Now showing items 768-787 of 3804

    • Core Count vs Cache Size for Manycore Architectures in the Cloud 

      Agarwal, Anant; Miller, Jason; Beckmann, Nathan; Wentzlaff, David (2010-02-11)
      The number of cores which fit on a single chip is growing at an exponential rate while off-chip main memory bandwidth is growing at a linear rate at best. This core count to off-chip bandwidth disparity causes per-core ...
    • Corpus-Based Techniques for Word Sense Disambiguation 

      Levow, Gina-Anne (1998-05-27)
      The need for robust and easily extensible systems for word sense disambiguation coupled with successes in training systems for a variety of tasks using large on-line corpora has led to extensive research into corpus-based ...
    • Correction of Force Errors for Flexible Manipulators in Quasi-Static Conditions 

      Bicchi, Antonio; Melchiorri, Claudio (MIT Artificial Intelligence Laboratory, 1990-12)
      This paper deals with the problem of controlling the interactions of flexible manipulators with their environment. For executing a force control task, a manipulator with intrinsic (mechanical) compliance has some advantages ...
    • Correctness Conditions for Highly Available Replicated Databases 

      Lynch, Nancy A.; Blaustein, Barbara; Siegel, Michael (1986-06)
      Correctness conditions are given which describe some of the properties exhibited by highly available distributed database systems such as the SHARD (System for Highly Available Replicated Data) system currently being ...
    • Correctness of Communications Protocols, A case Study 

      Søgaard-Andersen, Jørgen; Lynch, Nancy A.; Lampson, Butler W. (1993-11)
      During the past few years, the technology for formal specification and verification of communication protocols has matured to the point where we believe that it now provides practical assistance for protocol design and validation.
    • Correctness of Vehicle Control Systems: A Case Study 

      Weinberg, Henri B. (1996-02)
    • Correctness Proof for a Network Synchronizer 

      Devarajan, Harish; Fekete, Alan; Lynch, Nancy A.; Shrira, Liuba (1993-12)
      In this paper we offer a formal, rigorous proof of the correctness of Awerbuch's algorithm for network synchronization [1]. We specify both the algorithm and the correctness condition using the I/O automaton model.
    • A Correctness Proof for a Practical Byzantine-Fault-Tolerant Replication Algorithm 

      Castro, Miguel (1999-06)
      We have developed a practical algorithm for state-machine replication [7,11] that tolerates Byzantine faults. The algorithm is described in [4]. It offers a strong safety property - it implements a linearizable [5] object ...
    • Correspondence and Affine Shape from Two Orthographic Views: Motion and Recognition 

      Shashua, Amnon (1991-12-01)
      The paper presents a simple model for recovering affine shape and correspondence from two orthographic views of a 3D object. It is shown that four corresponding points along two orthographic views, taken under similar ...
    • Cost Analysis of Debugging Systems 

      Lester, Bruce P. (1971-09)
      A general method is presented for performing cost analysis of interactive debugging systems. The method is based on an abstract model of program execution. This model is derived from the interpreter used in the Vienna ...
    • The Cost of Global Broadcast Using Abstract MAC Layers 

      Lynch, Nancy; Kuhn, Fabian; Kowalski, Dariusz; Khabbazian, Majid (2010-02-09)
      We analyze greedy algorithms for broadcasting messages throughout a multi-hop wireless network, using a slot-based model that includes message collisions without collision detection. Our algorithms are split formally into ...
    • Cost-sensitive Analysis of Communication Protocols 

      Awerbuch, Baruch; Baratz, Alan; Peleg, David (1991-06)
      This paper introduces the notion of cost-sensitive communication complexity and exemplifies it on the following basic communication problems: computing a global function, network synchornization, clock synchronization, ...
    • A Counterexample to the Theory that Vision Recovers Three-Dimensional Scenes 

      Marill, Thomas (MIT Artificial Intelligence Laboratory, 1988-11)
      The problem of three-dimensional vision is generally formulated as the problem of recovering the three-dimensional scene that caused the image. Here we present a certain line-drawing and show that it has the following ...
    • Counterfactual Explanations and Predictive Models to Enhance Clinical Decision-Making in Schizophrenia using Digital Phenotyping 

      Canas, Juan Sebastian; Gomez, Francisco; Costilla Reyes, Omar (2023-06-15)
      Clinical practice in psychiatry is burdened with the increased demand for healthcare services and the scarce resources available. New paradigms of health data powered with machine learning techniques could open the possibility ...
    • Counting Networks 

      Aspnes, James; Herlihy, Maurice; Shavit, Nir (1991-06)
      Many fundamental multi-processor coordination problems can be expressed as counting problems: processes must cooperate to assign successive values from a given range, such as addresses in memory of destinations on an ...
    • The Coupled Depth/Slope Approach to Surface Reconstruction 

      Harris, John G. (1986-06-01)
      Reconstructing a surface from sparse sensory data is a well known problem in computer vision. Early vision modules typically supply sparse depth, orientation and discontinuity information. The surface reconstruction ...
    • A Coupled Multi-ALU Processing Node for a Highly Parallel Computer 

      Keckler, Stephen W. (1992-09-01)
      This report describes Processor Coupling, a mechanism for controlling multiple ALUs on a single integrated circuit to exploit both instruction-level and inter-thread parallelism. A compiler statically schedules individual ...
    • Covering Graphs by Simple Circuits 

      Atai, Alon; Lipton, Richard J.; Papadimitriou, Christos H.; Rodeh, M. (1980-02)
    • CPHash: A Cache-Partitioned Hash Table 

      Metreveli, Zviad; Zeldovich, Nickolai; Kaashoek, M. Frans (2011-11-26)
      CPHash is a concurrent hash table for multicore processors. CPHash partitions its table across the caches of cores and uses message passing to transfer lookups/inserts to a partition. CPHash's message passing avoids the ...
    • Creating a Computer-based Learning Environment for Physically Handicapped Children 

      Valente, Jose Armando (1983-09)
      The objective of this research is to develop a computer-based learning environment for children physically handicapped by cerebral palsy and to study several issues related to the use of this environment for diagnostic, ...