Search
Now showing items 1-10 of 101
Learning a Dictionary of Shape-Components in Visual Cortex: Comparison with Neurons, Humans and Machines
(2006-04-25)
In this thesis, I describe a quantitative model that accounts for the circuits and computations of the feedforward path of the ventral stream of visual cortex. This model is consistent with a general theory of visual ...
Coordinating Agile Systems through the Model-based Execution of Temporal Plans
(2006-04-28)
Agile autonomous systems are emerging, such as unmanned aerial vehicles (UAVs), that must robustly perform tightly coordinated time-critical missions; for example, military surveillance or search-and-rescue scenarios. In ...
Of Malicious Motes and Suspicious Sensors
(2006-04-19)
How much damage can a malicious tiny device cause in a single-hopwireless network? Imagine two players, Alice and Bob, who want toexchange information. Collin, a malicious adversary, wants to preventthem from communicating. ...
A Combined Stochastic and Greedy Hybrid Estimation Capability for Concurrent Hybrid Models with Autonomous Mode Transitions
(2006-04-28)
Robotic and embedded systems have become increasingly pervasive in applicationsranging from space probes and life support systems to robot assistants. In order to act robustly in the physical world, robotic systems must ...
Detecting and tracking multiple interacting objects without class-specific models
(2006-04-25)
We propose a framework for detecting and tracking multiple interacting objects from a single, static, uncalibrated camera. The number of objects is variable and unknown, and object-class-specific models are not available. ...
Abstraction Layers for Scalable Microfluidic Biocomputers (Extended Version)
(2006-05-05)
Microfluidic devices are emerging as an attractive technology for automatically orchestrating the reactions needed in a biological computer. Thousands of microfluidic primitives have already been integrated on a single ...
A Probabilistic Particle Control Approach to Optimal, Robust Predictive Control
(2006-04-28)
Autonomous vehicles need to be able to plan trajectories to a specified goal that avoid obstacles, and are robust to the inherent uncertainty in the problem. This uncertainty arises due to uncertain state estimation, ...
Revisiting Internet Adressing: Back to the Future!
(2006-04-14)
IP prefixes undermine three goals of Internet routing: accurate reflection of network-layer reachability, secure routing messages, and effective traffic control. This paper presents Atomic IP (AIP), a simple change to ...
Supplement to "Distributed Quota Enforcement for Spam Control"
(2006-04-29)
This report is a supplement to our paper "Distributed Quota Enforcement forSpam Control" (NSDI 2006). We assume here that the reader has readthe main paper. In this report, we first analyze the enforcer nodes'key-value ...
Memoization Attacks and Copy Protection in Partitioned Applications
(2006-12-08)
Application source code protection is a major concern for software architects today. Secure platforms have been proposed that protect the secrecy of application algorithms and enforce copy protection assurances. Unfortunately, ...