Now showing items 631-650 of 775

    • SEEC: A General and Extensible Framework for Self-Aware Computing 

      Hoffmann, Henry; Maggio, Martina; Santambrogio, Marco D.; Leva, Alberto; Agarwal, Anant (2011-11-07)
      Modern systems require applications to balance competing goals, e.g. achieving high performance and low power. Achieving this balance places an unrealistic burden on application programmers who must understand the power ...
    • Selecting Refining and Evaluating Properties for Program Analysis 

      Dodoo, Nii; Lin, Lee; Ernst, Michael D. (2003-07-21)
      This research proposes and evaluates techniques for selectingpredicates for conditional program properties—thatis, implications such as p ) q whose consequent must betrue whenever the predicate is true. Conditional ...
    • Selecting Relevant Genes with a Spectral Approach 

      Wolf, Lior; Shashua, Amnon; Mukherjee, Sayan (2004-01-27)
      Array technologies have made it possible to record simultaneouslythe expression pattern of thousands of genes. A fundamental problemin the analysis of gene expression data is the identification ofhighly relevant genes that ...
    • Selective Vectorization for Short-Vector Instructions 

      Amarasinghe, Saman; Rabbah, Rodric; Larsen, Samuel (2009-12-18)
      Multimedia extensions are nearly ubiquitous in today's general-purpose processors. These extensions consist primarily of a set of short-vector instructions that apply the same opcode to a vector of operands. Vector ...
    • Selectivity of Local Field Potentials in Macaque Inferior Temporal Cortex 

      Kreiman, Gabriel; Hung, Chou; Poggio, Tomaso; DiCarlo, James (2004-09-21)
      While single neurons in inferior temporal (IT) cortex show differential responses to distinct complex stimuli, little is known about the responses of populations of neurons in IT. We recorded single electrode data, including ...
    • Self-Adaptive Systems for Information Survivability: PMOP and AWDRAT 

      Shrobe, Howard; Laddaga, Robert; Balzer, Robert; Goldman, Neil; Wile, Dave; e.a. (2007-04-10)
      Information systems form the backbones of the critical infrastructures of modern societies. Unfortunately, these systems are highly vulnerable to attacks that can result in enormous damage. Furthermore, traditional approaches ...
    • Self-Stabilizing Message Routing in Mobile ad hoc Networks 

      Lynch, Nancy; Lahiani, Limor; Dolev, Shlomi; Nolte, Tina (2009-01-28)
      We present a self-stabilizing algorithm for routing messages between arbitrary pairs of nodes in a mobile ad hoc network. Our algorithm assumes the availability of a reliable GPS service, which supplies mobile nodes with ...
    • Self-Stabilizing Mobile Node Location Management and Message 

      Dolev, Shlomi; Lahiani, Limor; Lynch, Nancy; Nolte, Tina (2005-08-11)
      We present simple algorithms for achieving self-stabilizing locationmanagement and routing in mobile ad-hoc networks. While mobile clients maybe susceptible to corruption and stopping failures, mobile networks areoften ...
    • Sensitive Manipulation 

      Torres-Jara, Eduardo (2007-03-02)
      This thesis presents an effective alternative to the traditionalapproach to robotic manipulation. In our approach, manipulation ismainly guided by tactile feedback as opposed to vision. Themotivation comes from the fact ...
    • Service Identification in TCP/IP: Well-Known versus Random Port Numbers 

      Masiello, Elizabeth (2006-01-11)
      The sixteen-bit well-known port number is often overlooked as a network identifier in Internet communications. Its purpose at the most fundamental level is only to demultiplex flows of traffic. Several unintended uses of ...
    • Set Interfaces for Generalized Typestate and Data Structure Consistency Verification 

      Lam, Patrick; Zee, Karen; Kuncak, Viktor; Rinard, Martin (2007-10-31)
      Typestate systems allow the type of an object to change during its lifetime in the computation. Unlike standard type systems, they can enforce safety properties that depend on changing object states. We present a new, ...
    • Shape from Sheen 

      Adelson, Edward H.; Torralba, Antonio; Fleming, Roland W. (2009-10-22)
    • Shape Representation in V4: Investigating Position-Specific Tuning for Boundary Conformation with the Standard Model of Object Recognition 

      Cadieu, Charles; Kouh, Minjoon; Riesenhuber, Maximilian; Poggio, Tomaso (2004-11-12)
      The computational processes in the intermediate stages of the ventral pathway responsible for visual object recognition are not well understood. A recent physiological study by A. Pasupathy and C. Connor in intermediate ...
    • Sharing visual features for multiclass and multiview object detection 

      Torralba, Antonio; Murphy, Kevin P.; Freeman, William T. (2004-04-14)
      We consider the problem of detecting a large number of different classes of objects in cluttered scenes. Traditional approaches require applying a battery of different classifiers to the image, at multiple locations and ...
    • SIFT Flow: Dense Correspondence across Scenes and its Applications 

      Freeman, William T.; Torralba, Antonio; Yuen, Jenny; Liu, Ce (2010-05-08)
      While image alignment has been studied in different areas of computer vision for decades, aligning images depicting different scenes remains a challenging problem. Analogous to optical flow where an image is aligned to its ...
    • Simit: A Language for Physical Simulation 

      Kjolstad, Fredrik; Kamil, Shoaib; Ragan-Kelley, Jonathan; Levin, David I.W.; Sueda, Shinjiro; e.a. (2015-05-26)
      Using existing programming tools, writing high-performance simulation code is labor intensive and requires sacrificing readability and portability. The alternative is to prototype simulations in a high-level language like ...
    • Simultaneous Localization and Tracking in Wireless Ad-hoc Sensor Networks 

      Taylor, Christopher J. (2005-05-31)
      In this thesis we present LaSLAT, a sensor network algorithm thatsimultaneously localizes sensors, calibrates sensing hardware, andtracks unconstrained moving targets using only range measurementsbetween the sensors and ...
    • Simultaneous Localization, Calibration, and Tracking in an ad Hoc Sensor Network 

      Taylor, Christopher; Rahimi, Ali; Bachrach, Jonathan; Shrobe, Howard (2005-04-26)
      We introduce Simultaneous Localization and Tracking (SLAT), the problem of tracking a target in a sensor network while simultaneously localizing and calibrating the nodes of the network. Our proposed solution, LaSLAT, ...
    • Slicing the Onion: Anonymous Routing Without PKI 

      Katti, Sachin; Katabi, Dina; Puchala, Katarzyna (2005-08-15)
      Recent years have witnessed many proposals for anonymous routing in overlay peer-to-peer networks. The proposed protocols either expose the receiver and the message content, or require the overlay nodes to have public-private ...
    • Sloth: Being Lazy is a Virtue (When Issuing Database Queries) 

      Cheung, Alvin; Madden, Samuel; Solar-Lezama, Armando (2014-04-14)
      Many web applications store persistent data in databases. During execution, such applications spend a significant amount of time communicating with the database for retrieval and storing of persistent data over the network. ...