Search
Now showing items 471-480 of 648
New LSH-based Algorithm for Approximate Nearest Neighbor
(2005-11-04)
We present an algorithm for c-approximate nearest neighbor problem in a d-dimensional Euclidean space, achieving query time ofO(dn^{1/c^2+o(1)}) and space O(dn + n^{1+1/c^2+o(1)}).
Subcontracted Rational SFE
(2005-11-02)
In their paper, "Rational Secure Computation and Ideal Mechanism Design," Izmalkov, Lepinski and Micali show that any one-shot mediated game can be simulated by the players themselves, without the help of a trusted mediator, ...
First Class Copy & Paste
(2006-05-22)
The Subtext project seeks to make programming fundamentally easier by altering the nature of programming languages and tools. This paper defines an operational semantics for an essential subset of the Subtext language. It ...
Amorphous Medium Language
(2005-07)
Programming reliable behavior on a large mesh network composed of unreliable parts is difficult. Amorphous Medium Language addresses this problem by abstracting robustness and networking issues away from the programmer via ...
CogSci to AI: It's the Brainware, Stupid!
(2006-03)
Current modularization techniques fail when applied to hard AI problems.But cognitive science shows that the mind has modules specialized for particular functions.Unlike current engineered modules, the modules of themind ...
Programming an Amorphous Computational Medium
(2004-09)
Amorphous computing considers the problem of controllingmillions of spatially distributed unreliable devices which communicateonly with nearby neighbors. To program such a system, we need a highleveldescription language ...
Infrastructure for Engineered Emergence on Sensor/Actuator Networks
(2006-03)
The ability to control emergent phenomena depends on decomposingthem into aspects susceptible to independent engineering. Forspatial self-managing systems, the amorphous-medium abstraction lets youseparate the system s ...
A Machine-Checked Safety Proof for a CISC-Compatible SFI Technique
(2006-05-11)
Executing untrusted code while preserving security requires that thecode be prevented from modifying memory or executing instructionsexcept as explicitly allowed. Software-based fault isolation (SFI) or"sandboxing" enforces ...
Schematic Querying of Large Tracking Databases
(2006-06-12)
In dealing with long-term tracking databases withwide-area coverage, an important problem is in formulating anintuitive and fast query system for analysis. In such a querysystem, a user who is not a computer vision research ...
What the Assassin's Guild Taught Me About Distributed Computing
(2006-05-27)
Distributed computing and live-action roleplaying share many of thesame fundamental problems, as live-action roleplaying games commonly include simulations carried out by their players.Games run by the MIT Assassin's Guild ...