Browsing Computer Science and Artificial Intelligence Lab (CSAIL) by Title
Now showing items 2495-2514 of 2625
-
A User's Guide to the AI Lab: Getting Started at Tech Square
(MIT Artificial Intelligence Laboratory, 1991-08-18)
-
Uses of Technology to Enhance Education
(1973-06-01)Section 1: Schematic outline of project and what we want. Hardly any intellectual content. Section 2: Statement of our goals in general terms. This statement is intended to have serious intellectual content but lacks meaty ...
-
Using Active Learning to Synthesize Models of Applications That Access Databases
(2018-08-28)We present a new technique that uses active learning to infer models of applications that manipulate relational databases. This technique comprises a domain-specific language for modeling applications that access ...
-
Using Analogy to Acquire Commonsense Knowledge from Human Contributors
(2003-02-12)The goal of the work reported here is to capture the commonsense knowledge of non-expert human contributors. Achieving this goal will enable more intelligent human-computer interfaces and pave the way for computers to ...
-
Using Code Perforation to Improve Performance, Reduce Energy Consumption, and Respond to Failures
(2009-09-03)Many modern computations (such as video and audio encoders, Monte Carlo simulations, and machine learning algorithms) are designed to trade off accuracy in return for increased performance. To date, such computations ...
-
Using computational models to study texture representations in the human visual system.
(2005-02-07)Traditionally, human texture perception has been studied using artificial textures made of random-dot patterns or abstract structured elements. At the same time, computer algorithms for the synthesis of natural textures ...
-
Using Computer Technology to Provide a Creative Learning Environment for Preschool Children
(1976-05-01)TORTIS is a system of special terminals together with software which is designed to provide programming capability and be accesible for use by very young children. The system is designed to add capabilities in small ...
-
Using Cyclic Memory Allocation to Eliminate Memory Leaks
(2005-10-26)We present and evaluate a new memory management technique foreliminating memory leaks in programs with dynamic memoryallocation. This technique observes the execution of the program on asequence of training inputsto find ...
-
Using Dynamic Monitoring to Synthesize Models of Applications That Access Databases
(2018-09-27)We previously developed Konure, a tool that uses active learning to infer the functionality of database applications. An alternative approach is to observe the inputs, outputs, and database traffic from a running ...
-
Using English For Indexing and Retrieving
(1988-10-01)This paper describes a natural language system START. The system analyzes English text and automatically transforms it into an appropriate representation, the knowledge base, which incorporates the information found in the ...
-
Using Enhanced Spherical Images for Object Representation
(1979-05-01)The processes involved in vision, manipulation, and spatial reasoning depend greatly on the particular representation of three-dimensional objects used. A novel representation, based on concepts of differential geometry, ...
-
Using Message Passing Instead of the GOTO Construct
(MIT Artificial Intelligence Laboratory, 1978-04)This paper advocates a programming methodology using message passing. Efficient programs are derived for fast exponentiation, merging ordered sequences, and path existence determination in a directed graph. The problems ...
-
Using Parallel Processing for Problem Solving
(1979-12-01)Parallel processing as a conceptual aid in the design of programs for problem solving applications is developed. A pattern directed invocation language know as Ether is introduced. Ether embodies tow notions in language ...
-
Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol
(2005-08-19)We demonstrate how to carry out cryptographic security analysis ofdistributed protocols within the Probabilistic I/O Automata frameworkof Lynch, Segala, and Vaandrager.This framework provides tools for arguing rigorously ...
-
Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol
(2006-06-19)We demonstrate how to carry out cryptographic security analysis ofdistributed protocols within the Probabilistic I/O Automataframework of Lynch, Segala, and Vaandrager. This framework providestools for arguing rigorously ...
-
Using Program Synthesis for Social Recommendations
(2012-08-13)This paper presents a new approach to select events of interest to a user in a social media setting where events are generated by the activities of the user's friends through their mobile devices. We argue that given the ...
-
Using Program Transformation to Improve Program Translation
(1987-05-01)Direct, construct by construct translation from one high level language to another often produces convoluted, unnatural, and unreadable results, particularly when the source and target languages support different ...
-
Using Recurrent Networks for Dimensionality Reduction
(1992-09-01)This report explores how recurrent neural networks can be exploited for learning high-dimensional mappings. Since recurrent networks are as powerful as Turing machines, an interesting question is how recurrent networks ...
-
Using Special-Purpose Computing to Examine Chaotic Behavior in Nonlinear Mappings
(1989-09-01)Studying chaotic behavior in nonlinear systems requires numerous computations in order to simulate the behavior of such systems. The Standard Map Machine was designed and implemented as a special computer for performing ...
-
Using Structural and Functional Information in Diagnostic Design
(1983-06-01)We wish to design a diagnostic for a device from knowledge of its structure and function. the diagnostic should achieve both coverage of the faults that can occur in the device, and should strive to achieve specificity ...