Advanced Search
DSpace@MIT

Browsing CSAIL Technical Reports (July 1, 2003 - present) by Title

Research and Teaching Output of the MIT Community

Browsing CSAIL Technical Reports (July 1, 2003 - present) by Title

Sort by: Order: Results:

  • Paris, Sylvain; Durand, Fredo (2006-11-09)
    The bilateral filter is a nonlinear filter that smoothes a signal while preserving strong edges. It has demonstrated great effectiveness for a variety of problems in computer vision and computer graphics, and fast versions ...
  • Aryananda, Lijin (2007-04-03)
    This thesis presents an integrated framework and implementation for Mertz, an expressive robotic creature for exploring the task of face recognition through natural interaction in an incremental and unsupervised fashion. ...
  • Kouh, Minjoon; Poggio, Tomaso (2004-12-31)
    Tuning to an optimal stimulus is a widespread property of neurons in cortex. We propose that such tuning is a consequence of normalization or gain control circuits. We also present a biologically plausible neural circuitry ...
  • Li, Ji (2007-07-26)
    In designing and building a network like the Internet, we continue to face the problems of scale and distribution. In particular, network management has become an increasingly difficult task, and network applications often ...
  • Li, Ji (2008-06-11)
    In designing and building a network like the Internet, we continue to face the problems of scale and distribution. With the dramatic expansion in scale and heterogeneity of the Internet, network management has become an ...
  • Milicevic, Aleksandar; Near, Joseph P.; Kang, Eunsuk; Jackson, Daniel (2014-09-02)
    The last decade has seen a dramatic growth in the use of constraint solvers as a computational mechanism, not only for analysis and synthesis of software, but also at runtime. Solvers are available for a variety of logics ...
  • McCamant, Stephen (2006-05-11)
    Executing untrusted code while preserving security requires that thecode be prevented from modifying memory or executing instructionsexcept as explicitly allowed. Software-based fault isolation (SFI) or"sandboxing" enforces ...
  • Abelson, Hal; Beal, Jacob; Sussman, Gerald Jay (2007)
    The goal of amorphous computing is to identify organizationalprinciples and create programming technologies for obtainingintentional, pre-specified behavior from the cooperation of myriadunreliable parts that are arranged ...
  • Newton, Ryan; Beal, Jacob (2002-12-10)
    We propose a method for the robust implementation of simple graphical automataon an amorphous computer. This infrastructure is applied to the implementationof purely functional programming languages. Specifically, it is ...
  • Beal, Jacob (2005-07)
    Programming reliable behavior on a large mesh network composed of unreliable parts is difficult. Amorphous Medium Language addresses this problem by abstracting robustness and networking issues away from the programmer via ...
  • Kuncak, Viktor; Nguyen, Huu Hai; Rinard, Martin (2004-07-19)
    We describe an algorithm for deciding the first-order multisorted theory BAPA, which combines 1) Boolean algebras of sets of uninterpreted elements (BA) and 2) Presburger arithmetic operations (PA). BAPA can express the ...
  • Finlayson, Mark Alan; Winston, Patrick Henry (2006-11-07)
    Analogical reasoning has been implicated in many important cognitive processes, such as learning, categorization, planning, and understanding natural language. Therefore, to obtain a full understanding of these processes, ...
  • Qi, Zichao; Long, Fan; Achour, Sara; Rinard, Martin (2015-05-26)
    We analyze reported patches for three existing generate-and-validate patch generation systems (GenProg, RSRepair, and AE). The basic principle behind generate-and-validate systems is to accept only plausible patches that ...
  • Qi, Zichao; Long, Fan; Achour, Sara; Rinard, Martin (2015-02-10)
    We analyze reported patches for three prior generate-and-validate patch generation systems (GenProg, RSRepair, and AE). Because of experimental error, the majority of the reported patches violate the basic principle behind ...
  • Qi, Zichao; Long, Fan; Achour, Sara; Rinard, Martin (2015-05-29)
    We analyze reported patches for three existing generate-and-validate patch generation systems (GenProg, RSRepair, and AE). The basic principle behind generate-and-validate systems is to accept only plausible patches that ...
  • Dasgupta, Sanjoy; Kalai, Adam Tauman; Monteleoni, Claire (2005-11-17)
    We start by showing that in an active learning setting, the Perceptron algorithm needs $\Omega(\frac{1}{\epsilon^2})$ labels to learn linear separators within generalization error $\epsilon$. We then present a simple ...
  • Borchardt, Gary; Katz, Boris; Nguyen, Hong-Linh; Felshin, Sue; Senne, Ken; Wang, Andy (2014-10-08)
    This report describes the Analyst's Assistant, a software system for language-interactive, collaborative user-system interpretation of events, specifically targeting vehicle events that can be recognized on the basis of ...
  • Salameh, Lynne Rafik (2007-06-05)
    Analog designers are interested in optimization tools which automate the process of circuit sizing. Geometric programming, which uses posynomial models of MOSFET parameters, represents one such tool. Genetic algorithms ...
  • Serre, Thomas; Wolf, Lior; Poggio, Tomaso (2004-11-14)
    In this paper, we introduce a novel set of features for robust object recognition, which exhibits outstanding performances on a variety ofobject categories while being capable of learning from only a fewtraining examples. ...
  • Pohl, Kilian M.; Fisher, John; Grimson, W. Eric L.; Wells, William M. (2005-04-01)
    This paper presents a statistical framework which combines the registration of an atlas with the segmentation of MR images. We use an Expectation Maximization-based algorithm to find a solution within the model, which ...
MIT-Mirage