Search
Now showing items 61-70 of 101
Adaptation for Regularization Operators in Learning Theory
(2006-09-10)
We consider learning algorithms induced by regularization methods in the regression setting. We show that previously obtained error bounds for these algorithms using a-priori choices of the regularization parameter, can ...
RingScalar: A Complexity-Effective Out-of-Order Superscalar Microarchitecture
(2006-09-18)
RingScalar is a complexity-effective microarchitecture for out-of-order superscalar processors, that reduces the area, latency, and power of all major structures in the instruction flow. The design divides an N-way ...
The Design of a Relational Engine
(2006-09-29)
The key design challenges in the construction of a SAT-based relational engine are described, and novel techniques are proposed to address them. An efficient engine must have a mechanism for specifying partial solutions, ...
First Class Copy & Paste
(2006-05-22)
The Subtext project seeks to make programming fundamentally easier by altering the nature of programming languages and tools. This paper defines an operational semantics for an essential subset of the Subtext language. It ...
CogSci to AI: It's the Brainware, Stupid!
(2006-03)
Current modularization techniques fail when applied to hard AI problems.But cognitive science shows that the mind has modules specialized for particular functions.Unlike current engineered modules, the modules of themind ...
Infrastructure for Engineered Emergence on Sensor/Actuator Networks
(2006-03)
The ability to control emergent phenomena depends on decomposingthem into aspects susceptible to independent engineering. Forspatial self-managing systems, the amorphous-medium abstraction lets youseparate the system s ...
A Machine-Checked Safety Proof for a CISC-Compatible SFI Technique
(2006-05-11)
Executing untrusted code while preserving security requires that thecode be prevented from modifying memory or executing instructionsexcept as explicitly allowed. Software-based fault isolation (SFI) or"sandboxing" enforces ...
Schematic Querying of Large Tracking Databases
(2006-06-12)
In dealing with long-term tracking databases withwide-area coverage, an important problem is in formulating anintuitive and fast query system for analysis. In such a querysystem, a user who is not a computer vision research ...
What the Assassin's Guild Taught Me About Distributed Computing
(2006-05-27)
Distributed computing and live-action roleplaying share many of thesame fundamental problems, as live-action roleplaying games commonly include simulations carried out by their players.Games run by the MIT Assassin's Guild ...
Learning using the Born Rule
(2006-05-16)
In Quantum Mechanics the transition from a deterministic descriptionto a probabilistic one is done using a simple rule termed the Bornrule. This rule states that the probability of an outcome ($a$)given a state ($\Psi$) ...