Now showing items 619-638 of 806

    • RingScalar: A Complexity-Effective Out-of-Order Superscalar Microarchitecture 

      Tseng, Jessica H.; Asanovic, Krste (2006-09-18)
      RingScalar is a complexity-effective microarchitecture for out-of-order superscalar processors, that reduces the area, latency, and power of all major structures in the instruction flow. The design divides an N-way ...
    • Risk Allocation for Multi-agent Systems using Tatonnement 

      Williams, Brian C.; Ono, Masahiro (2009-04-22)
      This paper proposes a new market-based distributed planning algorithm for multi-agent systems under uncertainty, called MIRA (Market-based Iterative Risk Allocation). In large coordination problems, from power grid management ...
    • Risk Allocation for Temporal Risk Assessment 

      Wang, Andrew J. (2013-01-31)
      Temporal uncertainty arises when performing any activity in the natural world. When activities are composed into temporal plans, then, there is a risk of not meeting the plan requirements. Currently, we do not have ...
    • Risk Bounds for Mixture Density Estimation 

      Rakhlin, Alexander; Panchenko, Dmitry; Mukherjee, Sayan (2004-01-27)
      In this paper we focus on the problem of estimating a boundeddensity using a finite combination of densities from a givenclass. We consider the Maximum Likelihood Procedure (MLE) and the greedy procedure described by Li ...
    • Risk Bounds for Regularized Least-squares Algorithm with Operator-valued kernels 

      Vito, Ernesto De; Caponnetto, Andrea (2005-05-16)
      We show that recent results in [3] on risk bounds for regularized least-squares on reproducing kernel Hilbert spaces can be straightforwardly extended to the vector-valued regression setting. We first briefly introduce ...
    • Risk-minimizing program execution in robotic domains 

      Effinger, Robert (2012-02-02)
      In this thesis, we argue that autonomous robots operating in hostile and uncertain environments can improve robustness by computing and reasoning explicitly about risk. Autonomous robots with a keen sensitivity to risk can ...
    • Robot Manipulation in Human Environments 

      Edsinger, Aaron (2007-01-16)
      Human environments present special challenges for robot manipulation. They are often dynamic, difficult to predict, and beyond the control of a robot engineer. Fortunately, many characteristics of these settings can be ...
    • Robust Execution of Bipedal Walking Tasks From Biomechanical Principles 

      Hofmann, Andreas (2006-04-28)
      Effective use of robots in unstructured environments requires that they have sufficient autonomy and agility to execute task-level commands successfully. A challenging example of such a robot is a bipedal walking machine. ...
    • Robust Tracking for Real-Time Dense RGB-D Mapping with Kintinuous 

      Whelan, Thomas; Johannsson, Hordur; Kaess, Michael; Leonard, John J.; McDonald, John (2012-09-17)
      This paper describes extensions to the Kintinuous algorithm for spatially extended KinectFusion, incorporating the following additions: (i) the integration of multiple 6DOF camera odometry estimation methods for robust ...
    • Robust, Goal-directed Plan Execution with Bounded Risk 

      Ono, Masahiro (2012-02-02)
      There is an increasing need for robust optimal plan execution for multi-agent systems in uncertain environments, while guaranteeing an acceptable probability of success. For ex- ample, a fleet of unmanned aerial vehicles ...
    • Rosebud: A Scalable Byzantine-Fault-Tolerant Storage Architecture 

      Rodrigues, Rodrigo; Liskov, Barbara (2003-12-17)
      This paper presents Rosebud, a new Byzantine faulttolerantstorage architecture designed to be highly scalableand deployable in the wide-area. To support massiveamounts of data, we need to partition the data among thenodes. ...
    • Rotation Invariant Object Recognition from One Training Example 

      Yokono, Jerry Jun; Poggio, Tomaso (2004-04-27)
      Local descriptors are increasingly used for the task of object recognition because of their perceived robustness with respect to occlusions and to global geometrical deformations. Such a descriptor--based on a set of ...
    • Safe Open-Nested Transactions Through Ownership 

      Agrawal, Kunal; Lee, I-Ting Angelina; Sukha, Jim (2008-02-20)
      Researchers in transactional memory (TM) have proposed open nesting asa methodology for increasing the concurrency of a program. The ideais to ignore certain "low-level" memory operations of anopen-nested transaction when ...
    • Scalable directoryless shared memory coherence using execution migration 

      Lis, Mieszko; Shim, Keun Sup; Cho, Myong Hyon; Khan, Omer; Devadas, Srinivas (2010-11-22)
      We introduce the concept of deadlock-free migration-based coherent shared memory to the NUCA family of architectures. Migration-based architectures move threads among cores to guarantee sequential semantics in large ...
    • A Scalable Information Theoretic Approach to Distributed Robot Coordination 

      Julian, Brian J.; Angermann, Michael; Schwager, Mac; Rus, Daniela (2011-09-25)
      This paper presents a scalable information theoretic approach to infer the state of an environment by distributively controlling robots equipped with sensors. The robots iteratively estimate the environment state using a ...
    • Scalable Information-Sharing Network Management 

      Guo, Nina X. (2011-06-07)
      This thesis analyzes scalable information-sharing network management. It looks into one of the large problems in network management today: finding information across different network domains. Information-sharing network ...
    • Scalable Internet Routing on Topology-Independent Node Identities 

      Ford, Bryan (2003-10-31)
      Unmanaged Internet Protocol (UIP) is a fully selforganizingnetwork-layer protocol that implements scalableidentity-based routing. In contrast with addressbasedrouting protocols, which depend for scalability oncentralized ...
    • Scalar Operand Networks: Design, Implementation, and Analysis 

      Taylor, Michael Bedford; Lee, Walter; Amarasinghe, Saman; Agarwal, Anant (2004-06-08)
      The bypass paths and multiported register files in microprocessors serve as an implicit interconnect tocommunicate operand values among pipeline stages and multiple ALUs. Previous superscalar designs implementedthis ...
    • Scale Control Processor Test-Chip 

      Batten, Christopher; Krashinsky, Ronny; Asanovic, Krste (2007-01-12)
      We are investigating vector-thread architectures which provide competitive performance and efficiency across a broad class of application domains. Vector-thread architectures unify data-level, thread-level, and instruction-level ...
    • Scene Classification with a Biologically Inspired Method 

      Terashima, Yoshito (2009-05-10)
      We present a biologically motivated method for scene image classification. The core of the method is to use shape based image property that is provided by a hierarchical feedforward model of the visual cortex [18]. Edge ...