Search
Now showing items 3711-3720 of 4210
The Condor Programmer's Manual - Version II
(MIT Artificial Intelligence Laboratory, 1987-07)
This is the CONDOR programmer's manual, that describes the hardware and software that form the basis of the real-time computational architecture built originally for the Utah-MIT hand. The architecture has been used ...
The New Idiot's Guide to OZ
(MIT Artificial Intelligence Laboratory, 1988-02)
This is a manual for complete beginners. It assumes no knowledge of the MIT computer systems. This guide will teach you how to log onto the computer called OZ, a DEC PDP-20 computer running the TWENEX (TOPS-20) operating ...
Merging Illustrations and Printing on Big Paper
(MIT Artificial Intelligence Laboratory, 1987-07)
How to guide for some of the printing utilities in the AI lab. Describes how TEX tiles are processed and how some illustrations may be merged into the final copy. Also describes how to use TEX to print on 8.5x14 (legal) ...
Efficient Motion Planning Algorithm for Stochastic Dynamic Systems with Constraints on Probability of Failure
(2008-03-06)
When controlling dynamic systems such as mobile robots in uncertain environments, there is a trade off between risk and reward. For example, a race car can turn a corner faster by taking a more challenging path. This paper ...
Unsupervised Distributed Feature Selection for Multi-view Object Recognition
(2008-02-17)
Object recognition accuracy can be improved when information frommultiple views is integrated, but information in each view can oftenbe highly redundant. We consider the problem of distributed objectrecognition or indexing ...
WaveScript: A Case-Study in Applying a Distributed Stream-Processing Language
(2008-01-31)
Applications that combine live data streams with embedded, parallel,and distributed processing are becoming more commonplace. WaveScriptis a domain-specific language that brings high-level, type-safe,garbage-collected ...
Transfer learning for image classification with sparse prototype representations
(2008-03-03)
To learn a new visual category from few examples, prior knowledge from unlabeled data as well as previous related categories may be useful. We develop a new method for transfer learning which exploits available unlabeled ...
Wicked Problems and Gnarly Results: Reflecting on Design and Evaluation Methods for Idiosyncratic Personal Information Management Tasks
(2008-02-10)
This paper is a case study of an artifact design and evaluation process; it is a reflection on how right thinking about design methods may at times result in sub-optimal results. Our goal has been to assess our decision ...
Finding Bugs In Dynamic Web Applications
(2008-02-06)
Web script crashes and malformed dynamically-generated web pages are common errors, and they seriously impact usability of web applications. Currenttools for web-page validation cannot handle the dynamically-generatedpages ...
Exploiting Transport-Level Characteristics of Spam
(2008-02-15)
In the arms race to secure electronic mail users and servers fromunsolicited messages (spam), the most successful solutions employtechniques that are difficult for spammers to circumvent. Thisresearch investigates the ...