Browse Dept. of Computer Science by Title

  • Sobeih, Ahmed A. (2008-08)
    Verifiation and Validation (V&V) is a critically important phase in the development life cycle of a simulation model. In the context of network simulation, traditional network simulators perform well in using a simulation ...

    application/pdf

    application/pdfPDF (829kB)
  • Sobeih, Ahmed A. (2008-08)
    Verifiation and Validation (V&V) is a critically important phase in the development life cycle of a simulation model. In the context of network simulation, traditional network simulators perform well in using a simulation ...

    application/pdf

    application/pdfPDF (829kB)
  • Sobeih, Ahmed Adel (2008)
    Finally, we present incremental state space exploration (ISSE), a technique that aims to provide a speedup in the state space exploration time of evolving simulation models; i.e., simulation models whose code changes from ...

    application/pdf

    application/pdfPDF (9MB)Restricted to U of Illinois
  • Sobeih, Ahmed A.; d'Amorim, Marcelo; Viswanathan, Mahesh; Marinov, Darko; Hou, Jennifer C. (2007-08)
    Verification and Validation (V&V) is a critically important phase in the development life cycle of a simulation model. In the context of network simulation, traditional network simulators perform well in using a simulation ...

    application/pdf

    application/pdfPDF (298kB)
  • Chen, Zhongbo (2014-09-16)
    Computer Networks are complex and prone to bugs. Most existing tools designed to fix these problems run offline and can only fix the problems after they occur. Those tools often run at the timescale of seconds to hours. ...

    application/pdf

    application/pdfPDF (691kB)
  • Kanevsky, Arkady (1988)
    This thesis concerns several problems concerning vertex connectivity of undirected graphs and presents new bounds and algorithms for these problems.

    application/pdf

    application/pdfPDF (5MB)Restricted to U of Illinois
  • Zilouchian Moghaddam, Roshanak (2009)
    Multiple Display Environments (MDEs) facilitate collaborative activities that involve the use of electronic task artifacts. Supporting interactions and infrastructures have matured in recent years, allowing researchers ...

    application/pdf

    application/pdfPDF (2MB)
  • Yu, Yizhou; Wu, Qing (2004-05)
    Metamorphosis is generally known as the continuous evolution of a source into a target. There is frame-to-frame camera or object motion most of the time when either the source or the target is an image sequence. It would ...

    application/pdf

    application/pdfPDF (258kB)
  • Lee, Kihwal (2006)
    We examined the performance of VEER by comparing the existing real-time embedded systems and the migrated and reorganized version of the same systems. The performance overhead of RT-VMM is about 1.7% if self-contained, or ...

    application/pdf

    application/pdfPDF (3MB)Restricted to U of Illinois
  • Lee, Kihwal (2006-12)
    Increasing demand for more features and bigger roles of software makes software more and more complex. Unfortunately, increase in the logical and organizational complexity of software generally leads to more bugs. Real-time ...

    application/pdf

    application/pdfPDF (468kB)
  • Lee, Adam J.; Winslett, Marianne (2006-02)
    The lack of available identity information in attribute-based trust management systems complicates the design of the audit and incident response systems, anomaly detection algorithms, collusion detection/prevention mechanisms, ...

    application/pdf

    application/pdfPDF (348kB)
  • Erickson, Lawrence (2014-05-30)
    This thesis introduces and examines the chromatic art gallery problem. The chromatic art gallery problem asks for the minimum number of landmark classes required to ensure that every point in an input polygon sees at least ...

    application/pdf

    application/pdfPDF (1MB)
  • Xia, Pengye; Nahrstedt, Klara (2012-08-20)
    3D Tele-Immersion (3DTI) system brings 3D data of people from geographically distributed locations into the same virtual space to enable interaction in 3D space. One main obstacle of designing 3DTI system is to overcome ...

    application/pdf

    application/pdfPDF (502kB)
  • Ahmad, Subutai (1991)
    One of the challenges for models of cognitive phenomena is the development of efficient and flexible interfaces between low level sensory information and high level processes. For visual processing, researchers have long ...

    application/pdf

    application/pdfPDF (5MB)Restricted to U of Illinois
  • Tan, Kar-Han (2003)
    The availability of affordable computational power and graphics rendering capabilities is enabling the creation of realistic imagery that are widely used today in special effects and animation. New forms of visual media ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Hils, Daniel David (1992)
    Today scientists are confronted with the problem of understanding and analyzing large masses of numeric scientific data. One solution to this problem is scientific visualization: converting the numeric data into pictures ...

    application/pdf

    application/pdfPDF (7MB)Restricted to U of Illinois
  • Rogers, Gregory Scott (1990)
    Visual programming techniques have proven successful within limited domains. However, little progress has been made in using graphics to support "real-world" programming. The GRClass system provides a solution by combining ...

    application/pdf

    application/pdfPDF (5MB)Restricted to U of Illinois
  • Gulganjalli Narasimhan, Medhini (2019-04-25)
    Accurately answering a question about a given image requires combining observations with general knowledge. While this is effortless for humans, reasoning with general knowledge remains an algorithmic challenge. To advance ...

    application/pdf

    application/pdfPDF (13MB)
  • Jain, Unnat (2018-07-16)
    Curious questioning or the ability to inquire about surrounding environment or additional context, is an important step towards building agents which go beyond learning from a static knowledge base. The ability to request ...

    application/pdf

    application/pdfPDF (5MB)
  • Lee, Hyun Bin (2017-07-14)
    Privacy-preserving statistical databases are designed to provide information about a population while preventing end-users from learning about an individual. Meanwhile, scholars have shown that a sophisticated adversary ...

    application/pdf

    application/pdfPDF (2MB)