Advanced Search
DSpace@MIT

Browsing CSAIL Technical Reports (July 1, 2003 - present) by Issue Date

Research and Teaching Output of the MIT Community

Browsing CSAIL Technical Reports (July 1, 2003 - present) by Issue Date

Sort by: Order: Results:

  • Gil, Stephanie; Kumar, Swarun; Mazumder, Mark; Katabi, Dina; Rus, Daniela (July 2015)
    Multi-robot networks use wireless communication to provide wide-ranging services such as aerial surveillance and unmanned delivery. However, effective coordination between multiple robots requires trust, making them ...
  • Unhelkar, Vaibhav V.; Shah, Julie A. (2018-05-17)
    Learning models of decision-making behavior during sequential tasks is useful across a variety of applications, including human-machine interaction. In this paper, we present an approach to learning such models within ...
  • Kawaguchi, Kenji; Kaelbling, Leslie Pack; Bengio, Yoshua (2018-05-01)
    With a direct analysis of neural networks, this paper presents a mathematically tight generalization theory to partially address an open problem regarding the generalization of deep learning. Unlike previous bound-based ...
  • Katz, Boris; Borchardt, Gary; Felshin, Sue; Mora, Federico (2018-03-01)
    Creating a robust, automated capability to respond to natural language requests has been a longstanding goal in the development of intelligent systems. This article describes the StartMobile system, originally developed ...
  • Bhargava, Nikhil; Muise, Christian; Vaquero, Tiago; Williams, Brian (2018-01-29)
    Simple Temporal Networks with Uncertainty provide a useful framework for modeling temporal constraints and, importantly, for modeling actions with uncertain durations. To determine whether we can construct a schedule for ...
  • Alawaji, Ahmed; Sollins, Karen (2018-01-24)
    A review of national health records (NEHR) systems shows that privacy and security risks have a profound impact on the success of such projects. Countries have different approaches when dealing with privacy and security ...
  • Cambronero, Jose; Rinard, Martin (2017-12-21)
    We present CrowdLearn, a new system that processes an existing corpus of crowdsourced machine learning programs to learn how to generate effective pipelines for solving supervised machine learning problems. CrowdLearn uses ...
  • Atkinson, Eric; Carbin, Michael (2017-11-09)
    Researchers have recently proposed several systems that ease the process of developing Bayesian probabilistic inference algorithms. These include systems for automatic inference algorithm synthesis as well as stronger ...
  • Benjamin, Michael R. (2017-09-01)
    Interval programming (IvP) is model for representing multi-objective optimization problems along with a set of solution algorithms. This paper describes a set of IvP solution experiments run over randomly generated problem ...
  • Shen, Jiasi; Rinard, Martin (2017-08-29)
    We present a new technique that infers models of programs that manipulate relational databases. This technique generates test databases and input commands, runs the program, then observes the resulting outputs and updated ...
  • Ahrens, Peter; Schiefer, Nicholas; Xu, Helen (2017-06-09)
    Tensors, linear-algebraic extensions of matrices in arbitrary dimensions, have numerous applications in computer science and computational science. Many tensors are sparse, containing more than 90% zero entries. Efficient ...
  • Micali, Silvio; Vlachos, Georgios (2017-06-05)
    The revenue of traditional auction mechanisms is benchmarked solely against the players' own valuations, despite the fact that they may also have valuable beliefs about each other's valuations. Not much is known about ...
  • Benjamin, Michael R. (2017-05-16)
    This paper concerns an implementation of an autonomy system for unmanned surface vessels operating in accordance with the Coast Guard Collision Regulations (COLREGS). The autonomy system is implemented by associating a ...
  • Rinard, Martin; Shen, Jiasi (2017-04-24)
    As modern computation platforms become increasingly complex, their programming interfaces are increasingly difficult to use. This complexity is especially inappropriate given the relatively simple core functionality that ...
  • Lombardi, Alex; Vaikuntanathan, Vinod (2017-04-06)
    Lin and Tessaro (Eprint 2017/250) recently proposed indistinguishability obfuscation and functional encryption candidates and proved their security based on a standard assumption on bilinear maps and a non-standard assumption ...
  • Micali, Silvio; Vaikuntanathan, Vinod (2017-03-31)
    We construct a Byzantine Agreement protocol that tolerates t < n/2 corruptions, is very efficient in terms of the number of rounds and the number of bits of communication, and satisfies a strong notion of robustness called ...
  • Kjolstad, Fredrik; Kamil, Shoaib; Chou, Stephen; Lugato, David; Amarasinghe, Saman (2017-02-17)
    Tensor and linear algebra is pervasive in data analytics and the physical sciences. Often the tensors, matrices or even vectors are sparse. Computing expressions involving a mix of sparse and dense tensors, matrices and ...
  • Rosen, David M.; Carlone, Luca; Bandeira, Afonso S.; Leonard, John J. (2017-02-05)
    Many important geometric estimation problems naturally take the form of synchronization over the special Euclidean group: estimate the values of a set of unknown poses given noisy measurements of a subset of their pairwise ...
  • Anders, Ariel; Kaelbling, Leslie; Lozano-Perez, Tomas (2017-01-30)
    A crucial challenge in robotics is achieving reliable results in spite of sensing and control uncertainty. A prominent strategy for dealing with uncertainty is to construct a feedback policy, where actions are chosen as a ...
  • Khan, M. Taimoor; Serpanos, Dimitrios; Shrobe, Howard (2016-12-15)
    We present a run-time security monitor that detects both known and unknown cyber attacks by checking that the run-time behavior of the application is consistent with the expected behavior modeled by an application ...
MIT-Mirage