Open Access Repositories: Recent submissions

Now showing items 2301-2320 of 4204

  • Sparse recovery using sparse matrices 

    Unknown author (2008-01-10)
    We consider the approximate sparse recovery problem, where the goal is to (approximately) recover a high-dimensional vector x from its lower-dimensional sketch Ax. A popular way of performing this recovery is by finding ...

  • Relational Envelope-based Planning 

    Unknown author (2007-12-31)
    This thesis proposes a synthesis of logic and probability for solving stochastic sequential decision-making problems. We address two main questions: How can we take advantage of logical structure to speed up planning in a ...

  • Views on Vision 

    Unknown author (MIT Artificial Intelligence Laboratory, 1971-02)

  • The Object Partition Problem 

    Unknown author (MIT Artificial Intelligence Laboratory, 1971-02)

  • Feature Point Generation Programs 

    Unknown author (MIT Artificial Intelligence Laboratory, 1971)
    The programs in this set extract, from a raster of intensity values over some scene, a set of points which are adjudged to lie along the boundaries of objects in the scene. Intensities may be obtained directly from the new ...

  • The Line Verifier GVERIFY1 

    Unknown author (MIT Artificial Intelligence Laboratory, 1971)
    A line verifier is presented which, given the co-ordinates of the end points of the hypothesized line, returns a (possibly) more accurate version of the end points, together with an estimate of the probability that there ...

  • Learning complex cell invariance from natural videos: A plausibility proof 

    Unknown author (2007-12-26)
    One of the most striking feature of the cortex is its ability to wire itself. Understanding how the visual cortex wires up through development and how visual experience refines connections into adulthood is a key question ...

  • Report on the Probabilistic Language Scheme 

    Unknown author (2007-10-22)
    Reasoning with probabilistic models is a widespread andsuccessful technique in areas ranging from computer vision, to naturallanguage processing, to bioinformatics. Currently, these reasoningsystems are either coded from ...

  • Team MIT Urban Challenge Technical Report 

    Unknown author (2007-12-14)
    This technical report describes Team MIT s approach to theDARPA Urban Challenge. We have developed a novel strategy forusing many inexpensive sensors, mounted on the vehicle periphery,and calibrated with a new cross-­modal ...

  • The L%LINES Package 

    Unknown author (MIT Artificial Intelligence Laboratory, 1971)
    The program (L%LINES X Y) takes feature point output from the FP%FPOINTS program (q.v.) for horizontal and vertical scans (X and Y respectively); and outputs a list consisting of two lists of line segments, represented in ...

  • Quantitative Information Flow as Network Flow Capacity 

    Unknown author (2007-12-10)
    We present a new technique for determining how much information abouta program's secret inputs is revealed by its public outputs. Incontrast to previous techniques based on reachability from secretinputs (tainting), it ...

  • Transcriptional profiling of MnSOD-mediated lifespan extension in Drosophila reveals a species-general network of aging and metabolic genes 

    Curtis, Christina; Landis, Gary N; Folk, Donna; Wehr, Nancy B; Hoe, Nicholas; Waskar, Morris; Abdueva, Diana; Skvortsov, Dmitriy; Ford, Daniel; Luu, Allan; Badrinath, Ananth; Levine, Rodney L; Bradley, Timothy J; Tavare, Simon; Tower, John (2007-12-09)
    Abstract Background Several interventions increase lifespan in model organisms, including reduced insulin/insulin-like growth factor-like signaling (IIS), FOXO transcription factor activation, dietary restriction, and ...

  • Verifiably Secure Devices 

    Unknown author (2007-12-05)
    We put forward the notion of a verifiably secure device, in essence a stronger notion of secure computation, and achieve it in the ballot-box model. Verifiably secure devices1. Provide a perfect solution to the problem of ...

  • Mapping Stream Programs into the Compressed Domain 

    Unknown author (2007-11-30)
    Due to the high data rates involved in audio, video, and signalprocessing applications, it is imperative to compress the data todecrease the amount of storage used. Unfortunately, this implies thatany program operating on ...

  • ReCrash: Making Crashes Reproducible 

    Unknown author (2007-11-20)
    It is difficult to fix a problem without being able to reproduce it.However, reproducing a problem is often difficult and time-consuming.This paper proposes a novel algorithm, ReCrash, that generatesmultiple unit tests ...

  • Towards Feature Selection In Actor-Critic Algorithms 

    Unknown author (2007-11-01)
    Choosing features for the critic in actor-critic algorithms with function approximation is known to be a challenge. Too few critic features can lead to degeneracy of the actor gradient, and too many features may lead to ...

  • Transfering Nonlinear Representations using Gaussian Processes with a Shared Latent Space 

    Unknown author (2007-11-06)
    When a series of problems are related, representations derived fromlearning earlier tasks may be useful in solving later problems. Inthis paper we propose a novel approach to transfer learning withlow-dimensional, non-linear ...

  • Collusion-Resilient Revenue In Combinatorial Auctions 

    Unknown author (2007-11-02)
    In auctions of a single good, the second-price mechanism achieves, in dominantstrategies, a revenue benchmark that is naturally high and resilient to anypossible collusion.We show how to achieve, to the maximum extent ...

  • Set Interfaces for Generalized Typestate and Data Structure Consistency Verification 

    Unknown author (2007-10-31)
    Typestate systems allow the type of an object to change during its lifetime in the computation. Unlike standard type systems, they can enforce safety properties that depend on changing object states. We present a new, ...

  • Fast Self-Healing Gradients 

    Unknown author (2008-03)
    We present CRF-Gradient, a self-healing gradient algorithm that provably reconfigures in O(diameter) time. Self-healing gradients are a frequently used building block for distributed self-healing systems, but previous ...