Browse Dissertations and Theses - Computer Science by Title

  • Gu, Randy S. (2011-01-14)
    The growing dependence of society on enormous quantities of information stored electronically has led to a corresponding rise in errors in this information. The stored data can be critically important, necessitating new ...

    application/pdf

    application/pdfPDF (1Mb)
  • Gu, Siyu (2014-05-30)
    This thesis complements the large body of social sensing literature by developing means for augmenting sensing data with inference results that "fill-in" missing pieces. Unlike trend-extrapolation methods, we focus on ...

    application/pdf

    application/pdfPDF (1Mb)Restricted to U of Illinois
  • Dalton, Steven (2015-01-21)
    Algebraic multigrid methods for large, sparse linear systems are central to many computational simulations. Parallel algorithms for such solvers are generally decomposed into coarse-grain tasks suitable for distributed ...

    application/pdf

    application/pdfPDF (6Mb)
  • Brodman, James C. (2011-05-25)
    Exploiting parallelism in modern machines increases the di culty of developing applications. Thus, new abstractions are needed that facilitate parallel programming and at the same time allow the programmer to control ...

    application/pdf

    application/pdfPDF (9Mb)
  • Mehrotra, Sharad (1996)
    Despite rapid increases in CPU performance, the primary obstacles to achieving higher performance in contemporary processor organizations remain control and data hazards. Primary data cache misses are responsible for the ...

    application/pdf

    application/pdfPDF (7Mb)Restricted to U of Illinois
  • Yamada, Yoji (1995)
    Numerical applications frequently contain nested loop structures that process large arrays of data. The execution of these loop structures often produces memory preference patterns that poorly utilize data caches. Limited ...

    application/pdf

    application/pdfPDF (4Mb)Restricted to U of Illinois
  • Song, Xiaohui (1992)
    This thesis studies the performance of concurrency control algorithms in maintaining temporal consistency of data in hard real-time systems. In our model, a hard real-time system consists of periodic tasks which are either ...

    application/pdf

    application/pdfPDF (7Mb)Restricted to U of Illinois
  • Chu, Sheauyin Iris (1995)
    This research addresses the problems in obtaining efficient database support with good functionality for electronic CAD applications. We believe that performance is a deciding factor in the acceptance of DBMSes as a ...

    application/pdf

    application/pdfPDF (4Mb)Restricted to U of Illinois
  • Kim, Yong-Bin (2010-07-13)
    Top-down proteomics is a revolutionary application for the identification and characterization of protein, known to be one of the most complicated and challenging issues in biology. In top-down proteomics, the quality ...

    application/pdf

    application/pdfPDF (3Mb)
  • Kim, Yong-Bin (2010-08-20)
    Top-down proteomics is a revolutionary application for the identification and characterization of protein, known to be one of the most complicated and challenging issues in biology. In top-down proteomics, the quality ...

    application/pdf

    application/pdfPDF (3Mb)
  • Youngquist, Anne M. (2011-05-25)
    Abstract Stigma in America creates heated controversy and is associated not only with people within defined social groups, but with a variety of products which are used daily. Many products (e.g. assistive walking devices, ...

    application/pdf

    application/pdfPDF (29Mb)
  • Gioachin, Filippo (2011-01-14)
    Debugging is a fundamental part of software development, and one of the largest in terms of time spent. When developing parallel applications, debugging becomes much harder due to a whole new set of problems not present ...

    application/pdf

    application/pdfPDF (3Mb)
  • Lee, Yuh-Jeng (1988)
    This dissertation addresses the use of executable specifications in debugging logic programs which are renowned for their clean syntax and well-understood semantics, and for the feature that one can use a single language ...

    application/pdf

    application/pdfPDF (5Mb)Restricted to U of Illinois
  • Khirwadkar, Tanmay S. (2011-05-25)
    As Internet has become ubiquitous, the risk posed by network attacks has greatly increased. Network attacks have been used to achieve a wide gamut of objectives ranging from overloading a website to accessing classified ...

    application/pdf

    application/pdfPDF (736Kb)
  • Rosenberger, Harald (1990)
    Degenerate geometric data (e.g., three points on a line, four points on a circle) is known to create all sorts of special cases, some easy and some complicated, that have to be considered in implementations of geometric ...

    application/pdf

    application/pdfPDF (4Mb)Restricted to U of Illinois
  • Jayachandran, Praveen (2011-01-14)
    This thesis develops a new reduction-based analysis methodology for studying the worst-case end-to-end delay and schedulability of real-time jobs in distributed systems. The main result is a simple delay composition rule, ...

    application/pdf

    application/pdfPDF (2Mb)
  • Bortner, Dustin P. (2010-05-19)
    Information networks, such as biological or social networks, contain groups of related entities, which can be identified by clustering. Density-based clustering (DBC) differs from vertex-partitioning methods in that some ...

    application/pdf

    application/pdfPDF (677Kb)
  • Bortner, Dustin P. (2010-05)
    Information networks, such as biological or social networks, contain groups of related entities, which can be identified by clustering. Density-based clustering (DBC) differs from vertex-partitioning methods in that some ...

    application/pdf

    application/pdfPDF (677Kb)
  • Midkiff, Samuel Pratt (1992)
    The optimization of programs with explicit--i.e. user specified--parallelism requires the computation of the data dependence relation if optimizations performed by the compiler are to preserve sequential consistency. Shasha ...

    application/pdf

    application/pdfPDF (6Mb)Restricted to U of Illinois
  • Wang, Jiqin (2014-09-16)
    The depth map of a video is a very important piece of information. Recovering the depth map of a video expands a 2D video into its 3rd dimension, and creates new possibilities, such as, object insertion, conversion to 3D, ...

    application/pdf

    application/pdfPDF (36Mb)