Now showing items 194-213 of 806

    • CryptDB: A Practical Encrypted Relational DBMS 

      Popa, Raluca Ada; Zeldovich, Nickolai; Balakrishnan, Hari (2011-01-26)
      CryptDB is a DBMS that provides provable and practical privacy in the face of a compromised database server or curious database administrators. CryptDB works by executing SQL queries over encrypted data. At its core are ...
    • Cryptographic Treatment of CryptDB's Adjustable Join 

      Popa, Raluca Ada; Zeldovich, Nickolai (2012-03-25)
      In this document, we provide a cryptographic treatment of the adjustable join protocol from CryptDB. We also discuss how our scheme could be used outside of CryptDB because it provides a simple functionality that may be ...
    • Data and Code for "A New Approach to Animacy Detection" 

      Labiba, Jahan,; Geeticka, Chauhan,; A., Finlayson, Mark (2018-06-07)
      This archive contains the code and data for the workshop article "A New Approach to Animacy Detection," published in 2018 in the the 27th International Conference on Computational Linguistics (COLING 2018), in Santa Fe, ...
    • Data and Code for "Automatic Identification of Narrative Diegesis and Point of View" 

      Eisenberg, Joshua D.; Finlayson, Mark A. (2016-11-09)
      This archive contains the code and data for the workshop article "Automatic Identification of Narrative Diegesis and Point of View," published in 2016 in the 2nd Workshop for Computing News Storylines (CNewsStory 2016), ...
    • Data Structure Repair Using Goal-Directed Reasoning 

      Demsky, Brian; Rinard, Martin (2004-05-18)
      Model-based data structure repair is a promising techniquefor enabling programs to continue to execute successfullyin the face of otherwise fatal data structure corruption errors.Previous research in this eld relied on ...
    • De-Emphasis of Distracting Image Regions Using Texture Power Maps 

      Su, Sara L.; Durand, Fredo; Agrawala, Maneesh (2005-04-12)
      A major obstacle in photography is the presence of distracting elements that pull attention away from the main subject and clutter the composition. In this article, we present a new image-processing technique that reduces ...
    • Dealers, Insiders and Bandits: Learning and its Effects on Market Outcomes 

      Das, Sanmay (2006-07-12)
      This thesis seeks to contribute to the understanding of markets populated by boundedly rational agents who learn from experience. Bounded rationality and learning have both been the focus of much research in computer ...
    • Decision Uncertainty Minimization and Autonomous Information Gathering 

      Bush, Lawrence A. M. (2013-08-22)
      Over the past several decades, technologies for remote sensing and exploration have be- come increasingly powerful but continue to face limitations in the areas of information gathering and analysis. These limitations ...
    • Decomposing Broadcast Algorithms Using Abstract MAC Layers 

      Khabbazian, Majid; Kowalski, Dariusz; Kuhn, Fabian; Lynch, Nancy (2011-02-23)
      In much of the theoretical literature on global broadcast algorithms for wireless networks, issues of message dissemination are considered together with issues of contention management. This combination leads to complicated ...
    • Decoupled Sampling for Real-Time Graphics Pipelines 

      Ragan-Kelley, Jonathan; Doggett, Michael; Lehtinen, Jaakko; Chen, Jiawen; Durand, Fredo (2010-03-29)
      We propose decoupled sampling, an approach that decouples shading from visibility sampling in order to enable motion blur and depth-of-field at reduced cost. More generally, it enables extensions of modern real-time graphics ...
    • Deep Learning without Poor Local Minima 

      Kawaguchi, Kenji (2016-05-23)
      In this paper, we prove a conjecture published in 1989 and also partially address an open problem announced at the Conference on Learning Theory (COLT) 2015. For an expected loss function of a deep nonlinear neural network, ...
    • Definition and Expansion of Composite Automata in IOA 

      Tauber, Joshua A.; Garland, Stephen J. (2004-07-19)
      The IOA language provides notations for defining both primitive and composite I/O automata.This note describes, both formally and with examples, the constraints on these definitions, thecomposability requirements for the ...
    • Deionizer: A Tool for Capturing and Embedding I/O Cells 

      Taylor, Michael Bedford (2004-06-07)
      In this paper, we introduce the concept of a deionizer. A deionizeris a special type of partial evaluator whose purpose is to create a newversion of a program that can run without accessing a partial set of I/O resources.Although ...
    • Delay Controllability: Multi-Agent Coordination under Communication Delay 

      Bhargava, Nikhil; Muise, Christian; Vaquero, Tiago; Williams, Brian (2018-01-29)
      Simple Temporal Networks with Uncertainty provide a useful framework for modeling temporal constraints and, importantly, for modeling actions with uncertain durations. To determine whether we can construct a schedule for ...
    • Delphi: A Software Controller for Mobile Network Selection 

      Deng, Shuo; Sivaraman, Anirudh; Balakrishnan, Hari (2016-02-25)
      This paper presents Delphi, a mobile software controller that helps applications select the best network among available choices for their data transfers. Delphi optimizes a specified objective such as transfer completion ...
    • Designing a Context-Sensitive Context Detection Service for Mobile Devices 

      Chen, Tiffany Yu-Han; Sivaraman, Anirudh; Das, Somak; Ravindranath, Lenin; Balakrishnan, Hari (2015-09-24)
      This paper describes the design, implementation, and evaluation of Amoeba, a context-sensitive context detection service for mobile devices. Amoeba exports an API that allows a client to express interest in one or more ...
    • Detecting and Tolerating Byzantine Faults in Database Systems 

      Vandiver, Benjamin Mead (2008-06-30)
      This thesis describes the design, implementation, and evaluation of a replication scheme to handle Byzantine faults in transaction processing database systems. The scheme compares answers from queries and updates on multiple ...
    • Detecting and tracking multiple interacting objects without class-specific models 

      Bose, Biswajit; Wang, Xiaogang; Grimson, Eric (2006-04-25)
      We propose a framework for detecting and tracking multiple interacting objects from a single, static, uncalibrated camera. The number of objects is variable and unknown, and object-class-specific models are not available. ...
    • Detecting Hazardous Intensive Care Patient Episodes Using Real-time Mortality Models 

      Hug, Caleb (2009-08-26)
      The modern intensive care unit (ICU) has become a complex, expensive, data-intensive environment. Caregivers maintain an overall assessment of their patients based on important observations and trends. If an advanced ...
    • Determining articulator configuration in voiced stop consonants by matching time-domain patterns in pitch periods 

      Kondacs, Attila (2005-01-28)
      In this thesis I will be concerned with linking the observed speechsignal to the configuration of articulators.Due to the potentially rapid motion of the articulators, the speechsignal can be highly non-stationary. The ...