Computer Science and Artificial Intelligence Lab (CSAIL): Recent submissions

Now showing items 901-920 of 2625

  • Knowledge Flow Analysis for Security Protocols 

    Unknown author (2005-10-19)
    Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of knowledge amongst principals. Because this ...

  • Towards the Prevention of Dyslexia 

    Unknown author (2005-10-18)
    Previous studies have shown that dyslexic individuals who supplement windowed reading practice with intensive small-scale hand-eye coordination tasks exhibit marked improvement in their reading skills. Here we examine ...

  • Victim Migration: Dynamically Adapting Between Private and Shared CMP Caches 

    Unknown author (2005-10-10)
    Future CMPs will have more cores and greater onchip cache capacity. The on-chip cache can either be divided into separate private L2 caches for each core, or treated as a large shared L2 cache. Private caches provide low ...

  • Learning to Trade with Insider Information 

    Unknown author (2005-10-07)
    This paper introduces algorithms for learning how to trade usinginsider (superior) information in Kyle's model of financial markets.Prior results in finance theory relied on the insider having perfectknowledge of the ...

  • Automatic Software Upgrades for Distributed Systems 

    Unknown author (2005-10-06)
    Upgrading the software of long-lived, highly-available distributedsystems is difficult. It is not possible to upgrade all the nodes in asystem at once, since some nodes may be unavailable and halting thesystem for an ...

  • Secondary Structure Prediction of All-Helical Proteins Using Hidden Markov Support Vector Machines 

    Unknown author (2005-10-06)
    Our goal is to develop a state-of-the-art predictor with an intuitive and biophysically-motivated energy model through the use of Hidden Markov Support Vector Machines (HM-SVMs), a recent innovation in the field of machine ...

  • Combining diagrammatic and symbolic reasoning 

    Unknown author (2005-10-06)
    We introduce a domain-independent framework for heterogeneous natural deduction that combines diagrammatic and sentential reasoning. The framework is presented in the form of a family of denotational proof languages (DPLs). ...

  • Spatial and Temporal Abstractions in POMDPs Applied to Robot Navigation 

    Unknown author (2005-09-27)
    Partially observable Markov decision processes (POMDPs) are a well studied paradigm for programming autonomous robots, where the robot sequentially chooses actions to achieve long term goals efficiently. Unfortunately, ...

  • Automated Audio-visual Activity Analysis 

    Unknown author (2005-09-20)
    Current computer vision techniques can effectively monitor gross activities in sparse environments. Unfortunately, visual stimulus is often not sufficient for reliably discriminating between many types of activity. In ...

  • LabelMe: a database and web-based tool for image annotation 

    Unknown author (2005-09-08)
    Research in object detection and recognition in cluttered scenes requires large image collections with ground truth labels. The labels should provide information about the object classes present in each image, as well as ...

  • Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol 

    Unknown author (2005-08-19)
    We demonstrate how to carry out cryptographic security analysis ofdistributed protocols within the Probabilistic I/O Automata frameworkof Lynch, Segala, and Vaandrager.This framework provides tools for arguing rigorously ...

  • Collective Choice with Uncertain Domain Moldels 

    Unknown author (2005-08-16)
    When groups of individuals make choices among several alternatives, the most compelling social outcome is the Condorcet winner, namely the alternative beating all others in a pair-wise contest. Obviously the Condorcet ...

  • Slicing the Onion: Anonymous Routing Without PKI 

    Unknown author (2005-08-15)
    Recent years have witnessed many proposals for anonymous routing in overlay peer-to-peer networks. The proposed protocols either expose the receiver and the message content, or require the overlay nodes to have public-private ...

  • Self-Stabilizing Mobile Node Location Management and Message 

    Unknown author (2005-08-11)
    We present simple algorithms for achieving self-stabilizing locationmanagement and routing in mobile ad-hoc networks. While mobile clients maybe susceptible to corruption and stopping failures, mobile networks areoften ...

  • Implementing Probabilistically Checkable Proofs of Proximity 

    Unknown author (2005-08-08)
    Abstract: In this paper, we describe a proof-of-concept implementation of the probabilistically checkable proof of proximity (PCPP) system described by Ben-Sasson and Sudan in \\cite{bs05}. In particular, we implement a ...

  • On Algorithms and Complexity for Sets with Cardinality Constraints 

    Unknown author (2005-08-03)
    Typestate systems ensure many desirable properties of imperativeprograms, including initialization of object fields and correct use ofstateful library interfaces. Abstract sets with cardinalityconstraints naturally ...

  • How to Construct a Correct and Scalable iBGP Configuration 

    Unknown author (2005-08-03)
    The Border Gateway Protocol (BGP), the current inter domain routing protocol in the Internet, has two modes of operation: eBGP (External BGP), used to exchange routing information between autonomous systems, and iBGP ...

  • Proving Atomicity: An Assertional Approach 

    Unknown author (2005-07-22)
    Atomicity (or linearizability) is a commonly used consistency criterion for distributed services and objects. Although atomic object implementations are abundant, proving that algorithms achieve atomicity has turned out ...

  • Byzantine Clients Rendered Harmless 

    Unknown author (2005-07-21)
    Byzantine quorum systems have been proposed that work properly even when up to f replicas fail arbitrarily.However, these systems are not so successful when confronted with Byzantine faulty clients. This paper presents ...

  • Boosting a Biologically Inspired Local Descriptor for Geometry-free Face and Full Multi-view 3D Object Recognition 

    Unknown author (2005-07-07)
    Object recognition systems relying on local descriptors are increasingly used because of their perceived robustness with respect to occlusions and to global geometrical deformations. Descriptors of this type -- based on ...