Computer Science and Artificial Intelligence Lab (CSAIL): Recent submissions
Now showing items 221-240 of 2625
-
A Comparison of Autonomic Decision Making Techniques
(2011-04-01)Autonomic computing systems are capable of adapting their behavior and resources thousands of times a second to automatically decide the best way to accomplish a given goal despite changing environmental conditions and ...
-
Remote Oblivious Storage: Making Oblivious RAM Practical
(2011-03-30)Remote storage of data has become an increasingly attractive and advantageous option, especially due to cloud systems. While encryption protects the data, it does not hide the access pattern to the data. A natural solution ...
-
Multicore Performance Optimization Using Partner Cores
(2011-03-25)As the push for parallelism continues to increase the number of cores on a chip, and add to the complexity of system design, the task of optimizing performance at the application level becomes nearly impossible for the ...
-
SEEC: A Framework for Self-aware Management of Multicore Resources
(2011-03-24)This paper presents SEEC, a self-aware programming model, designed to reduce programming effort in modern multicore systems. In the SEEC model, application programmers specify application goals and progress, while systems ...
-
Intel Concurrent Collections for Haskell
(2011-03-22)Intel Concurrent Collections (CnC) is a parallel programming model in which a network of steps (functions) communicate through message-passing as well as a limited form of shared memory. This paper describes a new ...
-
BOOM: Broadcast Optimizations for On-chip Meshes
(2011-03-14)Future many-core chips will require an on-chip network that can support broadcasts and multicasts at good power-performance. A vanilla on-chip network would send multiple unicast packets for each broadcast packet, resulting ...
-
Fleets: Scalable Services in a Factored Operating System
(2011-03-09)Current monolithic operating systems are designed for uniprocessor systems, and their architecture reflects this. The rise of multicore and cloud computing is drastically changing the tradeoffs in operating system design. ...
-
Werner Reichardt: the man and his scientific legacy
(2011-03-04)Excerpts from a talk given by Tomaso Poggio in Tübingen on the opening ofthe Werner Reichardt Centrun für Integrative Neurowissenschaften, December 8, 2008.
-
Decomposing Broadcast Algorithms Using Abstract MAC Layers
(2011-02-23)In much of the theoretical literature on global broadcast algorithms for wireless networks, issues of message dissemination are considered together with issues of contention management. This combination leads to complicated ...
-
SoftCast: Clean-slate Scalable Wireless Video
(2011-02-15)Video broadcast and mobile video challenge the conventional wireless design. In broadcast and mobile scenarios the bit rate supported by the channel differs across receivers and varies quickly over time. The conventional ...
-
Mechanism Design With Approximate Player Types
(2011-02-16)We investigate mechanism design when the players do not exactly know their types, but have instead only partial information about them.
-
Towards Understanding Hierarchical Natural Language Commands for Robotic Navigation and Manipulation
(2011-02-01)We describe a new model for understanding hierarchical natural language commands for robot navigation and manipulation. The model has three components: a semantic structure that captures the hierarchical structure of ...
-
What is Decidable about Strings?
(2011-02-01)We prove several decidability and undecidability results for the satisfiability/validity problem of formulas over a language of finite-length strings and integers (interpreted as lengths of strings). The atomic formulas ...
-
CryptDB: A Practical Encrypted Relational DBMS
(2011-01-26)CryptDB is a DBMS that provides provable and practical privacy in the face of a compromised database server or curious database administrators. CryptDB works by executing SQL queries over encrypted data. At its core are ...
-
Multi-Output Learning via Spectral Filtering
(2011-01-24)In this paper we study a class of regularized kernel methods for vector-valued learning which are based on filtering the spectrum of the kernel matrix. The considered methods include Tikhonov regularization as a special ...
-
Probabilistic and Statistical Analysis of Perforated Patterns
(2011-01-19)We present a new foundation for the analysis and transformation of computer programs.Standard approaches involve the use of logical reasoning to prove that the applied transformation does not change the observable semantics ...
-
Flexible Execution of Plans with Choice and Uncertainty
(2011-01-15)Dynamic plan execution strategies allow an autonomous agent to respond to uncertainties, while improving robustness and reducing the need for an overly conservative plan. Executives have improved robustness by expanding ...
-
Neurons That Confuse Mirror-Symmetric Object Views
(2010-12-31)Neurons in inferotemporal cortex that respond similarly to many pairs of mirror-symmetric images -- for example, 45 degree and -45 degree views of the same face -- have often been reported. The phenomenon seemed to be an ...
-
Learning Generic Invariances in Object Recognition: Translation and Scale
(2010-12-30)Invariance to various transformations is key to object recognition but existing definitions of invariance are somewhat confusing while discussions of invariance are often confused. In this report, we provide an operational ...
-
Conservative Rationalizability and The Second-Knowledge Mechanism
(2010-12-20)In mechanism design, the traditional way of modeling the players' incomplete information about their opponents is "assuming a Bayesian." This assumption, however, is very strong and does not hold in many real applications. ...