Open Access Repositories: Recent submissions
Now showing items 2361-2380 of 4204
-
Trading Structure for Randomness in Wireless Opportunistic Routing
(2007-02-23)Opportunistic routing is a recent technique that achieves high throughput in the face of lossy wireless links. The current opportunistic routing protocol, ExOR, ties the MAC with routing, imposing a strict schedule on ...
-
Information Slicing: Anonymity Using Unreliable Overlays
(2007-02-23)This paper proposes a new approach to anonymous communication called information slicing. Typically, anonymizers use onion routing, where a message is encrypted in layers with the public keys of the nodes along the path. ...
-
Embracing Wireless Interference: Analog Network Coding
(2007-02-23)Traditionally, interference is considered harmful.Wireless networks strive to avoid scheduling multiple transmissions at the same time in order to prevent interference. This paper adopts the opposite approach; it encourages ...
-
Using Task-Structured Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol
(2007-02-16)The Probabilistic I/O Automata framework of Lynch, Segala and Vaandrager provides tools for precisely specifying protocols and reasoning about their correctness using multiple levels of abstraction, based on implementation ...
-
Automatic shaping and decomposition of reward functions
(2007-02-13)This paper investigates the problem of automatically learning how torestructure the reward function of a Markov decision process so as tospeed up reinforcement learning. We begin by describing a method thatlearns a shaped ...
-
PPR: Partial Packet Recovery for Wireless Networks
(2007-02-02)Bit errors occur over wireless channels when the signal isn't strongenough to overcome the effects of interference and noise. Currentwireless protocols may use forward error correction (FEC) to correct forsome (small) ...
-
HQ Replication: Properties and Optimizations
(2007-02-12)There are currently two approaches to providing Byzantine-fault-tolerant state machine replication: a replica-based approach, e.g., BFT, that uses communication between replicas to agree on a proposed ordering of requests, ...
-
Phonetic Classification Using Hierarchical, Feed-forward, Spectro-temporal Patch-based Architectures
(2007-02-01)A preliminary set of experiments are described in which a biologically-inspired computer vision system (Serre, Wolf et al. 2005; Serre 2006; Serre, Oliva et al. 2006; Serre, Wolf et al. 2006) designed for visual object ...
-
Explorations in Low-Cost Compliant Robotics
(2007-01-30)This thesis presents the findings of exploratory research in low-cost compliant robotics. The most heavily leveraged trade-off is that of mechanical precision for computational power, with the hope that the price of future ...
-
Online Active Learning in Practice
(2007-01-23)We compare the practical performance of several recently proposed algorithms for active learning in the online setting. We consider two algorithms (and their combined variants) that are strongly online, in that they do ...
-
Robot Manipulation in Human Environments
(2007-01-16)Human environments present special challenges for robot manipulation. They are often dynamic, difficult to predict, and beyond the control of a robot engineer. Fortunately, many characteristics of these settings can be ...
-
Scale Control Processor Test-Chip
(2007-01-12)We are investigating vector-thread architectures which provide competitive performance and efficiency across a broad class of application domains. Vector-thread architectures unify data-level, thread-level, and instruction-level ...
-
Latent-Dynamic Discriminative Models for Continuous Gesture Recognition
(2007-01-07)Many problems in vision involve the prediction of a class label for each frame in an unsegmented sequence. In this paper we develop a discriminative framework for simultaneous sequence segmentation and labeling which can ...
-
Quantifier-Free Boolean Algebra with Presburger Arithmetic is NP-Complete
(2007-01-01)Boolean Algebra with Presburger Arithmetic (BAPA) combines1) Boolean algebras of sets of uninterpreted elements (BA)and 2) Presburger arithmetic operations (PA). BAPA canexpress the relationship between integer variables ...
-
Bounded CCA2-Secure Non-Malleable Encryption
(2006-12-14)Under an adaptive chosen ciphertext attack (CCA2), the security of an encryption scheme must hold against adversaries that have access to a decryption oracle. We consider a weakening of CCA2 security, wherein security ...
-
Memoization Attacks and Copy Protection in Partitioned Applications
(2006-12-08)Application source code protection is a major concern for software architects today. Secure platforms have been proposed that protect the secrecy of application algorithms and enforce copy protection assurances. Unfortunately, ...
-
Distributed Area Search with a Team of Robots
(2006-12-05)The main goal of this thesis is to demonstrate the applicability of the distributed systems paradigm to robotic systems. This goal is accomplished by presenting two solutions to the Distributed Area Search problem: organizing ...
-
Materialization Strategies in a Column-Oriented DBMS
(2006-11-27)There has been renewed interest in column-oriented database architectures in recent years. For read-mostly query workloads such as those found in data warehouse and decision support applications, ``column-stores'' have ...
-
Scoop: An Adaptive Indexing Scheme for Stored Data in Sensor Networks
(2006-11-27)In this paper, we present the design of Scoop, a system for indexing and querying stored data in sensor networks. Scoop works by collecting statistics about the rate of queries and distribution of sensor readings over a ...
-
Context-based Visual Feedback Recognition
(2006-11-15)During face-to-face conversation, people use visual feedback (e.g.,head and eye gesture) to communicate relevant information and tosynchronize rhythm between participants. When recognizing visualfeedback, people often rely ...
