Browsing CSAIL Technical Reports (July 1, 2003 - present) by Title
Now showing items 612-631 of 775
-
Robust, Goal-directed Plan Execution with Bounded Risk
(2012-02-02)There is an increasing need for robust optimal plan execution for multi-agent systems in uncertain environments, while guaranteeing an acceptable probability of success. For ex- ample, a fleet of unmanned aerial vehicles ... -
Rosebud: A Scalable Byzantine-Fault-Tolerant Storage Architecture
(2003-12-17)This paper presents Rosebud, a new Byzantine faulttolerantstorage architecture designed to be highly scalableand deployable in the wide-area. To support massiveamounts of data, we need to partition the data among thenodes. ... -
Rotation Invariant Object Recognition from One Training Example
(2004-04-27)Local descriptors are increasingly used for the task of object recognition because of their perceived robustness with respect to occlusions and to global geometrical deformations. Such a descriptor--based on a set of ... -
Safe Open-Nested Transactions Through Ownership
(2008-02-20)Researchers in transactional memory (TM) have proposed open nesting asa methodology for increasing the concurrency of a program. The ideais to ignore certain "low-level" memory operations of anopen-nested transaction when ... -
Scalable directoryless shared memory coherence using execution migration
(2010-11-22)We introduce the concept of deadlock-free migration-based coherent shared memory to the NUCA family of architectures. Migration-based architectures move threads among cores to guarantee sequential semantics in large ... -
A Scalable Information Theoretic Approach to Distributed Robot Coordination
(2011-09-25)This paper presents a scalable information theoretic approach to infer the state of an environment by distributively controlling robots equipped with sensors. The robots iteratively estimate the environment state using a ... -
Scalable Information-Sharing Network Management
(2011-06-07)This thesis analyzes scalable information-sharing network management. It looks into one of the large problems in network management today: finding information across different network domains. Information-sharing network ... -
Scalable Internet Routing on Topology-Independent Node Identities
(2003-10-31)Unmanaged Internet Protocol (UIP) is a fully selforganizingnetwork-layer protocol that implements scalableidentity-based routing. In contrast with addressbasedrouting protocols, which depend for scalability oncentralized ... -
Scalar Operand Networks: Design, Implementation, and Analysis
(2004-06-08)The bypass paths and multiported register files in microprocessors serve as an implicit interconnect tocommunicate operand values among pipeline stages and multiple ALUs. Previous superscalar designs implementedthis ... -
Scale Control Processor Test-Chip
(2007-01-12)We are investigating vector-thread architectures which provide competitive performance and efficiency across a broad class of application domains. Vector-thread architectures unify data-level, thread-level, and instruction-level ... -
Scene Classification with a Biologically Inspired Method
(2009-05-10)We present a biologically motivated method for scene image classification. The core of the method is to use shape based image property that is provided by a hierarchical feedforward model of the visual cortex [18]. Edge ... -
Schematic Querying of Large Tracking Databases
(2006-06-12)In dealing with long-term tracking databases withwide-area coverage, an important problem is in formulating anintuitive and fast query system for analysis. In such a querysystem, a user who is not a computer vision research ... -
Scoop: An Adaptive Indexing Scheme for Stored Data in Sensor Networks
(2006-11-27)In this paper, we present the design of Scoop, a system for indexing and querying stored data in sensor networks. Scoop works by collecting statistics about the rate of queries and distribution of sensor readings over a ... -
SE-Sync: A Certifiably Correct Algorithm for Synchronization over the Special Euclidean Group
(2017-02-05)Many important geometric estimation problems naturally take the form of synchronization over the special Euclidean group: estimate the values of a set of unknown poses given noisy measurements of a subset of their pairwise ... -
Secondary Structure Prediction of All-Helical Proteins Using Hidden Markov Support Vector Machines
(2005-10-06)Our goal is to develop a state-of-the-art predictor with an intuitive and biophysically-motivated energy model through the use of Hidden Markov Support Vector Machines (HM-SVMs), a recent innovation in the field of machine ... -
Secure Program Execution Via Dynamic Information Flow Tracking
(2003-07-21)We present a simple architectural mechanism called dynamicinformation flow tracking that can significantly improve thesecurity of computing systems with negligible performanceoverhead. Dynamic information flow tracking ... -
Securing Deployed RFIDs by Randomizing the Modulation and the Channel
(2013-01-12)RFID cards are widely used today in sensitive applications such as access control, payment systems, and asset tracking. Past work shows that an eavesdropper snooping on the communication between a card and its legitimate ... -
SEEC: A Framework for Self-aware Computing
(2010-10-13)As the complexity of computing systems increases, application programmers must be experts in their application domain and have the systems knowledge required to address the problems that arise from parallelism, power, ... -
SEEC: A Framework for Self-aware Management of Multicore Resources
(2011-03-24)This paper presents SEEC, a self-aware programming model, designed to reduce programming effort in modern multicore systems. In the SEEC model, application programmers specify application goals and progress, while systems ... -
SEEC: A General and Extensible Framework for Self-Aware Computing
(2011-11-07)Modern systems require applications to balance competing goals, e.g. achieving high performance and low power. Achieving this balance places an unrealistic burden on application programmers who must understand the power ...