Computer Science and Artificial Intelligence Lab (CSAIL): Recent submissions

Now showing items 261-280 of 2625

  • UCM/MIT Indications, Referring Expressions, and Coreference Corpus (UMIREC corpus) v1.1 

    Patrick Winston; Genesis (2010-05-12)
    The corpus comprises 62 files in "Story Workbench" annotation format: 30 folktales in English from a variety of sources, and 32 Wall Street Journal articles selected to coincide with articles found in the Penn Treebank. ...

  • Parallelizing Sequential Programs With Statistical Accuracy Tests 

    Unknown author (2010-08-05)
    We present QuickStep, a novel system for parallelizing sequential programs. QuickStep deploys a set of parallelization transformations that together induce a search space of candidate parallel programs. Given a sequential ...

  • An Efficient Learning Procedure for Deep Boltzmann Machines 

    Unknown author (2010-08-04)
    We present a new learning algorithm for Boltzmann Machines that contain many layers of hidden variables. Data-dependent statistics are estimated using a variational approximation that tends to focus on a single mode, and ...

  • MAC Design for Analog Network Coding 

    Unknown author (2010-08-02)
    Most medium access control mechanisms discard collided packets and consider interference harmful. Recent work on Analog Network Coding (ANC) suggests a different approach, in which multiple interfering transmissions are ...

  • Learning and Invariance in a Family of Hierarchical Kernels 

    Unknown author (2010-07-30)
    Understanding invariance and discrimination properties of hierarchical models is arguably the key to understanding how and why such models, of which the the mammalian visual system is one instance, can lead to good ...

  • Examining high level neural representations of cluttered scenes 

    Unknown author (2010-07-29)
    Humans and other primates can rapidly categorize objects even when they are embedded in complex visual scenes (Thorpe et al., 1996; Fabre-Thorpe et al., 1998). Studies by Serre et al., 2007 have shown that the ability of ...

  • Characteristics of Small Social Networks 

    Unknown author (2010-07-27)
    Two dozen networks are analyzed using three parameters that attempt to capture important properties of social networks: leadership L, member bonding B, and diversity of expertise D. The first two of these parameters have ...

  • Language and Compiler Support for Auto-Tuning Variable-Accuracy Algorithms 

    Unknown author (2010-07-27)
    Approximating ideal program outputs is a common technique for solving computationally difficult problems, for adhering to processing or timing constraints, and for performance optimization in situations where perfect ...

  • ChitChat: Making Video Chat Robust to Packet Loss 

    Unknown author (2010-07-05)
    Video chat is increasingly popular among Internet users. Often, however, chatting sessions suffer from packet loss, which causes video outage and poor quality. Existing solutions however are unsatisfying. Retransmissions ...

  • EM2: A Scalable Shared-Memory Multicore Architecture 

    Unknown author (2010-06-12)
    We introduce the Execution Migration Machine (EM2), a novel, scalable shared-memory architecture for large-scale multicores constrained by off-chip memory bandwidth. EM2 reduces cache miss rates, and consequently off-chip ...

  • Broadcasting in Unreliable Radio Networks 

    Unknown author (2010-06-08)
    Practitioners agree that unreliable links, which fluctuate between working and not working, are an important characteristic of wireless networks. In contrast, most theoretical models of radio networks fix a static set of ...

  • iJam: Jamming Oneself for Secure Wireless Communication 

    Unknown author (2010-06-07)
    Wireless is inherently less secure than wired networks because of its broadcast nature. Attacks that simply snoop on the wireless medium successfully defeat the security of even 802.11 networks using the most recent security ...

  • Power-Aware Computing with Dynamic Knobs 

    Unknown author (2010-05-14)
    We present PowerDial, a system for dynamically adapting application behavior to execute successfully in the face of load and power fluctuations. PowerDial transforms static configuration parameters into dynamic knobs that ...

  • SIFT Flow: Dense Correspondence across Scenes and its Applications 

    Unknown author (2010-05-08)
    While image alignment has been studied in different areas of computer vision for decades, aligning images depicting different scenes remains a challenging problem. Analogous to optical flow where an image is aligned to its ...

  • Hierarchical Task and Motion Planning in the Now 

    Unknown author (2010-05-07)
    In this paper we outline an approach to the integration of task planning and motion planning that has the following key properties: It is aggressively hierarchical. It makes choices and commits to them in a top-down fashion ...

  • UCM/MIT Indications, Referring Expressions, and Coreference Corpus (UMIREC corpus) 

    Unknown author (2010-05-12)
    This version of the UMIREC corpus has been superseded by version 1.1, found at http://hdl.handle.net/1721.1/57507. Please do not use version 1.0, as it contains corrupted coreference information. The correct, uncorrupted ...

  • Annotation Guide for the UCM/MIT Indications, Referential Expressions, and Coreference Corpus (UMIREC Corpus) 

    Unknown author (2010-05-12)
    This is the annotation guide given to the annotators who created the UCM/MIT Indications, Referring Expressions, and Coreference (UMIREC) Corpus version 1.0. The corpus comprises texts annotated for referring expressions, ...

  • A User Study Comparing 3D Modeling with Silhouettes and Google SketchUp 

    Unknown author (2010-05-05)
    We describe a user study comparing 3D Modeling with Silhouettes and Google SketchUp. In the user study, ten users were asked to create 3D models of three different objects, using either 3D Modeling with Silhouettes or ...

  • Automatic Error Finding in Access-Control Policies 

    Unknown author (2010-05-05)
    Access-control policies are a key infrastructural technology for computer security. However, a significant problem is that system administrators need to be able to automatically verify whether their policies capture the ...

  • The Bayes Tree: Enabling Incremental Reordering and Fluid Relinearization for Online Mapping 

    Unknown author (2010-01-29)
    In this paper we present a novel data structure, the Bayes tree, which exploits the connections between graphical model inference and sparse linear algebra. The proposed data structure provides a new perspective on an ...