Search
Now showing items 1-10 of 36
5D Covariance Tracing for Efficient Defocus and Motion Blur
(2012-11-16)
The rendering of effects such as motion blur and depth-of-field requires costly 5D integrals. We dramatically accelerate their computation through adaptive sampling and reconstruction based on the prediction of the anisotropy ...
Monitoring the Execution of Temporal Plans for Robotic Systems
(2012-10-04)
To achieve robustness in dynamic and uncertain environments, robotic systems must monitor the progress of their plans during execution. This thesis develops a plan executive called Pike that is capable of executing and ...
The computational magic of the ventral stream: sketch of a theory (and why some deep architectures work).
(2012-12-29)
This paper explores the theoretical consequences of a simple assumption: the computational goal of the feedforward path in the ventral stream -- from V1, V2, V4 and to IT -- is to discount image transformations, after ...
A Gaussian Approximation of Feature Space for Fast Image Similarity
(2012-10-01)
We introduce a fast technique for the robust computation of image similarity. It builds on a re-interpretation of the recent exemplar-based SVM approach, where a linear SVM is trained at a query point and distance is ...
The Order Independence of Iterated Dominance in Extensive Games, with Connections to Mechanism Design and Backward Induction
(2012-07-31)
Shimoji and Watson (1998) prove that a strategy of an extensive game is rationalizable in the sense of Pearce if and only if it survives the maximal elimination of conditionally dominated strategies. Briefly, this process ...
Multiscale Geometric Methods for Data Sets I: Multiscale SVD, Noise and Curvature
(2012-09-08)
Large data sets are often modeled as being noisy samples from probability distributions in R^D, with D large. It has been noticed that oftentimes the support M of these probability distributions seems to be well-approximated ...
Using Program Synthesis for Social Recommendations
(2012-08-13)
This paper presents a new approach to select events of interest to a user in a social media setting where events are generated by the activities of the user's friends through their mobile devices. We argue that given the ...
Bounded-Contention Coding for Wireless Networks in the High SNR Regime
(2012-08-27)
Efficient communication in wireless networks is typically challenged by the possibility of interference among several transmitting nodes. Much important research has been invested in decreasing the number of collisions in ...
From Formal Methods to Executable Code
(2012-08-27)
The objective of this work is the derivation of software that is verifiably correct. Our approach is to abstract system specifications and model these in a formal framework called Timed Input/Output Automata, which provides ...
A Social-Welfare Optimal Probabilistic Mechanism for Knightian Single-Good Auctions
(2012-09-07)
We provide an optimal probabilistic mechanism for maximizing social welfare in single-good auctions when each player does not know his true valuation for the good, but only a set of valuations that is guaranteed to include ...