MIT: Recent submissions
Now showing items 61-80 of 2625
-
Big Data Privacy Scenarios
(2015-10-01)This paper is the first in a series on privacy in Big Data. As an outgrowth of a series of workshops on the topic, the Big Data Privacy Working Group undertook a study of a series of use scenarios to highlight the challenges ...
-
Designing a Context-Sensitive Context Detection Service for Mobile Devices
(2015-09-24)This paper describes the design, implementation, and evaluation of Amoeba, a context-sensitive context detection service for mobile devices. Amoeba exports an API that allows a client to express interest in one or more ...
-
Network Maximal Correlation
(2015-09-21)Identifying nonlinear relationships in large datasets is a daunting task particularly when the form of the nonlinearity is unknown. Here, we introduce Network Maximal Correlation (NMC) as a fundamental measure to capture ...
-
Prophet: Automatic Patch Generation via Learning from Successful Patches
(2015-07-13)We present Prophet, a novel patch generation system that learns a probabilistic model over candidate patches from a database of past successful patches. Prophet defines the probabilistic model as the combination of a ...
-
Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications
(2015-07-06)Twenty years ago, law enforcement organizations lobbied to require data and communication services to engineer their products to guarantee law enforcement access to all data. After lengthy debate and vigorous predictions ...
-
PhD Thesis Proposal: Human-Machine Collaborative Optimization via Apprenticeship Scheduling
(2015-07-02)Resource optimization in health care, manufacturing, and military operations requires the careful choreography of people and equipment to effectively fulfill the responsibilities of the profession. However, resource ...
-
Guaranteeing Spoof-Resilient Multi-Robot Networks
(July 2015)Multi-robot networks use wireless communication to provide wide-ranging services such as aerial surveillance and unmanned delivery. However, effective coordination between multiple robots requires trust, making them ...
-
Value-Deviation-Bounded Serial Data Encoding for Energy-Efficient Approximate Communication
(2015-06-04)Transferring data between ICs accounts for a growing proportion of system power in wearable and mobile systems. Reducing signal transitions reduces the dynamic power dissipated in this data transfer, but traditional ...
-
An Analysis of Patch Plausibility and Correctness for Generate-And-Validate Patch Generation Systems
(2015-05-29)We analyze reported patches for three existing generate-and-validate patch generation systems (GenProg, RSRepair, and AE). The basic principle behind generate-and-validate systems is to accept only plausible patches that ...
-
An Analysis of Patch Plausibility and Correctness for Generate-And-Validate Patch Generation Systems
(2015-05-26)We analyze reported patches for three existing generate-and-validate patch generation systems (GenProg, RSRepair, and AE). The basic principle behind generate-and-validate systems is to accept only plausible patches that ...
-
Prophet: Automatic Patch Generation via Learning from Successful Human Patches
(2015-05-26)We present Prophet, a novel patch generation system that learns a probabilistic model over candidate patches from a large code database that contains many past successful human patches. It defines the probabilistic model ...
-
Automatic Discovery and Patching of Buffer and Integer Overflow Errors
(2015-05-26)We present Targeted Automatic Patching (TAP), an automatic buffer and integer overflow discovery and patching system. Starting with an application and a seed input that the application processes correctly, TAP dynamically ...
-
Simit: A Language for Physical Simulation
(2015-05-26)Using existing programming tools, writing high-performance simulation code is labor intensive and requires sacrificing readability and portability. The alternative is to prototype simulations in a high-level language like ...
-
An Analysis of Patch Plausibility and Correctness for Generate-And-Validate Patch Generation Systems (Supplementary Material)
(2015-05-21)We analyze reported patches for three prior generate-and-validate patch generation systems (GenProg, RSRepair, and AE). Because of errors in the patch evaluation infrastructure, the majority of the reported patches violate ...
-
A (Truly) Local Broadcast Layer for Unreliable Radio Networks
(2015-05-18)In this paper, we implement an efficient local broadcast service for the dual graph model, which describes communication in a radio network with both reliable and unreliable links. Our local broadcast service offers ...
-
Non-Essential Communication in Mobile Applications
(2015-05-04)This paper studies communication patterns in mobile applications. Our analysis shows that 65% of the HTTP, socket, and RPC communication in top-popular Android applications from Google Play have no effect on the user-observable ...
-
Markov Chain Hallway and Poisson Forest Environment Generating Distributions
(2015-04-27)We document two environment-generating distributions used for sampling random 2D maps. The first generates random hallway environments based on a Markov chain and the second generates random forest environments based on ...
-
Automatic Error Elimination by Horizontal Code Transfer Across Multiple Applications
(2015-04-15)We present Code Phage (CP), a system for automatically transferring correct code from donor applications into recipient applications that process the same inputs to successfully eliminate errors in the recipient. Experimental ...
-
Horizontal Code Transfer via Program Fracture and Recombination
(2015-04-14)We present a new horizontal code transfer technique, program fracture and recombination, for automatically replacing, deleting, and/or combining code from multiple applications. Benefits include automatic generation of new ...
-
A Cache Model for Modern Processors
(2015-04-09)Modern processors use high-performance cache replacement policies that outperform traditional alternatives like least-recently used (LRU). Unfortunately, current cache models use stack distances to predict LRU or its ...