Open Access Repositories: Recent submissions
Now showing items 2561-2580 of 4204
-
Discovering Latent Classes in Relational Data
(2004-07-22)We present a framework for learning abstract relational knowledge with the aimof explaining how people acquire intuitive theories of physical, biological, orsocial systems. Our approach is based on a generative relational ...
-
An Algorithm for Deciding BAPA: Boolean Algebra with Presburger Arithmetic
(2004-07-19)We describe an algorithm for deciding the first-order multisorted theory BAPA, which combines 1) Boolean algebras of sets of uninterpreted elements (BA) and 2) Presburger arithmetic operations (PA). BAPA can express the ...
-
Definition and Expansion of Composite Automata in IOA
(2004-07-19)The IOA language provides notations for defining both primitive and composite I/O automata.This note describes, both formally and with examples, the constraints on these definitions, thecomposability requirements for the ...
-
Systematic Removal of Nondeterminism for Code Generation in I/O Automata
(2004-07-19)The Input/Output (I/O) automaton model developed by Lynch and Tuttle models components in asynchronous concurrentsystems as labeled transition systems. IOA is a precise language for describing I/O automata and for stating ...
-
Dynamically Resizable Static CMOS Logic for Fine-Grain Leakage
(2004-07-12)Digital circuits often have a critical path that runs through a smallsubset of the component subblocks, but where the path changes dynamicallyduring operation. Dynamically resizable static CMOS (DRCMOS) logic isproposed ...
-
A Constant-Factor Approximation Algorithm for Embedding Unweighted Graphs into Trees
(2004-07-05)We present a constant-factor approximation algorithm for computing anembedding of the shortest path metric of an unweighted graph into atree, that minimizes the multiplicative distortion.
-
Optimal Approximations of the Frequency Moments
(2004-07-02)We give a one-pass, O~(m^{1-2/k})-space algorithm for estimating the k-th frequency moment of a data stream for any real k>2. Together with known lower bounds, this resolves the main problem left open by Alon, Matias, ...
-
Contextual models for object detection using boosted random fields
(2004-06-25)We seek to both detect and segment objects in images. To exploit both local image data as well as contextual information, we introduce Boosted Random Fields (BRFs), which uses Boosting to learn the graph structure and ...
-
Middleboxes No Longer Considered Harmful
(2004-06-24)Intermediate network elements, such as network address translators (NATs), firewalls, and transparent caches are now commonplace. The usual reaction in the network architecture community to these so-called middleboxes is ...
-
How People Re-find Information When the Web Changes
(2004-06-18)This paper investigates how people return to information in a dynamic information environment. For example, a person might want to return to Web content via a link encountered earlier on a Web page, only to learn that the ...
-
Building Grounded Abstractions for Artificial Intelligence Programming
(2004-06-16)Most Artificial Intelligence (AI) work can be characterized as either ``high-level'' (e.g., logical, symbolic) or ``low-level'' (e.g., connectionist networks, behavior-based robotics). Each approach suffers from particular ...
-
Versatility and VersaBench: A New Metric and a Benchmark Suite for Flexible Architectures
(2004-06-14)For the last several decades, computer architecture research has largely benefited from, and continues to be driven by ad-hoc benchmarking. Often the benchmarks are selected to represent workloads that architects believe ...
-
Scalar Operand Networks: Design, Implementation, and Analysis
(2004-06-08)The bypass paths and multiported register files in microprocessors serve as an implicit interconnect tocommunicate operand values among pipeline stages and multiple ALUs. Previous superscalar designs implementedthis ...
-
Deionizer: A Tool for Capturing and Embedding I/O Cells
(2004-06-07)In this paper, we introduce the concept of a deionizer. A deionizeris a special type of partial evaluator whose purpose is to create a newversion of a program that can run without accessing a partial set of I/O resources.Although ...
-
BioJADE: A Design and Simulation Tool for Synthetic Biological Systems
(2004-05-28)The next generations of both biological engineering and computer engineering demand that control be exerted at the molecular level. Creating, characterizing and controlling synthetic biological systems may provide us with ...
-
Data Structure Repair Using Goal-Directed Reasoning
(2004-05-18)Model-based data structure repair is a promising techniquefor enabling programs to continue to execute successfullyin the face of otherwise fatal data structure corruption errors.Previous research in this eld relied on ...
-
Learning Commonsense Categorical Knowledge in a Thread Memory System
(2004-05-18)If we are to understand how we can build machines capable of broadpurpose learning and reasoning, we must first aim to build systemsthat can represent, acquire, and reason about the kinds of commonsenseknowledge that we ...
-
Generative Temporal Planning with Complex Processes
(2004-05-18)Autonomous vehicles are increasingly being used in mission-critical applications, and robust methods are needed for controlling these inherently unreliable and complex systems. This thesis advocates the use of model-based ...
-
Verifying the Correctness of Wide-Area Internet Routing
(2004-05-17)Several studies have shown that wide-area Internet routing is fragile, with failures occurring for a variety of reasons. Routing fragility is largely due to the flexible and powerful ways in which BGP can be configured to ...
-
A Combined Pointer and Purity Analysis for Java Programs
(2004-05-17)We present a new method purity analysis for Java programs.A method is pure if it does not mutate any location that exists in the program state right before method invocation.Our analysis is built on top of a combined pointer ...
