Now showing items 147-166 of 209

    • Parallel prefetching and caching 

      Kimbrel, Tracy (1997)
      High-performance I/O systems depend on prefetching and caching to deliver good performance to applications. These two techniques have generally been considered in isolation, even though there are significant interactions ...
    • Photo-Realistic Scene Modeling and Visualization using Online Photo Collections 

      Shan, Qi
      Reconstructing 3D scenes from online photo collections has attracted a tremendous amount of interest from both academia and industry. The progress in the past decade has been exceptional, in terms of scale and reconstruction ...
    • Pixel-Based Reverse Engineering of Graphical Interfaces 

      Dixon, Morgan Emory
      User interface software is often large, complex, rigid, and difficult to implement. In fact, most of the development time and effort in a typical application is dedicated to the user interface. Not only do interfaces require ...
    • Practical Improvements to User Privacy in Cloud Applications 

      Cheng, Raymond
      As the cloud handles more user data, users need better techniques to protect their privacy from adversaries looking to gain unauthorized access to sensitive data. Today’s cloud services offer weak assurances with respect ...
    • Practical Verification of Safety-Critical Systems 

      Pernsteiner, Stuart
      Software-based control systems operate scientific equipment worth millions of dollars and even safety-critical medical devices, making them good targets for strong formal verification techniques. However, these systems ...
    • Practical, Usable, and Secure Authentication and Authorization on the Web 

      Czeskis, Alexei (2013-11-14)
      User authentication and authorization are two of the most critical aspects of computer security and privacy on the web. However, despite their importance, <italic>in practice</italic>, authentication and authorization are ...
    • Privacy and Performance in Social Overlay Networks 

      Isdal, Tomas (2012-09-13)
      The core Internet protocols were not designed to protect the privacy of content or the identities of communicating users, thus making censorship and surveillance easy. The same problem persists at higher level protocols, ...
    • Program Synthesis Without Full Specifications for Novel Applications 

      Perelman, Daniel Adam
      Program synthesis is a family of techniques that generate programs from a description of what the program should do but not how it should do it. By designing a program synthesis algorithm together with the user interaction ...
    • Programming by demonstration: a machine learning approach 

      Lau, Tessa (2001)
      Programming by demonstration (PBD) enables users to construct programs to automate repetitive tasks without writing a line of code. The key idea in PBD is to generalize from the user's demonstration of the program on a ...
    • Pushing the Limits of Compiler Verification 

      Mullen, Eric Alexander
      Modern computer systems rely on the correctness of at least one compiler for correct operation. Formal verification is a powerful technique for constructing correct systems. While there have been many efforts to develop ...
    • Quantum Computation and Isomorphism Testing 

      Rosenbaum, David Jeffrey
      In this thesis, we study quantum computation and algorithms for isomorphism problems. Some of the problems that we cover are fundamentally quantum and therefore require quantum techniques. For other problems, classical ...
    • Query Processing for Massively Parallel Systems 

      Koutris, Paraschos
      The need to analyze and understand big data has changed the landscape of data management over the last years. To process the large amounts of data available to users in both industry and science, many modern data management ...
    • Reconstruction and Visualization of Architectural Scenes 

      Kushal, Avanish
      Can we experience a scene virtually, such as the Colosseum in Rome, without ever having to visit it? Such an experience should replicate the feeling of being physically present, in terms of being able to visualize the scene ...
    • Reducing the Usability Barrier to Specification and Verification 

      Schiller, Todd Wademan
      A program specification is a contract between a client and a program, which describes how the program can or will behave given input from the client. In practice, formal (machine-verified) specifications take more effort ...
    • Relation Extraction: from Ontological Smoothing to Temporal Correspondence 

      Zhang, Congle
      Relation extraction, the task of extracting facts from natural language text and creating machine readable knowledge, is a great dream of artificial intelligence. Today, most approaches to relation extraction are based on ...
    • Representation of d-dimensional geometric objects 

      Brisson, Erik, 1957- (1990)
      This work investigates data structures and algorithms for representing and manipulating d-dimensional geometric objects for arbitrary d $\le$ 1. These objects are often described by a set of basic building blocks, together ...
    • Role oriented programming for software evolution 

      VanHilst, Michael, 1953- (1997)
      This thesis addresses the problem of changing requirements in software evolution. It presents a method of development and change based on roles, where a role, in object oriented development, is a part of an object that ...
    • Runtime Optimizations for Large-Scale Data Analytics 

      Wang, Jingjing
      Large-scale data analytics is key to modern science, technology, and business development. Big data systems have emerged rapidly in recent years, but modern data analytics remains challenging due to application requirements. ...
    • Runtime Repair and Enhancement of Mobile App Accessibility 

      Zhang, Xiaoyi
      Mobile devices and applications (apps) have become ubiquitous in daily life. Ensuring full access to the wealth of information and services they provide is a matter of social justice. Unfortunately, many capabilities and ...
    • Scalable Methods and Expressive Models for Planning Under Uncertainty 

      Kolobov, Andrey (2013-07-25)
      The ability to plan in the presence of uncertainty about the effects of one's own actions and the events of the environment is a core skill of a truly intelligent agent. This type of sequential decision-making has been ...