Search
Now showing items 71-80 of 648
A Probabilistic Particle Control Approach to Optimal, Robust Predictive Control
(2006-04-28)
Autonomous vehicles need to be able to plan trajectories to a specified goal that avoid obstacles, and are robust to the inherent uncertainty in the problem. This uncertainty arises due to uncertain state estimation, ...
Revisiting Internet Adressing: Back to the Future!
(2006-04-14)
IP prefixes undermine three goals of Internet routing: accurate reflection of network-layer reachability, secure routing messages, and effective traffic control. This paper presents Atomic IP (AIP), a simple change to ...
Supplement to "Distributed Quota Enforcement for Spam Control"
(2006-04-29)
This report is a supplement to our paper "Distributed Quota Enforcement forSpam Control" (NSDI 2006). We assume here that the reader has readthe main paper. In this report, we first analyze the enforcer nodes'key-value ...
Memoization Attacks and Copy Protection in Partitioned Applications
(2006-12-08)
Application source code protection is a major concern for software architects today. Secure platforms have been proposed that protect the secrecy of application algorithms and enforce copy protection assurances. Unfortunately, ...
Scale Control Processor Test-Chip
(2007-01-12)
We are investigating vector-thread architectures which provide competitive performance and efficiency across a broad class of application domains. Vector-thread architectures unify data-level, thread-level, and instruction-level ...
Quantifier-Free Boolean Algebra with Presburger Arithmetic is NP-Complete
(2007-01-01)
Boolean Algebra with Presburger Arithmetic (BAPA) combines1) Boolean algebras of sets of uninterpreted elements (BA)and 2) Presburger arithmetic operations (PA). BAPA canexpress the relationship between integer variables ...
Robot Manipulation in Human Environments
(2007-01-16)
Human environments present special challenges for robot manipulation. They are often dynamic, difficult to predict, and beyond the control of a robot engineer. Fortunately, many characteristics of these settings can be ...
Bounded CCA2-Secure Non-Malleable Encryption
(2006-12-14)
Under an adaptive chosen ciphertext attack (CCA2), the security of an encryption scheme must hold against adversaries that have access to a decryption oracle. We consider a weakening of CCA2 security, wherein security ...
Distributed Area Search with a Team of Robots
(2006-12-05)
The main goal of this thesis is to demonstrate the applicability of the distributed systems paradigm to robotic systems. This goal is accomplished by presenting two solutions to the Distributed Area Search problem: organizing ...
Online Active Learning in Practice
(2007-01-23)
We compare the practical performance of several recently proposed algorithms for active learning in the online setting. We consider two algorithms (and their combined variants) that are strongly online, in that they do ...