# Browse Research and Tech Reports - Computer Science by Title

• (2005-10)
It is well recognized that data cubing often produces huge outputs. Two popular efforts devoted to this problem are (1) iceberg cube, where only significant cells are kept, and (2)closed cube, where a group of cells which ...

application/pdf

PDF (209kB)
• (2006-10)
In a wireless network, data transmission suffers from varied signal strengths and channel bit error rates. To ensure successful packet reception under different channel conditions, automatic bit rate control schemes are ...

application/pdf

PDF (144kB)
• (2007-08)
Design complexity and limited power budget are causing the number of cores on the same chip to grow very rapidly. The wide availability of Chip Multiprocessors (CMPs) is enabling the design of inexpensive, shared-memory ...

application/pdf

PDF (620kB)
• (2004-07)
In this paper, we study how the achievable throughput scales in a wireless network with randomly located nodes as the number of nodes increases, under a communication model where (i) each node has a maximum transmission ...

application/pdf

PDF (286kB)
• (2014-09-09)
Type qualifier inference tools usually operate in batch mode and assume that the program must not be changed except to add the type qualifiers. In practice, programs must be changed to make them type-correct, and programmers ...

application/pdf

PDF (490kB)
• (2007-05)
Contrary to traditional belief, we show in this paper, that for distributed systems non-preemptive scheduling can perform better than preemptive scheduling in the worst case in terms of task schedulability, under certain ...

application/pdf

PDF (254kB)
• (2010-08-30)
This paper presents a catalog of code refactorings that are intended to improve the different quality attributes of Fortran programs. We classify the refactorings according to their purpose, that is, the internal or ...

application/pdf

PDF (395kB)
• (2009-02)
Security requirements change, but the typical way of improving system security by patches is ad hoc and has not produced good results. Security improvements should be systematic, just as new features can be added to software ...

application/pdf

PDF (336kB)
• (2009-02)
Security requirements change, but the typical way of improving system security by patches is ad hoc and has not produced good results. Security improvements should be systematic, just as new features can be added to software ...

application/pdf

PDF (336kB)
• (2007-01)
We define a novel formulation of dataflow analysis for concurrent programs, where the flow of facts is along the causal dependencies of events. We capture the control flow of concurrent programs using a Petri net (called ...

application/pdf

PDF (2MB)
• (2004-06)
Modern superscalar processors often suffer long stalls due to load misses in on-chip L2 caches. To address this problem, we propose hiding L2 misses with Checkpoint-Assisted VAlue prediction (CAVA). On an L2 cache miss, a ...

application/pdf

PDF (281kB)
• (2012-06-16)
This report develops an analytical model of the performance of the CGPOP mini-app and validates the model by running CGPOP on various processor counts.

application/pdf

PDF (1MB)
• (2004-09)
Cooperation in wireless ad hoc networks has two-fold implications. First, each wireless node does not excessively and greedily inject traffic to the shared wireless channel. Second, intermediate nodes voluntarily relay ...

application/pdf

PDF (444kB)
• (2014)
The CAP theorem is a fundamental result that applies to distributed storage systems. In this paper, we first present probabilistic models to characterize the three important elements of the CAP theorem: consistency (C), ...

application/pdf

PDF (507kB)
• (2012)
Concurrent collections provide thread-safe, highly-scalable operations, and are widely used in practice. However, programmers can misuse these concurrent collections by composing one operation that checks a condition ...

application/pdf

PDF (497kB)
• (2012-08)
This paper presents a verification framework that is parametric in a (trusted) operational semantics of some programming language. The underlying proof system is language-independent and consists of eight proof rules. The ...

application/pdf

PDF (346kB)
• (2012-04)
This paper presents a verification framework that is parametric in a (trusted) operational semantics of some programming language. The underlying proof system is language-independent and consists of eight proof rules. ...

application/pdf

PDF (343kB)
• (2004-07)
While Chip Multiprocessors (CMP) with Speculative Multithreading (SM) support have been gaining momentum, experienced processor designers in industry have reservations about their practical implementation. SM CMPs must ...

application/pdf

PDF (744kB)
• (2010-08-04)
The art gallery problem asks for the smallest number of guards required to see every point of the interior of a polygon $P$. We introduce and study a similar problem called the chromatic art gallery problem. Suppose that ...

application/pdf

PDF (124kB)
• (2009-02)
Coinductive proofs of behavioral equivalence often require human ingenuity, in that one is expected to provide a "good" relation extending one's goal with additional lemmas, making automation of coinduction a challenging ...

application/pdf

PDF (260kB)