Browse Dissertations and Theses - Computer Science by Title

  • Jayakumar, Anirudh (2016-12-06)
    As data permeates all disciplines, the role of big data becomes increasingly important. Sensors, IoT devices, social networks, and online transactions are all generating data that can be monitored constantly to enable a ...

    application/pdf

    application/pdfPDF (2MB)
  • Lim, Swee Boon (1996)
    Effective file system caching reduces local disk accesses and remote file server accesses significantly. Traditional file systems use fixed strategies to control caching. This thesis shows that a file system with adaptive ...

    application/pdf

    application/pdfPDF (10MB)Restricted to U of Illinois
  • Nguyen Ba, Canh Son (2015-01-21)
    The CAP theorem says that distributed key-value stores can only provide bounded consistency (C) and availability (A) under the presence of partition (P). Recent work has proposed the ability for applications of such stores ...

    application/pdf

    application/pdfPDF (950kB)
  • Simitci, Huseyin (2000)
    Experimental results verified the accuracy of the developed analytical model in estimating and explaining disk striping performance. Also, experiments with artificial benchmarks and scientific applications showed that, ...

    application/pdf

    application/pdfPDF (8MB)Restricted to U of Illinois
  • Gopalakrishnan Menon, Harshitha Menon (2016-10-10)
    One of the critical factors that affect the performance of many applications is load imbalance. Applications are increasingly becoming sophisticated and are using irregular structures and adaptive refinement techniques, ...

    application/pdf

    application/pdfPDF (3MB)
  • Chang, Conrad Tze Kong (2002)
    Object-oriented databases can be very useful for applications containing complex data models that are not well served by conventional databases. Although much research has been done on developing concurrency control protocols ...

    application/pdf

    application/pdfPDF (6MB)Restricted to U of Illinois
  • Bordner, James Oliver (1999)
    A C++ implementation, ASR - MG++ , of the ASR-MG method is described, and experimental results for different sub-methods are presented.

    application/pdf

    application/pdfPDF (8MB)Restricted to U of Illinois
  • Krishnamurthy, Sudha (2002)
    In this thesis we describe the adaptive framework and present the probabilistic models we have developed for the cases in which the replicated content is either static or dynamic. We discuss experimental results that ...

    application/pdf

    application/pdfPDF (9MB)Restricted to U of Illinois
  • Venkatasubramanian, Nalini (1998)
    In this thesis, we present a new paradigm for developing safe, customizable middleware for the global information infrastructure. The composition of multiple resource management services is necessary to guarantee safe, ...

    application/pdf

    application/pdfPDF (15MB)Restricted to U of Illinois
  • Zhao, Xin (2012-06-27)
    The one-sided communication model (or remote memory access) supported by MPI-2 is more convenient to use than the regular two-sided send/receive communication model, because it allows the sender to specify all data transfer ...

    application/pdf

    application/pdfPDF (749kB)
  • Mikida, Eric P. (2019-04-15)
    Discrete Event Simulation (DES) can be an important tool across various domains such as Engineering, Military, Biology, High Performance Computing, and many others. Interacting systems in these domains can be simulated ...

    application/pdf

    application/pdfPDF (4MB)
  • Mont, Alexander D. (2012-02-06)
    We describe the spacetime discontinuous Galerkin method, a new type of finite-element method which promises dramatic improvement in solution speed for hyperbolic problems. These methods require the generation of spacetime ...

    application/pdf

    application/pdfPDF (2MB)
  • Sun, Bofan (2017-07-20)
    Optimizing interactive information retrieval interfaces is a new trend in IR which focuses more on the interface design and formalizes interactive IR. However, none of existing work has proposed a system to support both ...

    application/pdf

    application/pdfPDF (3MB)
  • Trower, Matthew (2012-05-22)
    This thesis focuses on the feasibility of adding a new dimension to spatial context referred to as orientation. Based on directional antennas and previous work in RSSI based radio distance estimation, this work shows that ...

    application/pdf

    application/pdfPDF (449kB)
  • Tucek, Joseph (2012-02-06)
    The high complexity of modern software, and our pervasive reliance on that software, has made the problems of software reliability increasingly important. Yet despite advances in software engineering practice, pre-release ...

    application/pdf

    application/pdfPDF (916kB)
  • Chang, Hsiao-Ching (2018-04-23)
    Modeling visual context and its corresponding text description with a joint embedding network has been an effective way to enable cross-modal retrieval. However, while abundant work has been done for image-text tasks, not ...

    application/pdf

    application/pdfPDF (15MB)Restricted to U of Illinois
  • Agarwal, Rishika (2019-04-26)
    Adversarial Machine learning is a field of research lying at the intersection of Machine Learning and Security, which studies vulnerabilities of Machine learning models that make them susceptible to attacks. The attacks ...

    application/pdf

    application/pdfPDF (68MB)
  • Yang, Wei (2018-04-20)
    As mobile phones become an increasingly critical part of our world, ensuring the security and privacy of mobile applications (in short as apps) becomes increasingly important. For too long, researchers have often tackled ...

    application/pdf

    application/pdfPDF (1MB)Restricted to U of Illinois
  • Narwekar, Abhishek Avinash (2018-04-26)
    Affective computing is the study and development of devices that can recognize emotions through various modes such as video, audio and text automatically. In this thesis, I focus on the problem of affective computing in ...

    application/pdf

    application/pdfPDF (1MB)
  • Li, Baochun (2000)
    Third, in order to optimally design the reconfiguration rules in configurators so that the best possible application QoS is achieved, we designed mechanisms and protocols for the Quality of Service probing and profiling ...

    application/pdf

    application/pdfPDF (9MB)Restricted to U of Illinois