Advanced Search
DSpace@MIT

Browsing CSAIL Technical Reports (July 1, 2003 - present) by Title

Research and Teaching Output of the MIT Community

Browsing CSAIL Technical Reports (July 1, 2003 - present) by Title

Sort by: Order: Results:

  • Devadas, Srinivas; Lis, Mieszko; Khan, Omer (2010-04-17)
    We introduce the Execution Migration Machine (EM²), a novel data-centric multicore memory system architecture based on computation migration. Unlike traditional distributed memory multicores, which rely on complex cache ...
  • Poggio, Tomaso; Serre, Thomas; Tan, Cheston; Chikkerur, Sharat (2009-06-20)
    Apart from helping shed some light on human perceptual mechanisms, modeling visual attention has important applications in computer vision. It has been shown to be useful in priming object detection, pruning interest points, ...
  • Kaelbling, Leslie Pack; Lozano-Perez, Tomas (2012-07-03)
    In this paper, we describe an integrated strategy for planning, perception, state-estimation and action in complex mobile manipulation domains. The strategy is based on planning in the belief space of probability distribution ...
  • Kaelbling, Leslie Pack; Lozano-Perez, Tomas (2012-06-29)
    This paper provides an approach to integrating geometric motion planning with logical task planning for long-horizon tasks in domains with many objects. We propose a tight integration between the logical and geometric ...
  • Newton, Ryan; Chen, Chih-Ping; Marlow, Simon (2011-03-22)
    Intel Concurrent Collections (CnC) is a parallel programming model in which a network of steps (functions) communicate through message-passing as well as a limited form of shared memory. This paper describes a new ...
  • Abe, Yeuhi; Popovic, Jovan (2006-02-28)
    Lifelike animation of manipulation must account for the dynamicinteraction between animated characters, objects, and their environment. Failing to do so would ignore the often significant effects objectshave on the motion ...
  • Scull, Craig; Johnson, Steve; Aliaga, Frederick; Paris, Sylvain; Su, Sara L.; Durand, Fredo (2009-06-24)
    Presentation and graphics software enables users to experiment with variations of illustrations. They can revisit recent editing operations using the ubiquitous undo command, but they are limited to sequential exploration. ...
  • Kouh, Minjoon; Riesenhuber, Maximilian (2003-09-08)
    The question of how shape is represented is of central interest to understanding visual processing in cortex. While tuning properties of the cells in early part of the ventral visual stream, thought to be responsible for ...
  • Teow, Loo Nin; Katabi, Dina (2006-07-04)
    This paper introduces a new application: predicting the Internet provider-customer market. We cast the problem in the collaborative filtering framework, where we use current and past customer-provider relationships to ...
  • Rosasco, Lorenzo; Verri, Alessandro; Santoro, Matteo; Mosci, Sofia; Villa, Silvia (2009-10-14)
    In this paper we propose a general framework to characterize and solve the optimization problems underlying a large class of sparsity based regularization algorithms. More precisely, we study the minimization of learning ...
  • Tschantz, Matthew S. (2006-09-05)
    This paper describes a programming language, Javari, that is capable of expressing and enforcing immutability constraints. The specific constraint expressed is that the abstract state of the object to which an immutable ...
  • Beckmann, Nathan; Sanchez, Daniel (2013-09-01)
    Shared last-level caches, widely used in chip-multiprocessors (CMPs), face two fundamental limitations. First, the latency and energy of shared caches degrade as the system scales up. Second, when multiple workloads share ...
  • Lynch, Nancy; Ley-Wild, Ruy; Kuhn, Fabian; Cornejo, Alejandro (2009-06-17)
    Designing robust algorithms for mobile agents with reliable communication is difficult due to the distributed nature of computation, in mobile ad hoc networks (MANETs) the matter is exacerbated by the need to ensure ...
  • Alvarez, Mauricio A.; Rosasco, Lorenzo; Lawrence, Neil D. (2011-06-30)
    Kernel methods are among the most popular techniques in machine learning. From a frequentist/discriminative perspective they play a central role in regularization theory as they provide a natural choice for the hypotheses ...
  • Whelan, Thomas; Kaess, Michael; Fallon, Maurice; Johannsson, Hordur; Leonard, John; McDonald, John (2012-07-19)
    In this paper we present an extension to the KinectFusion algorithm that permits dense mesh-based mapping of extended scale environments in real-time. This is achieved through (i) altering the original algorithm such that ...
  • Chen, Jing; Micali, Silvio (2008-06)
    We put forward new benchmarks and solution concepts for Adversarial Mechanism Design, as defined by [MV07.a], and we exemplify them in the case of truly combinatorial auctions.We benchmark the combined performance (the sum ...
  • Chen, Jing; Micali, Silvio (2008-07)
    We put forward new benchmarks and solution concepts for Adversarial Mechanism Design, as defined by [MV07.a], and we exemplify them in the case of truly combinatorial auctions.We benchmark the combined performance (the sum ...
  • Torlak, Emina; van Dijk, Marten; Gassend, Blaise; Jackson, Daniel; Devadas, Srinivas (2005-10-19)
    Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of knowledge amongst principals. Because this ...
  • Li, Hui X. (2010-04-09)
    Most unmanned missions in space and undersea are commanded by a "script" that specifies a sequence of discrete commands and continuous actions. Currently such scripts are mostly hand-generated by human operators. This ...
  • Russell, Bryan C.; Torralba, Antonio; Murphy, Kevin P.; Freeman, William T. (2005-09-08)
    Research in object detection and recognition in cluttered scenes requires large image collections with ground truth labels. The labels should provide information about the object classes present in each image, as well as ...
MIT-Mirage