Open Access Repositories: Recent submissions
Now showing items 1701-1720 of 4204
-
'You can't just hit a button’: an ethnographic study of strategies to repurpose data from advanced clinical information systems for clinical process improvement
(BMC Medicine, 2013-04)Abstract Background Current policies encourage healthcare institutions to acquire clinical information systems (CIS) so that captured data can be used for secondary purposes, including clinical process improvement. Such ...
-
A Plan for Optimizing Network-Intensive Cloud Applications
(2013-02-12)A significant and growing number of applications deployed on cloud infrastructures are network-intensive. These applications are frequently bottlenecked by the speed of network connections between the machines on which ...
-
Asynchronous Failure Detectors
(2013-01-30)Failure detectors -- oracles that provide information about process crashes -- are an important abstraction for crash tolerance in distributed systems. The generality of failure-detector theory, while providing great ...
-
Securing Deployed RFIDs by Randomizing the Modulation and the Channel
(2013-01-12)RFID cards are widely used today in sensitive applications such as access control, payment systems, and asset tracking. Past work shows that an eavesdropper snooping on the communication between a card and its legitimate ...
-
The computational magic of the ventral stream: sketch of a theory (and why some deep architectures work).
(2012-12-29)This paper explores the theoretical consequences of a simple assumption: the computational goal of the feedforward path in the ventral stream -- from V1, V2, V4 and to IT -- is to discount image transformations, after ...
-
5D Covariance Tracing for Efficient Defocus and Motion Blur
(2012-11-16)The rendering of effects such as motion blur and depth-of-field requires costly 5D integrals. We dramatically accelerate their computation through adaptive sampling and reconstruction based on the prediction of the anisotropy ...
-
Monitoring the Execution of Temporal Plans for Robotic Systems
(2012-10-04)To achieve robustness in dynamic and uncertain environments, robotic systems must monitor the progress of their plans during execution. This thesis develops a plan executive called Pike that is capable of executing and ...
-
A Gaussian Approximation of Feature Space for Fast Image Similarity
(2012-10-01)We introduce a fast technique for the robust computation of image similarity. It builds on a re-interpretation of the recent exemplar-based SVM approach, where a linear SVM is trained at a query point and distance is ...
-
Robust Tracking for Real-Time Dense RGB-D Mapping with Kintinuous
(2012-09-17)This paper describes extensions to the Kintinuous algorithm for spatially extended KinectFusion, incorporating the following additions: (i) the integration of multiple 6DOF camera odometry estimation methods for robust ...
-
Aeolus Reference Manual
(2012-09-14)This document describes the interface that the Aeolus information flow platform provides for users who are implementing applications using Java. The document explains how the Aeolus features are made available by means of ...
-
Multiscale Geometric Methods for Data Sets I: Multiscale SVD, Noise and Curvature
(2012-09-08)Large data sets are often modeled as being noisy samples from probability distributions in R^D, with D large. It has been noticed that oftentimes the support M of these probability distributions seems to be well-approximated ...
-
A Social-Welfare Optimal Probabilistic Mechanism for Knightian Single-Good Auctions
(2012-09-07)We provide an optimal probabilistic mechanism for maximizing social welfare in single-good auctions when each player does not know his true valuation for the good, but only a set of valuations that is guaranteed to include ...
-
From Formal Methods to Executable Code
(2012-08-27)The objective of this work is the derivation of software that is verifiably correct. Our approach is to abstract system specifications and model these in a formal framework called Timed Input/Output Automata, which provides ...
-
Bounded-Contention Coding for Wireless Networks in the High SNR Regime
(2012-08-27)Efficient communication in wireless networks is typically challenged by the possibility of interference among several transmitting nodes. Much important research has been invested in decreasing the number of collisions in ...
-
Using Program Synthesis for Social Recommendations
(2012-08-13)This paper presents a new approach to select events of interest to a user in a social media setting where events are generated by the activities of the user's friends through their mobile devices. We argue that given the ...
-
Multiple functionally divergent and conserved copies of alpha tubulin in bdelloid rotifers
(2012-08-17)AbstractBackgroundBdelloid rotifers are microscopic animals that have apparently survived without sex for millions of years and are able to survive desiccation at all life stages through a process called anhydrobiosis. ...
-
Device and circuit-level performance of carbon nanotube field-effect transistor with benchmarking against a nano-MOSFET
(2012-08-19)AbstractThe performance of a semiconducting carbon nanotube (CNT) is assessed and tabulated for parameters against those of a metal-oxide-semiconductor field-effect transistor (MOSFET). Both CNT and MOSFET models considered ...
-
The Order Independence of Iterated Dominance in Extensive Games, with Connections to Mechanism Design and Backward Induction
(2012-07-31)Shimoji and Watson (1998) prove that a strategy of an extensive game is rationalizable in the sense of Pearce if and only if it survives the maximal elimination of conditionally dominated strategies. Briefly, this process ...
-
Patch complexity, finite pixel correlations and optimal denoising
(2012-10-07)Image restoration tasks are ill-posed problems, typically solved withpriors. Since the optimal prior is the exact unknown density of natural images,actual priors are only approximate and typically restricted to small ...
-
Viewstamped Replication Revisited
(2012-07-23)This paper presents an updated version of Viewstamped Replication, a replication technique that handles failures in which nodes crash. It describes how client requests are handled, how the group reorganizes when a replica ...
