Computer Science and Artificial Intelligence Lab (CSAIL): Recent submissions

Now showing items 881-900 of 2625

  • Nuggeteer: Automatic Nugget-Based Evaluation Using Descriptions and Judgements 

    Unknown author (2006-01-09)
    TREC Definition and Relationship questions are evaluated on thebasis of information nuggets that may be contained in systemresponses. Human evaluators provide informal descriptions of eachnugget, and judgements (assignments ...

  • Polylogarithmic Approximation Algorithm for Non-Uniform Multicommodity Buy-at-Bulk 

    Unknown author (2005-11-26)
    We consider the non-uniform multicommodity buy-at-bulknetworkdesign problem. In this problem we are given a graph $G(V,E)$withtwo cost functions on the edges, a buy cost $b:E\longrightarrow \RR^+$and a rent cost$r:E\long ...

  • Approximating Buy-at-Bulk k-Steiner trees 

    Unknown author (2005-11-15)
    In the buy-at-bulk $k$-Steiner tree (or rent-or-buy$k$-Steiner tree) problem we are given a graph $G(V,E)$ with a setof terminals $T\subseteq V$ including a particular vertex $s$ calledthe root, and an integer $k\leq |T|$. ...

  • Cognitive-Developmental Learning for a Humanoid Robot: A Caregiver's Gift 

    Unknown author (2004-09-26)
    The goal of this work is to build a cognitive system for the humanoid robot, Cog, that exploits human caregivers as catalysts to perceive and learn about actions, objects, scenes, people, and the robot itself. This thesis ...

  • Electronic Cash with Blind Deposits: How to Have No Spare Change 

    Unknown author (2003-10-14)
    Electronic cash schemes in which the bank authenticates many coins at once suffer from the problem that coins that are authenticated together can be linked to one another. Unfortunately, unless a user spends coins in a ...

  • Generating Trees of (Reducible) 1324-avoiding Permutations 

    Unknown author (2003-10-09)
    We consider permutations that avoid the pattern 1324. We give exact formulas for thenumber of reducible 1324-avoiding permutations and the number of {1324, 4132, 2413, 3241}-avoiding permutations. By studying the generating ...

  • Error weighted classifier combination for multi-modal human identification 

    Unknown author (2005-12-14)
    In this paper we describe a technique of classifier combination used in a human identification system. The system integrates all available features from multi-modal sources within a Bayesian framework. The framework allows ...

  • Automatic Software Upgrades for Distributed Systems 

    Unknown author (2005-11-30)
    Upgrading the software of long-lived, highly-available distributed systems is difficult. It is not possible to upgrade all the nodes in a system at once, since some nodes may be unavailable and halting the system for an ...

  • Conditional Random People: Tracking Humans with CRFs and Grid Filters 

    Unknown author (2005-12-01)
    We describe a state-space tracking approach based on a Conditional Random Field(CRF) model, where the observation potentials are \emph{learned} from data. Wefind functions that embed both state and observation into a space ...

  • Identifying Expression Fingerprints using Linguistic Information 

    Unknown author (2005-11-18)
    This thesis presents a technology to complement taxation-based policy proposals aimed at addressing the digital copyright problem. Theapproach presented facilitates identification of intellectual propertyusing expression ...

  • Accurate and Scalable Surface Representation and Reconstruction from Images 

    Unknown author (2005-11-18)
    We introduce a new surface representation, the patchwork, to extend the problem of surface reconstruction from multiple images. A patchwork is the combination of several patches that are built one by one. This design ...

  • Analysis of Perceptron-Based Active Learning 

    Unknown author (2005-11-17)
    We start by showing that in an active learning setting, the Perceptron algorithm needs $\Omega(\frac{1}{\epsilon^2})$ labels to learn linear separators within generalization error $\epsilon$. We then present a simple ...

  • Online Learning of Non-stationary Sequences 

    Unknown author (2005-11-17)
    We consider an online learning scenario in which the learner can make predictions on the basis of a fixed set of experts. We derive upper and lower relative loss bounds for a class of universal learning algorithms involving ...

  • New LSH-based Algorithm for Approximate Nearest Neighbor 

    Unknown author (2005-11-04)
    We present an algorithm for c-approximate nearest neighbor problem in a d-dimensional Euclidean space, achieving query time ofO(dn^{1/c^2+o(1)}) and space O(dn + n^{1+1/c^2+o(1)}).

  • On Field Constraint Analysis 

    Unknown author (2005-11-03)
    We introduce field constraint analysis, a new technique for verifying data structure invariants. A field constraint for a field is a formula specifying a set of objects to which the field can point. Field constraints ...

  • Subcontracted Rational SFE 

    Unknown author (2005-11-02)
    In their paper, "Rational Secure Computation and Ideal Mechanism Design," Izmalkov, Lepinski and Micali show that any one-shot mediated game can be simulated by the players themselves, without the help of a trusted mediator, ...

  • Towards Realizing the Performance and Availability Benefits of a Global Overlay Network 

    Unknown author (2005-11-01)
    Prior analyses of the benefits of routing overlays are based onplatforms consisting of nodes located primarily in North America, onthe academic Internet, and at the edge of the network. This paper isthe first global study ...

  • Using Cyclic Memory Allocation to Eliminate Memory Leaks 

    Unknown author (2005-10-26)
    We present and evaluate a new memory management technique foreliminating memory leaks in programs with dynamic memoryallocation. This technique observes the execution of the program on asequence of training inputsto find ...

  • MPEG-2 in a Stream Programming Language 

    Unknown author (2005-10-22)
    Image and video codecs are prevalent in multimedia applications, ranging from embedded systems, to desktop computers, to high-end servers such as HDTV editing consoles. It is not uncommon however that developers create ...

  • Asymptotics of Gaussian Regularized Least-Squares 

    Unknown author (2005-10-20)
    We consider regularized least-squares (RLS) with a Gaussian kernel. Weprove that if we let the Gaussian bandwidth $\sigma \rightarrow\infty$ while letting the regularization parameter $\lambda\rightarrow 0$, the RLS solution ...