Advanced Search
DSpace@MIT

Browsing CSAIL Technical Reports (July 1, 2003 - present) by Title

Research and Teaching Output of the MIT Community

Browsing CSAIL Technical Reports (July 1, 2003 - present) by Title

Sort by: Order: Results:

  • Abraham, Ittai; Chockler, Gregory; Keidar, Idit; Malkhi, Dahlia (2005-04-05)
    We present a simple, efficient, and self-contained construction of a wait-free regular register from Byzantine storage components. Our construction utilizes a novel building block, called 1-regular register, which can be ...
  • Sibanda, Tawanda Carleton (2006-06-28)
    In this thesis, we detail an approach to extracting key information in medical discharge summaries. Starting with a narrative patient report, we first identify and remove information that compromises privacy (de-identifi ...
  • Newton, Ryan; Girod, Lewis; Craig, Michael; Madden, Sam; Morrisett, Greg (2008-01-31)
    Applications that combine live data streams with embedded, parallel,and distributed processing are becoming more commonplace. WaveScriptis a domain-specific language that brings high-level, type-safe,garbage-collected ...
  • Poggio, Tomaso (2011-03-04)
    Excerpts from a talk given by Tomaso Poggio in Tübingen on the opening ofthe Werner Reichardt Centrun für Integrative Neurowissenschaften, December 8, 2008.
  • Lesniewski-Laas, Chris; Kaashoek, M. Frans (2009-09-24)
    Decentralized systems, such as distributed hash tables, are subject to the Sybil attack, in which an adversary creates many false identities to increase its influence. This paper proposes a routing protocol for a distributed ...
  • Ganesh, Vijay; Minnes, Mia; Solar-Lezama, Armando; Rinard, Martin (2011-02-01)
    We prove several decidability and undecidability results for the satisfiability/validity problem of formulas over a language of finite-length strings and integers (interpreted as lengths of strings). The atomic formulas ...
  • Beal, Jacob (2006-05-27)
    Distributed computing and live-action roleplaying share many of thesame fundamental problems, as live-action roleplaying games commonly include simulations carried out by their players.Games run by the MIT Assassin's Guild ...
  • Bernstein, Michael; Van Kleek, Max; Khushraj, Deepali; Nayak, Rajeev; Liu, Curtis; schraefel, mc; Karger, David R. (2008-02-10)
    This paper is a case study of an artifact design and evaluation process; it is a reflection on how right thinking about design methods may at times result in sub-optimal results. Our goal has been to assess our decision ...
  • Koch, Olivier; Teller, Seth (2006-01-09)
    We describe an algorithm that takes as inputs a coarse3D model of an environment, and a video sequence acquiredwithin the environment, and produces as output an estimateof the cameraÂ’s 6-DOF egomotion expressed in the ...
  • Brodsky, Micah; Krohn, Maxwell; Morris, Robert; Walfish, Michael; Yip, Alexander (2007-08-24)
    Today's Web is built upon a particular symbiotic relationship betweensites and users: the sites invest capital to create and market a setof features, and users gain access to the sites often in exchange fortheir data (e.g., ...
  • Katabi, Dina; Gollakota, Shyamnath (2008-10-01)
    This paper presents ZigZag, an 802.11 receiver design that combats hidden terminals. ZigZag's core contribution is a new form of interference cancellation that exploits asynchrony across successive collisions. Specifically, ...
  • Katabi, Dina; Gollakota, Shyamnath (2008-04-08)
    This paper presents ZigZag, an 802.11 receiver that combats hidden terminals. ZigZag exploits 802.11 retransmissions which, in the case of hidden terminals, cause successive collisions. Due to asynchrony, these collisions ...
MIT-Mirage