Computer Science and Artificial Intelligence Lab (CSAIL): Recent submissions

Now showing items 741-760 of 2625

  • Verifiably Secure Devices 

    Unknown author (2007-12-05)
    We put forward the notion of a verifiably secure device, in essence a stronger notion of secure computation, and achieve it in the ballot-box model. Verifiably secure devices1. Provide a perfect solution to the problem of ...

  • Mapping Stream Programs into the Compressed Domain 

    Unknown author (2007-11-30)
    Due to the high data rates involved in audio, video, and signalprocessing applications, it is imperative to compress the data todecrease the amount of storage used. Unfortunately, this implies thatany program operating on ...

  • ReCrash: Making Crashes Reproducible 

    Unknown author (2007-11-20)
    It is difficult to fix a problem without being able to reproduce it.However, reproducing a problem is often difficult and time-consuming.This paper proposes a novel algorithm, ReCrash, that generatesmultiple unit tests ...

  • Towards Feature Selection In Actor-Critic Algorithms 

    Unknown author (2007-11-01)
    Choosing features for the critic in actor-critic algorithms with function approximation is known to be a challenge. Too few critic features can lead to degeneracy of the actor gradient, and too many features may lead to ...

  • Transfering Nonlinear Representations using Gaussian Processes with a Shared Latent Space 

    Unknown author (2007-11-06)
    When a series of problems are related, representations derived fromlearning earlier tasks may be useful in solving later problems. Inthis paper we propose a novel approach to transfer learning withlow-dimensional, non-linear ...

  • Collusion-Resilient Revenue In Combinatorial Auctions 

    Unknown author (2007-11-02)
    In auctions of a single good, the second-price mechanism achieves, in dominantstrategies, a revenue benchmark that is naturally high and resilient to anypossible collusion.We show how to achieve, to the maximum extent ...

  • Set Interfaces for Generalized Typestate and Data Structure Consistency Verification 

    Unknown author (2007-10-31)
    Typestate systems allow the type of an object to change during its lifetime in the computation. Unlike standard type systems, they can enforce safety properties that depend on changing object states. We present a new, ...

  • Fast Self-Healing Gradients 

    Unknown author (2008-03)
    We present CRF-Gradient, a self-healing gradient algorithm that provably reconfigures in O(diameter) time. Self-healing gradients are a frequently used building block for distributed self-healing systems, but previous ...

  • Pluggable type-checking for custom type qualifiers in Java 

    Unknown author (2007-09-17)
    We have created a framework for adding custom type qualifiers to the Javalanguage in a backward-compatible way. The type system designer definesthe qualifiers and creates a compiler plug-in that enforces theirsemantics. ...

  • MIXIT: The Network Meets the Wireless Channel 

    Unknown author (2007-09-04)
    The traditional contract between the network and the lower layers states that the network does routing and the lower layers deliver correct packets. In a wireless network, however, different nodes may hear most bits in a ...

  • Factors Affecting the Adoption of Faculty-Developed Academic Software: A Study of Five iCampus Projects 

    Unknown author (2007-10-20)
    Instruction in higher education must adapt more rapidly to: changes in workforce needs, global issues, advances in disciplines, and resource constraints. The pace of such improvement depends on the speed with which new ...

  • World Wide Web Without Walls 

    Unknown author (2007-08-24)
    Today's Web is built upon a particular symbiotic relationship betweensites and users: the sites invest capital to create and market a setof features, and users gain access to the sites often in exchange fortheir data (e.g., ...

  • Constraint and Restoring Force 

    Unknown author (2007-08-24)
    Long-lived sensor network applications must be able to self-repair and adapt to changing demands. We introduce a new approach for doing so: Constraint and Restoring Force. CRF is a physics-inspired framework for computing ...

  • Learning by Learning To Communicate 

    Unknown author (2007-08-23)
    Human intelligence is a product of cooperation among many different specialists. Much of this cooperation must be learned, but we do not yet have a mechanism that explains how this might happen for the "high-level" agile ...

  • Factors Affecting the Adoption of Faculty-Developed Academic Software: A Study of Five iCampus Projects 

    Unknown author (2007-08-20)
    Initiated in 1999, iCampus is a research collaboration between Microsoft Research and MIT whose goal is to create and demonstrate technologies with the potential for revolutionary change throughout the university curriculum. ...

  • Toward Secure Services from Untrusted Developers 

    Unknown author (2007-08-06)
    We present a secure service prototype built from untrusted,contributed code.The service manages private data for a variety of different users, anduser programs frequently require access to other users' private data.However, ...

  • Perfect Implementation of Normal-Form Mechanisms 

    Unknown author (2005)
    Privacy and trust affect our strategic thinking, yet they have not been precisely modeled in mechanism design. In settings of incomplete information, traditional implementations of a normal-form mechanism ---by disregarding ...

  • Agent Organization and Request Propagation in the Knowledge Plane 

    Unknown author (2007-07-26)
    In designing and building a network like the Internet, we continue to face the problems of scale and distribution. In particular, network management has become an increasingly difficult task, and network applications often ...

  • Continuous Space-Time Semantics Allow Adaptive Program Execution 

    Unknown author (2007-07)
    A spatial computer is a collection of devices filling spacewhose ability to interact is strongly dependent on theirproximity. Previously, we have showed that programmingsuch a computer as a continuous space can allow ...

  • Hierarchical Dirichlet Process-Based Models For Discovery of Cross-species Mammalian Gene Expression 

    Unknown author (2007-07-06)
    An important research problem in computational biology is theidentification of expression programs, sets of co-activatedgenes orchestrating physiological processes, and thecharacterization of the functional breadth of these ...