Open Access Repositories: Recent submissions
Now showing items 1881-1900 of 4204
-
Attentive processing improves object recognition
(2009-10-02)The human visual system can recognize several thousand object categories irrespective of their position and size. This combination of selectivity and invariance is built up gradually across several stages of visual processing. ...
-
Efficient POMDP Forward Search by Predicting the Posterior Belief Distribution
(2009-09-23)Online, forward-search techniques have demonstrated promising results for solving problems in partially observable environments. These techniques depend on the ability to efficiently search and evaluate the set of beliefs ...
-
Whanaungatanga: Sybil-proof routing with social networks
(2009-09-24)Decentralized systems, such as distributed hash tables, are subject to the Sybil attack, in which an adversary creates many false identities to increase its influence. This paper proposes a routing protocol for a distributed ...
-
The first step in the development of text mining technology for cancer risk assessment: identifying and organizing scientific evidence in risk assessment literature
(2009-09-22)Abstract Background One of the most neglected areas of biomedical Text Mining (TM) is the development of systems based on carefully assessed user needs. We have recently investigated the user needs of an important task yet ...
-
BayesPeak: Bayesian analysis of ChIP-seq data
(2009-09-21)Abstract Background High-throughput sequencing technology has become popular and widely used to study protein and DNA interactions. Chromatin immunoprecipitation, followed by sequencing of the resulting samples, produces ...
-
Finding aircraft collision-avoidance strategies using policy search methods
(2009-09-12)A progress report describing the application of policy gradient and policy search by dynamic programming methods to an aircraft collision avoidance problem inspired by the requirements of next-generation TCAS.
-
Dependency-Directed Backtracking in Non-Deterministic Scheme
(MIT Artificial Intelligence Laboratory, 1988-08)Non-deterministic LISP can be used to describe a search problem without specifying the method used to solve the problem. We show that SCHEMER, a non-deterministic dialect of SCHEME, can support dependency-directed backtracking ...
-
Code for LOLCAT Method (Variant of Gillespie Algorithm)
(2009-09-04)This code and data is publicly listed code for the LOLCAT Method developed by Sagar Indurkhya and Jacob Beal, in the paper: "Reaction factoring and bipartite update graphs accelerate the Gillespie algorithm for large-scale ...
-
Using Code Perforation to Improve Performance, Reduce Energy Consumption, and Respond to Failures
(2009-09-03)Many modern computations (such as video and audio encoders, Monte Carlo simulations, and machine learning algorithms) are designed to trade off accuracy in return for increased performance. To date, such computations ...
-
Lightweight Communications and Marshalling for Low-Latency Interprocess Communication
(2009-09-02)We describe the Lightweight Communications and Marshalling (LCM) library for message passing and data marshalling. The primary goal of LCM is to simplify the development of low-latency message passing systems, targeted at ...
-
Information Flow for Secure Distributed Applications
(2009-08-27)Private and confidential information is increasingly stored online and increasingly being exposed due to human errors as well as malicious attacks. Information leaks threaten confidentiality, lead to lawsuits, damage ...
-
AvatarSAT: An Auto-tuning Boolean SAT Solver
(2009-08-26)We present AvatarSAT, a SAT solver that uses machine-learning classifiers to automatically tune the heuristics of an off-the-shelf SAT solver on a per-instance basis. The classifiers use features of both the input and ...
-
Detecting Hazardous Intensive Care Patient Episodes Using Real-time Mortality Models
(2009-08-26)The modern intensive care unit (ICU) has become a complex, expensive, data-intensive environment. Caregivers maintain an overall assessment of their patients based on important observations and trends. If an advanced ...
-
Extending a MOOS-IvP Autonomy System and Users Guide to the IvPBuild Toolbox
(2009-08-20)This document describes how to extend the suite of MOOS applications and IvP Helm behaviors distributed with the MOOS-IvP software bundle from www.moos-ivp.org. It covers (a) a straw-man repository with a place-holder MOOS ...
-
Guaranteed in-order packet delivery using Exclusive Dynamic Virtual Channel Allocation
(2009-08-18)In-order packet delivery, a critical abstraction for many higher-level protocols, can severely limit the performance potential in low-latency networks (common, for example, in network-on-chip designs with many cores). While ...
-
Application Heartbeats for Software Performance and Health
(2009-08-07)Adaptive, or self-aware, computing has been proposed as one method to help application programmers confront the growing complexity of multicore software development. However, existing approaches to adaptive systems are ...
-
R/BHC: fast Bayesian hierarchical clustering for microarray data
(BMC Bioinformatics 2009, 2009-08-06)Abstract Background Although the use of clustering methods has rapidly become one of the standard computational approaches in the literature of microarray gene expression data analysis, little attention has been paid to ...
-
CG2Real: Improving the Realism of Computer Generated Images using a Large Collection of Photographs
(2009-07-15)Computer Graphics (CG) has achieved a high level of realism, producing strikingly vivid images. This realism, however, comes at the cost of long and often expensive manual modeling, and most often humans can still distinguish ...
-
The Guided Improvement Algorithm for Exact, General-Purpose, Many-Objective Combinatorial Optimization
(2009-07-03)This paper presents a new general-purpose algorithm for exact solving of combinatorial many-objective optimization problems. We call this new algorithm the guided improvement algorithm. The algorithm is implemented on top ...
-
Programming Manifolds
(2007)Many programming domains involve the manipulation of values distributed through a manifold - examples include sensor networks, smart materials, and biofilms. This paper describes a programming semantics for manifolds based ...
