Open Access Repositories: Recent submissions
Now showing items 2321-2340 of 4204
-
Pluggable type-checking for custom type qualifiers in Java
(2007-09-17)We have created a framework for adding custom type qualifiers to the Javalanguage in a backward-compatible way. The type system designer definesthe qualifiers and creates a compiler plug-in that enforces theirsemantics. ...
-
MIXIT: The Network Meets the Wireless Channel
(2007-09-04)The traditional contract between the network and the lower layers states that the network does routing and the lower layers deliver correct packets. In a wireless network, however, different nodes may hear most bits in a ...
-
Factors Affecting the Adoption of Faculty-Developed Academic Software: A Study of Five iCampus Projects
(2007-10-20)Instruction in higher education must adapt more rapidly to: changes in workforce needs, global issues, advances in disciplines, and resource constraints. The pace of such improvement depends on the speed with which new ...
-
World Wide Web Without Walls
(2007-08-24)Today's Web is built upon a particular symbiotic relationship betweensites and users: the sites invest capital to create and market a setof features, and users gain access to the sites often in exchange fortheir data (e.g., ...
-
Constraint and Restoring Force
(2007-08-24)Long-lived sensor network applications must be able to self-repair and adapt to changing demands. We introduce a new approach for doing so: Constraint and Restoring Force. CRF is a physics-inspired framework for computing ...
-
Learning by Learning To Communicate
(2007-08-23)Human intelligence is a product of cooperation among many different specialists. Much of this cooperation must be learned, but we do not yet have a mechanism that explains how this might happen for the "high-level" agile ...
-
Factors Affecting the Adoption of Faculty-Developed Academic Software: A Study of Five iCampus Projects
(2007-08-20)Initiated in 1999, iCampus is a research collaboration between Microsoft Research and MIT whose goal is to create and demonstrate technologies with the potential for revolutionary change throughout the university curriculum. ...
-
Toward Secure Services from Untrusted Developers
(2007-08-06)We present a secure service prototype built from untrusted,contributed code.The service manages private data for a variety of different users, anduser programs frequently require access to other users' private data.However, ...
-
Perfect Implementation of Normal-Form Mechanisms
(2005)Privacy and trust affect our strategic thinking, yet they have not been precisely modeled in mechanism design. In settings of incomplete information, traditional implementations of a normal-form mechanism ---by disregarding ...
-
Agent Organization and Request Propagation in the Knowledge Plane
(2007-07-26)In designing and building a network like the Internet, we continue to face the problems of scale and distribution. In particular, network management has become an increasingly difficult task, and network applications often ...
-
Continuous Space-Time Semantics Allow Adaptive Program Execution
(2007-07)A spatial computer is a collection of devices filling spacewhose ability to interact is strongly dependent on theirproximity. Previously, we have showed that programmingsuch a computer as a continuous space can allow ...
-
Hierarchical Dirichlet Process-Based Models For Discovery of Cross-species Mammalian Gene Expression
(2007-07-06)An important research problem in computational biology is theidentification of expression programs, sets of co-activatedgenes orchestrating physiological processes, and thecharacterization of the functional breadth of these ...
-
Using The Barton Libraries Dataset As An RDF benchmark
(2007-07-06)This report describes the Barton Libraries RDF dataset and Longwell querybenchmark that we use for our recent VLDB paper on Scalable Semantic WebData Management Using Vertical Partitioning.
-
Table 2 (Supplemental): Complete data for all 100 expression programs discovered by GeneProgram from the Novartis Gene Atlas v2
(2007-06-25)Table 2 (Supplemental): Complete data for all 100 recurrent expression programs (EPs) discovered by GeneProgram. Each EP has two identifying rows, a list of meta-genes, and a list of significantly enriched GO categories. ...
-
Table 1 (Supplemental): Summary of expression programs discovered by GeneProgram from Novartis Tissue Atlas v2 data
(2007-06-25)Table 1 (Supplemental): Summary of recurrent expression programs (EPs) discovered by GeneProgram. The columns are: (1) the EP identifier (an arbitrarily assigned number), (2) the number of genes in the EP, (3) the number ...
-
Stateful Anycast for DDoS Mitigation
(2007-06-21)Distributed denial-of-service (DDoS) attacks can easily cripple victim hosts or networks, yet effective defenses remain elusive. Normal anycast can be used to force the diffusion of attack traffic over a group of several ...
-
Information Accountability
(2007-06-13)Ease of information flow is both the boon and the bane of large-scale, decentralized systems like the World Wide Web. For all the benefits and opportunities brought by the information revolution, with that same revolution ...
-
Using expression arrays for copy number detection: an example from E. Coli
(2007-06-14)Abstract Background The sequencing of many genomes and tiling arrays consisting of millions of DNA segments spanning entire genomes have made high-resolution copy number analysis possible. Microarray-based comparative ...
-
The Psychophysiology of Risk Processing and Decision Making at a Regional Stock Exchange
(2007-06-12)A longstanding controversy in philosophy is whether decision-making isgoverned by reason or emotion. I study the role of physiologicalresponses in the decision-making process within the realm of financialmarkets, where ...
-
An Analysis of Posynomial MOSFET Models Using Genetic Algorithms and Visualization
(2007-06-05)Analog designers are interested in optimization tools which automate the process of circuit sizing. Geometric programming, which uses posynomial models of MOSFET parameters, represents one such tool. Genetic algorithms ...
