Open Access Repositories: Recent submissions

Now showing items 2501-2520 of 4204

  • Simultaneous Localization and Tracking in Wireless Ad-hoc Sensor Networks 

    Unknown author (2005-05-31)
    In this thesis we present LaSLAT, a sensor network algorithm thatsimultaneously localizes sensors, calibrates sensing hardware, andtracks unconstrained moving targets using only range measurementsbetween the sensors and ...

  • Empirical Effective Dimension and Optimal Rates for Regularized Least Squares Algorithm 

    Unknown author (2005-05-27)
    This paper presents an approach to model selection for regularized least-squares on reproducing kernel Hilbert spaces in the semi-supervised setting. The role of effective dimension was recently shown to be crucial in the ...

  • Comparing Visual Features for Morphing Based Recognition 

    Unknown author (2005-05-25)
    This thesis presents a method of object classification using the idea of deformable shape matching. Three types of visual features, geometric blur, C1 and SIFT, are used to generate feature descriptors. These feature ...

  • Lexical Chains and Sliding Locality Windows in Content-based Text Similarity Detection 

    Unknown author (2005-05-19)
    We present a system to determine content similarity of documents. More specifically, our goal is to identify book chapters that are translations of the same original chapter; this task requires identification of not only ...

  • Some Properties of Empirical Risk Minimization over Donsker Classes 

    Unknown author (2005-05-17)
    We study properties of algorithms which minimize (or almost minimize) empirical error over a Donsker class of functions. We show that the L2-diameter of the set of almost-minimizers is converging to zero in probability. ...

  • A Region-based Architecture for Service-Providing Distributed Systems 

    Unknown author (2005-05-17)
    A service-providing system consists of hosts that provide services such as data, content, computational and memory resources and data-based services to other entities in the system. Consumers that wish to use services ...

  • Risk Bounds for Regularized Least-squares Algorithm with Operator-valued kernels 

    Unknown author (2005-05-16)
    We show that recent results in [3] on risk bounds for regularized least-squares on reproducing kernel Hilbert spaces can be straightforwardly extended to the vector-valued regression setting. We first briefly introduce ...

  • Efficient, Verifiable Binary Sandboxing for a CISC Architecture 

    Unknown author (2005-05-02)
    Executing untrusted code while preserving security requiresenforcement of memory and control-flow safety policies:untrusted code must be prevented from modifying memory orexecuting code except as explicitly allowed. ...

  • Simultaneous Localization, Calibration, and Tracking in an ad Hoc Sensor Network 

    Unknown author (2005-04-26)
    We introduce Simultaneous Localization and Tracking (SLAT), the problem of tracking a target in a sensor network while simultaneously localizing and calibrating the nodes of the network. Our proposed solution, LaSLAT, ...

  • Gestural Cues for Sentence Segmentation 

    Unknown author (2005-04-19)
    In human-human dialogues, face-to-face meetings are often preferred over phone conversations.One explanation is that non-verbal modalities such as gesture provide additionalinformation, making communication more efficient ...

  • Fast Rates for Regularized Least-squares Algorithm 

    Unknown author (2005-04-14)
    We develop a theoretical analysis of generalization performances of regularized least-squares on reproducing kernel Hilbert spaces for supervised learning. We show that the concept of effective dimension of an integral ...

  • Learning From Snapshot Examples 

    Unknown author (2005-04-13)
    Examples are a powerful tool for teaching both humans and computers.In order to learn from examples, however, a student must first extractthe examples from its stream of perception. Snapshot learning is ageneral approach ...

  • De-Emphasis of Distracting Image Regions Using Texture Power Maps 

    Unknown author (2005-04-12)
    A major obstacle in photography is the presence of distracting elements that pull attention away from the main subject and clutter the composition. In this article, we present a new image-processing technique that reduces ...

  • Construction by robot swarms using extended stigmergy 

    Unknown author (2005-04-08)
    We describe a system in which simple, identical, autonomous robots assemble two-dimensional structures out of identical building blocks. We show that, in a system divided in this way into mobile units and structural units, ...

  • Motion Coordination Using Virtual Nodes 

    Unknown author (2005-04-06)
    We describe how a virtual node abstraction layer can be used to coordinate the motion of real mobile nodes in a region of 2-space. In particular, we consider how nodes in a mobile ad hoc network can arrange themselves along ...

  • On Relational Analysis of Algebraic Datatypes 

    Unknown author (2005-04-05)
    We present a technique that enables the use of finite modelfinding to check the satisfiability of certain formulaswhose intended models are infinite. Such formulas arisewhen using the language of sets and relations to ...

  • Wait-free Regular Storage from Byzantine Components 

    Unknown author (2005-04-05)
    We present a simple, efficient, and self-contained construction of a wait-free regular register from Byzantine storage components. Our construction utilizes a novel building block, called 1-regular register, which can be ...

  • An Expectation Maximization Approach for Integrated Registration, Segmentation, and Intensity Correction 

    Unknown author (2005-04-01)
    This paper presents a statistical framework which combines the registration of an atlas with the segmentation of MR images. We use an Expectation Maximization-based algorithm to find a solution within the model, which ...

  • Combining Variable Selection with Dimensionality Reduction 

    Unknown author (2005-03-30)
    This paper bridges the gap between variable selection methods (e.g., Pearson coefficients, KS test) and dimensionality reductionalgorithms (e.g., PCA, LDA). Variable selection algorithms encounter difficulties dealing with ...

  • Matrix Approximation and Projective Clustering via Iterative Sampling 

    Unknown author (2005-03-29)
    We present two new results for the problem of approximating a given real m by n matrix A by a rank-k matrix D, where k < min{m, n}, so as to minimize ||A-D||_F^2. It is known that bysampling O(k/eps) rows of the matrix, ...