Computer Science and Artificial Intelligence Lab (CSAIL): Recent submissions
Now showing items 901-920 of 2625
-
Knowledge Flow Analysis for Security Protocols
(2005-10-19)Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of knowledge amongst principals. Because this ...
-
Towards the Prevention of Dyslexia
(2005-10-18)Previous studies have shown that dyslexic individuals who supplement windowed reading practice with intensive small-scale hand-eye coordination tasks exhibit marked improvement in their reading skills. Here we examine ...
-
Victim Migration: Dynamically Adapting Between Private and Shared CMP Caches
(2005-10-10)Future CMPs will have more cores and greater onchip cache capacity. The on-chip cache can either be divided into separate private L2 caches for each core, or treated as a large shared L2 cache. Private caches provide low ...
-
Learning to Trade with Insider Information
(2005-10-07)This paper introduces algorithms for learning how to trade usinginsider (superior) information in Kyle's model of financial markets.Prior results in finance theory relied on the insider having perfectknowledge of the ...
-
Automatic Software Upgrades for Distributed Systems
(2005-10-06)Upgrading the software of long-lived, highly-available distributedsystems is difficult. It is not possible to upgrade all the nodes in asystem at once, since some nodes may be unavailable and halting thesystem for an ...
-
Secondary Structure Prediction of All-Helical Proteins Using Hidden Markov Support Vector Machines
(2005-10-06)Our goal is to develop a state-of-the-art predictor with an intuitive and biophysically-motivated energy model through the use of Hidden Markov Support Vector Machines (HM-SVMs), a recent innovation in the field of machine ...
-
Combining diagrammatic and symbolic reasoning
(2005-10-06)We introduce a domain-independent framework for heterogeneous natural deduction that combines diagrammatic and sentential reasoning. The framework is presented in the form of a family of denotational proof languages (DPLs). ...
-
Spatial and Temporal Abstractions in POMDPs Applied to Robot Navigation
(2005-09-27)Partially observable Markov decision processes (POMDPs) are a well studied paradigm for programming autonomous robots, where the robot sequentially chooses actions to achieve long term goals efficiently. Unfortunately, ...
-
Automated Audio-visual Activity Analysis
(2005-09-20)Current computer vision techniques can effectively monitor gross activities in sparse environments. Unfortunately, visual stimulus is often not sufficient for reliably discriminating between many types of activity. In ...
-
LabelMe: a database and web-based tool for image annotation
(2005-09-08)Research in object detection and recognition in cluttered scenes requires large image collections with ground truth labels. The labels should provide information about the object classes present in each image, as well as ...
-
Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol
(2005-08-19)We demonstrate how to carry out cryptographic security analysis ofdistributed protocols within the Probabilistic I/O Automata frameworkof Lynch, Segala, and Vaandrager.This framework provides tools for arguing rigorously ...
-
Collective Choice with Uncertain Domain Moldels
(2005-08-16)When groups of individuals make choices among several alternatives, the most compelling social outcome is the Condorcet winner, namely the alternative beating all others in a pair-wise contest. Obviously the Condorcet ...
-
Slicing the Onion: Anonymous Routing Without PKI
(2005-08-15)Recent years have witnessed many proposals for anonymous routing in overlay peer-to-peer networks. The proposed protocols either expose the receiver and the message content, or require the overlay nodes to have public-private ...
-
Self-Stabilizing Mobile Node Location Management and Message
(2005-08-11)We present simple algorithms for achieving self-stabilizing locationmanagement and routing in mobile ad-hoc networks. While mobile clients maybe susceptible to corruption and stopping failures, mobile networks areoften ...
-
Implementing Probabilistically Checkable Proofs of Proximity
(2005-08-08)Abstract: In this paper, we describe a proof-of-concept implementation of the probabilistically checkable proof of proximity (PCPP) system described by Ben-Sasson and Sudan in \\cite{bs05}. In particular, we implement a ...
-
On Algorithms and Complexity for Sets with Cardinality Constraints
(2005-08-03)Typestate systems ensure many desirable properties of imperativeprograms, including initialization of object fields and correct use ofstateful library interfaces. Abstract sets with cardinalityconstraints naturally ...
-
How to Construct a Correct and Scalable iBGP Configuration
(2005-08-03)The Border Gateway Protocol (BGP), the current inter domain routing protocol in the Internet, has two modes of operation: eBGP (External BGP), used to exchange routing information between autonomous systems, and iBGP ...
-
Proving Atomicity: An Assertional Approach
(2005-07-22)Atomicity (or linearizability) is a commonly used consistency criterion for distributed services and objects. Although atomic object implementations are abundant, proving that algorithms achieve atomicity has turned out ...
-
Byzantine Clients Rendered Harmless
(2005-07-21)Byzantine quorum systems have been proposed that work properly even when up to f replicas fail arbitrarily.However, these systems are not so successful when confronted with Byzantine faulty clients. This paper presents ...
-
Boosting a Biologically Inspired Local Descriptor for Geometry-free Face and Full Multi-view 3D Object Recognition
(2005-07-07)Object recognition systems relying on local descriptors are increasingly used because of their perceived robustness with respect to occlusions and to global geometrical deformations. Descriptors of this type -- based on ...
