Open Access Repositories: Recent submissions
Now showing items 2401-2420 of 4204
-
Predicting the Risk and Trajectory of Intensive Care Patients Using Survival Models
(2006-08-30)Using artificial intelligence to assist physicians in patient care has received sustained interest over the past several decades. Recently, with automated systems at most bedsides, the amount of patient information collected ...
-
Anthills Built to Order: Automating Construction with Artificial Swarms
(2006-05-12)Social insects build large, complex structures, which emerge through the collective actions of many simple agents acting with no centralized control or preplanning. These natural systems motivate investigating the use of ...
-
Resilient Network Coding In the Presence of Byzantine Adversaries
(2006-08-05)Network coding substantially increases network throughput. But since it involves mixing of information inside the network, a single corrupted packet generated by a malicious node can end up contaminating all the information ...
-
Human Document Classification Using Bags of Words
(2006-08-09)Humans are remarkably adept at classifying text documents into cate-gories. For instance, while reading a news story, we are rapidly able to assess whether it belongs to the domain of finance, politics or sports. Automating ...
-
Dealers, Insiders and Bandits: Learning and its Effects on Market Outcomes
(2006-07-12)This thesis seeks to contribute to the understanding of markets populated by boundedly rational agents who learn from experience. Bounded rationality and learning have both been the focus of much research in computer ...
-
Iterative Collaborative Ranking of Customers and Providers
(2006-07-04)This paper introduces a new application: predicting the Internet provider-customer market. We cast the problem in the collaborative filtering framework, where we use current and past customer-provider relationships to ...
-
MORE: A Network Coding Approach to Opportunistic Routing
(2006-06-30)Opportunistic routing has the potential to substantially increase wireless network throughput. Prior work on opportunistic routing, however, requires tight node coordination. Different nodes in a network must have knowledge ...
-
Robust Execution of Bipedal Walking Tasks From Biomechanical Principles
(2006-04-28)Effective use of robots in unstructured environments requires that they have sufficient autonomy and agility to execute task-level commands successfully. A challenging example of such a robot is a bipedal walking machine. ...
-
Was the Patient Cured? Understanding Semantic Categories and Their Relationships in Patient Records
(2006-06-28)In this thesis, we detail an approach to extracting key information in medical discharge summaries. Starting with a narrative patient report, we first identify and remove information that compromises privacy (de-identifi ...
-
Using Task-Structured Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol
(2006-06-20)The Probabilistic I/O Automata framework of Lynch, Segala and Vaandrager provides tools for precisely specifying protocols and reasoning about theircorrectness using multiple levels of abstraction, based on implementation ...
-
Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol
(2006-06-19)We demonstrate how to carry out cryptographic security analysis ofdistributed protocols within the Probabilistic I/O Automataframework of Lynch, Segala, and Vaandrager. This framework providestools for arguing rigorously ...
-
Approximate Correspondences in High Dimensions
(2006-06-15)Pyramid intersection is an efficient method for computing an approximate partial matching between two sets of feature vectors. We introduce a novel pyramid embedding based on a hierarchy of non-uniformly shaped bins that ...
-
New Techniques for Geographic Routing
(2006-06-14)As wireless sensor networks continue to grow in size, we are facedwith the prospect of emerging wireless networks with hundreds orthousands of nodes. Geographic routing algorithms are a promisingalternative to tradition ...
-
Schematic Querying of Large Tracking Databases
(2006-06-12)In dealing with long-term tracking databases withwide-area coverage, an important problem is in formulating anintuitive and fast query system for analysis. In such a querysystem, a user who is not a computer vision research ...
-
Infrastructure for Engineered Emergence on Sensor/Actuator Networks
(2006-03)The ability to control emergent phenomena depends on decomposingthem into aspects susceptible to independent engineering. Forspatial self-managing systems, the amorphous-medium abstraction lets youseparate the system s ...
-
CogSci to AI: It's the Brainware, Stupid!
(2006-03)Current modularization techniques fail when applied to hard AI problems.But cognitive science shows that the mind has modules specialized for particular functions.Unlike current engineered modules, the modules of themind ...
-
Amorphous Medium Language
(2005-07)Programming reliable behavior on a large mesh network composed of unreliable parts is difficult. Amorphous Medium Language addresses this problem by abstracting robustness and networking issues away from the programmer via ...
-
Programming an Amorphous Computational Medium
(2004-09)Amorphous computing considers the problem of controllingmillions of spatially distributed unreliable devices which communicateonly with nearby neighbors. To program such a system, we need a highleveldescription language ...
-
What the Assassin's Guild Taught Me About Distributed Computing
(2006-05-27)Distributed computing and live-action roleplaying share many of thesame fundamental problems, as live-action roleplaying games commonly include simulations carried out by their players.Games run by the MIT Assassin's Guild ...
-
First Class Copy & Paste
(2006-05-22)The Subtext project seeks to make programming fundamentally easier by altering the nature of programming languages and tools. This paper defines an operational semantics for an essential subset of the Subtext language. It ...
