Browse Dissertations and Theses - Computer Science by Title

  • Heuring, Gerald Raymond (1993)
    File migration is the movement of files from secondary storage devices, such as magnetic disks, to tertiary or mass storage devices, such as automated tape libraries. It provides a service analogous to demand paging in ...

    application/pdf

    application/pdfPDF (5MB)Restricted to U of Illinois
  • Siefert, Christopher Martin (2006)
    For these applications, we present results illustrating the eigenvalue bounds on our preconditioners and demonstrating the theoretical justification of these methods. We also present convergence and timing results, showing ...

    application/pdf

    application/pdfPDF (3MB)Restricted to U of Illinois
  • Pellizzoni, Rodolfo (2010-08-20)
    Modern real-time embedded systems are moving from federated architectures, where logical applications and subsystems are implemented on different hardware components, to progressively more integrated architectures which ...

    application/pdf

    application/pdfPDF (14MB)
  • Wen, Jen-Yang (2019-04-22)
    The Federal Aviation Administration (FAA) in its recent CAST-32A certification guidance suggests that more than one core in a multi-core chip for safety-critical avionics applications can be used only if all the inter-core ...

    application/pdf

    application/pdfPDF (557kB)Restricted Access
  • Cheng, Qian (2017-03-29)
    It is unknown what physiological functions can be monitored at clinical quality with a normal smartphone, which is ubiquitous. There are standard measures like walk speed, pulmonary function and oxygen saturation ...

    application/pdf

    application/pdfPDF (2MB)
  • Yang, Yiwei (2014-01-16)
    The delay of web page loading time becomes one important factor of user experience. Lots of users are impatient. Therefore reducing the delay is important for both individuals and companies. This paper will use the ...

    application/pdf

    application/pdfPDF (598kB)
  • Trivedi, Kishor Shridharbhai (1974)

    application/pdf

    application/pdfPDF (6MB)Restricted to U of Illinois
  • Lee, Choonghwan (2014-01-16)
    Runtime verification is an effective and accurate technique for ensuring that an execution of a program conform to certain specifications at runtime. Although excessive runtime overhead, one of its main drawbacks, has been ...

    application/pdf

    application/pdfPDF (535kB)
  • Hari, Siva Kumar (2014-01-16)
    According to Moore’s law, technology scaling is continuously providing smaller and faster devices. These scaled devices are, however, becoming increasingly susceptible to in-field hardware failures from sources such as ...

    application/pdf

    application/pdfPDF (2MB)
  • Abdi Taghi Abad, Fardin (2014-09-16)
    Cyber-physical systems (CPS) may interact and manipulate objects in the physical world with the aid of communication channels. Additionally, due to their nature, most CPS are safety-critical systems where there are safety ...

    application/pdf

    application/pdfPDF (2MB)
  • Schear, Nabil A. (2011-05-25)
    Many existing encrypted Internet protocols leak information through packet sizes and timing. Though seemingly innocuous, prior work has shown that such leakage can be used to recover part or all of the plaintext being ...

    application/pdf

    application/pdfPDF (1MB)
  • Oetting, Amy Nicole (2016-12-05)
    A pervasive societal and personal concern is how we can maintain or improve our quality of life as we age. The purpose of this thesis is to assess the current state of technology as it is (or can be) used in everyday life ...

    application/pdf

    application/pdfPDF (3MB)
  • Xue, Yuan (2005)
    In this dissertation, we propose a new price-based resource allocation framework in wireless ad hoc networks to achieve optimal resource utilization and fairness among competing end-to-end flows. We build our pricing ...

    application/pdf

    application/pdfPDF (3MB)Restricted to U of Illinois
  • Xu, Zhentao (2015-04-29)
    European-style options are quite popular nowadays. Calculating their theo- retical price is not an easy task because there are many sources of uncertainty. However, we can model these uncertainties with random numbers. In ...

    application/pdf

    application/pdfPDF (213kB)
  • Salverda, Pierre M. (2008)
    The clustered machines, by contrast, are shown to be inherently capable of matching monolithic machine performance, the penalties imposed by distributed execution notwithstanding. Key to exploiting that potential is knowledge ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Termehchy, Arash (2012-09-18)
    People generate and share a huge variety of information that can be used to derive useful insights and create value for society. Keyword queries are by far the most popular method for users to search, explore, and understand ...

    application/pdf

    application/pdfPDF (2MB)
  • Zhang, Aston (2015-07-22)
    Anonymized user datasets are often released for research or industry applications. As an example, t.qq.com released its anonymized users’ profile, social interaction, and recommendation log data in KDD Cup 2012 to call for ...

    application/pdf

    application/pdfPDF (1MB)
  • Oh, Se Eun (2014-05-30)
    Health Information Technology has spurred the development of distributed systems known as Health Information Exchanges (HIEs) to enable the sharing of patient records between different health care organizations. Participants ...

    application/pdf

    application/pdfPDF (4MB)
  • Li, Hongyang (2016-05-31)
    Dynamic charging of electric vehicles (EVs) is a promising technology for future electrified transportation. By installing wireless charging pads under the roadbed, dynamic charging allows EVs to charge their batteries ...

    application/pdf

    application/pdfPDF (1MB)
  • Ding, Bolin (2013-02-03)
    Data cubes play an essential role in data analysis and decision support. In a data cube, data from a fact table is aggregated on subsets of the table's dimensions, forming a collection of smaller tables called cuboids. ...

    application/pdf

    application/pdfPDF (1MB)