Browsing Department of Computer Science by Issue Date
Now showing items 120 of 89

Evolving a Disjunctive Predator Prey Swarm using PSO: Adapting Swarms with Swarms
(20060215)Swarm Intelligence is the study of "the emergent collective intelligence of groups of simple agents." Recent research has explored the important applications in the field of business, telecommunications, robotics and ... 
Java bytecode compilation for highperformance, platformindependent logical inference.
(20060511)Automated reasoning systems are powerful computer programs capable of solving complex problems. They are characterized as computationally intensive having high performance requirements. Very few reasoning systems have ... 
Analysis of transaction throughput in P2P environments.
(20060528)In recent years P2P systems have gained tremendous popularity. Support of a transaction processing facility in P2P systems would provide databases at a low cost. Extending distributed database algorithms such as 2PC and ... 
PGmeans: learning the number of clusters in data.
(20070319)We present a novel algorithm called PGmeans in this thesis. This algorithm is able to determine the number of clusters in a classical Gaussian mixture model automatically. PGmeans uses efficient statistical hypothesis ... 
"Twoway" obliviousness in general aspectoriented modeling.
(20081001)A key problem in software development is producing systems that are maintainable even as the concerns at play evolve. Aspectoriented programming (AOP) seeks to foster maintainability by isolating the speciﬁcations of ... 
Using GF(2) matrices in Simulation and Logic Synthesis
(20090123)GF(2) matrices are matrices of ones and zeros under modulo 2 arithmetic. Like the GF(2) polynomials used in error detection and correction, they have many potential uses in Electronic Design Automation (EDA). Nonsingular ... 
Using GF2 Matrices to Simplify Boolean Logic
(20090123)Conventional logic simplification can be couched in terms of singular GF(2) matrices. The advantage to doing this is that different matrices can be used to combine terms that are separated by a Hamming distance greater ... 
A Quick Algorithm for Identifying Conjugate Groups in GF(2)
(20090218)This report gives the details an algorithm for determining whether two matrix groups are conjugate to one another. Each group is designated by a pair of matrices that generate the group. The algorithm is able to determine ... 
Categories for Component Level Design
(20090218)Several research problems are discussed, including communication mechanisms and the interface between components and the glue logic used to tie them together. A technique for engineering new componentlevel applications ... 
The Complexity of Detecting Symmetric Functions
(20090218)The characterization of the symmetries of boolean functions is important both in automatic layout synthesis, and in automatic verification of manually created layouts. It is possible to characterize the symmetries of an ... 
The GF2Matrices Classes: A Programming Package for Mathematical Research
(20090331)Over the past few years I have been engaged in an intense study of GF(2) matrices, especially of dimensions 2, 3, 4, and 5. The software I used for this study was mostly a bunch of adhoc subroutines scattered over numerous ... 
: GF2Matrices
(20090331)This is the software described in the technical report “The GF2Matrices Classes: A Programming Package for Mathematical Research.” Over the past few years I have been engaged in an intense study of GF(2) matrices, especially ... 
The GF(2) General Linear Group for Dimensions 2, 3, 4, and 5
(20090415)This report contains some data about the General Linear Groups of GF(2) for dimensions 2, 3, 4, and 5. These groups are groups of matrices over GF(2), the integers modulo 2. The General Linear Group of order is the set ... 
Metamorphic programming
(20090415)Metamorphic programming is an effective tool for creating efficient and elegant solutions to many programming problems, at least once you get over the shock of seeing code that violates many of the accepted rules of good ... 
A Search Strategy Using a HammingDistance Oracle
(20090804)The objective of the algorithm described in this report is to optimally guess a hidden binary string based on queries to an oracle where the length of the string is known beforehand. A C++ version of the algorithm is given ... 
AN APPLICATION OF GROUP THEORY TO THE ANALYSIS OF SYMMETRIC GATES
(20091026)A method for determining the symmetries of the inputs of a logic gate either from its truth table or from facts obtained by inspection of its circuit is presented. The symmetry rule of a gate with n inputs is defined in ... 
Deduction by Induction
(20091026)In this report, I offer a technique for computing power sums that is: intuitive, wellmotivated, generalizable to all k, and suitable for presentation to precalculus students. 
Designing a Capstone Course to Simulate the Industrial Environment
(20091026)The creation of a capstone course for an un dergraduate computer science curriculum mirrors traditional software design. Initially, a highlevel goal is created. This is refined into lowerlevel specifications by ... 
The Functional Hardware Design Language
(20091028)The Functional Hardware Design Language is an expandable language that is designed to make it easy to specify gatelevel. FHDL currently supports the specification of gates, highlevel functional blocks, state machines, ... 
The FHDL Manual
(20091028)The Functional Hardware Design Language can be used to create all parts of a digital design. It can be used to design logiclevel circuits with ordinary gates, flipflops and midsized functional blocks. It is hierarchical ...