Now showing items 642-661 of 775

    • Shape from Sheen 

      Adelson, Edward H.; Torralba, Antonio; Fleming, Roland W. (2009-10-22)
    • Shape Representation in V4: Investigating Position-Specific Tuning for Boundary Conformation with the Standard Model of Object Recognition 

      Cadieu, Charles; Kouh, Minjoon; Riesenhuber, Maximilian; Poggio, Tomaso (2004-11-12)
      The computational processes in the intermediate stages of the ventral pathway responsible for visual object recognition are not well understood. A recent physiological study by A. Pasupathy and C. Connor in intermediate ...
    • Sharing visual features for multiclass and multiview object detection 

      Torralba, Antonio; Murphy, Kevin P.; Freeman, William T. (2004-04-14)
      We consider the problem of detecting a large number of different classes of objects in cluttered scenes. Traditional approaches require applying a battery of different classifiers to the image, at multiple locations and ...
    • SIFT Flow: Dense Correspondence across Scenes and its Applications 

      Freeman, William T.; Torralba, Antonio; Yuen, Jenny; Liu, Ce (2010-05-08)
      While image alignment has been studied in different areas of computer vision for decades, aligning images depicting different scenes remains a challenging problem. Analogous to optical flow where an image is aligned to its ...
    • Simit: A Language for Physical Simulation 

      Kjolstad, Fredrik; Kamil, Shoaib; Ragan-Kelley, Jonathan; Levin, David I.W.; Sueda, Shinjiro; e.a. (2015-05-26)
      Using existing programming tools, writing high-performance simulation code is labor intensive and requires sacrificing readability and portability. The alternative is to prototype simulations in a high-level language like ...
    • Simultaneous Localization and Tracking in Wireless Ad-hoc Sensor Networks 

      Taylor, Christopher J. (2005-05-31)
      In this thesis we present LaSLAT, a sensor network algorithm thatsimultaneously localizes sensors, calibrates sensing hardware, andtracks unconstrained moving targets using only range measurementsbetween the sensors and ...
    • Simultaneous Localization, Calibration, and Tracking in an ad Hoc Sensor Network 

      Taylor, Christopher; Rahimi, Ali; Bachrach, Jonathan; Shrobe, Howard (2005-04-26)
      We introduce Simultaneous Localization and Tracking (SLAT), the problem of tracking a target in a sensor network while simultaneously localizing and calibrating the nodes of the network. Our proposed solution, LaSLAT, ...
    • Slicing the Onion: Anonymous Routing Without PKI 

      Katti, Sachin; Katabi, Dina; Puchala, Katarzyna (2005-08-15)
      Recent years have witnessed many proposals for anonymous routing in overlay peer-to-peer networks. The proposed protocols either expose the receiver and the message content, or require the overlay nodes to have public-private ...
    • Sloth: Being Lazy is a Virtue (When Issuing Database Queries) 

      Cheung, Alvin; Madden, Samuel; Solar-Lezama, Armando (2014-04-14)
      Many web applications store persistent data in databases. During execution, such applications spend a significant amount of time communicating with the database for retrieval and storing of persistent data over the network. ...
    • Smartlocks: Self-Aware Synchronization through Lock Acquisition Scheduling 

      Agarwal, Anant; Santambrogio, Marco D.; Wingate, David; Eastep, Jonathan (2009-11-09)
      As multicore processors become increasingly prevalent, system complexity is skyrocketing. The advent of the asymmetric multicore compounds this -- it is no longer practical for an average programmer to balance the system ...
    • A Social-Welfare Optimal Probabilistic Mechanism for Knightian Single-Good Auctions 

      Chiesa, Alessandro; Micali, Silvio; Zhu, Zeyuan Allen (2012-09-07)
      We provide an optimal probabilistic mechanism for maximizing social welfare in single-good auctions when each player does not know his true valuation for the good, but only a set of valuations that is guaranteed to include ...
    • SoftCast: Clean-slate Scalable Wireless Video 

      Jakubczak, Szymon; Katabi, Dina (2011-02-15)
      Video broadcast and mobile video challenge the conventional wireless design. In broadcast and mobile scenarios the bit rate supported by the channel differs across receivers and varies quickly over time. The conventional ...
    • SoftCast: One Video to Serve All Wireless Receivers 

      Katabi, Dina; Rahul, Hariharan; Jakubczak, Szymon (2009-02-07)
      The main challenge in wireless video multicast is to scalably serve multiple receivers who have different channel characteristics. Current wireless transmission schemes, however, cannot support smooth degradation. Specifically, ...
    • The SoftPHY Abstraction: from Packets to Symbols in Wireless Network Design 

      Jamieson, Kyle (2008-06-03)
      At ever-increasing rates, we are using wireless systems to communicatewith others and retrieve content of interest to us. Current wirelesstechnologies such as WiFi or Zigbee use forward error correction todrive bit error ...
    • A Software Approach to Unifying Multicore Caches 

      Boyd-Wickizer, Silas; Kaashoek, M. Frans; Morris, Robert; Zeldovich, Nickolai (2011-06-28)
      Multicore chips will have large amounts of fast on-chip cache memory, along with relatively slow DRAM interfaces. The on-chip cache memory, however, will be fragmented and spread over the chip; this distributed arrangement ...
    • Some Properties of Empirical Risk Minimization over Donsker Classes 

      Caponnetto, Andrea; Rakhlin, Alexander (2005-05-17)
      We study properties of algorithms which minimize (or almost minimize) empirical error over a Donsker class of functions. We show that the L2-diameter of the set of almost-minimizers is converging to zero in probability. ...
    • Sound and Complete Runtime Security Monitor for Application Software 

      Khan, M. Taimoor; Serpanos, Dimitrios; Shrobe, Howard (2016-12-15)
      We present a run-time security monitor that detects both known and unknown cyber attacks by checking that the run-time behavior of the application is consistent with the expected behavior modeled by an application ...
    • Sound Input Filter Generation for Integer Overflow Errors 

      Long, Fan; Sidiroglou-Douskos, Stelios; Kim, Deokhwan; Rinard, Martin (2013-08-06)
      We present a system, SIFT, for generating input filters that nullify integer overflow errors associated with critical program sites such as memory allocation or block copy sites. SIFT uses a static program analysis to ...
    • Sparse recovery using sparse matrices 

      Berinde, Radu; Indyk, Piotr (2008-01-10)
      We consider the approximate sparse recovery problem, where the goal is to (approximately) recover a high-dimensional vector x from its lower-dimensional sketch Ax. A popular way of performing this recovery is by finding ...
    • Spatial and Temporal Abstractions in POMDPs Applied to Robot Navigation 

      Theocharous, Georgios; Mahadevan, Sridhar; Kaelbling, Leslie Pack (2005-09-27)
      Partially observable Markov decision processes (POMDPs) are a well studied paradigm for programming autonomous robots, where the robot sequentially chooses actions to achieve long term goals efficiently. Unfortunately, ...