Browse Dissertations and Theses - Computer Science by Title

  • Sukumar, Pritam (2013-08-22)
    This thesis presents an investigation of the Collection of Parts Model for object categorization. Multiclass categorization is performed using the Collections of Parts model. Results using Support Vector Machines, L1 ...

    application/pdf

    application/pdfPDF (934kB)
  • Dai, Qieyun (2017-07-11)
    Object localization algorithms aim at finding out what objects exist in an image and where each object is. Object localization is fundamental to many computer vision problems. Simply knowing what is in the image is not ...

    application/pdf

    application/pdfPDF (93MB)
  • Zelinka, Stephen David (2005)
    Modelling by example has arisen as a powerful paradigm for reducing the artistic skill required for computer graphics. Instead of relying on the user's own modelling skills, a system that models by example allows users to ...

    application/pdf

    application/pdfPDF (7MB)Restricted to U of Illinois
  • Pham, Cuong K. (2010-08-20)
    As the web evolves, increasing quantities of structured information is embedded in web pages in disparate formats. For example, a digital camera’s description may include its price and megapixels whereas a professor’s ...

    application/pdf

    application/pdfPDF (567kB)
  • Xiao, Lun (1995)
    This thesis defines an extensible transaction model and shows that an extensible and customizable transaction system based on the model can be built using an object-oriented framework.

    application/pdf

    application/pdfPDF (5MB)Restricted to U of Illinois
  • Madany, Peter William (1992)
    File systems are essential components of general purpose operating systems and are highly visible to computer users. To satisfy the growing diversity of persistent storage needs presented by application and system programs, ...

    application/pdf

    application/pdfPDF (7MB)Restricted to U of Illinois
  • Dykstra, David Wayne (1992)
    Protection is the mechanism employed by operating systems to control access to resources. Object encapsulation in object-based systems requires control of access to every object. The incremental definition of objects through ...

    application/pdf

    application/pdfPDF (6MB)Restricted to U of Illinois
  • Russo, Vincent Frank (1991)
    This thesis describes an experiment to use object-oriented programming and design techniques to design and implement an operating system. This experiment uses object-oriented techniques to address problems of operating ...

    application/pdf

    application/pdfPDF (8MB)Restricted to U of Illinois
  • Sum, Robert N., Jr. (1991)
    The large size and inherent complexity of modern software products have made it difficult to use strictly manual techniques for the management of software production. In this thesis, object-oriented techniques are used to ...

    application/pdf

    application/pdfPDF (5MB)Restricted to U of Illinois
  • Gao, Zhenhuan (2015-12-09)
    3D Tele-immersion (3DTI) technology allows full-body, multi-modal content delivery among geographically dispersed users. In 3DTI, user’s 3D model will be captured by multiple RGB-D (color plus depth) cameras surround- ing ...

    application/pdf

    application/pdfPDF (996kB)
  • Lim, Jongwoo (2005)
    When the lighting and pose variation occurs simultaneously, we do not have a reasonably good clustering algorithm yet. A few candidate algorithms are tested and the result are given in this thesis. Finding an effective ...

    application/pdf

    application/pdfPDF (3MB)Restricted to U of Illinois
  • Maji, Hemanta K. (2012-02-06)
    In cryptographic protocols, honest parties would prefer that their security is assured even in presence of adversarial parties who have unbounded computational power. Information theoretic secure realization of cryptographic ...

    application/pdf

    application/pdfPDF (1MB)
  • Stahl, Fred Alan (1974)

    application/pdf

    application/pdfPDF (3MB)Restricted to U of Illinois
  • Gratch, Jonathan Matthew (1995)
    Domain independent general purpose problem solving techniques are desirable from the standpoints of software engineering and human computer interaction. They employ declarative and modular knowledge representations and ...

    application/pdf

    application/pdfPDF (10MB)Restricted to U of Illinois
  • Wang, Hongwei (2016-12-07)
    In this thesis, we describe a general methodology for enhancing sensing accuracy in cyber-physical systems that involve human domain workflows in noisy physical environment. A novel workflow-aware sensing model is proposed ...

    application/pdf

    application/pdfPDF (1MB)Restricted Access
  • Li, Chien-Wei (2006)
    We built an in-lining based prototype of the memory data-flow analysis system on top of the IMPACT compiler infrastructure. We applied the prototype to analyze the memory data-flow of several MediaBench programs. The ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Wang, Shiguang (2017-04-14)
    For decades, from the invention of Sensor Networks, people envisioned a global sensing platform with millions of sensors deployed globally. The platform has finally become real recently with the advent of multiple online ...

    application/pdf

    application/pdfPDF (6MB)
  • Ling, Shaoshi (2017-07-17)
    In many natural language understanding applications, text processing requires comparing lexical units: words, phrases, name entities and sentences. A significant amount of research has taken place in studying evaluating ...

    application/pdf

    application/pdfPDF (480kB)
  • Su, Hong-Men (1992)
    Interprocessor communication has been one of the major overheads in parallel processing. Although synchronization and data transfer are two related activities associated with interprocessor communication, most previous ...

    application/pdf

    application/pdfPDF (7MB)Restricted to U of Illinois
  • Polychronopoulos, Constantine Demetrios (1986)
    This dissertation discusses several software and hardware aspects of program execution on large-scale, high-performance parallel processor systems. The issues covered are program restructuring, partitioning, scheduling and ...

    application/pdf

    application/pdfPDF (8MB)Restricted to U of Illinois