mohapatra, Prasant; Szymanski,Boleslaw; Le, Hieu; Abdelzaher, Tarek F. (ACM/IEEE-CS, 2014)
    The explosive growth in social network content suggests that the largest "sensor network" yet might be human. Extending the participatory sensing model, this paper explores the prospect of utilizing social networks as ...

    application/pdf

    application/pdfPDF (2MB)
  • Xue, Hui (2013-05-24)
    Modern computer systems are complex. Their complexity leads to security vulnerabilities and software bugs that are hard to fix using existing techniques. One current trend is that nowadays we have more redundant resources ...

    application/pdf

    application/pdfPDF (4MB)
  • Sodhi, Rajinder S. (2011-01-14)
    Tomorrow's display and interaction technology will go beyond standard computer monitors, television and mobile screens and will enable projecting digital content onto any complex physical surface. While devices like the ...

    application/pdf

    application/pdfPDF (6MB)
  • Bronsard, Francois (1995)
    In this thesis we develop the use of term orders as a control paradigm for first-order reasoning. The starting point of our work is Knuth and Bendix's successful completion method for equational reasoning. This method ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Saul, Jared (2015-04-16)
    We present in this thesis a modification to the deformable simplicial complex method that allows it to reconstruct surfaces given only a point cloud extracted from a Wavefront .obj file. By creating a velocity function ...

    application/pdf

    application/pdfPDF (2MB)
  • Sidelnik, Albert; Chamberlain, Bradford L.; Garzaran, Maria J.; Padua, David (2011-04-25)
    It has been widely shown that GPGPU architectures offer large performance gains compared to their traditional CPU counterparts for many applications. The downside to these architectures is that the current programming ...

    application/pdf

    application/pdfPDF (2MB)
  • Young, Peter (2014-01-16)
    Semantic inference is essential to natural language understanding. There are two different traditional approaches to semantic inference. The logic-based approach translates utterances into a formal meaning representation ...

    application/pdf

    application/pdfPDF (3MB)
  • Crepaldi, Riccardo (2014-01-16)
    Current mobile networking support in urban environments is mostly achieved through wide-area cellular systems, resulting in expensive, limited access that must be shared among many users. While cellular access may be ...

    application/pdf

    application/pdfPDF (5MB)
  • Xue, Yuan; Cui, Yi; Nahrstedt, Klara (2006-04)
    Energy efficient routing is a critical problem in multihop wireless networks due to the severe power constraint of wireless nodes. Despite its importance and many research efforts towards it, a distributed routing algorithm ...

    application/pdf

    application/pdfPDF (164kB)
  • Xue, Yuan; Cui, Yi; Nahrstedt, Klara (2005-06)
    Energy efficient routing is a critical problem in multihop wireless networks due to the severe power constraint of wireless nodes. Despite its importance and many research efforts towards it, a distributed routing algorithm ...

    application/pdf

    application/pdfPDF (159kB)
  • Choudhury, Romit Roy (2006-07)
    Wireless multihop networks are gaining popularity in applications such as mesh networks, wireless backbones, and sensor networks. Typically, communication protocols designed for such networks have explicitly or implicitly ...

    application/pdf

    application/pdfPDF (1MB)
  • Choudhury, Romit Roy (2006)
    Wireless multihop networks are gaining popularity in applications such as mesh networks, wireless backbones, and sensor networks. Typically, communication protocols designed for such networks have explicitly or implicitly ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Yeh, Han-Wen (2013-05-24)
    The World Wide Web is abundant with discussion forums about all sorts of topics, and it is becoming increasingly difficult for people to find quality forums about a certain topic in which to join. While many modern search ...

    application/pdf

    application/pdfPDF (681kB)
  • Cho, Hyun Duk (2012-09-18)
    Attribute-value pairs, or NVP is defined as extracting words expressing characteristics of entity and associating the said words with word or phrases that best describe the attributes. Applications for NVP arise in various ...

    application/pdf

    application/pdfPDF (2MB)
  • Tia, Too-Seng (1995)
    A real-time system typically has a mixture of periodic and aperiodic workload. Requests in each periodic task have regular arrival times and hard deadlines. Aperiodic requests, on the other hand, have random arrival times ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois