Browse Dissertations and Theses - Computer Science by Title

  • Duffy, Eric (2013-08-22)
    The past two decades in the United States have ushered in an era of increasing ubiquity of digitized healthcare as the speed and sophistication of technology follows an ever-growing trend. Electronic health records (EHRs) are ...

    application/pdf

    application/pdfPDF (1MB)
  • Rajagopalan, Balasubramanian (1991)
    Reliability is an important requirement in network communication. Many distributed applications rely on exchanging information reliably in the presence of host crashes and network failures. In this thesis, our concern is ...

    application/pdf

    application/pdfPDF (7MB)Restricted to U of Illinois
  • Gainaru, Ana (2015-07-15)
    A increasingly larger percentage of computing capacity in today's large high-performance computing systems is wasted due to failures and recoveries. Moreover, it is expected that high performance computing will reach ...

    application/pdf

    application/pdfPDF (5MB)
  • Seo, Eun Soo (2012-09-18)
    Failures in computing systems are unavoidable. Therefore, it is important to detect and diagnose failures early to improve the reliability of systems. In this dissertation, new approaches on root-cause diagnosis for two ...

    application/pdf

    application/pdfPDF (6MB)
  • Fox, Kyle J. (2014-01-16)
    We describe several results on combinatorial optimization problems for graphs where the input comes with an embedding on an orientable surface of small genus. While the specific techniques used differ between problems, all ...

    application/pdf

    application/pdfPDF (3MB)
  • application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Yershov, Dmytro (2014-01-16)
    Optimization of high-level autonomous tasks requires solving the optimal motion planning problem for a mobile robot. For example, to reach the desired destination on time, a self-driving car must quickly navigate streets ...

    application/pdf

    application/pdfPDF (3MB)
  • Sadeghi, Mohammad Amin (2015-12-04)
    The ultimate goal of computer vision is to understand images. We describe methods to understand images at two levels. One is at the level of description of images which we produce using sentences. These sentences talk ...

    application/pdf

    application/pdfPDF (18MB)
  • Wang, Wei (2005)
    Polarizable force fields are considered to be the single most significant development in the next-generation force fields used in biomolecular simulations. The self-consistent computation of induced atomic dipoles in a ...

    application/pdf

    application/pdfPDF (3MB)Restricted to U of Illinois
  • Mayse, William Clark (1992)
    The basic technique of scale-space filtering has been modified to render it suitable for detecting instances of short-duration "patterns" in one-dimensional waveform data. Scale-space filtering involves convolving ...

    application/pdf

    application/pdfPDF (5MB)Restricted to U of Illinois
  • Yee, Alexander (2013-05-24)
    FFT implementations today generally fall into two categories: Library generators (such as FFTW and Spiral) and specialized FFTs (such as prime95). Specialized FFTs have the obvious limitation of being specialized. However ...

    application/pdf

    application/pdfPDF (938kB)
  • Hasan, Nany (1990)
    Reconfigurable chips can be used to enhance the yield of chip production. These chips contain redundant elements that can be used to replace the defective elements. The fault covering problem is to assign the redundant ...

    application/pdf

    application/pdfPDF (3MB)Restricted to U of Illinois
  • Shih, Hsi-Ching (1986)
    Fault collapsing, test generation, and fault simulation were traditionally developed at the gate-level based on the stuck-at fault model. However, with the advent of VLSI MOS technology, this fault model is not applicable. ...

    application/pdf

    application/pdfPDF (3MB)Restricted to U of Illinois
  • Padmanabhan, Krishnan (1984)
    A general class of fault-tolerant multistage interconnection networks is introduced, wherein fault tolerance is achieved by providing non-unique paths between each input and each output. The topology of the multiple paths ...

    application/pdf

    application/pdfPDF (7MB)Restricted to U of Illinois
  • Chakravorty, Sayantan (2008)
    This thesis presents research aimed at developing a fault tolerant protocol that is relevant in the context of parallel computing and provides fast restarts. We propose to combine the ideas of message logging and object ...

    application/pdf

    application/pdfPDF (3MB)Restricted to U of Illinois
  • Tzeng, Nian-Feng (1986)
    Interconnection networks have long been recognized as one of the key issues in designing a multiprocessor. A new scheme to provide multistage interconnection networks with fault-tolerance is introduced. Multiple paths ...

    application/pdf

    application/pdfPDF (5MB)Restricted to U of Illinois
  • Liestman, Arthur Lee (1981)
    Incorporating fault-tolerance into a computer system involves redundancy and therefore increases the system's cost. An investigation into this cost is initiated by considering the application of fault-tolerance to two ...

    application/pdf

    application/pdfPDF (3MB)Restricted to U of Illinois
  • Matheus, Christopher John (1990)
    While similarity-based learning (SBL) methods can be effective for acquiring concept descriptions from labeled examples, their success largely depends upon the quality of the features used to describe the examples. When a ...

    application/pdf

    application/pdfPDF (7MB)Restricted to U of Illinois
  • Wu, Qing (2007)
    Finally, we propose to apply multilinear models to wavelet domain to reduce overhead. High-frequency wavelet sub-bands are subdivided into small blocks most of which get pruned. The blocks are usually correlated especially ...

    application/pdf

    application/pdfPDF (3MB)Restricted to U of Illinois
  • Hayes, Thomas (2014-05-30)
    In scientific infrastructures researchers accessing computing and other resources (e.g., instruments, data) across institutional boundaries rely on federated identity management systems. Multiple competing technologies are ...

    application/pdf

    application/pdfPDF (229kB)