Open Access Repositories: Recent submissions
Now showing items 2441-2460 of 4204
-
Amorphous Infrastructure for Language Implementation
(2002-12-10)We propose a method for the robust implementation of simple graphical automataon an amorphous computer. This infrastructure is applied to the implementationof purely functional programming languages. Specifically, it is ...
-
A soft touch: Compliant Tactile Sensors for Sensitive Manipulation
(2006-03-01)We present the design, analysis and construction of a biologicallyinspired tactile sensor. The sensor can measure normal and lateralforces, conform to the surfaces with which it comes in contact andincrease the friction ...
-
Finite Horizon Control Design for Optimal Discrimination between Several Models
(2006-02-28)Multiple-Model fault detection is a powerful method for detecting changes, such as faults, in dynamic systems. In many cases, the ability of such a detection scheme to distinguish between possible models for the system ...
-
Interactive Animation of Dynamic Manipulation
(2006-02-28)Lifelike animation of manipulation must account for the dynamicinteraction between animated characters, objects, and their environment. Failing to do so would ignore the often significant effects objectshave on the motion ...
-
Control and Estimation for Cooperative Manipulator Tasks
(2006-02-28)The objective of this project is to achieve reliable transfer of an object from one robotic manipulator to another. This capability is useful for a number of applications, for instance robotic assembly, or robots with ...
-
Encrypted Keyword Search in a Distributed Storage System
(2006-02-23)Encrypted keyword search allows a server to perform a search over a set of encrypted documents on behalf of a client without learning the contents of the documents or the words being searched for. Designing a practical ...
-
Network Coding Made Practical
(2006-02-16)We propose a new architecture for wireless mesh networks. In addition to forwarding packets, routers mix (i.e., code) packets from different sources to increase the information content of each transmission. We show that ...
-
Learning Semantic Scene Models by Trajectory Analysis
(2006-02-10)In this paper, we describe an unsupervised learning framework to segment a scene into semantic regions and to build semantic scene models from long-term observations of moving objects in the scene. First, we introduce two ...
-
Transparent Accountable Data Mining: New Strategies for Privacy Protection
(2006-01-27)Attempts to address issues of personal privacy in a world of computerized databases and information networks -- from security technology to data protection regulation to Fourth Amendment law jurisprudence -- typically ...
-
A Consistency Management Layer for Inter-Domain Routing
(2006-01-27)This paper proposes an isolation layer -- a shim -- betweeninter-domain routing and packet forwarding. The job of this layer isto coordinate between Autonomous Systems (AS's) on when and how tomodify the forwarding state ...
-
A Unified Information Theoretic Framework for Pair- and Group-wise Registration of Medical Images
(2006-01-25)The field of medical image analysis has been rapidly growing for the past two decades. Besides a significant growth in computational power, scanner performance, and storage facilities, this acceleration is partially due ...
-
Service Identification in TCP/IP: Well-Known versus Random Port Numbers
(2006-01-11)The sixteen-bit well-known port number is often overlooked as a network identifier in Internet communications. Its purpose at the most fundamental level is only to demultiplex flows of traffic. Several unintended uses of ...
-
Wide-Area Egomotion Estimation from Known 3D Structure
(2006-01-09)We describe an algorithm that takes as inputs a coarse3D model of an environment, and a video sequence acquiredwithin the environment, and produces as output an estimateof the camera s 6-DOF egomotion expressed in the ...
-
Nuggeteer: Automatic Nugget-Based Evaluation Using Descriptions and Judgements
(2006-01-09)TREC Definition and Relationship questions are evaluated on thebasis of information nuggets that may be contained in systemresponses. Human evaluators provide informal descriptions of eachnugget, and judgements (assignments ...
-
Polylogarithmic Approximation Algorithm for Non-Uniform Multicommodity Buy-at-Bulk
(2005-11-26)We consider the non-uniform multicommodity buy-at-bulknetworkdesign problem. In this problem we are given a graph $G(V,E)$withtwo cost functions on the edges, a buy cost $b:E\longrightarrow \RR^+$and a rent cost$r:E\long ...
-
Approximating Buy-at-Bulk k-Steiner trees
(2005-11-15)In the buy-at-bulk $k$-Steiner tree (or rent-or-buy$k$-Steiner tree) problem we are given a graph $G(V,E)$ with a setof terminals $T\subseteq V$ including a particular vertex $s$ calledthe root, and an integer $k\leq |T|$. ...
-
Cognitive-Developmental Learning for a Humanoid Robot: A Caregiver's Gift
(2004-09-26)The goal of this work is to build a cognitive system for the humanoid robot, Cog, that exploits human caregivers as catalysts to perceive and learn about actions, objects, scenes, people, and the robot itself. This thesis ...
-
Electronic Cash with Blind Deposits: How to Have No Spare Change
(2003-10-14)Electronic cash schemes in which the bank authenticates many coins at once suffer from the problem that coins that are authenticated together can be linked to one another. Unfortunately, unless a user spends coins in a ...
-
Generating Trees of (Reducible) 1324-avoiding Permutations
(2003-10-09)We consider permutations that avoid the pattern 1324. We give exact formulas for thenumber of reducible 1324-avoiding permutations and the number of {1324, 4132, 2413, 3241}-avoiding permutations. By studying the generating ...
-
Error weighted classifier combination for multi-modal human identification
(2005-12-14)In this paper we describe a technique of classifier combination used in a human identification system. The system integrates all available features from multi-modal sources within a Bayesian framework. The framework allows ...
