Browse Dept. of Computer Science by Title

  • Yee, Alexander; Kondo, Shigeru (2011-11-11)
    Hypergeometric series are powerful mathematical tools with many usages. Many mathematical functions, such as trigonometric functions, can be partly or entirely expressed in terms of them. In most cases this allows efficient ...

    application/pdf

    application/pdfPDF (2MB)
  • Meseguer, José (Elsevier, 2012-06-29)
    Rewriting logic is a simple computational logic that can naturally express both concurrent computation and logical deduction with great generality. This paper provides a gentle, intuitive introduction to its main ...

    application/pdf

    application/pdfPDF (745kB)
  • Lau, JohnMark (2014-01-16)
    This thesis proposes a robust method of creating a 3D digital model of an object through stereoscopic reconstruction. There are existing methods and tools for achieving this, but they tend to only perform well under favorable ...

    application/pdf

    application/pdfPDF (14MB)
  • Rothganger, Fredrick H. (2004)
    *This dissertation is a compound document (contains both a paper copy and a CD as part of the dissertation). The CD requires the following system requirements: Windows MediaPlayer or RealPlayer.

    application/pdf

    application/pdfPDF (16MB)Restricted to U of Illinois
  • Rothganger, Fredrick H. (2004-11)
    This thesis introduces a novel representation for three-dimensional (3D) objects in terms of local affine-invariant descriptors of their appearance and the spatial relationships between the corresponding affine regions. ...

    application/pdf

    application/pdfPDF (3MB)
  • Maitre, Matthieu; Guillemot, Christine; Morin, Luce (IEEE, 2006-10)
    The compression efficiency of Distributed Video-Coding (DVC) suffers from the necessity of transmitting a large number of key-frames which are intra-coded. This paper describes a new 3D model-basedDVC approach which reduces ...

    application/pdf

    application/pdfPDF (385kB)
  • Vu, Long; Do, Quang; Nahrstedt, Klara (2011-03-31)
    In this paper, we first characterize the fine-grained encounter pattern among mobile users found in a large-scale Bluetooth trace collected by 123 participants at the University of Illinois campus from March to August 2010. ...

    application/pdf

    application/pdfPDF (130kB)
  • Arefin, Md Ahsan; Huang, Zixia; Nahrstedt, Klara; Agarwal, Pooja (IEEE, 2012)
    3D Tele-immersive systems create real-time multi-stream and multi-view 3D collaborative contents from multiple sites to allow interactive shared activities in virtual environments. Applications of 3DTI include online sports, ...

    application/pdf

    application/pdfPDF (3MB)
  • Healey, Steven Thomas (1987)
    This thesis describes a module planner for decomposing arbitrary functional specifications of any complexity into abstract cells for custom-VLSI module generation. A graph representing random logic is partitioned and the ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Finnicum, Murph (2013-08-22)
    As general purpose robots begin to find their way into the household and workplace, there will be a demand for software to run on these robots. My research group forsees the proliferation of robot apps that use a common ...

    application/pdf

    application/pdfPDF (2MB)
  • Hoberock, Jared (2008)
    This dissertation investigates novel methods of accelerating the central computations of physically-based light transport algorithms. We present novel mappings of the crucial primitive operations of ray tracing and shading ...

    application/pdf

    application/pdfPDF (2MB)Restricted to U of Illinois
  • Sampemane, Geetanjali (2005)
    We evaluate our model on the criteria of expressiveness, performance and usability. The model is sufficiently expressive for applications used in our Active Space. The performance overhead of our access control is demonstrated ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Sampemane, Geetanjali (2005-08)
    Recent advances in embedded computing and communications technology have facilitated the development of intelligent environments, enabling exciting new applications, but also creating new challenges for security. The large ...

    application/pdf

    application/pdfPDF (816kB)
  • Jones, Vicki Ellen (1997)
    This thesis shows how to obtain efficient, fine-grained (object-level) control over user access to ODB data. We present a target access control model for ODB applications and delineate the trust assumptions required for ...

    application/pdf

    application/pdfPDF (6MB)Restricted to U of Illinois
  • Chen, Huei-Huang (1984)
    In evaluating a query using a network database, the links need to either be followed or be saved. Most of the previous approaches follow the links in evaluating a query using a network database. Actually, it is not always ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Farivar, Reza; Venkataraman, Shivaram; Li, Yanen; Chan, Ellick M.; Verma, Abhishek; Campbell, Roy H. (2011-05-03)
    Advent of next generation gene sequencing machines has led to computationally intensive alignment problems that can take many hours on a modern computer. Considering the fast increasing rate of introduction of new short ...

    application/pdf

    application/pdfPDF (878kB)
  • Yang, Yaling; Kravets, Robin (2005-01)
    In this paper, we propose a new protocol, named DDA (Distributed Delay Allocation), which provides average delay guarantees to real-time multimedia applications in wireless ad hoc networks. By adapting the contention window ...

    application/pdf

    application/pdfPDF (234kB)
  • Zheng, Gengbin (2005)
    We further motivate the need for next generation load balancing strategies for petaflops class machines. We explore a novel design of a scalable hierarchical load balancing scheme, which incorporates an explicit memory ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Zheng, Gengbin (2005-12)
    Parallel machines with an extremely large number of processors (at least tens of thousands processors) are now in operation. For example, the IBM BlueGene/L machine with 128K processors is currently being deployed. It is ...

    application/pdf

    application/pdfPDF (3MB)
  • Gaonkar, Shravan; Kravets, Robin H.; Magalhaes, Luiz (2004-05)
    The stability of the Internet depends on the presence of well-behaved flows. While TCP forms the majority of the traffic over the Internet, the Internet user community is also dedicated to supporting mobile devices over ...

    application/pdf

    application/pdfPDF (332kB)