Search
Now showing items 601-610 of 648
Selective Vectorization for Short-Vector Instructions
(2009-12-18)
Multimedia extensions are nearly ubiquitous in today's general-purpose processors. These extensions consist primarily of a set of short-vector instructions that apply the same opcode to a vector of operands. Vector ...
SWIFT: A Narrowband-Friendly Cognitive Wideband Network
(2008-08-17)
Wideband technologies in the unlicensed spectrum can satisfy the ever-increasing demands for wireless bandwidth created by emerging rich media applications. The key challenge for such systems, however, is to allow narrowband ...
Advancing Computational Models of Narrative
(2009-12-17)
Report of a Workshop held at the Wylie Center, Beverly, MA, Oct 8-10 2009
Sufficient Conditions for Uniform Stability of Regularization Algorithms
(2009-12-01)
In this paper, we study the stability and generalization properties of penalized empirical-risk minimization algorithms. We propose a set of properties of the penalty term that is sufficient to ensure uniform ?-stability: ...
Perfect and General Virtual Implementation For Perfectly Informed Players
(2009-12-04)
We show that, when the players are perfectly informed about each other, essentially all social-choice functions can be rationally robustly implemented via an extensive-form public-action mechanism that (1) is perfectly ...
Cabernet: A Content Delivery Network for Moving Vehicles
(2008-01-17)
This paper describes the design, implementation, and evaluation of Cabernet, a system to deliver data to and from moving vehicles using open 802.11 (WiFi) access points encountered opportunistically during travel. Network ...
Efficient Object Recognition and Image Retrieval for Large-Scale Applications
(2008-05-06)
Algorithms for recognition and retrieval tasks generally call for both speed and accuracy. When scaling up to very large applications, however, we encounter additional significant requirements: adaptability and scalability. ...
Understanding camera trade-offs through a Bayesian analysis of light field projections
(2008-04-16)
Computer vision has traditionally focused on extracting structure,such as depth, from images acquired using thin-lens or pinhole optics. The development of computational imaging is broadening this scope; a variety of ...
New-Age Cryptography
(2008-04-16)
We introduce new and general complexity theoretic hardness assumptions. These assumptions abstract out concrete properties of a random oracle and are significantly stronger than traditional cryptographic hardness assumptions; ...
Random-World Semantics and Syntactic Independence for Expressive Languages
(2008-05-03)
We consider three desiderata for a language combining logic and probability: logical expressivity, random-world semantics, and the existence of a useful syntactic condition for probabilistic independence. Achieving these ...