Computer Science and Artificial Intelligence Lab (CSAIL): Recent submissions

Now showing items 221-240 of 2625

  • A Comparison of Autonomic Decision Making Techniques 

    Unknown author (2011-04-01)
    Autonomic computing systems are capable of adapting their behavior and resources thousands of times a second to automatically decide the best way to accomplish a given goal despite changing environmental conditions and ...

  • Remote Oblivious Storage: Making Oblivious RAM Practical 

    Unknown author (2011-03-30)
    Remote storage of data has become an increasingly attractive and advantageous option, especially due to cloud systems. While encryption protects the data, it does not hide the access pattern to the data. A natural solution ...

  • Multicore Performance Optimization Using Partner Cores 

    Unknown author (2011-03-25)
    As the push for parallelism continues to increase the number of cores on a chip, and add to the complexity of system design, the task of optimizing performance at the application level becomes nearly impossible for the ...

  • SEEC: A Framework for Self-aware Management of Multicore Resources 

    Unknown author (2011-03-24)
    This paper presents SEEC, a self-aware programming model, designed to reduce programming effort in modern multicore systems. In the SEEC model, application programmers specify application goals and progress, while systems ...

  • Intel Concurrent Collections for Haskell 

    Arvind; Computation Structures (2011-03-22)
    Intel Concurrent Collections (CnC) is a parallel programming model in which a network of steps (functions) communicate through message-passing as well as a limited form of shared memory. This paper describes a new ...

  • BOOM: Broadcast Optimizations for On-chip Meshes 

    Unknown author (2011-03-14)
    Future many-core chips will require an on-chip network that can support broadcasts and multicasts at good power-performance. A vanilla on-chip network would send multiple unicast packets for each broadcast packet, resulting ...

  • Fleets: Scalable Services in a Factored Operating System 

    Unknown author (2011-03-09)
    Current monolithic operating systems are designed for uniprocessor systems, and their architecture reflects this. The rise of multicore and cloud computing is drastically changing the tradeoffs in operating system design. ...

  • Werner Reichardt: the man and his scientific legacy 

    Unknown author (2011-03-04)
    Excerpts from a talk given by Tomaso Poggio in Tübingen on the opening ofthe Werner Reichardt Centrun für Integrative Neurowissenschaften, December 8, 2008.

  • Decomposing Broadcast Algorithms Using Abstract MAC Layers 

    Unknown author (2011-02-23)
    In much of the theoretical literature on global broadcast algorithms for wireless networks, issues of message dissemination are considered together with issues of contention management. This combination leads to complicated ...

  • SoftCast: Clean-slate Scalable Wireless Video 

    Unknown author (2011-02-15)
    Video broadcast and mobile video challenge the conventional wireless design. In broadcast and mobile scenarios the bit rate supported by the channel differs across receivers and varies quickly over time. The conventional ...

  • Mechanism Design With Approximate Player Types 

    Unknown author (2011-02-16)
    We investigate mechanism design when the players do not exactly know their types, but have instead only partial information about them.

  • Towards Understanding Hierarchical Natural Language Commands for Robotic Navigation and Manipulation 

    Unknown author (2011-02-01)
    We describe a new model for understanding hierarchical natural language commands for robot navigation and manipulation. The model has three components: a semantic structure that captures the hierarchical structure of ...

  • What is Decidable about Strings? 

    Unknown author (2011-02-01)
    We prove several decidability and undecidability results for the satisfiability/validity problem of formulas over a language of finite-length strings and integers (interpreted as lengths of strings). The atomic formulas ...

  • CryptDB: A Practical Encrypted Relational DBMS 

    Unknown author (2011-01-26)
    CryptDB is a DBMS that provides provable and practical privacy in the face of a compromised database server or curious database administrators. CryptDB works by executing SQL queries over encrypted data. At its core are ...

  • Multi-Output Learning via Spectral Filtering 

    Unknown author (2011-01-24)
    In this paper we study a class of regularized kernel methods for vector-valued learning which are based on filtering the spectrum of the kernel matrix. The considered methods include Tikhonov regularization as a special ...

  • Probabilistic and Statistical Analysis of Perforated Patterns 

    Unknown author (2011-01-19)
    We present a new foundation for the analysis and transformation of computer programs.Standard approaches involve the use of logical reasoning to prove that the applied transformation does not change the observable semantics ...

  • Flexible Execution of Plans with Choice and Uncertainty 

    Unknown author (2011-01-15)
    Dynamic plan execution strategies allow an autonomous agent to respond to uncertainties, while improving robustness and reducing the need for an overly conservative plan. Executives have improved robustness by expanding ...

  • Neurons That Confuse Mirror-Symmetric Object Views 

    Unknown author (2010-12-31)
    Neurons in inferotemporal cortex that respond similarly to many pairs of mirror-symmetric images -- for example, 45 degree and -45 degree views of the same face -- have often been reported. The phenomenon seemed to be an ...

  • Learning Generic Invariances in Object Recognition: Translation and Scale 

    Unknown author (2010-12-30)
    Invariance to various transformations is key to object recognition but existing definitions of invariance are somewhat confusing while discussions of invariance are often confused. In this report, we provide an operational ...

  • Conservative Rationalizability and The Second-Knowledge Mechanism 

    Unknown author (2010-12-20)
    In mechanism design, the traditional way of modeling the players' incomplete information about their opponents is "assuming a Bayesian." This assumption, however, is very strong and does not hold in many real applications. ...