# Browse Dissertations and Theses - Computer Science by Title

• (1980)

application/pdf

PDF (4Mb)
• (2012-09-18)
The extensive form game is a formalism used to model environments where agents make sequences of decisions, possibly in the face of uncertainty about the state of the world and the decisions made by other agents. Such ...

application/pdf

PDF (702Kb)
• (1992)
Belief revision semantics appear promising as a definition for the meaning of updates to logical knowledge bases. Numerous model-based belief revision semantics have been proposed in the literature in recent years. It is ...

application/pdf

PDF (6Mb)
• (2011-05-25)
In multi-agent systems, the knowledge of agents about other agents’ knowledge often plays a pivotal role in their decisions. In many applications, this knowledge involves uncertainty. This uncertainty may be about the ...

application/pdf

PDF (2Mb)
• (2011-05-25)
As we move to large manycores, the hardware-based global checkpointing schemes that have been proposed for small shared-memory machines do not scale. Scalability barriers include global operations, work lost to global ...

application/pdf

PDF (284Kb)
• (2012-06-27)
In this thesis I introduce visual phrases, complex visual composites like a person riding a horse''. Visual phrases often display significantly reduced visual complexity compared to their component objects, because the ...

application/pdf

PDF (12Mb)
• (2011-05-25)
The growing availability and popularity of opinion rich resources on the online web resources, such as review sites and personal blogs, has made it convenient to find out about the opinions and experiences of layman people. ...

application/pdf

PDF (722Kb)
• (1993)
Advances in VLSI (Very Large Scale Integration) allow increasingly larger and more complex systems to be fabricated on a single chip or wafer. As the number of elements in these systems increases, the problem of tolerating ...

application/pdf

PDF (6Mb)
• (2015-01-21)
Record and deterministic Replay (RnR) is a primitive with many proposed applications in computer systems, including debugging, security and fault tolerance. RnR is typically a two phase process: in the first phase (record) ...

application/pdf

PDF (3Mb)
• (1987)
A perspective view of a slanted textured surface shows systematic changes in the density, area and aspect-ratio of texture elements. These apparent changes in texture element properties can be analyzed to recover information ...

application/pdf

PDF (9Mb)
• (1975)

application/pdf

PDF (4Mb)
• (1989)
Prefetching items into cache can either increase or decrease memory access time, depending on how well the prefetching algorithm matches the memory reference pattern. A popular prefetching algorithm is one block lookahead ...

application/pdf

PDF (5Mb)
• (1992)
Memory access time is a key factor limiting the performance of large-scale, shared-memory multiprocessors. In such systems, limited bandwidth in the interconnection between the processors and the memories, coupled with ...

application/pdf

PDF (5Mb)
• (2010-08-20)
Bounded-exhaustive testing is an automated testing methodology that checks the code under test for all inputs within given bounds: first the user describes a set of test inputs and provides test oracles that can check test ...

application/pdf

PDF (547Kb)
• (2012-05-22)
The number of end-users who write spreadsheet programs is at least an order of magnitude larger than the number of trained programmers who write professional software. We studied a corpus of 3691 spreadsheets and we ...

application/pdf

PDF (311Kb)
• (1992)
This thesis defines a set of program restructuring operations (refactorings) that support the design, evolution and reuse of object-oriented application frameworks.

application/pdf

PDF (8Mb)
• (2011-08-25)
Computing is everywhere and our society depends on it. Increased performance over the last decades has allowed us to solve ever more interesting problems. We long relied on frequency scaling and instruction-level parallelism ...

application/pdf

PDF (620Kb)
• (2013-08-22)
Designers move forward by looking back at past experiences. Reflection is a central activity of creative design which allows designers to develop new insight into their designs, generate alternative solutions, and reframe ...

application/pdf

PDF (4Mb)
• (2009-10-01)
Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control list. RDBAC aids the management ...

application/pdf

PDF (881Kb)
• (2012-09-18)
As manycores use dynamic energy ever more efficiently, static power consumption becomes a major concern. In particular, in a large manycore running at a low voltage, leakage in on-chip memory modules contributes substantially ...

application/pdf

PDF (355Kb)