Search
Now showing items 3581-3590 of 4210
New Resiliency in Truly Combinatorial Auctions (and Implementation in Surviving Strategies)
(2008-10-08)
Following Micali and Valiant [MV07.a], a mechanism is resilient if it achieves its objective without any problem of (1) equilibrium selection and (2) player collusion. To advance resilient mechanism design,We put forward ...
Refactoring Sequential Java Code for Concurrency via Concurrent Libraries
(2008-09-30)
Parallelizing existing sequential programs to run efficiently on multicores is hard. The Java 5 packagejava.util.concurrent (j.u.c.) supports writing concurrent programs: much of the complexity of writing threads-safe and ...
The Case for a Factored Operating System (fos)
(2008-10-08)
The next decade will afford us computer chips with 1,000 - 10,000 cores on a single piece of silicon. Contemporary operating systems have been designed to operate on a single core or small number of cores and hence are not ...
Adaptive Kernel Methods Using the Balancing Principle
(2008-10-16)
The regularization parameter choice is a fundamental problem in supervised learning since the performance of most algorithms crucially depends on the choice of one or more of such parameters. In particular a main theoretical ...
One Video Stream to Serve Diverse Receivers
(2008-10-18)
The fundamental problem of wireless video multicast is to scalably serve multiple receivers which may have very different channel characteristics. Ideally, one would like to broadcast a single stream that allows each ...
Recursively invoking Linnaeus: A Taxonomy for Naming Systems
(2002-03-01)
Naming is a central element of a distributed or network system design. Appropriate design choices are central. This paper explores a taxonomy of naming systems, and engineering tradeoffs as an aid to the namespace designer. ...
Modular Generation and Customization
(2008-10-10)
Modularity and flexibility can conflict in multi-language systems. For example, the templates commonly used to generate web pages must be manually updated when the database schema changes. Modularity can be improved by ...
ZigZag Decoding: Combating Hidden Terminals In Wireless Networks
(2008-10-01)
This paper presents ZigZag, an 802.11 receiver design that combats hidden terminals. ZigZag's core contribution is a new form of interference cancellation that exploits asynchrony across successive collisions. Specifically, ...
Detecting Hazardous Intensive Care Patient Episodes Using Real-time Mortality Models
(2009-08-26)
The modern intensive care unit (ICU) has become a complex, expensive, data-intensive environment. Caregivers maintain an overall assessment of their patients based on important observations and trends. If an advanced ...
Extending a MOOS-IvP Autonomy System and Users Guide to the IvPBuild Toolbox
(2009-08-20)
This document describes how to extend the suite of MOOS applications and IvP Helm behaviors distributed with the MOOS-IvP software bundle from www.moos-ivp.org. It covers (a) a straw-man repository with a place-holder MOOS ...