Computer Science and Artificial Intelligence Lab (CSAIL): Recent submissions

Now showing items 861-880 of 2625

  • Maximum Entropy Correlated Equilibria 

    Unknown author (2006-03-20)
    We study maximum entropy correlated equilibria in (multi-player)games and provide two gradient-based algorithms that are guaranteedto converge to such equilibria. Although we do not provideconvergence rates for these ...

  • Pyramid Match Kernels: Discriminative Classification with Sets of Image Features (version 2) 

    Unknown author (2006-03-18)
    Discriminative learning is challenging when examples are sets of features, and the sets vary in cardinality and lack any sort of meaningful ordering. Kernel-based classification methods can learn complex decision boundaries, ...

  • Computing action equivalences for planning under time-constraints 

    Unknown author (2006-03-20)
    In order for autonomous artificial decision-makers to solverealistic tasks, they need to deal with the dual problems of searching throughlarge state and action spaces under time pressure.We study the problem of planning ...

  • DNA Binding and Games 

    Unknown author (2006-03-06)
    We propose a game-theoretic approach tolearn and predict coordinate binding of multiple DNA bindingregulators. The framework implements resource constrainedallocation of proteins to local neighborhoods as well as to ...

  • Using Task-Structured Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol 

    Unknown author (2006-03-08)
    AbstractThe Probabilistic I/O Automata framework of Lynch, Segala and Vaandrager provides tools for precisely specifying protocols and reasoning about their correctness using multiple levels of abstraction, based on ...

  • Hyperglue: Designing High-Level Agent Communication for Distributed Applications 

    Unknown author (2006-03-01)
    We are building a new communication model and discoverysystem which will allow agent-based intelligent spacesto interact with one another. This new infrastructure layer,called Hyperglue, coordinates agent actions at a ...

  • Plan-Driven Pervasive Computing 

    Unknown author (2006-03-01)
    The goal of human-centered, pervasive computing should be to hide the details of the computing environment, allowing users to concentrate on their goals, rather than on the direct management of devices. This paper describes ...

  • Amorphous Infrastructure for Language Implementation 

    Unknown author (2002-12-10)
    We propose a method for the robust implementation of simple graphical automataon an amorphous computer. This infrastructure is applied to the implementationof purely functional programming languages. Specifically, it is ...

  • A soft touch: Compliant Tactile Sensors for Sensitive Manipulation 

    Unknown author (2006-03-01)
    We present the design, analysis and construction of a biologicallyinspired tactile sensor. The sensor can measure normal and lateralforces, conform to the surfaces with which it comes in contact andincrease the friction ...

  • Finite Horizon Control Design for Optimal Discrimination between Several Models 

    Unknown author (2006-02-28)
    Multiple-Model fault detection is a powerful method for detecting changes, such as faults, in dynamic systems. In many cases, the ability of such a detection scheme to distinguish between possible models for the system ...

  • Interactive Animation of Dynamic Manipulation 

    Unknown author (2006-02-28)
    Lifelike animation of manipulation must account for the dynamicinteraction between animated characters, objects, and their environment. Failing to do so would ignore the often significant effects objectshave on the motion ...

  • Control and Estimation for Cooperative Manipulator Tasks 

    Unknown author (2006-02-28)
    The objective of this project is to achieve reliable transfer of an object from one robotic manipulator to another. This capability is useful for a number of applications, for instance robotic assembly, or robots with ...

  • Encrypted Keyword Search in a Distributed Storage System 

    Unknown author (2006-02-23)
    Encrypted keyword search allows a server to perform a search over a set of encrypted documents on behalf of a client without learning the contents of the documents or the words being searched for. Designing a practical ...

  • Network Coding Made Practical 

    Unknown author (2006-02-16)
    We propose a new architecture for wireless mesh networks. In addition to forwarding packets, routers mix (i.e., code) packets from different sources to increase the information content of each transmission. We show that ...

  • Learning Semantic Scene Models by Trajectory Analysis 

    Unknown author (2006-02-10)
    In this paper, we describe an unsupervised learning framework to segment a scene into semantic regions and to build semantic scene models from long-term observations of moving objects in the scene. First, we introduce two ...

  • Transparent Accountable Data Mining: New Strategies for Privacy Protection 

    Unknown author (2006-01-27)
    Attempts to address issues of personal privacy in a world of computerized databases and information networks -- from security technology to data protection regulation to Fourth Amendment law jurisprudence -- typically ...

  • A Consistency Management Layer for Inter-Domain Routing 

    Unknown author (2006-01-27)
    This paper proposes an isolation layer -- a shim -- betweeninter-domain routing and packet forwarding. The job of this layer isto coordinate between Autonomous Systems (AS's) on when and how tomodify the forwarding state ...

  • A Unified Information Theoretic Framework for Pair- and Group-wise Registration of Medical Images 

    Unknown author (2006-01-25)
    The field of medical image analysis has been rapidly growing for the past two decades. Besides a significant growth in computational power, scanner performance, and storage facilities, this acceleration is partially due ...

  • Service Identification in TCP/IP: Well-Known versus Random Port Numbers 

    Unknown author (2006-01-11)
    The sixteen-bit well-known port number is often overlooked as a network identifier in Internet communications. Its purpose at the most fundamental level is only to demultiplex flows of traffic. Several unintended uses of ...

  • Wide-Area Egomotion Estimation from Known 3D Structure 

    Unknown author (2006-01-09)
    We describe an algorithm that takes as inputs a coarse3D model of an environment, and a video sequence acquiredwithin the environment, and produces as output an estimateof the camera s 6-DOF egomotion expressed in the ...