Computer Science and Artificial Intelligence Lab (CSAIL): Recent submissions

Now showing items 201-220 of 2625

  • An Overview of MOOS-IvP and a Users Guide to the IvP Helm - Release 4.2.1 

    Unknown author (2011-08-03)
    This document describes the IvP Helm - an Open Source behavior-based autonomy application for unmanned vehicles. IvP is short for interval programming - a technique for representing and solving multi-objective optimizations ...

  • Vote the OS off your Core 

    Unknown author (2011-07-27)
    Recent trends in OS research have shown evidence that there are performance benefits to running OS services on different cores than the user applications that rely on them. We quantitatively evaluate this claim in terms ...

  • A Scalable Information Theoretic Approach to Distributed Robot Coordination 

    Unknown author (2011-09-25)
    This paper presents a scalable information theoretic approach to infer the state of an environment by distributively controlling robots equipped with sensors. The robots iteratively estimate the environment state using a ...

  • Kernels for Vector-Valued Functions: a Review 

    Unknown author (2011-06-30)
    Kernel methods are among the most popular techniques in machine learning. From a frequentist/discriminative perspective they play a central role in regularization theory as they provide a natural choice for the hypotheses ...

  • A Software Approach to Unifying Multicore Caches 

    Unknown author (2011-06-28)
    Multicore chips will have large amounts of fast on-chip cache memory, along with relatively slow DRAM interfaces. The on-chip cache memory, however, will be fragmented and spread over the chip; this distributed arrangement ...

  • A hierarchical model of peripheral vision 

    Unknown author (2011-06-17)
    We present a peripheral vision model inspired by the cortical architecture discovered by Hubel and Wiesel. As with existing cortical models, this model contains alternating layers of simple cells, which employ tuning ...

  • Scalable Information-Sharing Network Management 

    Unknown author (2011-06-07)
    This thesis analyzes scalable information-sharing network management. It looks into one of the large problems in network management today: finding information across different network domains. Information-sharing network ...

  • Regularization Predicts While Discovering Taxonomy 

    Unknown author (2011-06-03)
    In this work we discuss a regularization framework to solve multi-category when the classes are described by an underlying class taxonomy. In particular we discuss how to learn the class taxonomy while learning a multi-category ...

  • Understanding the Performance of Broadband Networks through the Statistical Analysis of Speed Tests - Supplemental materials 

    Unknown author (2011-05-10)
    Supplemental materials for the master thesis "Understanding the Performance of Broadband Networks Through the Statistical Analysis of Speed Tests", by Rubén García, submitted in May 2011 for the S.M. in Technology and ...

  • jMWE v1.0.0 

    Unknown author (2011)
    jMWE is a Java library for constructing and testing Multi-Word Expression detectors. The library has three main facilities: (1) a detector API, (2) a MWE index facility, and (3) a test harness. This is version 1.0.0 of the ...

  • Source code and data for MWE'2011 papers 

    Unknown author (2011-05-09)
    Contains the source code and data necessary to run all computations described in the following two papers: Finlayson, Mark A. and Kulkarni, Nidhi (2011) "Detecting Multi-Word Expressions improves Word Sense Disambiguation", ...

  • Library Cache Coherence 

    Unknown author (2011-05-02)
    Directory-based cache coherence is a popular mechanism for chip multiprocessors and multicores. The directory protocol, however, requires multicast for invalidation messages and the collection of acknowledgement messages, ...

  • Comparison of User Traffic Characteristics on Mobile-Access versus Fixed-Access Networks 

    Unknown author (2011-05-03)
    We compare Web traffic characteristics of mobile- versus fixed-access end-hosts, where herein the term "mobile" refers to access via cell towers, using for example the 3G/UMTS standard, and the term "fixed" includes Wi-Fi ...

  • ARBAC Policy for a Large Multi-National Bank 

    Unknown author (2011-04-27)
    Administrative role-based access control (ARBAC) is the first comprehensive administrative model proposed for role-based access control (RBAC). ARBAC has several features for designing highly expressive policies, but current ...

  • Collusive Dominant-Strategy Truthfulness 

    Unknown author (2011-04-22)
    Fifty years ago, Vickrey published his famous mechanism for auctioning a single good in limited supply. The main property of Vickrey's mechanism is efficiency in dominant strategies. In absence of collusion, this is a ...

  • Mechanism Design with Approximate Valuations 

    Unknown author (2011-02-16)
    In mechanism design, we replace the strong assumption that each player knows his own payoff type EXACTLY with the more realistic assumption that he knows it only APPROXIMATELY. Specifically, we study the classical problem ...

  • Partial Reversal Acyclicity 

    Unknown author (2011-04-14)
    Partial Reversal (PR) is a link reversal algorithm which ensures that the underlying graph structure is destination-oriented and acyclic. These properties of PR make it useful in routing protocols and algorithms for solving ...

  • Gasping for AIR Why we need Linked Rules and Justifications on the Semantic Web 

    Unknown author (2011-04-16)
    The Semantic Web is a distributed model for publishing, utilizing and extending structured information using Web protocols. One of the main goals of this technology is to automate the retrieval and integration of data and ...

  • Approximations in the HMAX Model 

    Unknown author (2011-04-14)
    The HMAX model is a biologically motivated architecture for computer vision whose components are in close agreement with existing physiological evidence. The model is capable of achieving close to human level performance ...

  • Efficient Marginal Likelihood Optimization in Blind Deconvolution 

    Unknown author (2011-04-04)
    In blind deconvolution one aims to estimate from an input blurred image y a sharp image x and an unknown blur kernel k. Recent research shows that a key to success is to consider the overall shape of the posterior distribution ...