Computer Science and Artificial Intelligence Lab (CSAIL): Recent submissions
Now showing items 841-860 of 2625
-
Schematic Querying of Large Tracking Databases
(2006-06-12)In dealing with long-term tracking databases withwide-area coverage, an important problem is in formulating anintuitive and fast query system for analysis. In such a querysystem, a user who is not a computer vision research ...
-
Infrastructure for Engineered Emergence on Sensor/Actuator Networks
(2006-03)The ability to control emergent phenomena depends on decomposingthem into aspects susceptible to independent engineering. Forspatial self-managing systems, the amorphous-medium abstraction lets youseparate the system s ...
-
CogSci to AI: It's the Brainware, Stupid!
(2006-03)Current modularization techniques fail when applied to hard AI problems.But cognitive science shows that the mind has modules specialized for particular functions.Unlike current engineered modules, the modules of themind ...
-
Amorphous Medium Language
(2005-07)Programming reliable behavior on a large mesh network composed of unreliable parts is difficult. Amorphous Medium Language addresses this problem by abstracting robustness and networking issues away from the programmer via ...
-
Programming an Amorphous Computational Medium
(2004-09)Amorphous computing considers the problem of controllingmillions of spatially distributed unreliable devices which communicateonly with nearby neighbors. To program such a system, we need a highleveldescription language ...
-
What the Assassin's Guild Taught Me About Distributed Computing
(2006-05-27)Distributed computing and live-action roleplaying share many of thesame fundamental problems, as live-action roleplaying games commonly include simulations carried out by their players.Games run by the MIT Assassin's Guild ...
-
First Class Copy & Paste
(2006-05-22)The Subtext project seeks to make programming fundamentally easier by altering the nature of programming languages and tools. This paper defines an operational semantics for an essential subset of the Subtext language. It ...
-
Learning using the Born Rule
(2006-05-16)In Quantum Mechanics the transition from a deterministic descriptionto a probabilistic one is done using a simple rule termed the Bornrule. This rule states that the probability of an outcome ($a$)given a state ($\Psi$) ...
-
A Machine-Checked Safety Proof for a CISC-Compatible SFI Technique
(2006-05-11)Executing untrusted code while preserving security requires that thecode be prevented from modifying memory or executing instructionsexcept as explicitly allowed. Software-based fault isolation (SFI) or"sandboxing" enforces ...
-
Learning a Dictionary of Shape-Components in Visual Cortex: Comparison with Neurons, Humans and Machines
(2006-04-25)In this thesis, I describe a quantitative model that accounts for the circuits and computations of the feedforward path of the ventral stream of visual cortex. This model is consistent with a general theory of visual ...
-
Abstraction Layers for Scalable Microfluidic Biocomputers (Extended Version)
(2006-05-05)Microfluidic devices are emerging as an attractive technology for automatically orchestrating the reactions needed in a biological computer. Thousands of microfluidic primitives have already been integrated on a single ...
-
Supplement to "Distributed Quota Enforcement for Spam Control"
(2006-04-29)This report is a supplement to our paper "Distributed Quota Enforcement forSpam Control" (NSDI 2006). We assume here that the reader has readthe main paper. In this report, we first analyze the enforcer nodes'key-value ...
-
A Combined Stochastic and Greedy Hybrid Estimation Capability for Concurrent Hybrid Models with Autonomous Mode Transitions
(2006-04-28)Robotic and embedded systems have become increasingly pervasive in applicationsranging from space probes and life support systems to robot assistants. In order to act robustly in the physical world, robotic systems must ...
-
A Probabilistic Particle Control Approach to Optimal, Robust Predictive Control
(2006-04-28)Autonomous vehicles need to be able to plan trajectories to a specified goal that avoid obstacles, and are robust to the inherent uncertainty in the problem. This uncertainty arises due to uncertain state estimation, ...
-
Coordinating Agile Systems through the Model-based Execution of Temporal Plans
(2006-04-28)Agile autonomous systems are emerging, such as unmanned aerial vehicles (UAVs), that must robustly perform tightly coordinated time-critical missions; for example, military surveillance or search-and-rescue scenarios. In ...
-
Detecting and tracking multiple interacting objects without class-specific models
(2006-04-25)We propose a framework for detecting and tracking multiple interacting objects from a single, static, uncalibrated camera. The number of objects is variable and unknown, and object-class-specific models are not available. ...
-
Of Malicious Motes and Suspicious Sensors
(2006-04-19)How much damage can a malicious tiny device cause in a single-hopwireless network? Imagine two players, Alice and Bob, who want toexchange information. Collin, a malicious adversary, wants to preventthem from communicating. ...
-
Revisiting Internet Adressing: Back to the Future!
(2006-04-14)IP prefixes undermine three goals of Internet routing: accurate reflection of network-layer reachability, secure routing messages, and effective traffic control. This paper presents Atomic IP (AIP), a simple change to ...
-
The Symmetriad: A Journey of Discovery Through the Land of the Polychora
(2005)I devised and implemented a method for constructing regular andsemiregular geometric objects in n-dimensional Euclidean space.Given a finite reflection group (a Coxeter group) G, there is a standard way to give G a group ...
-
Task-Structured Probabilistic I/O Automata
(2006-03-31)In the Probabilistic I/O Automata (PIOA) framework, nondeterministicchoices are resolved using perfect-information schedulers,which are similar to history-dependent policies for Markov decision processes(MDPs). These ...
