Computer Science and Artificial Intelligence Lab (CSAIL): Recent submissions

Now showing items 841-860 of 2625

  • Schematic Querying of Large Tracking Databases 

    Unknown author (2006-06-12)
    In dealing with long-term tracking databases withwide-area coverage, an important problem is in formulating anintuitive and fast query system for analysis. In such a querysystem, a user who is not a computer vision research ...

  • Infrastructure for Engineered Emergence on Sensor/Actuator Networks 

    Unknown author (2006-03)
    The ability to control emergent phenomena depends on decomposingthem into aspects susceptible to independent engineering. Forspatial self-managing systems, the amorphous-medium abstraction lets youseparate the system s ...

  • CogSci to AI: It's the Brainware, Stupid! 

    Unknown author (2006-03)
    Current modularization techniques fail when applied to hard AI problems.But cognitive science shows that the mind has modules specialized for particular functions.Unlike current engineered modules, the modules of themind ...

  • Amorphous Medium Language 

    Unknown author (2005-07)
    Programming reliable behavior on a large mesh network composed of unreliable parts is difficult. Amorphous Medium Language addresses this problem by abstracting robustness and networking issues away from the programmer via ...

  • Programming an Amorphous Computational Medium 

    Unknown author (2004-09)
    Amorphous computing considers the problem of controllingmillions of spatially distributed unreliable devices which communicateonly with nearby neighbors. To program such a system, we need a highleveldescription language ...

  • What the Assassin's Guild Taught Me About Distributed Computing 

    Unknown author (2006-05-27)
    Distributed computing and live-action roleplaying share many of thesame fundamental problems, as live-action roleplaying games commonly include simulations carried out by their players.Games run by the MIT Assassin's Guild ...

  • First Class Copy & Paste 

    Unknown author (2006-05-22)
    The Subtext project seeks to make programming fundamentally easier by altering the nature of programming languages and tools. This paper defines an operational semantics for an essential subset of the Subtext language. It ...

  • Learning using the Born Rule 

    Unknown author (2006-05-16)
    In Quantum Mechanics the transition from a deterministic descriptionto a probabilistic one is done using a simple rule termed the Bornrule. This rule states that the probability of an outcome ($a$)given a state ($\Psi$) ...

  • A Machine-Checked Safety Proof for a CISC-Compatible SFI Technique 

    Unknown author (2006-05-11)
    Executing untrusted code while preserving security requires that thecode be prevented from modifying memory or executing instructionsexcept as explicitly allowed. Software-based fault isolation (SFI) or"sandboxing" enforces ...

  • Learning a Dictionary of Shape-Components in Visual Cortex: Comparison with Neurons, Humans and Machines 

    Unknown author (2006-04-25)
    In this thesis, I describe a quantitative model that accounts for the circuits and computations of the feedforward path of the ventral stream of visual cortex. This model is consistent with a general theory of visual ...

  • Abstraction Layers for Scalable Microfluidic Biocomputers (Extended Version) 

    Unknown author (2006-05-05)
    Microfluidic devices are emerging as an attractive technology for automatically orchestrating the reactions needed in a biological computer. Thousands of microfluidic primitives have already been integrated on a single ...

  • Supplement to "Distributed Quota Enforcement for Spam Control" 

    Unknown author (2006-04-29)
    This report is a supplement to our paper "Distributed Quota Enforcement forSpam Control" (NSDI 2006). We assume here that the reader has readthe main paper. In this report, we first analyze the enforcer nodes'key-value ...

  • A Combined Stochastic and Greedy Hybrid Estimation Capability for Concurrent Hybrid Models with Autonomous Mode Transitions 

    Unknown author (2006-04-28)
    Robotic and embedded systems have become increasingly pervasive in applicationsranging from space probes and life support systems to robot assistants. In order to act robustly in the physical world, robotic systems must ...

  • A Probabilistic Particle Control Approach to Optimal, Robust Predictive Control 

    Unknown author (2006-04-28)
    Autonomous vehicles need to be able to plan trajectories to a specified goal that avoid obstacles, and are robust to the inherent uncertainty in the problem. This uncertainty arises due to uncertain state estimation, ...

  • Coordinating Agile Systems through the Model-based Execution of Temporal Plans 

    Unknown author (2006-04-28)
    Agile autonomous systems are emerging, such as unmanned aerial vehicles (UAVs), that must robustly perform tightly coordinated time-critical missions; for example, military surveillance or search-and-rescue scenarios. In ...

  • Detecting and tracking multiple interacting objects without class-specific models 

    Unknown author (2006-04-25)
    We propose a framework for detecting and tracking multiple interacting objects from a single, static, uncalibrated camera. The number of objects is variable and unknown, and object-class-specific models are not available. ...

  • Of Malicious Motes and Suspicious Sensors 

    Unknown author (2006-04-19)
    How much damage can a malicious tiny device cause in a single-hopwireless network? Imagine two players, Alice and Bob, who want toexchange information. Collin, a malicious adversary, wants to preventthem from communicating. ...

  • Revisiting Internet Adressing: Back to the Future! 

    Unknown author (2006-04-14)
    IP prefixes undermine three goals of Internet routing: accurate reflection of network-layer reachability, secure routing messages, and effective traffic control. This paper presents Atomic IP (AIP), a simple change to ...

  • The Symmetriad: A Journey of Discovery Through the Land of the Polychora 

    Unknown author (2005)
    I devised and implemented a method for constructing regular andsemiregular geometric objects in n-dimensional Euclidean space.Given a finite reflection group (a Coxeter group) G, there is a standard way to give G a group ...

  • Task-Structured Probabilistic I/O Automata 

    Unknown author (2006-03-31)
    In the Probabilistic I/O Automata (PIOA) framework, nondeterministicchoices are resolved using perfect-information schedulers,which are similar to history-dependent policies for Markov decision processes(MDPs). These ...