Browse Dissertations and Theses - Computer Science by Title

  • Kutsch, James Albert, Jr. (1976)

    application/pdf

    application/pdfPDF (3Mb)Restricted to U of Illinois
  • Xiong, Weiwei (2013-08-22)
    Synchronization takes an important role in multi-threaded programs. Due to the non-deterministic nature of concurrency, it is always difficult for developers to make synchronizations correct. As a consequence, concurrent ...

    application/pdf

    application/pdfPDF (1Mb)
  • Lo, Virginia Mary (1983)
    This thesis addresses the problem of task assignment in distributed systems. A distributed system is defined as any configuration of two or more processors, each with private memory, in which computations utilize the ...

    application/pdf

    application/pdfPDF (4Mb)Restricted to U of Illinois
  • Horst, Robert Whiting (1991)
    This thesis introduces a parallel computer architecture known as task flow. Simple replicated cells contain both memory packets and processing logic. Each memory packet contains a data field, the next instruction, and a ...

    application/pdf

    application/pdfPDF (7Mb)Restricted to U of Illinois
  • Park, Chaeryung (1996)
    High-level synthesis becomes increasingly important in the area of VLSI CAD. This thesis addresses scheduling and allocation in high-level synthesis. Specifically, we study the problem of register allocation in the presence ...

    application/pdf

    application/pdfPDF (3Mb)Restricted to U of Illinois
  • Tan, Shin Hwei (2012-05-22)
    Code comments are important artifacts in software. Javadoc comments are widely used in Java for API specifications. API developers write Javadoc comments, and API users often read these comments to understand the API they ...

    application/pdf

    application/pdfPDF (170Kb)
  • Peiper, Chad E. (2009-01)
    Networked Tablet PCs have great potential for improving the learning environment in classrooms. By increasing the capacity for communication among participants, they can raise student engagement in, and teacher awareness ...

    application/pdf

    application/pdfPDF (23Mb)
  • Gupta, Abhishek (2014-09-16)
    The advantages of pay-as-you-go model, elasticity, and the flexibility and customization offered by virtualization make cloud computing an attractive option for meeting the needs of some High Performance Computing (HPC) ...

    application/pdf

    application/pdfPDF (5Mb)
  • Duan, Yue Lu (2015-01-21)
    Fences are instructions that programmers or compilers insert in the code to prevent the compiler or the hardware from reordering memory accesses [20, 43]. Fences can be expensive because all of the accesses before the fence ...

    application/pdf

    application/pdfPDF (499Kb)
  • Budnik, Paul Peter, Jr. (1975)

    application/pdf

    application/pdfPDF (8Mb)Restricted to U of Illinois
  • Lee, Chee Wai (2009-12-02)
    Performance analysis tools are essential to the maintenance of efficient parallel execution of scientific applications. As scientific applications are executed on larger and larger parallel supercomputers, it is clear that ...

    application/pdf

    application/pdfPDF (6Mb)
  • Lee, Chee Wai (2010-01-06)
    Performance analysis tools are essential to the maintenance of efficient parallel execution of scientific applications. As scientific applications are executed on larger and larger parallel supercomputers, it is clear ...

    application/pdf

    application/pdfPDF (6Mb)
  • Qi, Shanxiang (2013-08-22)
    Multicore machines have become pervasive and, as a result, parallel programming has received renewed interest. Unfortunately, writing correct parallel programs is notoriously hard. One challenging problem is how to ship ...

    application/pdf

    application/pdfPDF (2Mb)Restricted to U of Illinois
  • Hoot, Charles Glen (1996)
    Rewriting is a computational process in which one term is derived from another by replacing a subterm with another subterm in accordance with a set of rules. If such a set of rules (rewrite system) has the property that ...

    application/pdf

    application/pdfPDF (5Mb)Restricted to U of Illinois
  • Cheng, Wu-Tung (1985)
    The test methods of general iterative logic arrays (ILAs) composed of combinational cells are considered in the first part of this report. The fault model assumed is that faults in a cell can change a cell behavior in any ...

    application/pdf

    application/pdfPDF (4Mb)Restricted to U of Illinois
  • application/pdf

    application/pdfPDF (4Mb)Restricted to U of Illinois
  • O'Kane, Jason M. (2007-07)
    As robots interact with the physical world, their usefulness depends directly on how effectively they can sense and move through their environments. Unfortunately, sensors provide only limited (and sometimes incorrect) ...

    application/pdf

    application/pdfPDF (2Mb)
  • Zhou, Xing (2013-05-24)
    This thesis studies the techniques of tiling optimizations for stencil programs. Traditionally, research on tiling optimizations mainly focuses on tessellating tiling, atomic tiles and regular tile shapes. This thesis ...

    application/pdf

    application/pdfPDF (2Mb)
  • Qi, Shanxiang (2010-05-18)
    Data races are a common type of concurrency bug in parallel programs. An important type of race that has not received much attention is Asymmetric data races. In these races, the state of well tested, correct threads is ...

    application/pdf

    application/pdfPDF (951Kb)
  • Nam, Min Young (2013-02-03)
    In many hard real-time avionics systems, more and more features are being added to faster but cheaper hardware. Thus, hardware resources such as computation and network bandwidth are increasingly being shared by multiple ...

    application/pdf

    application/pdfPDF (4Mb)