Browse Dissertations and Theses - Computer Science by Title

  • Gu, Randy S. (2011-01-14)
    The growing dependence of society on enormous quantities of information stored electronically has led to a corresponding rise in errors in this information. The stored data can be critically important, necessitating new ...

    application/pdf

    application/pdfPDF (1MB)
  • Gu, Siyu (2014-05-30)
    This thesis complements the large body of social sensing literature by developing means for augmenting sensing data with inference results that "fill-in" missing pieces. Unlike trend-extrapolation methods, we focus on ...

    application/pdf

    application/pdfPDF (1MB)
  • Yu, Hwan-Jo (2004)
    KDD (Knowledge Discovery and Data mining) has been extensively studied in the last decade as data is continuously increasing in size and complexity. This thesis introduces three practical data mining problems---(1) classifying ...

    application/pdf

    application/pdfPDF (6MB)Restricted to U of Illinois
  • Dalton, Steven (2015-01-21)
    Algebraic multigrid methods for large, sparse linear systems are central to many computational simulations. Parallel algorithms for such solvers are generally decomposed into coarse-grain tasks suitable for distributed ...

    application/pdf

    application/pdfPDF (6MB)
  • Brodman, James C. (2011-05-25)
    Exploiting parallelism in modern machines increases the di culty of developing applications. Thus, new abstractions are needed that facilitate parallel programming and at the same time allow the programmer to control ...

    application/pdf

    application/pdfPDF (9MB)
  • Mehrotra, Sharad (1996)
    Despite rapid increases in CPU performance, the primary obstacles to achieving higher performance in contemporary processor organizations remain control and data hazards. Primary data cache misses are responsible for the ...

    application/pdf

    application/pdfPDF (7MB)Restricted to U of Illinois
  • Yamada, Yoji (1995)
    Numerical applications frequently contain nested loop structures that process large arrays of data. The execution of these loop structures often produces memory preference patterns that poorly utilize data caches. Limited ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Song, Xiaohui (1992)
    This thesis studies the performance of concurrency control algorithms in maintaining temporal consistency of data in hard real-time systems. In our model, a hard real-time system consists of periodic tasks which are either ...

    application/pdf

    application/pdfPDF (7MB)Restricted to U of Illinois
  • Jiao, Xiangmin M. (2001)
    This thesis also considers the interface propagation problem, formulated with an entropy-satisfying Huygens' principle . We introduce the concepts of prevoid sets and critical times of an evolving interface, and develop ...

    application/pdf

    application/pdfPDF (8MB)Restricted to U of Illinois
  • Chen, Wei-Peng (2004)
    In this thesis we propose a comprehensive data-centric information processing and dissemination framework for sensor networks. We consider two main research issues in this thesis: (T1) light-weight coordination mechanisms ...

    application/pdf

    application/pdfPDF (9MB)Restricted to U of Illinois
  • Chu, Sheauyin Iris (1995)
    This research addresses the problems in obtaining efficient database support with good functionality for electronic CAD applications. We believe that performance is a deciding factor in the acceptance of DBMSes as a ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Porkaew, Kriengkrai (2000)
    Increasingly emerging applications require data management systems to support novel access mechanisms over complex data types. This dissertation studies two such access mechanisms---similarity queries and queries over ...

    application/pdf

    application/pdfPDF (6MB)Restricted to U of Illinois
  • Kim, Yong-Bin (2010-08-20)
    Top-down proteomics is a revolutionary application for the identification and characterization of protein, known to be one of the most complicated and challenging issues in biology. In top-down proteomics, the quality ...

    application/pdf

    application/pdfPDF (3MB)
  • Kim, Yong-Bin (2010-07-13)
    Top-down proteomics is a revolutionary application for the identification and characterization of protein, known to be one of the most complicated and challenging issues in biology. In top-down proteomics, the quality ...

    application/pdf

    application/pdfPDF (3MB)
  • Youngquist, Anne M. (2011-05-25)
    Abstract Stigma in America creates heated controversy and is associated not only with people within defined social groups, but with a variety of products which are used daily. Many products (e.g. assistive walking devices, ...

    application/pdf

    application/pdfPDF (29MB)
  • Gioachin, Filippo (2011-01-14)
    Debugging is a fundamental part of software development, and one of the largest in terms of time spent. When developing parallel applications, debugging becomes much harder due to a whole new set of problems not present ...

    application/pdf

    application/pdfPDF (3MB)
  • Giochin, Filippo (2010)
    In this thesis, we explore a new approach based on a tight integration between the debugger and the application's underlying parallel runtime system. The debugger is responsible for interacting with the user and receiving ...

    application/pdf

    application/pdfPDF (2MB)Restricted to U of Illinois
  • Lee, Yuh-Jeng (1988)
    This dissertation addresses the use of executable specifications in debugging logic programs which are renowned for their clean syntax and well-understood semantics, and for the feature that one can use a single language ...

    application/pdf

    application/pdfPDF (5MB)Restricted to U of Illinois
  • Hendrix, Joseph D. (2008)
    Each of these theoretical topics have lead to the development of new libraries and tools. Two of the tools have already been used in external projects including our tree automata library's integration into the ACTAS protocol ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Khirwadkar, Tanmay S. (2011-05-25)
    As Internet has become ubiquitous, the risk posed by network attacks has greatly increased. Network attacks have been used to achieve a wide gamut of objectives ranging from overloading a website to accessing classified ...

    application/pdf

    application/pdfPDF (736kB)