Search
Now showing items 1001-1010 of 1390
Multi-Class Learning: Simplex Coding And Relaxation Error
(2011-09-27)
We study multi-category classification in the framework of computational learning theory. We show how a relaxation approach, which is commonly used in binary classification, can be generalized to the multi-class setting. ...
Vote the OS off your Core
(2011-07-27)
Recent trends in OS research have shown evidence that there are performance benefits to running OS services on different cores than the user applications that rely on them. We quantitatively evaluate this claim in terms ...
Faces as a "Model Category" for Visual Object Recognition
(2013-03-18)
Visual recognition is an important ability that is central to many everyday tasks such as reading, navigation and social interaction, and is therefore actively studied in neuroscience, cognitive psychology and artificial ...
Asynchronous Failure Detectors
(2013-01-30)
Failure detectors -- oracles that provide information about process crashes -- are an important abstraction for crash tolerance in distributed systems. The generality of failure-detector theory, while providing great ...
5D Covariance Tracing for Efficient Defocus and Motion Blur
(2012-11-16)
The rendering of effects such as motion blur and depth-of-field requires costly 5D integrals. We dramatically accelerate their computation through adaptive sampling and reconstruction based on the prediction of the anisotropy ...
Monitoring the Execution of Temporal Plans for Robotic Systems
(2012-10-04)
To achieve robustness in dynamic and uncertain environments, robotic systems must monitor the progress of their plans during execution. This thesis develops a plan executive called Pike that is capable of executing and ...
The computational magic of the ventral stream: sketch of a theory (and why some deep architectures work).
(2012-12-29)
This paper explores the theoretical consequences of a simple assumption: the computational goal of the feedforward path in the ventral stream -- from V1, V2, V4 and to IT -- is to discount image transformations, after ...
Securing Deployed RFIDs by Randomizing the Modulation and the Channel
(2013-01-12)
RFID cards are widely used today in sensitive applications such as access control, payment systems, and asset tracking. Past work shows that an eavesdropper snooping on the communication between a card and its legitimate ...
A Plan for Optimizing Network-Intensive Cloud Applications
(2013-02-12)
A significant and growing number of applications deployed on cloud infrastructures are network-intensive. These applications are frequently bottlenecked by the speed of network connections between the machines on which ...
Tracking 3-D Rotations with the Quaternion Bingham Filter
(2013-03-27)
A deterministic method for sequential estimation of 3-D rotations is presented. The Bingham distribution is used to represent uncertainty directly on the unit quaternion hypersphere. Quaternions avoid the degeneracies of ...