Browse Research and Tech Reports - Computer Science by Title

  • Dhurjati, Dinakar (2006-09)
    Many computing systems today are written in weakly typed languages such as C and C++. These languages are known to be ``unsafe'' as they do not prevent or detect common memory errors like array bounds violations, pointer ...

    application/pdf

    application/pdfPDF (745Kb)
  • Lee, Adam J.; Winslett, Marianne (2006-08)
    In trust negotiation and other distributed proving systems, networked entities cooperate to form proofs that are justified by collections of certified attributes. These attributes may be obtained through interactions with ...

    application/pdf

    application/pdfPDF (306Kb)
  • Yershova, Ganna (2008-10)
    In its original formulation, the motion planning problem considers the search of a robot path from an initial to a goal configuration. The study of motion planning has advanced significantly in recent years, in large part ...

    application/pdf

    application/pdfPDF (2Mb)
  • Yershova, Ganna (2008-10)
    In its original formulation, the motion planning problem considers the search of a robot path from an initial to a goal configuration. The study of motion planning has advanced significantly in recent years, in large part ...

    application/pdf

    application/pdfPDF (2Mb)
  • Cong, Shengnan (2006-02)
    Data mining is an emerging research area, whose goal is to discover potentially useful information embedded in databases. Due to the wide availability of huge amounts of data and the imminent need for turning such data ...

    application/pdf

    application/pdfPDF (3Mb)
  • Cheng, Peng (2005-08)
    Kinodynamic and nonholonomic planning problems have differential constraints which restrict admissible velocities and accelerations of robotic systems. Since these differential constraints are ignored in the path planning ...

    application/pdf

    application/pdfPDF (2Mb)
  • Sen, Koushik (2006-06)
    Testing using manually generated test cases is the primary technique used in industry to improve reliability of software---in fact, such ad hoc testing accounts for over half of the typical cost of software development. ...

    application/pdf

    application/pdfPDF (995Kb)
  • Lu, Charng-da (2005-08)
    Parallel scientific applications deal with machine unreliability by periodic checkpointing, in which all processes coordinate to dump memory to stable storage simultaneously. However, in systems comprising tens of thousands ...

    application/pdf

    application/pdfPDF (1Mb)
  • Fesehaye, Debessay; Malik, Rahul; Nahrstedt, Klara (2010-03-16)
    Large scale distributed systems such as cloud computing applications are becoming very common. These applications come with increasing challenges on how to transfer and where to store and compute data. The most prevalent ...

    application/pdf

    application/pdfPDF (548Kb)
  • Shaffer, Eric Gene (2005-08)
    Polygonal meshes are easily the most common surface representation currently employed in computer graphics, finding application in fields as diverse as the visual arts and scientific computation. Technological advances in ...

    application/pdf

    application/pdfPDF (9Mb)
  • Yin, Xiaoxin (2007-03)
    Relational databases are the most popular repository for structured data, and are thus one of the richest sources of knowledge in the world. In a relational database, multiple relations are linked together via entity-relationship ...

    application/pdf

    application/pdfPDF (1Mb)
  • Jin, Dongyun; Meredith, Patrick O'Neil; Rosu, Grigore (2012-04-24)
    Runtime monitoring is an effective means to improve the reliability of systems. In recent years, parametric monitoring, which is highly suitable for object-oriented systems, has gained significant traction. Previous ...

    application/pdf

    application/pdfPDF (275Kb)
  • Tabassum, Rehana; Nahrstedt, Klara; Rogers, Edmond; Rawson, Michael (2012)
    In smart grid, the scale of pole devices that monitor the health of power lines is already large, and with the upgrade of the smart grid, the number of these resource-constrained devices is further increasing. These devices ...

    application/pdf

    application/pdfPDF (453Kb)
  • Huang, Chengdu (2007-08)
    Providing contractual performance assurances in distributed systems is an important and challenging problem. From the users perspective, stringent performance requirements are becoming more critical, which increases the ...

    application/pdf

    application/pdfPDF (2Mb)
  • Biehl, Jacob T.; Bailey, Brian P. (2005-04)
    Iconic interfaces have been used to enable users to visually manage applications in interactive workspaces. However, current implementations do not scale for larger numbers of applications and do not allow users to maintain ...

    application/pdf

    application/pdfPDF (1Mb)
  • Chen, Terrence (2006-05)
    In this paper, we propose to solve several computer vision problems using a novel fundamental idea, the scale difference between different patterns. In order to achieve our goal, we utilize the recently proposed total ...

    application/pdf

    application/pdfPDF (3Mb)
  • Arefin, Md Ahsan; Khurshid, Ahmed; Caesar, Matthew; Nahrstedt, Klara (IEEE, 2011-08-11)
    Understanding and troubleshooting wide area networks (such as military backbone networks and ISP networks) are challenging tasks due to their large, distributed, and highly dynamic nature. Building a system that can record ...

    application/pdf

    application/pdfPDF (1Mb)
  • Fesehaye, Debessay (2013-01-17)
    With the fast growth of (online) content and the need for high quality content services, cloud data centers are increasingly becoming the preferred places to store data and retrieve it from. With a highly variable network ...

    application/pdf

    application/pdfPDF (530Kb)
  • Loeff, Nicolas; Farhadi, Ali; Forsyth, David A. (2008-01)
    What constitutes a scene? Defining a meaningful vocabulary for scene discovery is a challenging problem that has important consequences for object recognition. We consider scenes to depict correlated objects and present ...

    application/pdf

    application/pdfPDF (11Mb)
  • Bunde, David Pattison (2006-07)
    We present algorithms and hardness results for three resource allocation problems. The first is an abstract admission control problem where the system receives a series of requests and wants to satisfy as many as possible, ...

    application/pdf

    application/pdfPDF (498Kb)