Computer Science and Artificial Intelligence Lab (CSAIL): Recent submissions
Now showing items 1561-1580 of 2625
-
Recovering Intrinsic Images from a Single Image
(2002-09-01)We present an algorithm that uses multiple cues to recover shading and reflectance intrinsic images from a single image. Using both color information and a classifier trained to recognize gray-scale patterns, each image ...
-
On the Dirichlet Prior and Bayesian Regularization
(2002-09-01)A common objective in learning a model from data is to recover its network structure, while the model parameters are of minor interest. For example, we may wish to recover regulatory networks from high-throughput data ...
-
1968-1969 Progress Report
(1970-01-01)This report mainly summarizes the Project MAC A.I. Group work between July 1968 and June 1969 but covers some work up to February 1970. The work on computer vision is described in detail. This summary should be read ...
-
Revised Report on the Algorithmic Language Scheme
(1986-09-01)Data and procedures and the values they amass, Higher-order functions to combine and mix and match, Objects with their local state, the message they pass, A property, a package, the control of point for a catch- In the ...
-
Tense, Aspect and the Cognitive Representation of Time
(1984-12-01)This paper explores the relationships between a computation theory of temporal representation (as developed by James Allen) and a formal linguistic theory of tense (as developed by Norbert Hornstein) and aspect. It ...
-
Vision by Man and Machine
(1984-03-01)The development of increasingly sophisticated and powerful computers in the last few decades has frequently stimulated comparisons between them and the human brain. Such comparisons will become more earnest as computers ...
-
Structure from Stereo and Motion
(1983-09-01)Stereopsis and motion parallax are two methods for recovering three dimensional shape. Theoretical analyses of each method show that neither alone can recover rigid 3D shapes correctly unless other information, such ...
-
Implementing Universal Computation in an Evolutionary System
(2002-07-01)Evolutionary algorithms are a common tool in engineering and in the study of natural evolution. Here we take their use in a new direction by showing how they can be made to implement a universal computer. We consider ...
-
Properties and Applications of Shape Recipes
(2002-12-01)In low-level vision, the representation of scene properties such as shape, albedo, etc., are very high dimensional as they have to describe complicated structures. The approach proposed here is to let the image itself ...
-
Keeping Secrets in Hardware: the Microsoft Xbox(TM) Case Study
(2002-05-26)This paper discusses the hardware foundations of the cryptosystem employed by the Xbox(TM) video game console from Microsoft. A secret boot block overlay is buried within a system ASIC. This secret boot block decrypts and ...
-
Trajectory Mapping ("TM''): A New Non-Metric Scaling Technique
(1993-12-01)Trajectory Mapping "TM'' is a new scaling technique designed to recover the parameterizations, axes, and paths used to traverse a feature space. Unlike Multidimensional Scaling (MDS), there is no assumption that the ...
-
Seeing 'Ghost' Solutions in Stereo Vision
(1988-09-01)A unique matching is a stated objective of most computational theories of stereo vision. This report describes situations where humans perceive a small number of surfaces carried by non-unique matching of random dot ...
-
Quantitative Inference in a Mechanical Design Compiler
(1989-01-01)This paper presents the ideas underlying a program that takes as input a schematic of a mechanical or hydraulic power transmission system, plus specifications and a utility function, and returns catalog numbers from ...
-
Meta-Rules: Reasoning About Control
(1980-03-01)How can we insure that knowledge embedded in a program is applied effectively? Traditionally the answer to this question has been sought in different problem solving paradigms and in different approaches to encoding ...
-
The Computer as Coach: An Athletic Paradigm for Intellectual Education
(1976-12-01)Over the next five years, computer games will find their way into a vast number of American homes, creating a unique educational opportunity: the development of "computer coaches" for the serious intellectual skills ...
-
Floyd-Hoare Verifiers "Considered Harmful"
(1978-01-01)The Floyd-Hoare methodology completely dominates the field of program verification and has contributed much to our understanding of how programs might be analyzed. Useful but limited verifiers have been developed using ...
-
Actors and Continuous Functionals
(1977-07-01)This paper presents precise versions of some "laws" that must be satisfied by computations involving communicating parallel processes. The laws take the form of stating plausible restrictions on the histories of ...
-
Advanced Programming Language Features for Executable Design Patterns "Better Patterns Through Reflection
(2002-03-22)The Design Patterns book [GOF95] presents 24 time-tested patterns that consistently appear in well-designed software systems. Each pattern is presented with a description of the design problem the pattern addresses, as ...
-
Learning with Deictic Representation
(2002-04-10)Most reinforcement learning methods operate on propositional representations of the world state. Such representations are often intractably large and generalize poorly. Using a deictic representation is believed to be ...
-
The Image Dissector "Eyes"
(1969-08-01)This is a collection of data on the construction operation and performance of the two image dissector cameras. Some of this data is useful in deciding whether certain shortcomings are significant for a given application ...