Browse Dissertations and Theses - Computer Science by Title

  • Lee, Yun Hee (2011-01-14)
    Regulatory Compliance in current industries has become a mandatory requirement of every day business. Many of regulations and policies set standard of conduct by insiders, who, by definition, have been entrusted with ...

    application/pdf

    application/pdfPDF (405kB)
  • Wright, David Brian (1992)
    Databases are distributed and replicated to increase the efficiency and resiliency of a database management system; unfortunately, mechanisms to improve resiliency can have a substantial negative impact on the overall ...

    application/pdf

    application/pdfPDF (11MB)Restricted to U of Illinois
  • Baugh, Lee W. (2008)
    I also provide an analysis of I/O in lock-based critical sections in large multithreaded workloads, with observations on how this I/O could be performed in transactional code. In this analysis, I find that no one of the ...

    application/pdf

    application/pdfPDF (6MB)Restricted to U of Illinois
  • application/pdf

    application/pdfPDF (2MB)Restricted to U of Illinois
  • Raj, Vijay Kumar (1985)
    Translating a behavioral description of a digital system into an architecture is the initial step in silicon compilation. The behavioral description is in a high level programming language which is converted to a cyclic ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Magalhaes, Luiz Claudio Schara (2005)
    Support for host mobility is traditionally implemented in the link or network layer. In comparison, the transport layer has access to end-to-end information not available at lower layers. Coupled with inverse multiplexing ...

    application/pdf

    application/pdfPDF (5MB)Restricted to U of Illinois
  • Hammerslag, David Hugh (1990)
    Treemacs is a general purpose editor for trees. Although numerous editors for trees exist, they are not general purpose in the sense that they do not allow editing trees for a broad range of applications. The kinds of ...

    application/pdf

    application/pdfPDF (5MB)Restricted to U of Illinois
  • Chu, Jonathan (2014-05-30)
    In cyber security, engineers need to devise ways to protect their systems from hackers. One of the ways that they do this is through intrusion detection. Host based intrusion detection systems reside on the computer and ...

    application/pdf

    application/pdfPDF (503kB)
  • Khan, Mohammad M. (2012-02-01)
    The term “interactive complexity” was introduced by Charles Perrow in his famous book Normal Accidents: Living with High-Risk Technologies [1]. He used the term to describe the interacting tendency of systems with large ...

    application/pdf

    application/pdfPDF (2MB)
  • Mayhew, Stephen (2014-05-30)
    We begin by giving a comprehensive literature review that ties together many fields which have heretofore remained separate. We comment on the approaches from each field and show which algorithms are similar and which are ...

    application/pdf

    application/pdfPDF (306kB)
  • Mitra, Soumyadeb (2008)
    This dissertation shows that it is possible to greatly improve the assurances offered by current approaches to providing tamper resistance for records on WORM storage, without significantly increasing their cost. We propose ...

    application/pdf

    application/pdfPDF (14MB)Restricted to U of Illinois
  • Hasan, Ragib (2009)
    In this dissertation, we explore techniques for providing integrity assurances for the history of data in an untrusted environment. We show that it is possible to provide strong integrity assurances for data history, without ...

    application/pdf

    application/pdfPDF (3MB)Restricted to U of Illinois
  • Zhao, Bo (2013-02-03)
    In practical data integration systems, it is common for the data sources being integrated to provide conflicting information about the same entity. Consequently, a major challenge for data integration is to derive the ...

    application/pdf

    application/pdfPDF (3MB)
  • Totty, Brian Keith (1994)
    Distributed memory multiprocessor architectures offer enormous computational power, by exploiting the concurrent execution of many loosely connected processors. Yet, such scalability is not without price. Interface delays ...

    application/pdf

    application/pdfPDF (7MB)Restricted to U of Illinois
  • Yoon, Man-Ki (2011-05-25)
    In recent years, multicore processors have been receiving a significant amount of attention from avionic and automotive industries as the demand for high-end real-time applications drastically increases. However, the ...

    application/pdf

    application/pdfPDF (797kB)
  • Mancilla Caceres, Juan F. (2010-05-19)
    Commonsense is of primary interest to AI research since the inception of the field. Traditionally, commonsense knowledge is gathered by using humans to create and insert it in knowledge bases. Automating the collection of ...

    application/pdf

    application/pdfPDF (618kB)
  • Li, Lunan (2018-04-26)
    We present the Tweets2Cube system that uncovers the patterns underlying people's spatiotemporal activities from massive online social media. Tweets2Cube organizes unstructured social media records into a multi-dimensional ...

    application/pdf

    application/pdfPDF (5MB)Restricted Access
  • Kao, Gio K. (2008)
    To address the post-optimality selection problem, this dissertation also proposes a new discrete optimization problem to help the decision-maker to obtain an optimal preferred subset of Pareto optimal solutions. This ...

    application/pdf

    application/pdfPDF (2MB)Restricted to U of Illinois
  • Graver, Justin Owen (1989)
    Type systems for object-oriented programming languages have been studied a great deal over the past few years. Since Smalltalk was one of the earliest object-oriented languages, it is not surprising that there have been ...

    application/pdf

    application/pdfPDF (5MB)Restricted to U of Illinois
  • Swarup, Vipin (1992)
    This thesis is concerned with extending the correspondence between intuitionistic logic and functional programming to include assignments and dynamic data. We propose a theoretical framework for adding these imperative ...

    application/pdf

    application/pdfPDF (6MB)Restricted to U of Illinois