Open Access Repositories: Recent submissions

Now showing items 2441-2460 of 4204

  • Amorphous Infrastructure for Language Implementation 

    Unknown author (2002-12-10)
    We propose a method for the robust implementation of simple graphical automataon an amorphous computer. This infrastructure is applied to the implementationof purely functional programming languages. Specifically, it is ...

  • A soft touch: Compliant Tactile Sensors for Sensitive Manipulation 

    Unknown author (2006-03-01)
    We present the design, analysis and construction of a biologicallyinspired tactile sensor. The sensor can measure normal and lateralforces, conform to the surfaces with which it comes in contact andincrease the friction ...

  • Finite Horizon Control Design for Optimal Discrimination between Several Models 

    Unknown author (2006-02-28)
    Multiple-Model fault detection is a powerful method for detecting changes, such as faults, in dynamic systems. In many cases, the ability of such a detection scheme to distinguish between possible models for the system ...

  • Interactive Animation of Dynamic Manipulation 

    Unknown author (2006-02-28)
    Lifelike animation of manipulation must account for the dynamicinteraction between animated characters, objects, and their environment. Failing to do so would ignore the often significant effects objectshave on the motion ...

  • Control and Estimation for Cooperative Manipulator Tasks 

    Unknown author (2006-02-28)
    The objective of this project is to achieve reliable transfer of an object from one robotic manipulator to another. This capability is useful for a number of applications, for instance robotic assembly, or robots with ...

  • Encrypted Keyword Search in a Distributed Storage System 

    Unknown author (2006-02-23)
    Encrypted keyword search allows a server to perform a search over a set of encrypted documents on behalf of a client without learning the contents of the documents or the words being searched for. Designing a practical ...

  • Network Coding Made Practical 

    Unknown author (2006-02-16)
    We propose a new architecture for wireless mesh networks. In addition to forwarding packets, routers mix (i.e., code) packets from different sources to increase the information content of each transmission. We show that ...

  • Learning Semantic Scene Models by Trajectory Analysis 

    Unknown author (2006-02-10)
    In this paper, we describe an unsupervised learning framework to segment a scene into semantic regions and to build semantic scene models from long-term observations of moving objects in the scene. First, we introduce two ...

  • Transparent Accountable Data Mining: New Strategies for Privacy Protection 

    Unknown author (2006-01-27)
    Attempts to address issues of personal privacy in a world of computerized databases and information networks -- from security technology to data protection regulation to Fourth Amendment law jurisprudence -- typically ...

  • A Consistency Management Layer for Inter-Domain Routing 

    Unknown author (2006-01-27)
    This paper proposes an isolation layer -- a shim -- betweeninter-domain routing and packet forwarding. The job of this layer isto coordinate between Autonomous Systems (AS's) on when and how tomodify the forwarding state ...

  • A Unified Information Theoretic Framework for Pair- and Group-wise Registration of Medical Images 

    Unknown author (2006-01-25)
    The field of medical image analysis has been rapidly growing for the past two decades. Besides a significant growth in computational power, scanner performance, and storage facilities, this acceleration is partially due ...

  • Service Identification in TCP/IP: Well-Known versus Random Port Numbers 

    Unknown author (2006-01-11)
    The sixteen-bit well-known port number is often overlooked as a network identifier in Internet communications. Its purpose at the most fundamental level is only to demultiplex flows of traffic. Several unintended uses of ...

  • Wide-Area Egomotion Estimation from Known 3D Structure 

    Unknown author (2006-01-09)
    We describe an algorithm that takes as inputs a coarse3D model of an environment, and a video sequence acquiredwithin the environment, and produces as output an estimateof the camera s 6-DOF egomotion expressed in the ...

  • Nuggeteer: Automatic Nugget-Based Evaluation Using Descriptions and Judgements 

    Unknown author (2006-01-09)
    TREC Definition and Relationship questions are evaluated on thebasis of information nuggets that may be contained in systemresponses. Human evaluators provide informal descriptions of eachnugget, and judgements (assignments ...

  • Polylogarithmic Approximation Algorithm for Non-Uniform Multicommodity Buy-at-Bulk 

    Unknown author (2005-11-26)
    We consider the non-uniform multicommodity buy-at-bulknetworkdesign problem. In this problem we are given a graph $G(V,E)$withtwo cost functions on the edges, a buy cost $b:E\longrightarrow \RR^+$and a rent cost$r:E\long ...

  • Approximating Buy-at-Bulk k-Steiner trees 

    Unknown author (2005-11-15)
    In the buy-at-bulk $k$-Steiner tree (or rent-or-buy$k$-Steiner tree) problem we are given a graph $G(V,E)$ with a setof terminals $T\subseteq V$ including a particular vertex $s$ calledthe root, and an integer $k\leq |T|$. ...

  • Cognitive-Developmental Learning for a Humanoid Robot: A Caregiver's Gift 

    Unknown author (2004-09-26)
    The goal of this work is to build a cognitive system for the humanoid robot, Cog, that exploits human caregivers as catalysts to perceive and learn about actions, objects, scenes, people, and the robot itself. This thesis ...

  • Electronic Cash with Blind Deposits: How to Have No Spare Change 

    Unknown author (2003-10-14)
    Electronic cash schemes in which the bank authenticates many coins at once suffer from the problem that coins that are authenticated together can be linked to one another. Unfortunately, unless a user spends coins in a ...

  • Generating Trees of (Reducible) 1324-avoiding Permutations 

    Unknown author (2003-10-09)
    We consider permutations that avoid the pattern 1324. We give exact formulas for thenumber of reducible 1324-avoiding permutations and the number of {1324, 4132, 2413, 3241}-avoiding permutations. By studying the generating ...

  • Error weighted classifier combination for multi-modal human identification 

    Unknown author (2005-12-14)
    In this paper we describe a technique of classifier combination used in a human identification system. The system integrates all available features from multi-modal sources within a Bayesian framework. The framework allows ...