Computer Science and Artificial Intelligence Lab (CSAIL): Recent submissions
Now showing items 741-760 of 2625
-
Verifiably Secure Devices
(2007-12-05)We put forward the notion of a verifiably secure device, in essence a stronger notion of secure computation, and achieve it in the ballot-box model. Verifiably secure devices1. Provide a perfect solution to the problem of ...
-
Mapping Stream Programs into the Compressed Domain
(2007-11-30)Due to the high data rates involved in audio, video, and signalprocessing applications, it is imperative to compress the data todecrease the amount of storage used. Unfortunately, this implies thatany program operating on ...
-
ReCrash: Making Crashes Reproducible
(2007-11-20)It is difficult to fix a problem without being able to reproduce it.However, reproducing a problem is often difficult and time-consuming.This paper proposes a novel algorithm, ReCrash, that generatesmultiple unit tests ...
-
Towards Feature Selection In Actor-Critic Algorithms
(2007-11-01)Choosing features for the critic in actor-critic algorithms with function approximation is known to be a challenge. Too few critic features can lead to degeneracy of the actor gradient, and too many features may lead to ...
-
Transfering Nonlinear Representations using Gaussian Processes with a Shared Latent Space
(2007-11-06)When a series of problems are related, representations derived fromlearning earlier tasks may be useful in solving later problems. Inthis paper we propose a novel approach to transfer learning withlow-dimensional, non-linear ...
-
Collusion-Resilient Revenue In Combinatorial Auctions
(2007-11-02)In auctions of a single good, the second-price mechanism achieves, in dominantstrategies, a revenue benchmark that is naturally high and resilient to anypossible collusion.We show how to achieve, to the maximum extent ...
-
Set Interfaces for Generalized Typestate and Data Structure Consistency Verification
(2007-10-31)Typestate systems allow the type of an object to change during its lifetime in the computation. Unlike standard type systems, they can enforce safety properties that depend on changing object states. We present a new, ...
-
Fast Self-Healing Gradients
(2008-03)We present CRF-Gradient, a self-healing gradient algorithm that provably reconfigures in O(diameter) time. Self-healing gradients are a frequently used building block for distributed self-healing systems, but previous ...
-
Pluggable type-checking for custom type qualifiers in Java
(2007-09-17)We have created a framework for adding custom type qualifiers to the Javalanguage in a backward-compatible way. The type system designer definesthe qualifiers and creates a compiler plug-in that enforces theirsemantics. ...
-
MIXIT: The Network Meets the Wireless Channel
(2007-09-04)The traditional contract between the network and the lower layers states that the network does routing and the lower layers deliver correct packets. In a wireless network, however, different nodes may hear most bits in a ...
-
Factors Affecting the Adoption of Faculty-Developed Academic Software: A Study of Five iCampus Projects
(2007-10-20)Instruction in higher education must adapt more rapidly to: changes in workforce needs, global issues, advances in disciplines, and resource constraints. The pace of such improvement depends on the speed with which new ...
-
World Wide Web Without Walls
(2007-08-24)Today's Web is built upon a particular symbiotic relationship betweensites and users: the sites invest capital to create and market a setof features, and users gain access to the sites often in exchange fortheir data (e.g., ...
-
Constraint and Restoring Force
(2007-08-24)Long-lived sensor network applications must be able to self-repair and adapt to changing demands. We introduce a new approach for doing so: Constraint and Restoring Force. CRF is a physics-inspired framework for computing ...
-
Learning by Learning To Communicate
(2007-08-23)Human intelligence is a product of cooperation among many different specialists. Much of this cooperation must be learned, but we do not yet have a mechanism that explains how this might happen for the "high-level" agile ...
-
Factors Affecting the Adoption of Faculty-Developed Academic Software: A Study of Five iCampus Projects
(2007-08-20)Initiated in 1999, iCampus is a research collaboration between Microsoft Research and MIT whose goal is to create and demonstrate technologies with the potential for revolutionary change throughout the university curriculum. ...
-
Toward Secure Services from Untrusted Developers
(2007-08-06)We present a secure service prototype built from untrusted,contributed code.The service manages private data for a variety of different users, anduser programs frequently require access to other users' private data.However, ...
-
Perfect Implementation of Normal-Form Mechanisms
(2005)Privacy and trust affect our strategic thinking, yet they have not been precisely modeled in mechanism design. In settings of incomplete information, traditional implementations of a normal-form mechanism ---by disregarding ...
-
Agent Organization and Request Propagation in the Knowledge Plane
(2007-07-26)In designing and building a network like the Internet, we continue to face the problems of scale and distribution. In particular, network management has become an increasingly difficult task, and network applications often ...
-
Continuous Space-Time Semantics Allow Adaptive Program Execution
(2007-07)A spatial computer is a collection of devices filling spacewhose ability to interact is strongly dependent on theirproximity. Previously, we have showed that programmingsuch a computer as a continuous space can allow ...
-
Hierarchical Dirichlet Process-Based Models For Discovery of Cross-species Mammalian Gene Expression
(2007-07-06)An important research problem in computational biology is theidentification of expression programs, sets of co-activatedgenes orchestrating physiological processes, and thecharacterization of the functional breadth of these ...