# Browse Research and Tech Reports - Computer Science by Title

• (2013-07-17)
Dynamic wireless charging is an emerging technology that allows electric vehicles (EVs) to be charged while on the move. Accurate billing for dynamic EV charging requires secure communication between the EVs and the power ...

application/pdf

PDF (148Kb)
• (2015-04-27)
Compaction plays a crucial role in NoSQL systems to ensure a high overall read throughput. In this work, we formally define compaction as an optimization problem that attempts to minimize disk I/O.We prove this problem to ...

application/pdf

PDF (689Kb)
• (2004-01)
3D neuro-anatomical images and other volumetric data sets are important in many scientific and biomedical fields. Since such sets may be extremely large, a scalable compression method is critical to store, process and ...

application/pdf

PDF (239Kb)
• (2005-05)
Polarizable force fields are considered to be the single most significant development in the next-generation force fields used in biomolecular simulations. The self-consistent computation of induced atomic dipoles in a ...

application/pdf

PDF (23Mb)
• (2008-01)
Large machines with tens or even hundreds of thousands of processors are currently in use. As the number of components increases, the mean time between failure will decrease further. Fault tolerance is an important issue ...

application/pdf

PDF (2Mb)
• (2010)
Primary healthcare suffers from the single feature, single point-in-time syndrome. Physicians need \emph{long-term} data along multiple aspects of a patient's everyday health before, during and after treatment to best ...

application/pdf

PDF (959Kb)
• (2007-12)
Texture synthesis has always been an interesting research topic in Graphics. The popular neighborhood-based algorithms have two common stages: search for most similar neighborhoods in the sample texture; merge a local ...

application/pdf

PDF (4Mb)
• (2006-09)
Performance management and fault tolerance are two important issues faced by computing systems research. In this dissertation, we exploit the use of feedback control for performance management and fault tolerance. Specifically, ...

application/pdf

PDF (877Kb)
• (2013-04)
This is the final report of the work on parallel programming patterns that was part of the Center for Programming Models for Scalable Parallel Computing

application/pdf

PDF (187Kb)
• (2013-01-18)
The transmission control protocol (TCP) is the major trans- port protocol in the Internet. TCP and its variants have the drawback of not accurately knowing rate share of flows at bottleneck links. Some protocols proposed ...

application/pdf

PDF (277Kb)
• (2004-06)
Following ideas in Poole~\poole, which we correct, formalize and extend, this paper presents the first provable algorithm for reasoning with probabilistic first-order representations at the {\em lifted} level. Specifically, ...

application/pdf

PDF (366Kb)
• (2007-02)
We present four equational theories that are isomorphic to the traditional Boolean theory and show that each one of them gives rise to a canonical rewrite system modulo associativity, thus providing four decision procedures ...

application/pdf

PDF (658Kb)
• (2004-04)
An important problem for agents in open multiagent systems is how to find agents that match certain criteria. A number of middle agent services, such as matchmaking and brokering services, have been proposed to address ...

application/pdf

PDF (6Mb)
• (2004-04)
The development of wireless communication in recent years has posed new challenges in system design and analysis of wireless networks, among which energy efficiency and network capacity are perhaps the most important issues. ...

application/pdf

PDF (350Kb)
• (Elsevier, 2012)
Automated reasoning modulo an equational theory $\caE$ is a fundamental technique in many applications. If $\caE$ can be split as a disjoint union $E\!\cup \!Ax$ in such a way that $E$ is confluent, terminating, ...

application/pdf

PDF (443Kb)
• (2005-02)
Distributed systems are typically designed for scale and performance first, which often makes it difficult to add security later without affecting the original properties. This paper proposes the design of the Folklore ...

application/pdf

PDF (293Kb)
• (2008-08)
We have built and deployed a system called Folklore that implements a new property called data untraceability through a proactive migratory replication protocol in a large-scale distributed setting. A data untraceable ...

application/pdf

PDF (762Kb)
• (2008-08)
We have built and deployed a system called Folklore that implements a new property called data untraceability through a proactive migratory replication protocol in a large-scale distributed setting. A data untraceable ...

application/pdf

PDF (762Kb)
• (2010-05-21)
Effectively utilizing groups in delay tolerant networks (DTNs) can both improve the throughput of unicast routing protocols and open the door for a wide range of paradigms, such as anycast and multicast. Unfortunately, in ...

application/pdf

PDF (173Kb)
• (2010-05-21)
Effectively utilizing groups in delay tolerant networks (DTNs) can both improve the throughput of unicast routing protocols and open the door for a wide range of paradigms, such as anycast and multicast. Unfortunately, in ...

application/pdf

PDF (173Kb)