Advanced Search
DSpace@MIT

Browsing CSAIL Digital Archive by Title

Research and Teaching Output of the MIT Community

Browsing CSAIL Digital Archive by Title

Sort by: Order: Results:

  • Metreveli, Zviad; Zeldovich, Nickolai; Kaashoek, M. Frans (2011-11-26)
    CPHash is a concurrent hash table for multicore processors. CPHash partitions its table across the caches of cores and uses message passing to transfer lookups/inserts to a partition. CPHash's message passing avoids the ...
  • Popa, Raluca Ada; Zeldovich, Nickolai; Balakrishnan, Hari (2011-01-26)
    CryptDB is a DBMS that provides provable and practical privacy in the face of a compromised database server or curious database administrators. CryptDB works by executing SQL queries over encrypted data. At its core are ...
  • Popa, Raluca Ada; Zeldovich, Nickolai (2012-03-25)
    In this document, we provide a cryptographic treatment of the adjustable join protocol from CryptDB. We also discuss how our scheme could be used outside of CryptDB because it provides a simple functionality that may be ...
  • Labiba, Jahan,; Geeticka, Chauhan,; A., Finlayson, Mark (2018-06-07)
    This archive contains the code and data for the workshop article "A New Approach to Animacy Detection," published in 2018 in the the 27th International Conference on Computational Linguistics (COLING 2018), in Santa Fe, ...
  • Eisenberg, Joshua D.; Finlayson, Mark A. (2016-11-09)
    This archive contains the code and data for the workshop article "Automatic Identification of Narrative Diegesis and Point of View," published in 2016 in the 2nd Workshop for Computing News Storylines (CNewsStory 2016), ...
  • Demsky, Brian; Rinard, Martin (2004-05-18)
    Model-based data structure repair is a promising techniquefor enabling programs to continue to execute successfullyin the face of otherwise fatal data structure corruption errors.Previous research in this eld relied on ...
  • Das, Sanmay (2006-07-12)
    This thesis seeks to contribute to the understanding of markets populated by boundedly rational agents who learn from experience. Bounded rationality and learning have both been the focus of much research in computer ...
  • Bush, Lawrence A. M. (2013-08-22)
    Over the past several decades, technologies for remote sensing and exploration have be- come increasingly powerful but continue to face limitations in the areas of information gathering and analysis. These limitations ...
  • Khabbazian, Majid; Kowalski, Dariusz; Kuhn, Fabian; Lynch, Nancy (2011-02-23)
    In much of the theoretical literature on global broadcast algorithms for wireless networks, issues of message dissemination are considered together with issues of contention management. This combination leads to complicated ...
  • Ragan-Kelley, Jonathan; Doggett, Michael; Lehtinen, Jaakko; Chen, Jiawen; Durand, Fredo (2010-03-29)
    We propose decoupled sampling, an approach that decouples shading from visibility sampling in order to enable motion blur and depth-of-field at reduced cost. More generally, it enables extensions of modern real-time graphics ...
  • Su, Sara L.; Durand, Fredo; Agrawala, Maneesh (2005-04-12)
    A major obstacle in photography is the presence of distracting elements that pull attention away from the main subject and clutter the composition. In this article, we present a new image-processing technique that reduces ...
  • Kawaguchi, Kenji (2016-05-23)
    In this paper, we prove a conjecture published in 1989 and also partially address an open problem announced at the Conference on Learning Theory (COLT) 2015. For an expected loss function of a deep nonlinear neural network, ...
  • Tauber, Joshua A.; Garland, Stephen J. (2004-07-19)
    The IOA language provides notations for defining both primitive and composite I/O automata.This note describes, both formally and with examples, the constraints on these definitions, thecomposability requirements for the ...
  • Taylor, Michael Bedford (2004-06-07)
    In this paper, we introduce the concept of a deionizer. A deionizeris a special type of partial evaluator whose purpose is to create a newversion of a program that can run without accessing a partial set of I/O resources.Although ...
  • Bhargava, Nikhil; Muise, Christian; Vaquero, Tiago; Williams, Brian (2018-01-29)
    Simple Temporal Networks with Uncertainty provide a useful framework for modeling temporal constraints and, importantly, for modeling actions with uncertain durations. To determine whether we can construct a schedule for ...
  • Deng, Shuo; Sivaraman, Anirudh; Balakrishnan, Hari (2016-02-25)
    This paper presents Delphi, a mobile software controller that helps applications select the best network among available choices for their data transfers. Delphi optimizes a specified objective such as transfer completion ...
  • Chen, Tiffany Yu-Han; Sivaraman, Anirudh; Das, Somak; Ravindranath, Lenin; Balakrishnan, Hari (2015-09-24)
    This paper describes the design, implementation, and evaluation of Amoeba, a context-sensitive context detection service for mobile devices. Amoeba exports an API that allows a client to express interest in one or more ...
  • Vandiver, Benjamin Mead (2008-06-30)
    This thesis describes the design, implementation, and evaluation of a replication scheme to handle Byzantine faults in transaction processing database systems. The scheme compares answers from queries and updates on multiple ...
  • Bose, Biswajit; Wang, Xiaogang; Grimson, Eric (2006-04-25)
    We propose a framework for detecting and tracking multiple interacting objects from a single, static, uncalibrated camera. The number of objects is variable and unknown, and object-class-specific models are not available. ...
  • Hug, Caleb (2009-08-26)
    The modern intensive care unit (ICU) has become a complex, expensive, data-intensive environment. Caregivers maintain an overall assessment of their patients based on important observations and trends. If an advanced ...
MIT-Mirage