Computer Science and Artificial Intelligence Lab (CSAIL): Recent submissions

Now showing items 821-840 of 2625

  • Virtual Monotonic Counters and Count-Limited Objects using a TPM without a Trusted OS (Extended Version) 

    Unknown author (2006-09-11)
    A trusted monotonic counter is a valuable primitive thatenables a wide variety of highly scalable offlineand decentralized applications that would otherwise be prone to replay attacks, including offline payment, e-wallets, ...

  • Refactoring for parameterizing Java classes 

    Unknown author (2006-09-05)
    Type safety and expressiveness of many existing Java libraries and theirclient applications would improve, if the libraries were upgraded to definegeneric classes. Efficient and accurate tools exist to assist clientapplications ...

  • Task-Structured Probabilistic I/O Automata 

    Unknown author (2006-09-05)
    Modeling frameworks such as Probabilistic I/O Automata (PIOA) andMarkov Decision Processes permit both probabilistic andnondeterministic choices. In order to use such frameworks to express claims about probabilities of ...

  • Javari: Adding Reference Immutability to Java 

    Unknown author (2006-09-05)
    This paper describes a programming language, Javari, that is capable of expressing and enforcing immutability constraints. The specific constraint expressed is that the abstract state of the object to which an immutable ...

  • Random Lens Imaging 

    Unknown author (2006-09-02)
    We call a random lens one for which the function relating the input light ray to the output sensor location is pseudo-random. Imaging systems with random lensescan expand the space of possible camera designs, allowing new ...

  • Finding the needles in the haystack: Generating legal test inputs for object-oriented programs 

    Unknown author (2006-08-31)
    A test input for an object-oriented program typically consists of asequence of method calls that use the API defined by the programunder test. Generating legal test inputs can be challenging because,for some programs, the ...

  • Learning with Online Constraints: Shifting Concepts and Active Learning 

    Unknown author (2006-09-01)
    Many practical problems such as forecasting, real-time decisionmaking, streaming data applications, and resource-constrainedlearning, can be modeled as learning with online constraints. Thisthesis is concerned with analyzing ...

  • Predicting the Risk and Trajectory of Intensive Care Patients Using Survival Models 

    Unknown author (2006-08-30)
    Using artificial intelligence to assist physicians in patient care has received sustained interest over the past several decades. Recently, with automated systems at most bedsides, the amount of patient information collected ...

  • Anthills Built to Order: Automating Construction with Artificial Swarms 

    Unknown author (2006-05-12)
    Social insects build large, complex structures, which emerge through the collective actions of many simple agents acting with no centralized control or preplanning. These natural systems motivate investigating the use of ...

  • Resilient Network Coding In the Presence of Byzantine Adversaries 

    Unknown author (2006-08-05)
    Network coding substantially increases network throughput. But since it involves mixing of information inside the network, a single corrupted packet generated by a malicious node can end up contaminating all the information ...

  • Human Document Classification Using Bags of Words 

    Unknown author (2006-08-09)
    Humans are remarkably adept at classifying text documents into cate-gories. For instance, while reading a news story, we are rapidly able to assess whether it belongs to the domain of finance, politics or sports. Automating ...

  • Dealers, Insiders and Bandits: Learning and its Effects on Market Outcomes 

    Unknown author (2006-07-12)
    This thesis seeks to contribute to the understanding of markets populated by boundedly rational agents who learn from experience. Bounded rationality and learning have both been the focus of much research in computer ...

  • Iterative Collaborative Ranking of Customers and Providers 

    Unknown author (2006-07-04)
    This paper introduces a new application: predicting the Internet provider-customer market. We cast the problem in the collaborative filtering framework, where we use current and past customer-provider relationships to ...

  • MORE: A Network Coding Approach to Opportunistic Routing 

    Unknown author (2006-06-30)
    Opportunistic routing has the potential to substantially increase wireless network throughput. Prior work on opportunistic routing, however, requires tight node coordination. Different nodes in a network must have knowledge ...

  • Robust Execution of Bipedal Walking Tasks From Biomechanical Principles 

    Unknown author (2006-04-28)
    Effective use of robots in unstructured environments requires that they have sufficient autonomy and agility to execute task-level commands successfully. A challenging example of such a robot is a bipedal walking machine. ...

  • Was the Patient Cured? Understanding Semantic Categories and Their Relationships in Patient Records 

    Unknown author (2006-06-28)
    In this thesis, we detail an approach to extracting key information in medical discharge summaries. Starting with a narrative patient report, we first identify and remove information that compromises privacy (de-identifi ...

  • Using Task-Structured Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol 

    Unknown author (2006-06-20)
    The Probabilistic I/O Automata framework of Lynch, Segala and Vaandrager provides tools for precisely specifying protocols and reasoning about theircorrectness using multiple levels of abstraction, based on implementation ...

  • Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol 

    Unknown author (2006-06-19)
    We demonstrate how to carry out cryptographic security analysis ofdistributed protocols within the Probabilistic I/O Automataframework of Lynch, Segala, and Vaandrager. This framework providestools for arguing rigorously ...

  • Approximate Correspondences in High Dimensions 

    Unknown author (2006-06-15)
    Pyramid intersection is an efficient method for computing an approximate partial matching between two sets of feature vectors. We introduce a novel pyramid embedding based on a hierarchy of non-uniformly shaped bins that ...

  • New Techniques for Geographic Routing 

    Unknown author (2006-06-14)
    As wireless sensor networks continue to grow in size, we are facedwith the prospect of emerging wireless networks with hundreds orthousands of nodes. Geographic routing algorithms are a promisingalternative to tradition ...