Browse Dissertations and Theses - Computer Science by Title

  • Habeeb, Haroun (2019-04-22)
    We propose the Fixed Grouping Layer (FGL); a novel feedforward layer designed to incorporate structured smoothness in a deep learning model. FGL achieves this goal by connecting nodes across layers based on spatial similarity. ...

    application/pdf

    application/pdfPDF (950kB)
  • Duncan, Chase (2018-08-28)
    Entity linking (EL) is the task of mapping entities, such as persons, locations, organizations, etc., in text to a corresponding record in a knowledge base (KB) like Wikipedia or Freebase. In this paper we present, for the ...

    application/pdf

    application/pdfPDF (306kB)
  • Gorse, Shirdon Ismial (2019-04-26)
    The microservice architecture is a service-oriented architecture that supports the development of small loosely-coupled software services. In contrast to the monolithic architecture, the microservice architecture is ...

    application/pdf

    application/pdfPDF (508kB)Restricted Access
  • Healey, Steven Thomas (1987)
    This thesis describes a module planner for decomposing arbitrary functional specifications of any complexity into abstract cells for custom-VLSI module generation. A graph representing random logic is partitioned and the ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Finnicum, Murph (2013-08-22)
    As general purpose robots begin to find their way into the household and workplace, there will be a demand for software to run on these robots. My research group forsees the proliferation of robot apps that use a common ...

    application/pdf

    application/pdfPDF (2MB)
  • Xin, Doris (2019-07-18)
    Machine learning workflow development is a process of trial-and-error: developers iterate on workflows by testing out small modifications until the desired accuracy is achieved. Unfortunately, existing machine learning ...

    application/pdf

    application/pdfPDF (8MB)
  • Bhat, Nitin Kundapur (2017-12-06)
    With the advent of Exascale computing, the number and size of messages is expected to increase greatly. One sided communication with the help of Remote Direct Memory Access (RDMA) supported hardware is the natural choice ...

    application/pdf

    application/pdfPDF (381kB)
  • Hoberock, Jared (2008)
    This dissertation investigates novel methods of accelerating the central computations of physically-based light transport algorithms. We present novel mappings of the crucial primitive operations of ray tracing and shading ...

    application/pdf

    application/pdfPDF (2MB)Restricted to U of Illinois
  • Sampemane, Geetanjali (2005)
    We evaluate our model on the criteria of expressiveness, performance and usability. The model is sufficiently expressive for applications used in our Active Space. The performance overhead of our access control is demonstrated ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Jones, Vicki Ellen (1997)
    This thesis shows how to obtain efficient, fine-grained (object-level) control over user access to ODB data. We present a target access control model for ODB applications and delineate the trust assumptions required for ...

    application/pdf

    application/pdfPDF (6MB)Restricted to U of Illinois
  • Chen, Huei-Huang (1984)
    In evaluating a query using a network database, the links need to either be followed or be saved. Most of the previous approaches follow the links in evaluating a query using a network database. Actually, it is not always ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Zheng, Gengbin (2005)
    We further motivate the need for next generation load balancing strategies for petaflops class machines. We explore a novel design of a scalable hierarchical load balancing scheme, which incorporates an explicit memory ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • He, Wenbo (2008)
    To show the efficacy and efficiency of the proposed schemes, I present simulation results of our schemes and compare their performance to a typical data aggregation scheme, Tiny Aggregation protocol (TAG), where no privacy ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Hajishirzi, Hannaneh (2012-02-06)
    This dissertation focuses on modeling stochastic dynamic domains, using representations and algorithms that combine logical AI ideas and probabilistic methods. We introduce new tractable and highly accurate algorithms for ...

    application/pdf

    application/pdfPDF (4MB)
  • Chaing, Heien-Kun (1997)
    With the advent of advanced computer network and information technology and the popularity of Internet, computer supported cooperative applications in software and engineering environments have begun to emerge. However, ...

    application/pdf

    application/pdfPDF (5MB)Restricted to U of Illinois
  • Malik, Rahul (2011-01-21)
    With the advent of virtual spaces, there has been a need to integrate physical worlds with virtual spaces. The integration can be achieved by real-time 3D imaging at several geographically distributed locations followed ...

    application/pdf

    application/pdfPDF (33MB)
  • Charalambides, Minas (2018-04-20)
    This thesis discusses two methodologies for applying type discipline to concurrent programming with actors: process types, and session types. A system based on each of the two is developed, and used as the basis for a ...

    application/pdf

    application/pdfPDF (1MB)
  • Ren, Shangping (1997)
    This research uses both theoretical and experimental methods. Specifically, an operational semantics based on RTsynchronizers and regular computational objects (modeled as actors) is defined. RTsynchronizers are implemented ...

    application/pdf

    application/pdfPDF (5MB)Restricted to U of Illinois
  • Xu, Yang (2014-09-16)
    Atomicity violation is a common kind of concurrency bug in real world projects. PENELOPE is a framework that can detect atomicity violations in a single observed trace, without explicitly examining all traces that result ...

    application/pdf

    application/pdfPDF (292kB)
  • Gornish, Edward H. (1995)
    Memory latency has always been a major issue in shared-memory multiprocessors and high-speed systems. This is even more true as the gap between processor and memory speeds continues to grow. Data prefetching has been ...

    application/pdf

    application/pdfPDF (6MB)Restricted to U of Illinois