Search
Now showing items 251-260 of 290
Modeling Network User Behavior: Various Approaches
(2016-06-28)
This project involves learning to predict users' mobility within the network topology. Topological mobility, as opposed to physical mobility, can be substantial as a user switches from LTE to wifi network, while moving ...
Automatic Inference of Code Transforms and Search Spaces for Automatic Patch Generation Systems
(2016-07-08)
We present a new system, Genesis, that processes sets of human patches to automatically infer code transforms and search spaces for automatic patch generation. We present results that characterize the effectiveness of the ...
Data and Code for "Automatic Identification of Narrative Diegesis and Point of View"
(2016-11-09)
This archive contains the code and data for the workshop article "Automatic Identification of Narrative Diegesis and Point of View," published in 2016 in the 2nd Workshop for Computing News Storylines (CNewsStory 2016), ...
Collaborative Diagnosis of Over-Subscribed Temporal Plans
(2016-10-14)
Over-subscription, that is, being assigned too many tasks or requirements that are too demanding, is commonly encountered in temporal planning problems. As human beings, we often want to do more than we can, ask for things ...
SE-Sync: A Certifiably Correct Algorithm for Synchronization over the Special Euclidean Group
(2017-02-05)
Many important geometric estimation problems naturally take the form of synchronization over the special Euclidean group: estimate the values of a set of unknown poses given noisy measurements of a subset of their pairwise ...
Propositional and Activity Monitoring Using Qualitative Spatial Reasoning
(2016-12-14)
Communication is the key to effective teamwork regardless of whether the team members are humans or machines. Much of the communication that makes human teams so effective is non-verbal; they are able to recognize the ...
Oort: User-Centric Cloud Storage with Global Queries
(2016-12-08)
In principle, the web should provide the perfect stage for user-generated content, allowing users to share their data seamlessly with other users across services and applications. In practice, the web fragments a user's ...
On the Non-Existence of Blockwise 2-Local PRGs with Applications to Indistinguishability Obfuscation
(2017-04-06)
Lin and Tessaro (Eprint 2017/250) recently proposed indistinguishability obfuscation and functional encryption candidates and proved their security based on a standard assumption on bilinear maps and a non-standard assumption ...
Sound and Complete Runtime Security Monitor for Application Software
(2016-12-15)
We present a run-time security monitor that detects both known and unknown cyber attacks by checking that the run-time behavior of the application is consistent with the expected behavior modeled by an application ...
The Tensor Algebra Compiler
(2017-02-17)
Tensor and linear algebra is pervasive in data analytics and the physical sciences. Often the tensors, matrices or even vectors are sparse. Computing expressions involving a mix of sparse and dense tensors, matrices and ...