Search
Now showing items 61-70 of 90
Pyramid Match Kernels: Discriminative Classification with Sets of Image Features
(2005-03-17)
Discriminative learning is challenging when examples are setsof local image features, and the sets vary in cardinality and lackany sort of meaningful ordering. Kernel-based classificationmethods can learn complex decision ...
Exploiting Vector Parallelism in Software Pipelined Loops
(2005-06-03)
An emerging trend in processor design is the incorporation of short vector instructions into the ISA. In fact, vector extensions have appeared in most general-purpose microprocessors. To utilize these instructions, ...
Automatic Software Upgrades for Distributed Systems (PhD thesis)
(2005-10-06)
Upgrading the software of long-lived, highly-available distributedsystems is difficult. It is not possible to upgrade all the nodes in asystem at once, since some nodes may be unavailable and halting thesystem for an ...
Biologically-Inspired Robust Spatial Programming
(2005-01-18)
Inspired by the robustness and flexibility of biological systems, we are developing linguistic and programming tools to allow us to program spatial systems populated by vast numbers of unreliable components interconnected ...
A Dynamic Data Structure for Checking Hyperacyclicity
(2005-01-03)
We present a dynamic data structure that keeps track of an acyclic hypergraph (equivalently, a triangulated graph) and enables verifying that adding a candidate hyperedge (clique) will not break the acyclicity of the ...
Virtual Stationary Automata for Mobile Networks
(2005-01-21)
We define a programming abstraction formobile networks called the Virtual Stationary Automataprogramming layer, consisting of real mobile clients, virtualtimed I/O automata called virtual stationary automata(VSAs), and a ...
How Much of a Hypertree can be Captured by Windmills?
(2005-01-03)
Current approximation algorithms for maximum weight {\em hypertrees} find heavy {\em windmill farms}, and are based on the fact that a constant ratio (for constant width $k$) of the weight of a $k$-hypertree can be captured ...
Gestural Cues for Sentence Segmentation
(2005-04-19)
In human-human dialogues, face-to-face meetings are often preferred over phone conversations.One explanation is that non-verbal modalities such as gesture provide additionalinformation, making communication more efficient ...
Efficient, Verifiable Binary Sandboxing for a CISC Architecture
(2005-05-02)
Executing untrusted code while preserving security requiresenforcement of memory and control-flow safety policies:untrusted code must be prevented from modifying memory orexecuting code except as explicitly allowed. ...
A Region-based Architecture for Service-Providing Distributed Systems
(2005-05-17)
A service-providing system consists of hosts that provide services such as data, content, computational and memory resources and data-based services to other entities in the system. Consumers that wish to use services ...