Computer Science and Artificial Intelligence Lab (CSAIL): Recent submissions

Now showing items 1001-1020 of 2625

  • Deionizer: A Tool for Capturing and Embedding I/O Cells 

    Unknown author (2004-06-07)
    In this paper, we introduce the concept of a deionizer. A deionizeris a special type of partial evaluator whose purpose is to create a newversion of a program that can run without accessing a partial set of I/O resources.Although ...

  • BioJADE: A Design and Simulation Tool for Synthetic Biological Systems 

    Unknown author (2004-05-28)
    The next generations of both biological engineering and computer engineering demand that control be exerted at the molecular level. Creating, characterizing and controlling synthetic biological systems may provide us with ...

  • Data Structure Repair Using Goal-Directed Reasoning 

    Unknown author (2004-05-18)
    Model-based data structure repair is a promising techniquefor enabling programs to continue to execute successfullyin the face of otherwise fatal data structure corruption errors.Previous research in this eld relied on ...

  • Learning Commonsense Categorical Knowledge in a Thread Memory System 

    Unknown author (2004-05-18)
    If we are to understand how we can build machines capable of broadpurpose learning and reasoning, we must first aim to build systemsthat can represent, acquire, and reason about the kinds of commonsenseknowledge that we ...

  • Generative Temporal Planning with Complex Processes 

    Unknown author (2004-05-18)
    Autonomous vehicles are increasingly being used in mission-critical applications, and robust methods are needed for controlling these inherently unreliable and complex systems. This thesis advocates the use of model-based ...

  • Verifying the Correctness of Wide-Area Internet Routing 

    Unknown author (2004-05-17)
    Several studies have shown that wide-area Internet routing is fragile, with failures occurring for a variety of reasons. Routing fragility is largely due to the flexible and powerful ways in which BGP can be configured to ...

  • A Combined Pointer and Purity Analysis for Java Programs 

    Unknown author (2004-05-17)
    We present a new method purity analysis for Java programs.A method is pure if it does not mutate any location that exists in the program state right before method invocation.Our analysis is built on top of a combined pointer ...

  • Video Matching 

    Unknown author (2004-05-11)
    This paper describes a method for bringing two videos (recorded at different times) into spatiotemporal alignment, then comparing and combining corresponding pixels for applications such as background subtraction, compositing, ...

  • On Verifying a File System Implementation 

    Unknown author (2004-05-06)
    We present a correctness proof for a basic file system implementation. This implementation contains key elements of standard Unix file systems such as inodes and fixed-size disk blocks. We prove the implementation correct ...

  • Can Basic ML Techniques Illuminate Rateless Erasure Codes? 

    Unknown author (2004-05-05)
    The recently developed rateless erasure codes are a near-optimal channel coding technique that guaranteeslow overhead and fast decoding. The underlying theory, and current implementations, of thesecodes assume that a network ...

  • A Unified Statistical and Information Theoretic Framework for Multi-modal Image Registration 

    Unknown author (2004-04-28)
    We formulate and interpret several multi-modal registration methods inthe context of a unified statistical and information theoretic framework. A unified interpretation clarifies the implicit assumptionsof each method ...

  • Rotation Invariant Object Recognition from One Training Example 

    Unknown author (2004-04-27)
    Local descriptors are increasingly used for the task of object recognition because of their perceived robustness with respect to occlusions and to global geometrical deformations. Such a descriptor--based on a set of ...

  • Light-Weight Leases for Storage-Centric Coordination 

    Unknown author (2004-04-22)
    We propose light-weight lease primitives to leverage fault-tolerant coordination among clients accessing a shared storage infrastructure (such as network attached disks or storage servers). In our approach, leases are ...

  • Cascading Regularized Classifiers 

    Unknown author (2004-04-21)
    Among the various methods to combine classifiers, Boosting was originally thought as an stratagem to cascade pairs of classifiers through their disagreement. I recover the same idea from the work of Niyogi et al. to show ...

  • M&M: A Passive Toolkit for Measuring, Correlating, and Tracking Path Characteristics 

    Unknown author (2004-04-14)
    This paper presents M&M, a passive measurement toolkitsuitable for large-scale studies of Internet path characteristics.The multiQ tool uses equally-spaced mode gaps in TCP flows packet interarrival time distributions to ...

  • A 1020-Node Modular Microphone Array and Beamformer for Intelligent Computing Spaces 

    Unknown author (2004-04-14)
    Ubiquitous computing environments are characterized by an unboundedamount of noise and crosstalk. In these environments, traditionalmethods of sound capture are insufficient, and array microphones areneeded in order to ...

  • Contextual Influences on Saliency 

    Unknown author (2004-04-14)
    This article describes a model for including scene/context priors in attention guidance. In the proposed scheme, visual context information can be available early in the visual processing chain, in order to modulate the ...

  • A Quantitative Comparison of Reconfigurable, Tiled, and Conventional Architectures on Bit-level Computation 

    Unknown author (2004-04-13)
    General purpose computing architectures are being called on to work on amore diverse application mix every day. This has been fueled by the needfor reduced time to market and economies of scale that are the hallmarksof ...

  • Long-Lived Rambo: Trading Knowledge for Communication 

    Unknown author (2004-04-12)
    Shareable data services providing consistency guarantees, such as atomicity (linearizability), make building distributedsystems easier. However, combining linearizability with efficiency in practical algorithms is difficult. ...

  • On Generalized Records and Spatial Conjunction in Role Logic 

    Unknown author (2004-04-06)
    We have previously introduced role logic as a notation fordescribing properties of relational structures in shapeanalysis, databases and knowledge bases. A natural fragmentof role logic corresponds to two-variable logic ...