Search
Now showing items 61-70 of 939
Learning to Trade with Insider Information
(2005-10-07)
This paper introduces algorithms for learning how to trade usinginsider (superior) information in Kyle's model of financial markets.Prior results in finance theory relied on the insider having perfectknowledge of the ...
Asymptotics of Gaussian Regularized Least-Squares
(2005-10-20)
We consider regularized least-squares (RLS) with a Gaussian kernel. Weprove that if we let the Gaussian bandwidth $\sigma \rightarrow\infty$ while letting the regularization parameter $\lambda\rightarrow 0$, the RLS solution ...
Automatic Software Upgrades for Distributed Systems
(2005-10-06)
Upgrading the software of long-lived, highly-available distributedsystems is difficult. It is not possible to upgrade all the nodes in asystem at once, since some nodes may be unavailable and halting thesystem for an ...
Knowledge Flow Analysis for Security Protocols
(2005-10-19)
Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of knowledge amongst principals. Because this ...
Learning a Dictionary of Shape-Components in Visual Cortex: Comparison with Neurons, Humans and Machines
(2006-04-25)
In this thesis, I describe a quantitative model that accounts for the circuits and computations of the feedforward path of the ventral stream of visual cortex. This model is consistent with a general theory of visual ...
Coordinating Agile Systems through the Model-based Execution of Temporal Plans
(2006-04-28)
Agile autonomous systems are emerging, such as unmanned aerial vehicles (UAVs), that must robustly perform tightly coordinated time-critical missions; for example, military surveillance or search-and-rescue scenarios. In ...
Of Malicious Motes and Suspicious Sensors
(2006-04-19)
How much damage can a malicious tiny device cause in a single-hopwireless network? Imagine two players, Alice and Bob, who want toexchange information. Collin, a malicious adversary, wants to preventthem from communicating. ...
A Combined Stochastic and Greedy Hybrid Estimation Capability for Concurrent Hybrid Models with Autonomous Mode Transitions
(2006-04-28)
Robotic and embedded systems have become increasingly pervasive in applicationsranging from space probes and life support systems to robot assistants. In order to act robustly in the physical world, robotic systems must ...
Detecting and tracking multiple interacting objects without class-specific models
(2006-04-25)
We propose a framework for detecting and tracking multiple interacting objects from a single, static, uncalibrated camera. The number of objects is variable and unknown, and object-class-specific models are not available. ...
Abstraction Layers for Scalable Microfluidic Biocomputers (Extended Version)
(2006-05-05)
Microfluidic devices are emerging as an attractive technology for automatically orchestrating the reactions needed in a biological computer. Thousands of microfluidic primitives have already been integrated on a single ...