Computer Science and Artificial Intelligence Lab (CSAIL): Recent submissions

Now showing items 441-460 of 2625

  • Knowledge Driven Recognition of the Human Body 

    Unknown author (MIT Artificial Intelligence Laboratory, 1976-01)
    This paper shows how a good internal model of the subject viewed aids in the visual recognition and following of key parts. The role of knowledge driven top-down tools and methods is shown by recognizing a series of human ...

  • Mini-Robot Group User's Guide Part 2: Access From ITS 

    Unknown author (MIT Artificial Intelligence Laboratory, 1978-06)
    Part 2 of the MINI-ROBOT USER'S GUIDE describes those devices attached to the mini-robot system which may be accessed from ITS, and describes the appropriate software for accessing them. Specifically, the photowriter, ...

  • Guided Time Warping for Motion Editing 

    Jovan Popovic; Computer Graphics (2007-08-01)
    Time warping allows users to modify timing without affecting poses. It has many applications in animation systems for motion editing, such as refining motions to meet new timing constraints or modifying the acting of ...

  • Style Translation for Human Motion 

    Jovan Popovic; Computer Graphics (2005-08-01)
    Style translation is the process of transforming an input motion into a new style while preserving its original content. This problem is motivated by the needs of interactive applications, which require rapid processing ...

  • Example-Based Control of Human Motion 

    Jovan Popovic; Computer Graphics (2004-07-01)
    In human motion control applications, the mapping between a control specification and an appropriate target motion often defies an explicit encoding. We present a method that allows such a mapping to be defined by example, ...

  • A Note on Perturbation Results for Learning Empirical Operators 

    Unknown author (2008-08-19)
    A large number of learning algorithms, for example, spectral clustering, kernel Principal Components Analysis and many manifold methods are based on estimating eigenvalues and eigenfunctions of operators defined by a ...

  • A Stored Picture Hacking Facility 

    Unknown author (MIT Artificial Intelligence Laboratory, 1972-06)
    A short description of LISP functions that have been written for use with the stored picture facility. These functions allow one to display an image of a stored scene on the 340 scope, and produce graphs and histograms of ...

  • Transductive Ranking on Graphs 

    Unknown author (2008-08-07)
    In ranking, one is given examples of order relationships among objects, and the goal is to learn from these examples a real-valued ranking function that induces a ranking or ordering over the object space. We consider the ...

  • Adaptive Envelope MDPs for Relational Equivalence-based Planning 

    Unknown author (2008-07-29)
    We describe a method to use structured representations of the environmentâ s dynamics to constrain and speed up the planning process. Given a problem domain described in a probabilistic logical description language, we ...

  • Cognitive Cliches 

    Unknown author (MIT Artificial Intelligence Laboratory, 1986-04)
    This paper is an exploration of a wide class of mental structures called cognitive cliches that support intermediate methods that are moderately general purpose, in that a few of them will probably be applicable to any ...

  • Understanding camera trade-offs through a Bayesian analysis of light field projections - A revision 

    Unknown author (2008-07-28)
    Computer vision has traditionally focused on extracting structure,such as depth, from images acquired using thin-lens or pinholeoptics. The development of computational imaging is broadening thisscope; a variety of ...

  • Event Order Abstraction for Parametric Real-Time System Verification 

    Unknown author (2008-07-28)
    We present a new abstraction technique, event order abstraction (EOA), for parametric safety verification of real-time systems in which ``correct orderings of events'' needed for system correctness are maintained by timing ...

  • An $\Omega(n \log n)$ Lower Bound on the Cost of Mutual Exclusion 

    Unknown author (2006-07-23)
    We prove an $\Omega(n \log n)$ lower bound on the number ofnon-busywaiting memory accesses by any deterministic algorithm solving$n$ process mutual exclusion that communicates via shared registers.The cost of the algorithm ...

  • Elastic-Net Regularization in Learning Theory 

    Unknown author (2008-07-24)
    Within the framework of statistical learning theory we analyze in detail the so-called elastic-net regularization scheme proposed by Zou and Hastie ["Regularization and variable selection via the elastic net" J. R. Stat. ...

  • A Projected Subgradient Method for Scalable Multi-Task Learning 

    Unknown author (2008-07-23)
    Recent approaches to multi-task learning have investigated the use of a variety of matrix norm regularization schemes for promoting feature sharing across tasks.In essence, these approaches aim at extending the l1 framework ...

  • Composable Probabilistic Inference with Blaise 

    Unknown author (2008-07-23)
    Probabilistic inference provides a unified, systematic framework for specifying and solving these problems. Recent work has demonstrated the great value of probabilistic models defined over complex, structured domains. ...

  • A Distributed Building Evacuation System 

    Unknown author (2008-07-14)
    This thesis investigates the feasibility of a smart building evacuation system, capable of guiding occupants along safe paths to exits and responding to changing threats. Inspired by developments in amorphous computing, ...

  • Knowledge Benchmarks in Adversarial Mechanism Design (Part I) and Implementation in Surviving Strategies (Part I) 

    Unknown author (2008-07)
    We put forward new benchmarks and solution concepts for Adversarial Mechanism Design, as defined by [MV07.a], and we exemplify them in the case of truly combinatorial auctions.We benchmark the combined performance (the sum ...

  • Knowledge Benchmarks in Adversarial Mechanism Design and Implementation in Surviving Strategies (Part I) 

    Unknown author (2008-06)
    We put forward new benchmarks and solution concepts for Adversarial Mechanism Design, as defined by [MV07.a], and we exemplify them in the case of truly combinatorial auctions.We benchmark the combined performance (the sum ...