Computer Science and Artificial Intelligence Lab (CSAIL): Recent submissions

Now showing items 461-480 of 2625

  • Flexible MIPS Soft Processor Architecture 

    Unknown author (2008-06-16)
    The flexible MIPS soft processor architecture borrows selected technologies from high-performance computing to deliver a modular, highly customizable CPU targeted towards FPGA implementations for embedded systems; the ...

  • Detecting and Tolerating Byzantine Faults in Database Systems 

    Unknown author (2008-06-30)
    This thesis describes the design, implementation, and evaluation of a replication scheme to handle Byzantine faults in transaction processing database systems. The scheme compares answers from queries and updates on multiple ...

  • Revenue in Truly Combinatorial Auctions and Adversarial Mechanism Design 

    Unknown author (2007- 11-0)
    Little is known about generating revenue in UNRESTRICTED combinatorial auctions. (In particular, the VCG mechanism has no revenue guarantees.) In this paper we determine how much revenue can be guaranteed in such auctions. ...

  • Safe Open-Nested Transactions Through Ownership 

    Unknown author (2008-02-20)
    Researchers in transactional memory (TM) have proposed open nesting asa methodology for increasing the concurrency of a program. The ideais to ignore certain "low-level" memory operations of anopen-nested transaction when ...

  • Matching Sets of Features for Efficient Retrieval and Recognition 

    Unknown author (2006-08-11)
    In numerous domains it is useful to represent a single example by the collection of local features or parts that comprise it. In computer vision in particular, local image features are a powerful way to describe images of ...

  • Fast concurrent object classification and localization 

    Unknown author (2008-06-10)
    Object localization and classification are important problems incomputer vision. However, in many applications, exhaustive searchover all class labels and image locations is computationallyprohibitive. While several methods ...

  • Agent Organization in the Knowledge Plane 

    Unknown author (2008-06-11)
    In designing and building a network like the Internet, we continue to face the problems of scale and distribution. With the dramatic expansion in scale and heterogeneity of the Internet, network management has become an ...

  • Non-Metrical Navigation Through Visual Path Control 

    Unknown author (2008-06-06)
    We describe a new method for wide-area, non-metrical robot navigationwhich enables useful, purposeful motion indoors. Our method has twophases: a training phase, in which a human user directs a wheeledrobot with an attached ...

  • On a model of visual cortex: learning invariance and selectivity 

    Unknown author (2008-04-04)
    In this paper we present a class of algorithms for similarity learning on spaces of images. The general framework that we introduce is motivated by some well-known hierarchical pre-processing architectures for object ...

  • The SoftPHY Abstraction: from Packets to Symbols in Wireless Network Design 

    Unknown author (2008-06-03)
    At ever-increasing rates, we are using wireless systems to communicatewith others and retrieve content of interest to us. Current wirelesstechnologies such as WiFi or Zigbee use forward error correction todrive bit error ...

  • Ignorable Information in Multi-Agent Scenarios 

    Unknown author (2008-05-12)
    In some multi-agent scenarios, identifying observations that an agent can safely ignore reduces exponentially the size of the agent's strategy space and hence the time required to find a Nash equilibrium. We consider games ...

  • Perfect Implementation of Normal-Form Mechanisms 

    Unknown author (2007-03)
    Privacy and trust affect our strategic thinking, yet they have not been precisely modeled in mechanism design. In settings of incomplete information, traditional implementations of a normal-form mechanism ---by disregarding ...

  • Gesture in Automatic Discourse Processing 

    Unknown author (2008-05-07)
    Computers cannot fully understand spoken language without access to the wide range of modalities that accompany speech. This thesis addresses the particularly expressive modality of hand gesture, and focuses on building ...

  • Efficient Object Recognition and Image Retrieval for Large-Scale Applications 

    Unknown author (2008-05-06)
    Algorithms for recognition and retrieval tasks generally call for both speed and accuracy. When scaling up to very large applications, however, we encounter additional significant requirements: adaptability and scalability. ...

  • New-Age Cryptography 

    Unknown author (2008-04-16)
    We introduce new and general complexity theoretic hardness assumptions. These assumptions abstract out concrete properties of a random oracle and are significantly stronger than traditional cryptographic hardness assumptions; ...

  • Transferring Nonlinear Representations using Gaussian Processes with a Shared Latent Space 

    Unknown author (2008-04-11)
    When a series of problems are related, representations derived from learning earlier tasks may be useful in solving later problems. In this paper we propose a novel approach to transfer learning with low-dimensional, ...

  • Random-World Semantics and Syntactic Independence for Expressive Languages 

    Unknown author (2008-05-03)
    We consider three desiderata for a language combining logic and probability: logical expressivity, random-world semantics, and the existence of a useful syntactic condition for probabilistic independence. Achieving these ...

  • Generalization of the MV Mechanism 

    Unknown author (2008-05-01)
    Micali and Valiant proposed a mechanism for combinatorial auctions that is dominant-strategy truthful, guarantees reasonably high revenue, and is very resilient against collusions. Their mechanism, however, uses as a ...

  • Block Heavy Hitters 

    Unknown author (2008-05-02)
    e study a natural generalization of the heavy hitters problem in thestreaming context. We term this generalization *block heavy hitters* and define it as follows. We are to stream over a matrix$A$, and report all *rows* ...

  • Understanding camera trade-offs through a Bayesian analysis of light field projections 

    Unknown author (2008-04-16)
    Computer vision has traditionally focused on extracting structure,such as depth, from images acquired using thin-lens or pinhole optics. The development of computational imaging is broadening this scope; a variety of ...