MIT: Recent submissions

Now showing items 101-120 of 2625

  • Automatic Error Elimination by Multi-Application Code Transfer 

    Unknown author (2014-10-02)
    We present Code Phage (CP), a system for automatically transferring correct code from donor applications into recipient applications to successfully eliminate errors in the recipient. Experimental results using six donor ...

  • Constraint Generation for the Jeeves Privacy Language 

    Unknown author (2014-10-01)
    Our goal is to present a completed, semantic formalization of the Jeeves privacy language evaluation engine, based on the original Jeeves constraint semantics defined by Yang et al at POPL12, but sufficiently strong to ...

  • OpLog: a library for scaling update-heavy data structures 

    Unknown author (2014-09-16)
    Existing techniques (e.g., RCU) can achieve good multi-core scaling for read-mostly data, but for update-heavy data structures only special-purpose techniques exist. This paper presents OpLog, a general-purpose library ...

  • Alloy*: A Higher-Order Relational Constraint Solver 

    Unknown author (2014-09-02)
    The last decade has seen a dramatic growth in the use of constraint solvers as a computational mechanism, not only for analysis and synthesis of software, but also at runtime. Solvers are available for a variety of logics ...

  • Motion Compatibility for Indoor Localization 

    Unknown author (2014-08-26)
    Indoor localization -- a device's ability to determine its location within an extended indoor environment -- is a fundamental enabling capability for mobile context-aware applications. Many proposed applications assume ...

  • Energy-Efficient Approximate Computation in Topaz 

    Unknown author (2014-08-19)
    We present Topaz, a new task-based language for computations that execute on approximate computing platforms that may occasionally produce arbitrarily inaccurate results. The Topaz implementation maps approximate tasks ...

  • A Coded Shared Atomic Memory Algorithm for Message Passing Architectures 

    Unknown author (2014-08-01)
    This paper considers the communication and storage costs of emulating atomic (linearizable) multi-writer multi-reader shared memory in distributed message-passing systems. The paper contains three main contributions: (1) ...

  • Autotuning Algorithmic Choice for Input Sensitivity 

    Unknown author (2014-06-23)
    Empirical autotuning is increasingly being used in many domains to achieve optimized performance in a variety of different execution environments. A daunting challenge faced by such autotuners is input sensitivity, where ...

  • Possibilistic Beliefs and Higher-Level Rationality 

    Unknown author (2014-06-09)
    We consider rationality and rationalizability for normal-form games of incomplete information in which the players have possibilistic beliefs about their opponents. In this setting, we prove that the strategies compatible ...

  • Possibilistic Beliefs and Higher-Level Rationality 

    Unknown author (2014-06-09)
    We consider rationality and rationalizability for normal-form games of incomplete information in which the players have possibilistic beliefs about their opponents. In this setting, we prove that the strategies compatible ...

  • Latent Case Model: A Generative Approach for Case-Based Reasoning and Prototype Classification 

    Unknown author (2014-05-26)
    We present a general framework for Bayesian case-based reasoning and prototype classification and clustering -- Latent Case Model (LCM). LCM learns the most representative prototype observations of a dataset by performing ...

  • Quaternionic Representation of the Riesz Pyramid for Video Magnification 

    Unknown author (2014-04-26)
    Recently, we presented a new image pyramid, called the Riesz pyramid, that uses the Riesz transform to manipulate the phase in non-oriented sub-bands of an image sequence to produce real-time motion-magnified videos. In ...

  • Multi-Person Motion Tracking via RF Body Reflections 

    Unknown author (2014-04-26)
    Recently, we have witnessed the emergence of technologies that can localize a user and track her gestures based purely on radio reflections off the person's body. These technologies work even if the user is behind a wall ...

  • One Clock to Rule Them All: A Primitive for Distributed Wireless Protocols at the Physical Layer 

    Unknown author (2014-04-27)
    Implementing distributed wireless protocols at the physical layer today is challenging because different nodes have different clocks, each of which has slightly different frequencies. This causes the nodes to have frequency ...

  • Symbolic Execution for (Almost) Free: Hijacking an Existing Implementation to Perform Symbolic Execution 

    Unknown author (2014-04-22)
    Symbolic execution of a language is traditionally achieved by replacing the language s interpreter with an entirely new interpreter. This may be an unnecessary burden, and it is tempting instead to try to use as much of ...

  • Moebius Language Reference, Version 1.2 

    Unknown author (2014-04-09)
    Moebius is a representation and interface language based on a subset of English. It is designed for use as a means of encoding information and as a means of conveying information between software components and other ...

  • Sloth: Being Lazy is a Virtue (When Issuing Database Queries) 

    Unknown author (2014-04-14)
    Many web applications store persistent data in databases. During execution, such applications spend a significant amount of time communicating with the database for retrieval and storing of persistent data over the network. ...

  • Cicada: Predictive Guarantees for Cloud Network Bandwidth 

    Unknown author (2014-03-24)
    In cloud-computing systems, network-bandwidth guarantees have been shown to improve predictability of application performance and cost. Most previous work on cloud-bandwidth guarantees has assumed that cloud tenants know ...

  • The N2 Corpus v1.0 

    Unknown author (MIT CSAIL, 2014-03-22)
    The N2 Corpus (Narrative Networks Corpus) comprises 100 story texts (42,480 words) relevant to Islamist Extremism, drawn from religious stories, online material, and promotional magazines. The corpus has been annotated for ...

  • An Architecture for Online Affordance-based Perception and Whole-body Planning 

    Unknown author (2014-03-16)
    The DARPA Robotics Challenge Trials held in December 2013 provided a landmark demonstration of dexterous mobile robots executing a variety of tasks aided by a remote human operator using only data from the robot's sensor ...