MIT: Recent submissions
Now showing items 21-40 of 2625
-
Privacy and Security Risks for National Health Records Systems
(2018-01-24)A review of national health records (NEHR) systems shows that privacy and security risks have a profound impact on the success of such projects. Countries have different approaches when dealing with privacy and security ...
-
Generating Component-based Supervised Learning Programs From Crowdsourced Examples
(2017-12-21)We present CrowdLearn, a new system that processes an existing corpus of crowdsourced machine learning programs to learn how to generate effective pipelines for solving supervised machine learning problems. CrowdLearn uses ...
-
Typesafety for Explicitly-Coded Probabilistic Inference Procedures
(2017-11-09)Researchers have recently proposed several systems that ease the process of developing Bayesian probabilistic inference algorithms. These include systems for automatic inference algorithm synthesis as well as stronger ...
-
The Interval Programming Model Solution Algorithm Experimentation Tools and Results
(2017-09-01)Interval programming (IvP) is model for representing multi-objective optimization problems along with a set of solution algorithms. This paper describes a set of IvP solution experiments run over randomly generated problem ...
-
Inference and Regeneration of Programs that Manipulate Relational Databases
(2017-08-29)We present a new technique that infers models of programs that manipulate relational databases. This technique generates test databases and input commands, runs the program, then observes the resulting outputs and updated ...
-
An Efficient Fill Estimation Algorithm for Sparse Matrices and Tensors in Blocked Formats
(2017-06-09)Tensors, linear-algebraic extensions of matrices in arbitrary dimensions, have numerous applications in computer science and computational science. Many tensors are sparse, containing more than 90% zero entries. Efficient ...
-
Multi-Unit Auction Revenue with Possibilistic Beliefs
(2017-06-05)The revenue of traditional auction mechanisms is benchmarked solely against the players' own valuations, despite the fact that they may also have valuable beliefs about each other's valuations. Not much is known about ...
-
Autonomous COLREGS Modes and Velocity Functions
(2017-05-16)This paper concerns an implementation of an autonomy system for unmanned surface vessels operating in accordance with the Coast Guard Collision Regulations (COLREGS). The autonomy system is implemented by associating a ...
-
Automatic Inference of Code Transforms and Search Spaces for Automatic Patch Generation Systems
(2016-07-08)We present a new system, Genesis, that processes sets of human patches to automatically infer code transforms and search spaces for automatic patch generation. We present results that characterize the effectiveness of the ...
-
Planning Robust Strategies for Constructing Multi-object Arrangements
(2017-01-30)A crucial challenge in robotics is achieving reliable results in spite of sensing and control uncertainty. A prominent strategy for dealing with uncertainty is to construct a feedback policy, where actions are chosen as a ...
-
Inference and Regeneration of Programs that Store and Retrieve Data
(2017-04-24)As modern computation platforms become increasingly complex, their programming interfaces are increasingly difficult to use. This complexity is especially inappropriate given the relatively simple core functionality that ...
-
On the Non-Existence of Blockwise 2-Local PRGs with Applications to Indistinguishability Obfuscation
(2017-04-06)Lin and Tessaro (Eprint 2017/250) recently proposed indistinguishability obfuscation and functional encryption candidates and proved their security based on a standard assumption on bilinear maps and a non-standard assumption ...
-
Optimal and Player-Replaceable Consensus with an Honest Majority
(2017-03-31)We construct a Byzantine Agreement protocol that tolerates t < n/2 corruptions, is very efficient in terms of the number of rounds and the number of bits of communication, and satisfies a strong notion of robustness called ...
-
The Tensor Algebra Compiler
(2017-02-17)Tensor and linear algebra is pervasive in data analytics and the physical sciences. Often the tensors, matrices or even vectors are sparse. Computing expressions involving a mix of sparse and dense tensors, matrices and ...
-
Collaborative Diagnosis of Over-Subscribed Temporal Plans
(2016-10-14)Over-subscription, that is, being assigned too many tasks or requirements that are too demanding, is commonly encountered in temporal planning problems. As human beings, we often want to do more than we can, ask for things ...
-
SE-Sync: A Certifiably Correct Algorithm for Synchronization over the Special Euclidean Group
(2017-02-05)Many important geometric estimation problems naturally take the form of synchronization over the special Euclidean group: estimate the values of a set of unknown poses given noisy measurements of a subset of their pairwise ...
-
Propositional and Activity Monitoring Using Qualitative Spatial Reasoning
(2016-12-14)Communication is the key to effective teamwork regardless of whether the team members are humans or machines. Much of the communication that makes human teams so effective is non-verbal; they are able to recognize the ...
-
Sound and Complete Runtime Security Monitor for Application Software
(2016-12-15)We present a run-time security monitor that detects both known and unknown cyber attacks by checking that the run-time behavior of the application is consistent with the expected behavior modeled by an application ...
-
Oort: User-Centric Cloud Storage with Global Queries
(2016-12-08)In principle, the web should provide the perfect stage for user-generated content, allowing users to share their data seamlessly with other users across services and applications. In practice, the web fragments a user's ...
-
Data and Code for "Automatic Identification of Narrative Diegesis and Point of View"
(2016-11-09)This archive contains the code and data for the workshop article "Automatic Identification of Narrative Diegesis and Point of View," published in 2016 in the 2nd Workshop for Computing News Storylines (CNewsStory 2016), ...