Open Access Repositories: Recent submissions

Now showing items 2361-2380 of 4204

  • Trading Structure for Randomness in Wireless Opportunistic Routing 

    Unknown author (2007-02-23)
    Opportunistic routing is a recent technique that achieves high throughput in the face of lossy wireless links. The current opportunistic routing protocol, ExOR, ties the MAC with routing, imposing a strict schedule on ...

  • Information Slicing: Anonymity Using Unreliable Overlays 

    Unknown author (2007-02-23)
    This paper proposes a new approach to anonymous communication called information slicing. Typically, anonymizers use onion routing, where a message is encrypted in layers with the public keys of the nodes along the path. ...

  • Embracing Wireless Interference: Analog Network Coding 

    Unknown author (2007-02-23)
    Traditionally, interference is considered harmful.Wireless networks strive to avoid scheduling multiple transmissions at the same time in order to prevent interference. This paper adopts the opposite approach; it encourages ...

  • Using Task-Structured Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol 

    Unknown author (2007-02-16)
    The Probabilistic I/O Automata framework of Lynch, Segala and Vaandrager provides tools for precisely specifying protocols and reasoning about their correctness using multiple levels of abstraction, based on implementation ...

  • Automatic shaping and decomposition of reward functions 

    Unknown author (2007-02-13)
    This paper investigates the problem of automatically learning how torestructure the reward function of a Markov decision process so as tospeed up reinforcement learning. We begin by describing a method thatlearns a shaped ...

  • PPR: Partial Packet Recovery for Wireless Networks 

    Unknown author (2007-02-02)
    Bit errors occur over wireless channels when the signal isn't strongenough to overcome the effects of interference and noise. Currentwireless protocols may use forward error correction (FEC) to correct forsome (small) ...

  • HQ Replication: Properties and Optimizations 

    Unknown author (2007-02-12)
    There are currently two approaches to providing Byzantine-fault-tolerant state machine replication: a replica-based approach, e.g., BFT, that uses communication between replicas to agree on a proposed ordering of requests, ...

  • Phonetic Classification Using Hierarchical, Feed-forward, Spectro-temporal Patch-based Architectures 

    Unknown author (2007-02-01)
    A preliminary set of experiments are described in which a biologically-inspired computer vision system (Serre, Wolf et al. 2005; Serre 2006; Serre, Oliva et al. 2006; Serre, Wolf et al. 2006) designed for visual object ...

  • Explorations in Low-Cost Compliant Robotics 

    Unknown author (2007-01-30)
    This thesis presents the findings of exploratory research in low-cost compliant robotics. The most heavily leveraged trade-off is that of mechanical precision for computational power, with the hope that the price of future ...

  • Online Active Learning in Practice 

    Unknown author (2007-01-23)
    We compare the practical performance of several recently proposed algorithms for active learning in the online setting. We consider two algorithms (and their combined variants) that are strongly online, in that they do ...

  • Robot Manipulation in Human Environments 

    Unknown author (2007-01-16)
    Human environments present special challenges for robot manipulation. They are often dynamic, difficult to predict, and beyond the control of a robot engineer. Fortunately, many characteristics of these settings can be ...

  • Scale Control Processor Test-Chip 

    Unknown author (2007-01-12)
    We are investigating vector-thread architectures which provide competitive performance and efficiency across a broad class of application domains. Vector-thread architectures unify data-level, thread-level, and instruction-level ...

  • Latent-Dynamic Discriminative Models for Continuous Gesture Recognition 

    Unknown author (2007-01-07)
    Many problems in vision involve the prediction of a class label for each frame in an unsegmented sequence. In this paper we develop a discriminative framework for simultaneous sequence segmentation and labeling which can ...

  • Quantifier-Free Boolean Algebra with Presburger Arithmetic is NP-Complete 

    Unknown author (2007-01-01)
    Boolean Algebra with Presburger Arithmetic (BAPA) combines1) Boolean algebras of sets of uninterpreted elements (BA)and 2) Presburger arithmetic operations (PA). BAPA canexpress the relationship between integer variables ...

  • Bounded CCA2-Secure Non-Malleable Encryption 

    Unknown author (2006-12-14)
    Under an adaptive chosen ciphertext attack (CCA2), the security of an encryption scheme must hold against adversaries that have access to a decryption oracle. We consider a weakening of CCA2 security, wherein security ...

  • Memoization Attacks and Copy Protection in Partitioned Applications 

    Unknown author (2006-12-08)
    Application source code protection is a major concern for software architects today. Secure platforms have been proposed that protect the secrecy of application algorithms and enforce copy protection assurances. Unfortunately, ...

  • Distributed Area Search with a Team of Robots 

    Unknown author (2006-12-05)
    The main goal of this thesis is to demonstrate the applicability of the distributed systems paradigm to robotic systems. This goal is accomplished by presenting two solutions to the Distributed Area Search problem: organizing ...

  • Materialization Strategies in a Column-Oriented DBMS 

    Unknown author (2006-11-27)
    There has been renewed interest in column-oriented database architectures in recent years. For read-mostly query workloads such as those found in data warehouse and decision support applications, ``column-stores'' have ...

  • Scoop: An Adaptive Indexing Scheme for Stored Data in Sensor Networks 

    Unknown author (2006-11-27)
    In this paper, we present the design of Scoop, a system for indexing and querying stored data in sensor networks. Scoop works by collecting statistics about the rate of queries and distribution of sensor readings over a ...

  • Context-based Visual Feedback Recognition 

    Unknown author (2006-11-15)
    During face-to-face conversation, people use visual feedback (e.g.,head and eye gesture) to communicate relevant information and tosynchronize rhythm between participants. When recognizing visualfeedback, people often rely ...