Computer Science and Artificial Intelligence Lab (CSAIL): Recent submissions

Now showing items 1561-1580 of 2625

  • Recovering Intrinsic Images from a Single Image 

    Unknown author (2002-09-01)
    We present an algorithm that uses multiple cues to recover shading and reflectance intrinsic images from a single image. Using both color information and a classifier trained to recognize gray-scale patterns, each image ...

  • On the Dirichlet Prior and Bayesian Regularization 

    Unknown author (2002-09-01)
    A common objective in learning a model from data is to recover its network structure, while the model parameters are of minor interest. For example, we may wish to recover regulatory networks from high-throughput data ...

  • 1968-1969 Progress Report 

    Unknown author (1970-01-01)
    This report mainly summarizes the Project MAC A.I. Group work between July 1968 and June 1969 but covers some work up to February 1970. The work on computer vision is described in detail. This summary should be read ...

  • Revised Report on the Algorithmic Language Scheme 

    Unknown author (1986-09-01)
    Data and procedures and the values they amass, Higher-order functions to combine and mix and match, Objects with their local state, the message they pass, A property, a package, the control of point for a catch- In the ...

  • Tense, Aspect and the Cognitive Representation of Time 

    Unknown author (1984-12-01)
    This paper explores the relationships between a computation theory of temporal representation (as developed by James Allen) and a formal linguistic theory of tense (as developed by Norbert Hornstein) and aspect. It ...

  • Vision by Man and Machine 

    Unknown author (1984-03-01)
    The development of increasingly sophisticated and powerful computers in the last few decades has frequently stimulated comparisons between them and the human brain. Such comparisons will become more earnest as computers ...

  • Structure from Stereo and Motion 

    Unknown author (1983-09-01)
    Stereopsis and motion parallax are two methods for recovering three dimensional shape. Theoretical analyses of each method show that neither alone can recover rigid 3D shapes correctly unless other information, such ...

  • Implementing Universal Computation in an Evolutionary System 

    Unknown author (2002-07-01)
    Evolutionary algorithms are a common tool in engineering and in the study of natural evolution. Here we take their use in a new direction by showing how they can be made to implement a universal computer. We consider ...

  • Properties and Applications of Shape Recipes 

    Unknown author (2002-12-01)
    In low-level vision, the representation of scene properties such as shape, albedo, etc., are very high dimensional as they have to describe complicated structures. The approach proposed here is to let the image itself ...

  • Keeping Secrets in Hardware: the Microsoft Xbox(TM) Case Study 

    Unknown author (2002-05-26)
    This paper discusses the hardware foundations of the cryptosystem employed by the Xbox(TM) video game console from Microsoft. A secret boot block overlay is buried within a system ASIC. This secret boot block decrypts and ...

  • Trajectory Mapping ("TM''): A New Non-Metric Scaling Technique 

    Unknown author (1993-12-01)
    Trajectory Mapping "TM'' is a new scaling technique designed to recover the parameterizations, axes, and paths used to traverse a feature space. Unlike Multidimensional Scaling (MDS), there is no assumption that the ...

  • Seeing 'Ghost' Solutions in Stereo Vision 

    Unknown author (1988-09-01)
    A unique matching is a stated objective of most computational theories of stereo vision. This report describes situations where humans perceive a small number of surfaces carried by non-unique matching of random dot ...

  • Quantitative Inference in a Mechanical Design Compiler 

    Unknown author (1989-01-01)
    This paper presents the ideas underlying a program that takes as input a schematic of a mechanical or hydraulic power transmission system, plus specifications and a utility function, and returns catalog numbers from ...

  • Meta-Rules: Reasoning About Control 

    Unknown author (1980-03-01)
    How can we insure that knowledge embedded in a program is applied effectively? Traditionally the answer to this question has been sought in different problem solving paradigms and in different approaches to encoding ...

  • The Computer as Coach: An Athletic Paradigm for Intellectual Education 

    Unknown author (1976-12-01)
    Over the next five years, computer games will find their way into a vast number of American homes, creating a unique educational opportunity: the development of "computer coaches" for the serious intellectual skills ...

  • Floyd-Hoare Verifiers "Considered Harmful" 

    Unknown author (1978-01-01)
    The Floyd-Hoare methodology completely dominates the field of program verification and has contributed much to our understanding of how programs might be analyzed. Useful but limited verifiers have been developed using ...

  • Actors and Continuous Functionals 

    Unknown author (1977-07-01)
    This paper presents precise versions of some "laws" that must be satisfied by computations involving communicating parallel processes. The laws take the form of stating plausible restrictions on the histories of ...

  • Advanced Programming Language Features for Executable Design Patterns "Better Patterns Through Reflection 

    Unknown author (2002-03-22)
    The Design Patterns book [GOF95] presents 24 time-tested patterns that consistently appear in well-designed software systems. Each pattern is presented with a description of the design problem the pattern addresses, as ...

  • Learning with Deictic Representation 

    Unknown author (2002-04-10)
    Most reinforcement learning methods operate on propositional representations of the world state. Such representations are often intractably large and generalize poorly. Using a deictic representation is believed to be ...

  • The Image Dissector "Eyes" 

    Unknown author (1969-08-01)
    This is a collection of data on the construction operation and performance of the two image dissector cameras. Some of this data is useful in deciding whether certain shortcomings are significant for a given application ...