Browse Dept. of Computer Science by Issue

  • Fang, Hui (2006-05)
    Both the measurement and simulation of unsteady flow yield huge datasets of time-varying volumetric vector fields. Flow dynamics researchers face the very difficult task of finding, extracting and analyzing important flow ...

    application/pdf

    application/pdfPDF (31MB)
  • Vardhan, Abhay (2006-02)
    Making high quality and reliable software systems remains a difficult problem. One approach to address this problem is automated verification which attempts to demonstrate algorithmically that a software system meets its ...

    application/pdf

    application/pdfPDF (872kB)
  • Qin, Feng (2006-08)
    As hardware performance and dependability have dramatically improved in the past few decades, the software dependability issues are becoming increasingly important. Unfortunately, many studies show that software bugs, which ...

    application/pdf

    application/pdfPDF (679kB)
  • Thompson, Nathanael A.; Luo, Haiyun (2006-07)
    802.11 networks have spread rapidly in residential areas, and it is common for neighbors to receive the signals from each other's home wireless routers. Residents can leverage such an opportunity to improve their Internet ...

    application/pdf

    application/pdfPDF (264kB)
  • Conner, William G.; Nahrstedt, Klara (2006-09)
    Providing an effective accounting scheme for decentralized peer-to-peer systems is difficult without relying on a central server or peers with special trusted status. In this paper, we present Probabilistic Quorum-based ...

    application/pdf

    application/pdfPDF (54kB)
  • Chen, Chun-cheng; Seo, Eunsoo; Luo, Haiyun; Vaidya, Nitin H. (2006-06)
    The majority of existing wireless rate controls are based on the implicit assumption that frames are corrupted due to the random, arbitrary environmental and thermal noises. They generally reduce the channel rate on frame ...

    application/pdf

    application/pdfPDF (659kB)
  • Zilles, Craig; Rajwar, Ravi (2007-03)
    Transactional Memory (TM) has been proposed as an alternative implementation of mutual exclusion that avoids many of the drawbacks of locks (e.g., deadlock, reliance on the programmer to associate shared data with locks, ...

    application/pdf

    application/pdfPDF (204kB)
  • Jeon, Won J.; Campbell, Roy H. (2007-12)
    Virtual worlds provide 3D-immersive experiences to users and some of them already have already launched commercial service to users. As computing environment becomes more heterogeneous, more mobile users are anticipated ...

    application/pdf

    application/pdfPDF (451kB)
  • Olson, Lars E.; Rosulek, Michael J.; Winslett, Marianne (2007-08)
    Need-to-know is a fundamental security concept: a party should not learn information that is irrelevant to its mission. In this paper we show that during a trust negotiation in which parties show their credentials to one ...

    application/pdf

    application/pdfPDF (345kB)
  • Clark, Robert (2008-10)
    We present a novel solution to streaming XPath query evaluation, capable of supporting forward and reverse axes queries. We show a conversion of an XPath query to a Visibly Pushdown Automaton that preserves the semantics ...

    application/pdf

    application/pdfPDF (129kB)
  • Small, Kevin M. (2009-10-02)
    Statistical machine learning has become an integral technology for solving many informatics applications. In particular, corpus-based statistical techniques have emerged as the dominant paradigm for core natural language ...

    application/pdf

    application/pdfPDF (2MB)
  • Ahmadi, Hossein; Abdelzaher, Tarek F. (2009-07-30)
    In this paper, we propose a new transport protocol for data collection in sensor networks that monitor physical phenomena. In a network with variable channel condition, this protocol adapts transmission reliability based ...

    application/pdf

    application/pdfPDF (546kB)
  • Flider, Mark J. (2004-01)
    We evaluated four techniques for controlling focus+context screens. We compared an egocentric versus exocentric View mixed with whether the display on the focus screen moves in the same (paper mapping) versus opposite ...

    application/pdf

    application/pdfPDF (1MB)
  • Chen, Ying-Ping (2004-04)
    There are two primary objectives of this dissertation. The first goal is to identify certain limits of genetic algorithms that use only fitness for learning genetic linkage. Both an explanatory theory and experimental ...

    application/pdf

    application/pdfPDF (2MB)
  • Lu, Shan (2008-12)
    Software is pervasive in our daily lives. Unfortunately, software bugs can severely affect the dependability and security of software systems. Among all types of software bugs, the concurrency bug is one of the most ...

    application/pdf

    application/pdfPDF (1MB)
  • Yih, Wen-tau (2005-05)
    Information extraction is a process that extracts limited semantic concepts from text documents and presents them in an organized way. Unlike several other natural language tasks, information extraction has a direct impact ...

    application/pdf

    application/pdfPDF (495kB)
  • Xue, Yuan; Cui, Yi; Nahrstedt, Klara (2005-06)
    Energy efficient routing is a critical problem in multihop wireless networks due to the severe power constraint of wireless nodes. Despite its importance and many research efforts towards it, a distributed routing algorithm ...

    application/pdf

    application/pdfPDF (159kB)
  • Zelinka, Stephen David (2005-05)
    Modelling by example has arisen as a powerful paradigm for reducing the artistic skill required for computer graphics. Instead of relying on the user's own modelling skills, a system that models by example allows users to ...

    application/pdf

    application/pdfPDF (79MB)
  • Adamczyk, Piotr D.; Busbey, Christopher W.; Bailey, Brian P. (2005-04)
    The use of continuous, physiological measures such as pupil size is becoming increasingly important in user interface design, attention management, and affective computing. While this data is best explored in context of ...

    application/pdf

    application/pdfPDF (344kB)
  • Meseguer, José; Sharykin, Raman (2005-10)
    In practice, many stochastic hybrid systems are not autonomous: they are objects that communicate with other objects by exchanging messages through an asynchronous medium such as a network. Issues such as: how to compositionally ...

    application/pdf

    application/pdfPDF (315kB)