Open Access Repositories: Recent submissions

Now showing items 2581-2600 of 4204

  • Video Matching 

    Unknown author (2004-05-11)
    This paper describes a method for bringing two videos (recorded at different times) into spatiotemporal alignment, then comparing and combining corresponding pixels for applications such as background subtraction, compositing, ...

  • On Verifying a File System Implementation 

    Unknown author (2004-05-06)
    We present a correctness proof for a basic file system implementation. This implementation contains key elements of standard Unix file systems such as inodes and fixed-size disk blocks. We prove the implementation correct ...

  • Can Basic ML Techniques Illuminate Rateless Erasure Codes? 

    Unknown author (2004-05-05)
    The recently developed rateless erasure codes are a near-optimal channel coding technique that guaranteeslow overhead and fast decoding. The underlying theory, and current implementations, of thesecodes assume that a network ...

  • A Unified Statistical and Information Theoretic Framework for Multi-modal Image Registration 

    Unknown author (2004-04-28)
    We formulate and interpret several multi-modal registration methods inthe context of a unified statistical and information theoretic framework. A unified interpretation clarifies the implicit assumptionsof each method ...

  • Rotation Invariant Object Recognition from One Training Example 

    Unknown author (2004-04-27)
    Local descriptors are increasingly used for the task of object recognition because of their perceived robustness with respect to occlusions and to global geometrical deformations. Such a descriptor--based on a set of ...

  • Light-Weight Leases for Storage-Centric Coordination 

    Unknown author (2004-04-22)
    We propose light-weight lease primitives to leverage fault-tolerant coordination among clients accessing a shared storage infrastructure (such as network attached disks or storage servers). In our approach, leases are ...

  • Cascading Regularized Classifiers 

    Unknown author (2004-04-21)
    Among the various methods to combine classifiers, Boosting was originally thought as an stratagem to cascade pairs of classifiers through their disagreement. I recover the same idea from the work of Niyogi et al. to show ...

  • M&M: A Passive Toolkit for Measuring, Correlating, and Tracking Path Characteristics 

    Unknown author (2004-04-14)
    This paper presents M&M, a passive measurement toolkitsuitable for large-scale studies of Internet path characteristics.The multiQ tool uses equally-spaced mode gaps in TCP flows packet interarrival time distributions to ...

  • A 1020-Node Modular Microphone Array and Beamformer for Intelligent Computing Spaces 

    Unknown author (2004-04-14)
    Ubiquitous computing environments are characterized by an unboundedamount of noise and crosstalk. In these environments, traditionalmethods of sound capture are insufficient, and array microphones areneeded in order to ...

  • Contextual Influences on Saliency 

    Unknown author (2004-04-14)
    This article describes a model for including scene/context priors in attention guidance. In the proposed scheme, visual context information can be available early in the visual processing chain, in order to modulate the ...

  • A Quantitative Comparison of Reconfigurable, Tiled, and Conventional Architectures on Bit-level Computation 

    Unknown author (2004-04-13)
    General purpose computing architectures are being called on to work on amore diverse application mix every day. This has been fueled by the needfor reduced time to market and economies of scale that are the hallmarksof ...

  • Long-Lived Rambo: Trading Knowledge for Communication 

    Unknown author (2004-04-12)
    Shareable data services providing consistency guarantees, such as atomicity (linearizability), make building distributedsystems easier. However, combining linearizability with efficiency in practical algorithms is difficult. ...

  • On Generalized Records and Spatial Conjunction in Role Logic 

    Unknown author (2004-04-06)
    We have previously introduced role logic as a notation fordescribing properties of relational structures in shapeanalysis, databases and knowledge bases. A natural fragmentof role logic corresponds to two-variable logic ...

  • Converting Java Programs to Use Generic Libraries 

    Unknown author (2004-03-30)
    Java 1.5 will include a type system (called JSR-14) that supports parametric polymorphism, or generic classes. This will bring many benefits to Java programmers, not least because current Java practice makes heavy use of ...

  • Predicting Problems Caused by Component Upgrades 

    Unknown author (2004-03-30)
    This report presents a new, automatic technique to assess whether replacing a component of a softwaresystem by a purportedly compatible component may change the behavior of the system. The techniqueoperates before integrating ...

  • Evaluation of sets of oriented and non-oriented receptive fields as local descriptors 

    Unknown author (2004-03-24)
    Local descriptors are increasingly used for the task of object recognition because of their perceived robustness with respect to occlusions and to global geometrical deformations. We propose a performance criterion for a ...

  • Predicting Unroll Factors Using Nearest Neighbors 

    Unknown author (2004-03-22)
    In order to deliver the promise of Moore s Law to the enduser, compilers must make decisions that are intimately tiedto a specific target architecture. As engineers add architecturalfeatures to increase performance, systems ...

  • REED: Robust, Efficient Filtering and Event Detection in Sensor Networks 

    Unknown author (2004-03-22)
    This paper presents an algorithm for handling many types of filters insensor networks that cannot be expressed using a simple predicate.Specifically, the action of the filter may be predicated on sensor produceddata where ...

  • Face processing in humans is compatible with a simple shape-based model of vision 

    Unknown author (2004-03-05)
    Understanding how the human visual system recognizes objects is one of the key challenges in neuroscience. Inspired by a large body of physiological evidence (Felleman and Van Essen, 1991; Hubel and Wiesel, 1962; Livingstone ...

  • Virtual Mobile Nodes for Mobile Ad Hoc Networks 

    Unknown author (2004-02-26)
    One of the most significant challenges introduced by mobile networks is the difficulty in coping withthe unpredictable movement of mobile nodes. If, instead, the mobile nodes could be programmed totravel through the world ...