Search
Now showing items 21-30 of 57
Power-Aware Computing with Dynamic Knobs
(2010-05-14)
We present PowerDial, a system for dynamically adapting application behavior to execute successfully in the face of load and power fluctuations. PowerDial transforms static configuration parameters into dynamic knobs that ...
iJam: Jamming Oneself for Secure Wireless Communication
(2010-06-07)
Wireless is inherently less secure than wired networks because of its broadcast nature. Attacks that simply snoop on the wireless medium successfully defeat the security of even 802.11 networks using the most recent security ...
EM2: A Scalable Shared-Memory Multicore Architecture
(2010-06-12)
We introduce the Execution Migration Machine (EM2), a novel, scalable shared-memory architecture for large-scale multicores constrained by off-chip memory bandwidth. EM2 reduces cache miss rates, and consequently off-chip ...
SIFT Flow: Dense Correspondence across Scenes and its Applications
(2010-05-08)
While image alignment has been studied in different areas of computer vision for decades, aligning images depicting different scenes remains a challenging problem. Analogous to optical flow where an image is aligned to its ...
ChitChat: Making Video Chat Robust to Packet Loss
(2010-07-05)
Video chat is increasingly popular among Internet users. Often, however, chatting sessions suffer from packet loss, which causes video outage and poor quality. Existing solutions however are unsatisfying. Retransmissions ...
Broadcasting in Unreliable Radio Networks
(2010-06-08)
Practitioners agree that unreliable links, which fluctuate between working and not working, are an important characteristic of wireless networks. In contrast, most theoretical models of radio networks fix a static set of ...
Automatic Error Finding in Access-Control Policies
(2010-05-05)
Access-control policies are a key infrastructural technology for computer security. However, a significant problem is that system administrators need to be able to automatically verify whether their policies capture the ...
Kongming: A Generative Planner for Hybrid Systems with Temporally Extended Goals
(2010-04-09)
Most unmanned missions in space and undersea are commanded by a "script" that specifies a sequence of discrete commands and continuous actions. Currently such scripts are mostly hand-generated by human operators. This ...
The Bayes Tree: Enabling Incremental Reordering and Fluid Relinearization for Online Mapping
(2010-01-29)
In this paper we present a novel data structure, the Bayes tree, which exploits the connections between graphical model inference and sparse linear algebra. The proposed data structure provides a new perspective on an ...
Annotation Guide for the UCM/MIT Indications, Referential Expressions, and Coreference Corpus (UMIREC Corpus)
(2010-05-12)
This is the annotation guide given to the annotators who created the UCM/MIT Indications, Referring Expressions, and Coreference (UMIREC) Corpus version 1.0. The corpus comprises texts annotated for referring expressions, ...