Now showing items 239-258 of 775

    • Elastic-Net Regularization in Learning Theory 

      De Mol, Christine; Rosasco, Lorenzo; De Vito, Ernesto (2008-07-24)
      Within the framework of statistical learning theory we analyze in detail the so-called elastic-net regularization scheme proposed by Zou and Hastie ["Regularization and variable selection via the elastic net" J. R. Stat. ...
    • Electronic Cash with Blind Deposits: How to Have No Spare Change 

      Liskov, Moses (2003-10-14)
      Electronic cash schemes in which the bank authenticates many coins at once suffer from the problem that coins that are authenticated together can be linked to one another. Unfortunately, unless a user spends coins in a ...
    • EM2: A Scalable Shared-Memory Multicore Architecture 

      Khan, Omer; Lis, Mieszko; Devadas, Srini (2010-06-12)
      We introduce the Execution Migration Machine (EM2), a novel, scalable shared-memory architecture for large-scale multicores constrained by off-chip memory bandwidth. EM2 reduces cache miss rates, and consequently off-chip ...
    • Embracing Wireless Interference: Analog Network Coding 

      Katti, Sachin; Gollakota, Shyamnath; Katabi, Dina (2007-02-23)
      Traditionally, interference is considered harmful.Wireless networks strive to avoid scheduling multiple transmissions at the same time in order to prevent interference. This paper adopts the opposite approach; it encourages ...
    • Empirical Effective Dimension and Optimal Rates for Regularized Least Squares Algorithm 

      Caponnetto, Andrea; Rosasco, Lorenzo; Vito, Ernesto De; Verri, Alessandro (2005-05-27)
      This paper presents an approach to model selection for regularized least-squares on reproducing kernel Hilbert spaces in the semi-supervised setting. The role of effective dimension was recently shown to be crucial in the ...
    • Encrypted Keyword Search in a Distributed Storage System 

      Artzi, Shay; Kiezun, Adam; Newport, Calvin; Schultz, David (2006-02-23)
      Encrypted keyword search allows a server to perform a search over a set of encrypted documents on behalf of a client without learning the contents of the documents or the words being searched for. Designing a practical ...
    • Energy Scalability of On-Chip Interconnection Networks in Multicore Architectures 

      Agarwal, Anant; Psota, James; Eastep, Jonathan; Konstantakopoulos, Theodoros (2008-11-11)
      On-chip interconnection networks (OCNs) such as point-to-point networks and buses form the communication backbone in systems-on-a-chip, multicore processors, and tiled processors. OCNs can consume significant portions of ...
    • Energy-Efficient Approximate Computation in Topaz 

      Achour, Sara; Rinard, Martin (2014-08-19)
      We present Topaz, a new task-based language for computations that execute on approximate computing platforms that may occasionally produce arbitrarily inaccurate results. The Topaz implementation maps approximate tasks ...
    • Energy-efficient Control of a Smart Grid with Sustainable Homes based on Distributing Risk 

      Ono, Masahiro (2012-01-20)
      The goal of this thesis is to develop a distributed control system for a smart grid with sustainable homes. A central challenge is how to enhance energy efficiency in the presence of uncertainty. A major source of uncertainty ...
    • Enhanced Visual Authoring Using Operation History 

      Su, Sara L. (2009-06-24)
      Graphical editors have introduced great flexibility to the designer's workflow, providing powerful digital tools and enabling the creation of complex and compelling designs. This thesis presents methods for improving these ...
    • Enhancing Availability and Security Through Failure-Oblivious Computing 

      Rinard, Martin; Cadar, Cristian; Dumitran, Daniel; Roy, Daniel M.; Jr., William S. Beebee (2004-02-06)
      We present a new technique, failure-oblivious computing,that enables programs to continue to execute through memoryerrors without memory corruption. Our safe compilerfor C inserts checks that dynamically detect invalid ...
    • EpiChord: Parallelizing the Chord Lookup Algorithm with Reactive Routing State Management 

      Leong, Ben; Liskov, Barbara; Demaine, Erik D. (2004-08-13)
      EpiChord is a DHT lookup algorithm that demonstrates that we canremove the O(log n)-state-per-node restriction on existing DHTtopologies to achieve significantly better lookup performance andresilience using a novel reactive ...
    • Epistemic Implementation and The Arbitrary-Belief Auction 

      Chen, Jing; Micali, Silvio; Pass, Rafael (2012-06-22)
      In settings of incomplete information we put forward an epistemic framework for designing mechanisms that successfully leverage the players' arbitrary higher-order beliefs, even when such beliefs are totally wrong, and ...
    • Error weighted classifier combination for multi-modal human identification 

      Ivanov, Yuri; Serre, Thomas; Bouvrie, Jacob (2005-12-14)
      In this paper we describe a technique of classifier combination used in a human identification system. The system integrates all available features from multi-modal sources within a Bayesian framework. The framework allows ...
    • Etna: a Fault-tolerant Algorithm for Atomic Mutable DHT Data 

      Muthitacharoen, Athicha; Gilbert, Seth; Morris, Robert (2005-06-15)
      This paper presents Etna, an algorithm for atomic reads and writes of replicated data stored in a distributed hash table. Etna correctly handles dynamically changing sets of replica hosts, and is optimized for reads, writes, ...
    • Evaluating Caching Mechanisms In Future Internet Architectures 

      Jing, Yuxin (2016-06-28)
      This thesis seeks to test and evaluate the effects of in-­network storage in novel proposed Internet architectures in terms of their performance. In a world where more and more people are mobile and connected to the Internet, ...
    • Evaluation of sets of oriented and non-oriented receptive fields as local descriptors 

      Yokono, Jerry Jun; Poggio, Tomaso (2004-03-24)
      Local descriptors are increasingly used for the task of object recognition because of their perceived robustness with respect to occlusions and to global geometrical deformations. We propose a performance criterion for a ...
    • Event Order Abstraction for Parametric Real-Time System Verification 

      Umeno, Shinya (2008-07-28)
      We present a new abstraction technique, event order abstraction (EOA), for parametric safety verification of real-time systems in which ``correct orderings of events'' needed for system correctness are maintained by timing ...
    • Evolving Robocode Tank Fighters 

      Eisenstein, Jacob (2003-10-28)
      In this paper, I describe the application of genetic programming to evolve a controller for a robotic tank in a simulated environment.The purpose is to explore how genetic techniques can best be applied to produce controllers ...
    • Exact Algorithms for the Canadian Traveller Problem on Paths and Trees 

      Karger, David; Nikolova, Evdokia (2008-01-28)
      The Canadian Traveller problem is a stochastic shortest paths problem in which one learns the cost of an edge only when arriving at one of its endpoints. The goal is to find an adaptive policy (adjusting as one learns more ...