Open Access Repositories: Recent submissions

Now showing items 2521-2540 of 4204

  • Combining Object and Feature Dynamics in Probabilistic Tracking 

    Unknown author (2005-03-02)
    Objects can exhibit different dynamics at different scales, a property that isoftenexploited by visual tracking algorithms. A local dynamicmodel is typically used to extract image features that are then used as inputsto a ...

  • Receptive field structures for recognition 

    Unknown author (2005-03-01)
    Localized operators, like Gabor wavelets and difference-of-Gaussian filters, are considered to be useful tools for image representation. This is due to their ability to form a  sparse code that can serve as a basis set ...

  • File Synchronization with Vector Time Pairs 

    Unknown author (2005-02-28)
    Vector time pairs are a new method for trackingsynchronization metadata. A vector time pairconsists of two vector times: one tracking filemodification history and one tracking filesynchronization history. Because the ...

  • Impossibility of boosting distributed service resilience 

    Unknown author (2005-02-25)
    We prove two theorems saying that no distributed system in whichprocesses coordinate using reliable registers and f-resilient servicescan solve the consensus problem in the presence of f+1 undetectableprocess stopping ...

  • Discovering object categories in image collections 

    Unknown author (2005-02-25)
    Given a set of images containing multiple object categories,we seek to discover those categories and their image locations withoutsupervision. We achieve this using generative modelsfrom the statistical text literature: ...

  • Improving 802.11 Range with Forward Error Correction 

    Unknown author (2005-02-24)
    The ISO/IEC 8802-11:1999(E) specification uses a 32-bit CRC for error detection and whole-packet retransmissions for recovery. In long-distance orhigh-interference links where the probability of a bit error is high,this ...

  • Complexity of finding Nash equilibria in 0-1 bimatrix games 

    Unknown author (2005-02-08)
    We exhibit a polynomial reduction from the problem of finding a Nashequilibrium of a bimatrix game with rational coefficients to the problemof finding a Nash equilibrium of a bimatrix game with 0-1 coefficients.

  • Stable Policy Routing with Provider Independence 

    Unknown author (2005-02-08)
    Thousands of competing autonomous systems (ASes) mustcooperate with each other to provide global Internet connectivity.These ASes encode various economic, business,and performance decisions in their routing policies. The ...

  • Using computational models to study texture representations in the human visual system. 

    Unknown author (2005-02-07)
    Traditionally, human texture perception has been studied using artificial textures made of random-dot patterns or abstract structured elements. At the same time, computer algorithms for the synthesis of natural textures ...

  • Functional Differential Geometry 

    Unknown author (2005-02-02)
    Differential geometry is deceptively simple. It is surprisingly easyto get the right answer with unclear and informal symbol manipulation.To address this problem we use computer programs to communicate aprecise understanding ...

  • The Security Power of the Ballot Box 

    Unknown author (2005-02-02)
    We show that any function F can be securely evaluated by a protocolwith ballots and a ballot box. That is, N mutually suspicious players,each player possessing a secret input, can use ballots and a ballotbox to jointly ...

  • Determining articulator configuration in voiced stop consonants by matching time-domain patterns in pitch periods 

    Unknown author (2005-01-28)
    In this thesis I will be concerned with linking the observed speechsignal to the configuration of articulators.Due to the potentially rapid motion of the articulators, the speechsignal can be highly non-stationary. The ...

  • Virtual Stationary Automata for Mobile Networks 

    Unknown author (2005-01-21)
    We define a programming abstraction formobile networks called the Virtual Stationary Automataprogramming layer, consisting of real mobile clients, virtualtimed I/O automata called virtual stationary automata(VSAs), and a ...

  • Biologically-Inspired Robust Spatial Programming 

    Unknown author (2005-01-18)
    Inspired by the robustness and flexibility of biological systems, we are developing linguistic and programming tools to allow us to program spatial systems populated by vast numbers of unreliable components interconnected ...

  • How Much of a Hypertree can be Captured by Windmills? 

    Unknown author (2005-01-03)
    Current approximation algorithms for maximum weight {\em hypertrees} find heavy {\em windmill farms}, and are based on the fact that a constant ratio (for constant width $k$) of the weight of a $k$-hypertree can be captured ...

  • A Dynamic Data Structure for Checking Hyperacyclicity 

    Unknown author (2005-01-03)
    We present a dynamic data structure that keeps track of an acyclic hypergraph (equivalently, a triangulated graph) and enables verifying that adding a candidate hyperedge (clique) will not break the acyclicity of the ...

  • Neural Voting Machines 

    Unknown author (2004-12-31)
     Winner-take-all networks typically pick as winners that alternative with the largest excitatory input. This choice is far from optimal when there is uncertainty in the strength of the inputs, and when information is ...

  • A general mechanism for tuning: Gain control circuits and synapses underlie tuning of cortical neurons 

    Unknown author (2004-12-31)
    Tuning to an optimal stimulus is a widespread property of neurons in cortex. We propose that such tuning is a consequence of normalization or gain control circuits. We also present a biologically plausible neural circuitry ...

  • Methods and Experiments With Bounded Tree-width Markov Networks 

    Unknown author (2004-12-30)
    Markov trees generalize naturally to bounded tree-width Markov networks, onwhich exact computations can still be done efficiently. However, learning themaximum likelihood Markov network with tree-width greater than 1 is ...

  • Machine-Checkable Correctness Proofs forIntra-procedural Dataflow Analyses 

    Unknown author (2004-12-16)
    This technical report describes our experience using the interactive theorem proverAthena for proving the correctness of abstract interpretation-based dataflow analyses.For each analysis, our methodology requires the ...