MIT: Recent submissions
Now showing items 41-60 of 2625
-
Report on the 2015 NSF Workshop on Unified Annotation Tooling
(2016-11-08)On March 30 & 31, 2015, an international group of twenty-three researchers with expertise in linguistic annotation convened in Sunny Isles Beach, Florida to discuss problems with and potential solutions for the state of ...
-
Alpenhorn: Bootstrapping Secure Communication without Leaking Metadata
(2016-10-05)Alpenhorn is the first system for initiating an encrypted connection between two users that provides strong privacy and forward secrecy guarantees for metadata (i.e., information about which users connected to each other) ...
-
Examining Key Mobility Resources through Denial of Service Attacks on proposed Global Name Resolution Services
(2016-09-26)The problem we address in this thesis is to uncover the design elements in a network architecture design that may open it up to denial of service (DoS) attacks and to expose the tradeoffs in mitigating those DoS opportunities. ...
-
Flowtune: Flowlet Control for Datacenter Networks
(2016-08-15)Rapid convergence to a desired allocation of network resources to endpoint traffic has been a long-standing challenge for packet-switched networks. The reason for this is that congestion control decisions are distributed ...
-
Automatic Inference of Code Transforms and Search Spaces for Automatic Patch Generation Systems
(2016-07-08)We present a new system, Genesis, that processes sets of human patches to automatically infer code transforms and search spaces for automatic patch generation. We present results that characterize the effectiveness of the ...
-
Evaluating Caching Mechanisms In Future Internet Architectures
(2016-06-28)This thesis seeks to test and evaluate the effects of in-network storage in novel proposed Internet architectures in terms of their performance. In a world where more and more people are mobile and connected to the Internet, ...
-
Modeling Network User Behavior: Various Approaches
(2016-06-28)This project involves learning to predict users' mobility within the network topology. Topological mobility, as opposed to physical mobility, can be substantial as a user switches from LTE to wifi network, while moving ...
-
Towards Practical Theory: Bayesian Optimization and Optimal Exploration
(2016-05-26)This thesis discusses novel principles to improve the theoretical analyses of a class of methods, aiming to provide theoretically driven yet practically useful methods. The thesis focuses on a class of methods, called ...
-
Deep Learning without Poor Local Minima
(2016-05-23)In this paper, we prove a conjecture published in 1989 and also partially address an open problem announced at the Conference on Learning Theory (COLT) 2015. For an expected loss function of a deep nonlinear neural network, ...
-
Delphi: A Software Controller for Mobile Network Selection
(2016-02-25)This paper presents Delphi, a mobile software controller that helps applications select the best network among available choices for their data transfers. Delphi optimizes a specified objective such as transfer completion ...
-
An Analysis of the Search Spaces for Generate and Validate Patch Generation Systems
(2016-02-18)We present the first systematic analysis of the characteristics of patch search spaces for automatic patch generation systems. We analyze the search spaces of two current state-of- the-art systems, SPR and Prophet, with ...
-
Outlier Detection in Heterogeneous Datasets using Automatic Tuple Expansion
(2016-02-08)Rapidly developing areas of information technology are generating massive amounts of data. Human errors, sensor failures, and other unforeseen circumstances unfortunately tend to undermine the quality and consistency of ...
-
Initial report on Object Spreadsheets
(2016-01-12)There is a growing demand for data-driven web applications that help automate organizational and business processes of low to medium complexity by letting users view and update structured data in controlled ways. We present ...
-
Filtered Iterators For Safe and Robust Programs in RIFL
(2015-12-27)We present a new language construct, filtered iterators, for safe and robust input processing. Filtered iterators are designed to eliminate many common input-processing errors while enabling robust continued execution. The ...
-
Jenga: Harnessing Heterogeneous Memories through Reconfigurable Cache Hierarchies
(2015-12-19)Conventional memory systems are organized as a rigid hierarchy, with multiple levels of progressively larger and slower memories. Hierarchy allows a simple, fixed design to benefit a wide range of applications, because ...
-
Bridging Theory and Practice in Cache Replacement
(2015-12-19)Much prior work has studied processor cache replacement policies, but a large gap remains between theory and practice. The optimal policy (MIN) requires unobtainable knowledge of the future, and prior theoretically-grounded ...
-
Cache Calculus: Modeling Caches through Differential Equations
(2015-12-19)Caches are critical to performance, yet their behavior is hard to understand and model. In particular, prior work does not provide closed-form solutions of cache performance, i.e. simple expressions for the miss rate of a ...
-
Supplementary materials for "ProppLearner: Deeply Annotating a Corpus of Russian Folktales to Enable the Machine Learning of a Russian Formalist Theory"
(2015-12-02)This archive contains the supplementary material for the journal article "ProppLearner: Deeply Annotating a Corpus of Russian Folktales to Enable the Machine Learning of a Russian Formalist Theory", published in the Journal ...
-
Representation Discovery for Kernel-Based Reinforcement Learning
(2015-11-24)Recent years have seen increased interest in non-parametric reinforcement learning. There are now practical kernel-based algorithms for approximating value functions; however, kernel regression requires that the underlying ...
-
Dynamic Prefetching of Data Tiles for Interactive Visualization
(2015-10-19)In this paper, we present ForeCache, a general-purpose tool for exploratory browsing of large datasets. ForeCache utilizes a client-server architecture, where the user interacts with a lightweight client-side interface to ...