Open Access Repositories: Recent submissions
Now showing items 1661-1680 of 4204
-
One Clock to Rule Them All: A Primitive for Distributed Wireless Protocols at the Physical Layer
(2014-04-27)Implementing distributed wireless protocols at the physical layer today is challenging because different nodes have different clocks, each of which has slightly different frequencies. This causes the nodes to have frequency ...
-
Symbolic Execution for (Almost) Free: Hijacking an Existing Implementation to Perform Symbolic Execution
(2014-04-22)Symbolic execution of a language is traditionally achieved by replacing the language s interpreter with an entirely new interpreter. This may be an unnecessary burden, and it is tempting instead to try to use as much of ...
-
Moebius Language Reference, Version 1.2
(2014-04-09)Moebius is a representation and interface language based on a subset of English. It is designed for use as a means of encoding information and as a means of conveying information between software components and other ...
-
Sloth: Being Lazy is a Virtue (When Issuing Database Queries)
(2014-04-14)Many web applications store persistent data in databases. During execution, such applications spend a significant amount of time communicating with the database for retrieval and storing of persistent data over the network. ...
-
Cicada: Predictive Guarantees for Cloud Network Bandwidth
(2014-03-24)In cloud-computing systems, network-bandwidth guarantees have been shown to improve predictability of application performance and cost. Most previous work on cloud-bandwidth guarantees has assumed that cloud tenants know ...
-
The N2 Corpus v1.0
(MIT CSAIL, 2014-03-22)The N2 Corpus (Narrative Networks Corpus) comprises 100 story texts (42,480 words) relevant to Islamist Extremism, drawn from religious stories, online material, and promotional magazines. The corpus has been annotated for ...
-
An Architecture for Online Affordance-based Perception and Whole-body Planning
(2014-03-16)The DARPA Robotics Challenge Trials held in December 2013 provided a landmark demonstration of dexterous mobile robots executing a variety of tasks aided by a remote human operator using only data from the robot's sensor ...
-
PIKA: A Network Service for Multikernel Operating Systems
(2014-01-28)PIKA is a network stack designed for multikernel operating systems that target potential future architectures lacking cache-coherent shared memory but supporting message passing. PIKA splits the network stack into several ...
-
Reliability-Aware Optimization of Approximate Computational Kernels with Rely
(2014-01-09)Emerging high-performance architectures are anticipated to contain unreliable components (e.g., ALUs) that offer low power consumption at the expense of soft errors. Some applications (such as multimedia processing, machine ...
-
Synthesis of Randomized Accuracy-Aware Map-Fold Programs
(2013-12-29)We present Syndy, a technique for automatically synthesizing randomized map/fold computations that trade accuracy for performance. Given a specification of a fully accurate computation, Syndy automatically synthesizes ...
-
3D Tracking via Body Radio Reflections
(2013-12-11)This paper introduces WiTrack, a system that tracks the 3D motion of a user from the radio signals reflected off her body. It works even if the person is occluded from the WiTrack device or in a different room. WiTrack ...
-
Bridging Utility Maximization and Regret Minimization
(2013-12-03)We relate the strategies obtained by (1) utility maximizers who use regret to refine their set of undominated strategies, and (2) regret minimizers who use weak domination to refine their sets of regret-minimizing strategies.
-
Random Intersection Trees
(JMLRJournal of Machine Learning Research, 2014-02)Finding interactions between variables in large and high-dimensional datasets is often a serious computational challenge. Most approaches build up interaction sets incrementally, adding variables in a greedy fashion. The ...
-
GenBase: A Complex Analytics Genomics Benchmark
(2013-11-19)This paper introduces a new benchmark, designed to test database management system (DBMS) performance on a mix of data management tasks (joins, filters, etc.) and complex analytics (regression, singular value decomposition, ...
-
On Randomized Path Coverage of Configuration Spaces
(2013-11-18)We present a sampling-based algorithm that generates a set of locally-optimal paths that differ in visibility.
-
OpenTuner: An Extensible Framework for Program Autotuning
(2013-11-01)Program autotuning has been shown to achieve better or more portable performance in a number of domains. However, autotuners themselves are rarely portable between projects, for a number of reasons: using a domain-informed ...
-
Code for Java Libraries for Accessing the Princeton Wordnet: Comparison and Evaluation
(2013-11-01)This archive contains the code and data for running the evaluations described in: Finlayson, Mark Alan (2014) "Java Libraries for Accessing the Princeton Wordnet: comparison and Evaluation" in Proceedings of the 7th Global ...
-
Asynchronous Failure Detectors
(2013-10-10)Failure detectors -- oracles that provide information about process crashes -- are an important abstraction for crash tolerance in distributed systems. The generality of failure-detector theory, while providing great ...
-
Distributed Shared State with History Maintenance
(2013-10-08)Shared mutable state is challenging to maintain in a distributed environment. We develop a technique, based on the Operational Transform, that guides independent agents into producing consistent states through inconsistent ...
-
Mouse Behavior Recognition with The Wisdom of Crowd
(2013-09-19)In this thesis, we designed and implemented a crowdsourcing system to annotatemouse behaviors in videos; this involves the development of a novel clip-based video labeling tools, that is more efficient than traditional ...
