Browse College of Engineering by Title

  • Gu, Siyu (2014-05-30)
    This thesis complements the large body of social sensing literature by developing means for augmenting sensing data with inference results that "fill-in" missing pieces. Unlike trend-extrapolation methods, we focus on ...

    application/pdf

    application/pdfPDF (1MB)
  • Goodwell, Allison E.; Zhu, Zhenduo; Dutta, Debsunder; Greenberg, Jonathan A.; Kumar, Praveen; Garcia, Marcelo H.; Rhoads, Bruce L.; Holmes, Robert R.; Parker, Gary; Berretta, David P.; Jacobson, Robert B. (2015-03-10)
    This collection includes data developed and used for the analysis of the Birds Point-New Madrid (BPNM) Floodway activation in 2011. The data collection includes 10 items, all of which present the processed and derived data. ...

    text/xml

    text/xmlXML (30kB)
  • Zou, Yuxuan (2019-07-11)
    In order to synthesize new images from a specific class, most generative models like Generative Adversarial Nets (GANs) require a large amount of data from this class. In other words, modern generative models often lack ...

    application/pdf

    application/pdfPDF (1MB)Restricted to U of Illinois
  • Sun, Yicheng (2016-05)
    Music elements are used as features for music information retrieval (MIR). However, while music elements are universal in music theory, there is no generic tool to extract them for modeling. Even worse, using music elements ...

    application/pdf

    application/pdfPDF (9MB)Restricted to U of Illinois
  • Sung, I-Jui (2013-05-24)
    Matrix transposition is an important algorithmic building block for many numeric algorithms like multidimensional FFT. It has also been used to convert the storage layout of arrays. Intuitively, in-place transposition ...

    application/pdf

    application/pdfPDF (6MB)
  • Mor, Omri (2019-08-18)
    Modern systems contain a variety of data-parallel compute components, such as CPU vector units and GPU cores. Addressing these components requires a restructuring of application data so that it can be efficiently loaded ...

    application/pdf

    application/pdfPDF (429kB)
  • Dutta, Sudipta (2013-02-03)
    The Smart Grid represents a transition of the power and energy industry into a new era of improved efficiency, reliability, availability, and security, while contributing to economic and environmental health. However, ...

    application/pdf

    application/pdfPDF (3MB)
  • Hill, David J. (2007)
    Anomaly detection is the task of identifying data that deviate from historical patterns. It has many practical applications, such as data quality assurance and control (QA/QC), focused data collection, and event detection. ...

    application/pdf

    application/pdfPDF (6MB)Restricted to U of Illinois
  • Yu, Hwan-Jo (2004-05)
    Data is everywhere, abundant, continuously increasing, and heterogeneous. For example, Web pages on the Internet are rapidly growing, data in commercial databases are continuously accumulating, as well as biological data ...

    application/pdf

    application/pdfPDF (3MB)
  • Yu, Hwan-Jo (2004)
    KDD (Knowledge Discovery and Data mining) has been extensively studied in the last decade as data is continuously increasing in size and complexity. This thesis introduces three practical data mining problems---(1) classifying ...

    application/pdf

    application/pdfPDF (6MB)Restricted to U of Illinois
  • Berkovsky, Shlomo; Eytani, Yaniv; Kuflik, Tsvi; Ricci, Francesco (2007-02)
    Collaborative Filtering (CF) is an attractive and reliable recommendation technique. CF is typically implemented using a centralized storage of user profiles and this is a severe privacy danger, since an attack to this ...

    application/pdf

    application/pdfPDF (106kB)
  • Dalton, Steven (2015-01-21)
    Algebraic multigrid methods for large, sparse linear systems are central to many computational simulations. Parallel algorithms for such solvers are generally decomposed into coarse-grain tasks suitable for distributed ...

    application/pdf

    application/pdfPDF (6MB)
  • Brodman, James C. (2011-05-25)
    Exploiting parallelism in modern machines increases the di culty of developing applications. Thus, new abstractions are needed that facilitate parallel programming and at the same time allow the programmer to control ...

    application/pdf

    application/pdfPDF (9MB)
  • Mehrotra, Sharad (1996)
    Despite rapid increases in CPU performance, the primary obstacles to achieving higher performance in contemporary processor organizations remain control and data hazards. Primary data cache misses are responsible for the ...

    application/pdf

    application/pdfPDF (7MB)Restricted to U of Illinois
  • Chen, William Yu-Wei, Jr. (1993)
    Processor design techniques, such as pipelining, superscalar, and VLIW, have dramatically decreased the average number of clock cycles per instruction. As a result, each execution cycle has become more significant to overall ...

    application/pdf

    application/pdfPDF (5MB)Restricted to U of Illinois
  • Walsh, Sara B.; Hajjar, Jerome F. (Newmark Structural Engineering Laboratory. University of Illinois at Urbana-Champaign., 2009-06)
    This research is investigating the use of high resolution 3D terrestrial laser scanners as tools to capture geometric data of complex scenes for structural engineering applications. Laser scan technology is continuously ...

    application/pdf

    application/pdfPDF (4MB)
  • Lourentzou, Ismini (2019-12-05)
    Deep Learning, a growing sub-field of machine learning, has been applied with tremendous success in a variety of domains, opening opportunities for achieving human level performance in many applications. However, Deep ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Yamada, Yoji (Center for Reliable and High-Performance Computing, Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, 1994-11)

    application/pdf

    application/pdfPDF (3MB)Restricted to U of Illinois
  • Yamada, Yoji (1995)
    Numerical applications frequently contain nested loop structures that process large arrays of data. The execution of these loop structures often produces memory preference patterns that poorly utilize data caches. Limited ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Stangel, Michael A. (Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, 1997-11)

    application/pdf

    application/pdfPDF (2MB)