Browse Research and Tech Reports - Computer Science by Title

  • Jalaparti, Virajith; Nguyen, Giang D. (2010-12-02)
    Cloud computing is a newly emerging paradigm in which a client pays as it uses computing resources owned by a cloud provider. Since multiple clients share the cloud's resources, they could potentially interfere with each ...

    application/pdf

    application/pdfPDF (169Kb)
  • Bailey, Brian P.; Tettegah, Sharon Y.; Bradley, Terry J. (2005-09)
    K-12 schools need effective methods for delivering technology and character education. In this paper, we describe the iterative design, use, and evaluation of a tool that enables kids to construct animated vignettes ...

    application/pdf

    application/pdfPDF (413Kb)
  • Biehl, Jacob T.; Baker, William T.; Bailey, Brian P. (2007-04)
    Existing tools do not adequately support the emerging practice of group-based software development, which is aimed at improving software quality. In this paper, we present a new, fully functional system called ClubDev. Our ...

    application/pdf

    application/pdfPDF (796Kb)
  • Shah, Samarth H.; Nahrstedt, Klara; Yuan, Wanghong (2005-05)
    Traditionally, the problem of minimizing energy consumption in mobile wireless devices has been addressed independently for various system components such as the CPU (via process management), network interface (via traffic ...

    application/pdf

    application/pdfPDF (838Kb)
  • Vakilian, Mohsen; Johnson, Ralph E. (2014-02-28)
    This data set contains the results of a quantitative analysis on the refactoring messages that CodingSpectator captured during our field study. CodingSpectator collects data about the usage of the Eclipse Integrated ...

    application/vnd.oasis.opendocument.spreadsheet

    application/vnd.oasis.opendocument.spreadsheetOpenOffice Calc (26Kb)
  • Cranston, Daniel W. (2007-10)
    This thesis studies both several extremal problems about coloring of graphs and a labeling problem on graphs. We consider colorings of graphs that are either embeddable in the plane or have low maximum degree. We consider ...

    application/pdf

    application/pdfPDF (496Kb)
  • Wolf, Michael M.; Heath, Michael T. (2009-02)
    It has been shown that combinatorial optimization of matrix-vector multiplication can lead to faster evaluation of finite element stiffness matrices. Based on a graph model characterizing relationships between rows, an ...

    application/pdf

    application/pdfPDF (310Kb)
  • Wolf, Michael M.; Heath, Michael T. (2009-02)
    It has been shown that combinatorial optimization of matrix-vector multiplication can lead to faster evaluation of finite element stiffness matrices. Based on a graph model characterizing relationships between rows, an ...

    application/pdf

    application/pdfPDF (310Kb)
  • Hendrix, Joe; Ohsaki, Hitoshi (2008-02)
    In this paper, we study combining equational tree automata in two different senses: (1) whether decidability results about equational tree automata over disjoint theories imply similar decidability results in the combined ...

    application/pdf

    application/pdfPDF (463Kb)
  • Epshteyn, Arkady (2007-04)
    For many tasks such as text categorization and control of robotic systems, state-of-the art learning systems can produce results comparable in accuracy to those of human subjects. However, the amount of training data needed ...

    application/pdf

    application/pdfPDF (1Mb)
  • Vu, Long; Do, Quang; Nahrstedt, Klara (2010-09-26)
    It is well known that the daily movement of people exhibits a high degree of repetition in which people usually stay at regular places for their daily activities [1]. It is also believed that people usually stay in a ...

    application/pdf

    application/pdfPDF (110Kb)
  • Sengul, Cigdem (2007-10)
    Energy conservation is one of the greatest challenges in multi-hop wireless networks due to the ever-increasing energy requirements of wireless devices and the slow advancement of battery technology. While significant ...

    application/pdf

    application/pdfPDF (1Mb)
  • Ren, Gang (2006-07)
    As an effective way of utilizing data parallelism in applications, SIMD architecture has been adopted by most today's microprocessors. Using intrinsic functions and automatic compilation are common programming methods for ...

    application/pdf

    application/pdfPDF (645Kb)
  • Chadha, Rohit; Legay, Axel; Prabhakar, Pavithra; Viswanathan, Mahesh (Springer Verlag, 2009)
    We present uniform approaches to establish complexity bounds for decision problems such as reachability and simulation, that arise naturally in the verification of timed software systems. We model timed software systems ...

    application/pdf

    application/pdfPDF (232Kb)
  • Vakilian, Mohsen; Johnson, Ralph E. (2012-06-01)
    The industry crossed the first refactoring rubicon, namely Extract Method, more than a decade ago. Today, all mainstream Integrated Development Environments (IDEs) support this refactoring, and empirical studies have shown ...

    application/pdf

    application/pdfPDF (80Kb)
  • Thompson, Nathanael A.; Gupta, Indranil; Birman, Kenneth (2004-10)
    It is essential to develop methodologies for the design of distributed protocols in order to reduce the complexity of distributed systems, and for maturing the field. This paper presents a composition methodology for ...

    application/pdf

    application/pdfPDF (127Kb)
  • Vakilian, Mohsen; Chen, Nicholas; Zilouchian Moghaddam, Roshanak; Negara, Stas; Johnson, Ralph E. (2012-05)
    Though modern IDEs have supported refactorings for more than a decade, recent studies suggest that programmers greatly underuse such tools, especially for complex refactorings. Complex refactorings affect several methods ...

    application/pdf

    application/pdfPDF (465Kb)
  • Kim, Hyun Duk; Ganesan, Kavita; Sondhi, Parikshit; Zhai, ChengXiang (2011)
    The abundance of opinions on the web has kindled the study of opinion summarization over the last few years. People have introduced various techniques and paradigms to solving this special task. This survey attempts to ...

    application/pdf

    application/pdfPDF (936Kb)
  • Hu, Chunyu; Hou, Jennifer C. (2006-04)
    This technical report presents a comprehensive study of the Enhanced Distributed Control Access (EDCA) function defined in IEEE 802.11e. All the three factors are considered. They are: contention window size (CW), arbitration ...

    application/pdf

    application/pdfPDF (500Kb)
  • Serbanuta, Traian Florin; Rosu, Grigore (2006-02)
    An automatic and easy to implement transformation of conditional term rewrite systems into computationally equivalent unconditional term rewrite systems is presented. No special support is needed from the underlying ...

    application/pdf

    application/pdfPDF (330Kb)