Open Access Repositories: Recent submissions

Now showing items 2481-2500 of 4204

  • Spatial and Temporal Abstractions in POMDPs Applied to Robot Navigation 

    Unknown author (2005-09-27)
    Partially observable Markov decision processes (POMDPs) are a well studied paradigm for programming autonomous robots, where the robot sequentially chooses actions to achieve long term goals efficiently. Unfortunately, ...

  • Automated Audio-visual Activity Analysis 

    Unknown author (2005-09-20)
    Current computer vision techniques can effectively monitor gross activities in sparse environments. Unfortunately, visual stimulus is often not sufficient for reliably discriminating between many types of activity. In ...

  • LabelMe: a database and web-based tool for image annotation 

    Unknown author (2005-09-08)
    Research in object detection and recognition in cluttered scenes requires large image collections with ground truth labels. The labels should provide information about the object classes present in each image, as well as ...

  • Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol 

    Unknown author (2005-08-19)
    We demonstrate how to carry out cryptographic security analysis ofdistributed protocols within the Probabilistic I/O Automata frameworkof Lynch, Segala, and Vaandrager.This framework provides tools for arguing rigorously ...

  • Collective Choice with Uncertain Domain Moldels 

    Unknown author (2005-08-16)
    When groups of individuals make choices among several alternatives, the most compelling social outcome is the Condorcet winner, namely the alternative beating all others in a pair-wise contest. Obviously the Condorcet ...

  • Slicing the Onion: Anonymous Routing Without PKI 

    Unknown author (2005-08-15)
    Recent years have witnessed many proposals for anonymous routing in overlay peer-to-peer networks. The proposed protocols either expose the receiver and the message content, or require the overlay nodes to have public-private ...

  • Self-Stabilizing Mobile Node Location Management and Message 

    Unknown author (2005-08-11)
    We present simple algorithms for achieving self-stabilizing locationmanagement and routing in mobile ad-hoc networks. While mobile clients maybe susceptible to corruption and stopping failures, mobile networks areoften ...

  • Implementing Probabilistically Checkable Proofs of Proximity 

    Unknown author (2005-08-08)
    Abstract: In this paper, we describe a proof-of-concept implementation of the probabilistically checkable proof of proximity (PCPP) system described by Ben-Sasson and Sudan in \\cite{bs05}. In particular, we implement a ...

  • On Algorithms and Complexity for Sets with Cardinality Constraints 

    Unknown author (2005-08-03)
    Typestate systems ensure many desirable properties of imperativeprograms, including initialization of object fields and correct use ofstateful library interfaces. Abstract sets with cardinalityconstraints naturally ...

  • How to Construct a Correct and Scalable iBGP Configuration 

    Unknown author (2005-08-03)
    The Border Gateway Protocol (BGP), the current inter domain routing protocol in the Internet, has two modes of operation: eBGP (External BGP), used to exchange routing information between autonomous systems, and iBGP ...

  • Proving Atomicity: An Assertional Approach 

    Unknown author (2005-07-22)
    Atomicity (or linearizability) is a commonly used consistency criterion for distributed services and objects. Although atomic object implementations are abundant, proving that algorithms achieve atomicity has turned out ...

  • Byzantine Clients Rendered Harmless 

    Unknown author (2005-07-21)
    Byzantine quorum systems have been proposed that work properly even when up to f replicas fail arbitrarily.However, these systems are not so successful when confronted with Byzantine faulty clients. This paper presents ...

  • Boosting a Biologically Inspired Local Descriptor for Geometry-free Face and Full Multi-view 3D Object Recognition 

    Unknown author (2005-07-07)
    Object recognition systems relying on local descriptors are increasingly used because of their perceived robustness with respect to occlusions and to global geometrical deformations. Descriptors of this type -- based on ...

  • Ultra-fast Object Recognition from Few Spikes 

    Unknown author (2005-07-06)
    Understanding the complex brain computations leading to object recognition requires quantitatively characterizing the information represented in inferior temporal cortex (IT), the highest stage of the primate visual stream. ...

  • Etna: a Fault-tolerant Algorithm for Atomic Mutable DHT Data 

    Unknown author (2005-06-15)
    This paper presents Etna, an algorithm for atomic reads and writes of replicated data stored in a distributed hash table. Etna correctly handles dynamically changing sets of replica hosts, and is optimized for reads, writes, ...

  • Autonomous Virtual Mobile Nodes 

    Unknown author (2005-06-15)
    This paper presents a new abstraction for virtual infrastructure in mobile ad hoc networks. An AutonomousVirtual Mobile Node (AVMN) is a robust and reliable entity that is designed to cope with theinherent difficulties ...

  • Automatic Test Factoring for Java 

    Unknown author (2005-06-08)
    Test factoring creates fast, focused unit tests from slow system-widetests; each new unit test exercises only a subset of the functionalityexercised by the system test. Augmenting a test suite with factoredunit tests ...

  • Nonlinear Latent Variable Models for Video Sequences 

    Unknown author (2005-06-06)
    Many high-dimensional time-varying signals can be modeled as a sequence of noisy nonlinear observations of a low-dimensional dynamical process. Given high-dimensional observations and a distribution describing the ...

  • Theoretical Analysis of Geographic Routing in Social Networks 

    Unknown author (2005-06-03)
    We introduce a formal model for geographic social networks, and introduce the notion of rank-based friendship, in which the probability that a person v is a friend of a person u is inversely proportional to the number of ...

  • A Novel Active Contour Framework. Multi-component Level Set Evolution under Topology Control 

    Unknown author (2005-06-01)
    We present a novel framework to exert a topology control over a level set evolution. Level set methods offer several advantages over parametric active contours, in particular automated topological changes. In some applications, ...