Computer Science and Artificial Intelligence Lab (CSAIL): Recent submissions
Now showing items 201-220 of 2625
-
An Overview of MOOS-IvP and a Users Guide to the IvP Helm - Release 4.2.1
(2011-08-03)This document describes the IvP Helm - an Open Source behavior-based autonomy application for unmanned vehicles. IvP is short for interval programming - a technique for representing and solving multi-objective optimizations ...
-
Vote the OS off your Core
(2011-07-27)Recent trends in OS research have shown evidence that there are performance benefits to running OS services on different cores than the user applications that rely on them. We quantitatively evaluate this claim in terms ...
-
A Scalable Information Theoretic Approach to Distributed Robot Coordination
(2011-09-25)This paper presents a scalable information theoretic approach to infer the state of an environment by distributively controlling robots equipped with sensors. The robots iteratively estimate the environment state using a ...
-
Kernels for Vector-Valued Functions: a Review
(2011-06-30)Kernel methods are among the most popular techniques in machine learning. From a frequentist/discriminative perspective they play a central role in regularization theory as they provide a natural choice for the hypotheses ...
-
A Software Approach to Unifying Multicore Caches
(2011-06-28)Multicore chips will have large amounts of fast on-chip cache memory, along with relatively slow DRAM interfaces. The on-chip cache memory, however, will be fragmented and spread over the chip; this distributed arrangement ...
-
A hierarchical model of peripheral vision
(2011-06-17)We present a peripheral vision model inspired by the cortical architecture discovered by Hubel and Wiesel. As with existing cortical models, this model contains alternating layers of simple cells, which employ tuning ...
-
Scalable Information-Sharing Network Management
(2011-06-07)This thesis analyzes scalable information-sharing network management. It looks into one of the large problems in network management today: finding information across different network domains. Information-sharing network ...
-
Regularization Predicts While Discovering Taxonomy
(2011-06-03)In this work we discuss a regularization framework to solve multi-category when the classes are described by an underlying class taxonomy. In particular we discuss how to learn the class taxonomy while learning a multi-category ...
-
Understanding the Performance of Broadband Networks through the Statistical Analysis of Speed Tests - Supplemental materials
(2011-05-10)Supplemental materials for the master thesis "Understanding the Performance of Broadband Networks Through the Statistical Analysis of Speed Tests", by Rubén García, submitted in May 2011 for the S.M. in Technology and ...
-
jMWE v1.0.0
(2011)jMWE is a Java library for constructing and testing Multi-Word Expression detectors. The library has three main facilities: (1) a detector API, (2) a MWE index facility, and (3) a test harness. This is version 1.0.0 of the ...
-
Source code and data for MWE'2011 papers
(2011-05-09)Contains the source code and data necessary to run all computations described in the following two papers: Finlayson, Mark A. and Kulkarni, Nidhi (2011) "Detecting Multi-Word Expressions improves Word Sense Disambiguation", ...
-
Library Cache Coherence
(2011-05-02)Directory-based cache coherence is a popular mechanism for chip multiprocessors and multicores. The directory protocol, however, requires multicast for invalidation messages and the collection of acknowledgement messages, ...
-
Comparison of User Traffic Characteristics on Mobile-Access versus Fixed-Access Networks
(2011-05-03)We compare Web traffic characteristics of mobile- versus fixed-access end-hosts, where herein the term "mobile" refers to access via cell towers, using for example the 3G/UMTS standard, and the term "fixed" includes Wi-Fi ...
-
ARBAC Policy for a Large Multi-National Bank
(2011-04-27)Administrative role-based access control (ARBAC) is the first comprehensive administrative model proposed for role-based access control (RBAC). ARBAC has several features for designing highly expressive policies, but current ...
-
Collusive Dominant-Strategy Truthfulness
(2011-04-22)Fifty years ago, Vickrey published his famous mechanism for auctioning a single good in limited supply. The main property of Vickrey's mechanism is efficiency in dominant strategies. In absence of collusion, this is a ...
-
Mechanism Design with Approximate Valuations
(2011-02-16)In mechanism design, we replace the strong assumption that each player knows his own payoff type EXACTLY with the more realistic assumption that he knows it only APPROXIMATELY. Specifically, we study the classical problem ...
-
Partial Reversal Acyclicity
(2011-04-14)Partial Reversal (PR) is a link reversal algorithm which ensures that the underlying graph structure is destination-oriented and acyclic. These properties of PR make it useful in routing protocols and algorithms for solving ...
-
Gasping for AIR Why we need Linked Rules and Justifications on the Semantic Web
(2011-04-16)The Semantic Web is a distributed model for publishing, utilizing and extending structured information using Web protocols. One of the main goals of this technology is to automate the retrieval and integration of data and ...
-
Approximations in the HMAX Model
(2011-04-14)The HMAX model is a biologically motivated architecture for computer vision whose components are in close agreement with existing physiological evidence. The model is capable of achieving close to human level performance ...
-
Efficient Marginal Likelihood Optimization in Blind Deconvolution
(2011-04-04)In blind deconvolution one aims to estimate from an input blurred image y a sharp image x and an unknown blur kernel k. Recent research shows that a key to success is to consider the overall shape of the posterior distribution ...