Open Access Repositories: Recent submissions
Now showing items 1921-1940 of 4204
-
Understanding and evaluating blind deconvolution algorithms
(2009-03-31)Blind deconvolution is the recovery of a sharp version of a blurred image when the blur kernel is unknown. Recent algorithms have afforded dramatic progress, yet many aspects of the problem remain challenging and hard to ...
-
Fragment Grammars: Exploring Computation and Reuse in Language
(2009-03-31)Language relies on a division of labor between stored units and structure building operations which combine the stored units into larger structures. This division of labor leads to a tradeoff: more structure-building means ...
-
Representing Small Group Evolution
(2009-03-30)Understanding the dynamics of network evolution rests in part on the representation chosen to characterize the evolutionary process. We offer a simple, three-parameter representation based on subgraphs that capture three ...
-
Oblivious Routing in On-Chip Bandwidth-Adaptive Networks
(2009-03-27)Oblivious routing can be implemented on simple router hardware, but network performance suffers when routes become congested. Adaptive routing attempts to avoid hot spots by re-routing flows, but requires more complex ...
-
Finding Bugs in Web Applications Using Dynamic Test Generation and Explicit State Model Checking
(2009-03-26)Web script crashes and malformed dynamically-generated web pages are common errors, and they seriously impact the usability of web applications. Current tools for web-page validation cannot handle the dynamically generated ...
-
The Abstract MAC Layer
(2009-02-21)A diversity of possible communication assumptions complicates the study of algorithms and lower bounds for radio networks. We address this problem by defining an Abstract MAC Layer. This service provides reliable local ...
-
Overcoming the Antennas-Per-Node Throughput Limit in MIMO LANs
(2009-02-18)Today, the number of concurrent packets in a MIMO LAN is limited by the number of antennas on the AP. This paper shows how to overcome this limit. It presents a new design where multiple client-AP pairs can communicate ...
-
Automatic Class-Specific 3D Reconstruction from a Single Image
(2009-02-18)Our goal is to automatically reconstruct 3D objects from a single image, by using prior 3D shape models of classes. The shape models, defined as a collection of oriented primitive shapes centered at fixed 3D positions, can ...
-
A Tour of MOOS-IvP Autonomy Software Modules
(2009-02-13)This paper provides an overview of the MOOS-IvP autonomy software modules. The MOOS-IvP collection of software, i.e., codebase, described here has been developed and is currently maintained by three organizations - Oxford ...
-
SoftCast: One Video to Serve All Wireless Receivers
(2009-02-07)The main challenge in wireless video multicast is to scalably serve multiple receivers who have different channel characteristics. Current wireless transmission schemes, however, cannot support smooth degradation. Specifically, ...
-
HAMPI: A Solver for String Constraints
(2009-02-04)Many automatic testing, analysis, and verification techniques for programs can be effectively reduced to a constraint-generation phase followed by a constraint-solving phase. This separation of concerns often leads to more ...
-
Self-Stabilizing Message Routing in Mobile ad hoc Networks
(2009-01-28)We present a self-stabilizing algorithm for routing messages between arbitrary pairs of nodes in a mobile ad hoc network. Our algorithm assumes the availability of a reliable GPS service, which supplies mobile nodes with ...
-
The Art of the Propagator
(2009-01-26)We develop a programming model built on the idea that the basic computational elements are autonomous machines interconnected by shared cells through which they communicate. Each machine continuously examines the cells it ...
-
Organic Indoor Location Discovery
(2008-12-30)We describe an indoor, room-level location discovery method based on spatial variations in "wifi signatures," i.e., MAC addresses and signal strengths of existing wireless access points. The principal novelty of our system ...
-
Analysis of plasmid genes by phylogenetic profiling and visualization of homology relationships using Blast2Network
(2008-12-21)Abstract Background Phylogenetic methods are well-established bioinformatic tools for sequence analysis, allowing to describe the non-independencies of sequences because of their common ancestor. However, the evolutionary ...
-
Resilient Auctions of One Good in Limited Supply
(2008-12-17)We present various resilient auction mechanisms for a good in limited supply. Our mechanisms achieve both player-knowledge and aggregated player-knowledge benchmarks.
-
Resilient Provision of a Public and/or Private Good, or: Resilient Auctions of One Good in Unlimited Supply
(2008-12-02)We present two resilient mechanisms: the first for the provision of a public good, and the second for the provision of a private good. Both mechanisms adopt a knowledge-based benchmark.
-
Resilient Provision of a Public Good
(2008-12-02)We present two resilient mechanisms for the provision of a public good. Both mechanisms adopt a knowledge-based benchmark.
-
Resilient Knowledge-Based Mechanisms For Truly Combinatorial Auctions (And Implementation in Surviving Strategies)
(2008-10-08)We put forward a new mechanism achieving a high benchmark for (both revenue and) the sum of revenue and efficiency in truly combinatorial auctions. Notably, our mechanism guarantees its performance (1) in a very adversarial ...
-
Mathematics of the Neural Response
(2008-11-26)We propose a natural image representation, the neural response, motivated by the neuroscience of the visual cortex. The inner product defined by the neural response leads to a similarity measure between functions which we ...
