Search
Now showing items 11-20 of 72
Non-Metrical Navigation Through Visual Path Control
(2008-06-06)
We describe a new method for wide-area, non-metrical robot navigationwhich enables useful, purposeful motion indoors. Our method has twophases: a training phase, in which a human user directs a wheeledrobot with an attached ...
Fast concurrent object classification and localization
(2008-06-10)
Object localization and classification are important problems incomputer vision. However, in many applications, exhaustive searchover all class labels and image locations is computationallyprohibitive. While several methods ...
Resilient Knowledge-Based Mechanisms For Truly Combinatorial Auctions (And Implementation in Surviving Strategies)
(2008-10-08)
We put forward a new mechanism achieving a high benchmark for (both revenue and) the sum of revenue and efficiency in truly combinatorial auctions. Notably, our mechanism guarantees its performance (1) in a very adversarial ...
MOOS-IvP Autonomy Tools Users Manual
(2008-11-11)
This document describes seven common MOOS-IvP autonomy tools. The uHelmScope application provides a run-time scoping window into the state of an active IvP Helm executing its mission. The pMarineViewer application is a ...
Resilient Provision of a Public and/or Private Good, or: Resilient Auctions of One Good in Unlimited Supply
(2008-12-02)
We present two resilient mechanisms: the first for the provision of a public good, and the second for the provision of a private good. Both mechanisms adopt a knowledge-based benchmark.
Stochastic Digital Circuits for Probabilistic Inference
(2008-11-24)
We introduce combinational stochastic logic, an abstraction that generalizes deterministic digital circuit design (based on Boolean logic gates) to the probabilistic setting. We show how this logic can be combined with ...
Modeling Computational Security in Long-Lived Systems, Version 2
(2008-11-22)
For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressively over the lifetime of a protocol. However, some ...
Resilient Mechanisms For Truly Combinatorial Auctions
(2008-11-13)
Dominant-strategy truthfulness is traditionally considered the best possible solution concept in mechanism design, as it enables one to predict with confidence which strategies INDEPENDENT players will actually choose. ...
Resilient Auctions of One Good in Limited Supply
(2008-12-17)
We present various resilient auction mechanisms for a good in limited supply. Our mechanisms achieve both player-knowledge and aggregated player-knowledge benchmarks.
Mathematics of the Neural Response
(2008-11-26)
We propose a natural image representation, the neural response, motivated by the neuroscience of the visual cortex. The inner product defined by the neural response leads to a similarity measure between functions which we ...