Search
Now showing items 41-50 of 51
Intellectual Property in Computing: (How) Should Software Be Protected? An Industry Perspective
(1992-05-01)
The future of the software industry is today being shaped in the courtroom. Most discussions of intellectual property to date, however, have been frames as debates about how the existing law --- promulgated long before the ...
Localization and Positioning Using Combinations of Model Views
(1992-09-01)
A method for localization and positioning in an indoor environment is presented. The method is based on representing the scene as a set of 2D views and predicting the appearances of novel views by linear combinations ...
Recognition by Prototypes
(1992-12-01)
A scheme for recognizing 3D objects from single 2D images is introduced. The scheme proceeds in two stages. In the first stage, the categorization stage, the image is compared to prototype objects. For each prototype, ...
Analytical Representation of Contours
(1992-10-01)
The interpretation and recognition of noisy contours, such as silhouettes, have proven to be difficult. One obstacle to the solution of these problems has been the lack of a robust representation for contours. The contour ...
Explorations of the Practical Issues of Learning Prediction-Control Tasks Using Temporal Difference Learning Methods
(1992-12-01)
There has been recent interest in using temporal difference learning methods to attack problems of prediction and control. While these algorithms have been brought to bear on many problems, they remain poorly understood. ...
Dynamics of buoyant releases in confined spaces.
(University of CambridgeDepartment of Applied Mathematics and Theoretical Physics, 1992-01-28)
The flows that may result from the release of a buoyant fluid from a small source in a confined space are varied and complex, depending on the source characteristics, the confining geometry and container ventilation. ...
Capture It, Name It, Own it: How to capture re-occurring patterns, name them and turn them into reusable functions via Emacs kbd-macros
(MIT Artificial Intelligence Laboratory, 1992-05)
The purpose of this talk is not to teach you about Emacs or Emacs kbd-macros, though we will use both as examples. I can teach you everything there is to know about Emacs and kbd-macros in 5 minutes. There are literally ...
Tomorrow's Surgery: Micromotors and Microrobots
(MIT Artificial Intelligence Laboratory, 1992-07)
Surgical procedures have changed radically over the last few years due to the arrival of new technology. What will technology bring us in the future?
This paper examines a few of the forces whose timing are causing new ...
AI Lab Faculty
(MIT Artificial Intelligence Laboratory, 1992-09)
This document is meant to introduce new graduate students in the MIT AI Lab to the faculty members of the laboratory and their research interests. Each entry consists of the faculty member's picture, if available, some ...
XSnap : a queueing network analysis package
(1992)
This dissertation describes the design and implementation of a sophisticated X-Windows based modelling package called XSnap, which can be used to solve product-form mixed multi-class queueing networks. A Graphical User ...