Browsing CSAIL Digital Archive by Title
Now showing items 371-390 of 806
-
Javari: Adding Reference Immutability to Java
(2006-09-05)This paper describes a programming language, Javari, that is capable of expressing and enforcing immutability constraints. The specific constraint expressed is that the abstract state of the object to which an immutable ... -
Jenga: Harnessing Heterogeneous Memories through Reconfigurable Cache Hierarchies
(2015-12-19)Conventional memory systems are organized as a rigid hierarchy, with multiple levels of progressively larger and slower memories. Hierarchy allows a simple, fixed design to benefit a wide range of applications, because ... -
Jigsaw: Scalable Software-Defined Caches (Extended Version)
(2013-09-01)Shared last-level caches, widely used in chip-multiprocessors (CMPs), face two fundamental limitations. First, the latency and energy of shared caches degrade as the system scales up. Second, when multiple workloads share ... -
jMWE v1.0.0
(2011)jMWE is a Java library for constructing and testing Multi-Word Expression detectors. The library has three main facilities: (1) a detector API, (2) a MWE index facility, and (3) a test harness. This is version 1.0.0 of the ... -
Keeping Mobile Robots Connected
(2009-06-17)Designing robust algorithms for mobile agents with reliable communication is difficult due to the distributed nature of computation, in mobile ad hoc networks (MANETs) the matter is exacerbated by the need to ensure ... -
Kernels for Vector-Valued Functions: a Review
(2011-06-30)Kernel methods are among the most popular techniques in machine learning. From a frequentist/discriminative perspective they play a central role in regularization theory as they provide a natural choice for the hypotheses ... -
Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications
(2015-07-06)Twenty years ago, law enforcement organizations lobbied to require data and communication services to engineer their products to guarantee law enforcement access to all data. After lengthy debate and vigorous predictions ... -
Kintinuous: Spatially Extended KinectFusion
(2012-07-19)In this paper we present an extension to the KinectFusion algorithm that permits dense mesh-based mapping of extended scale environments in real-time. This is achieved through (i) altering the original algorithm such that ... -
Knowledge Benchmarks in Adversarial Mechanism Design (Part I) and Implementation in Surviving Strategies (Part I)
(2008-07)We put forward new benchmarks and solution concepts for Adversarial Mechanism Design, as defined by [MV07.a], and we exemplify them in the case of truly combinatorial auctions.We benchmark the combined performance (the sum ... -
Knowledge Benchmarks in Adversarial Mechanism Design and Implementation in Surviving Strategies (Part I)
(2008-06)We put forward new benchmarks and solution concepts for Adversarial Mechanism Design, as defined by [MV07.a], and we exemplify them in the case of truly combinatorial auctions.We benchmark the combined performance (the sum ... -
Knowledge Flow Analysis for Security Protocols
(2005-10-19)Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of knowledge amongst principals. Because this ... -
Kongming: A Generative Planner for Hybrid Systems with Temporally Extended Goals
(2010-04-09)Most unmanned missions in space and undersea are commanded by a "script" that specifies a sequence of discrete commands and continuous actions. Currently such scripts are mostly hand-generated by human operators. This ... -
LabelMe: a database and web-based tool for image annotation
(2005-09-08)Research in object detection and recognition in cluttered scenes requires large image collections with ground truth labels. The labels should provide information about the object classes present in each image, as well as ... -
Language and Compiler Support for Auto-Tuning Variable-Accuracy Algorithms
(2010-07-27)Approximating ideal program outputs is a common technique for solving computationally difficult problems, for adhering to processing or timing constraints, and for performance optimization in situations where perfect ... -
Latent Case Model: A Generative Approach for Case-Based Reasoning and Prototype Classification
(2014-05-26)We present a general framework for Bayesian case-based reasoning and prototype classification and clustering -- Latent Case Model (LCM). LCM learns the most representative prototype observations of a dataset by performing ... -
Latent-Dynamic Discriminative Models for Continuous Gesture Recognition
(2007-01-07)Many problems in vision involve the prediction of a class label for each frame in an unsegmented sequence. In this paper we develop a discriminative framework for simultaneous sequence segmentation and labeling which can ... -
Leader Election Using Loneliness Detection
(2011-10-12)We consider the problem of leader election (LE) in single-hop radio networks with synchronized time slots for transmitting and receiving messages. We assume that the actual number n of processes is unknown, while the size ... -
LEAP Scratchpads: Automatic Memory and Cache Management for Reconfigurable Logic [Extended Version]
(2010-11-23)Developers accelerating applications on FPGAs or other reconfigurable logic have nothing but raw memory devices in their standard toolkits. Each project typically includes tedious development of single-use memory management. ... -
Learning a Dictionary of Shape-Components in Visual Cortex: Comparison with Neurons, Humans and Machines
(2006-04-25)In this thesis, I describe a quantitative model that accounts for the circuits and computations of the feedforward path of the ventral stream of visual cortex. This model is consistent with a general theory of visual ... -
Learning and disrupting invariance in visual recognition
(2011-09-10)Learning by temporal association rules such as Foldiak's trace rule is an attractive hypothesis that explains the development of invariance in visual recognition. Consistent with these rules, several recent experiments ...