Advanced Search
DSpace@MIT

Browsing Computer Science and Artificial Intelligence Lab (CSAIL) by Title

Research and Teaching Output of the MIT Community

Browsing Computer Science and Artificial Intelligence Lab (CSAIL) by Title

Sort by: Order: Results:

  • Teow, Loo Nin; Katabi, Dina (2006-07-04)
    This paper introduces a new application: predicting the Internet provider-customer market. We cast the problem in the collaborative filtering framework, where we use current and past customer-provider relationships to ...
  • Rosasco, Lorenzo; Verri, Alessandro; Santoro, Matteo; Mosci, Sofia; Villa, Silvia (2009-10-14)
    In this paper we propose a general framework to characterize and solve the optimization problems underlying a large class of sparsity based regularization algorithms. More precisely, we study the minimization of learning ...
  • Eastlake, D.; Greenblatt, R.; Holloway, J.; Knight, T.; Nelson, S. (1968-06-01)
    This reference manual consists of two parts. The first (sections 1 through 6) is intended for those who are either interested in the ITS 1.5 time sharing monitor for its own sake or who wish to write machine language ...
  • Eastlake, D.; Greenblatt, R.; Holloway, J.; Knight, T.; Nelson, S. (1969-07-01)
    This reference manual consists of two parts. The first (sections 1 through 6) is intended for those who are either interested in the ITS 1.5 time sharing monitor for its own sake or who wish to write machine language ...
  • Eastlake, Donald E. (1972-04-01)
    ITS is a time-shared operating system designed for the Artificial Intelligence Laboratory DEC PDP-10/PDP-6 installation and tailored to its special requirements. This status report described the design philosophy behind ...
  • Tschantz, Matthew S. (2006-09-05)
    This paper describes a programming language, Javari, that is capable of expressing and enforcing immutability constraints. The specific constraint expressed is that the abstract state of the object to which an immutable ...
  • Beckmann, Nathan; Sanchez, Daniel (2013-09-01)
    Shared last-level caches, widely used in chip-multiprocessors (CMPs), face two fundamental limitations. First, the latency and energy of shared caches degrade as the system scales up. Second, when multiple workloads share ...
  • Griffith, Arnold K. (MIT Artificial Intelligence Laboratory, 1971-04-02)
    The J%JOIN program creates links between the elements of a set of line segments on the basis of their geometric proximity. According to the value of the third argument, (T or NIL), the program will either place a set of ...
  • Finlayson, Mark Alan; Kulkarni, Nidhi (2011)
    jMWE is a Java library for constructing and testing Multi-Word Expression detectors. The library has three main facilities: (1) a detector API, (2) a MWE index facility, and (3) a test harness. This is version 1.0.0 of the ...
  • Minsky, Marvin (1980-11-01)
    Freud's theory of jokes explains how they overcome the mental "censors" that make it hard for us to think "forbidden" thoughts. But his theory did not work so well for humorous nonsense as for other comical subjects. ...
  • Strauss, Nicholas (MIT Artificial Intelligence Laboratory, 1985-07)
    The Jordan Form over field Z[subscript p] of J[superscript p][subscript p]n is diagonal for p > 3 with characteristic polynomial, ϕ(x) = x[superscript 3] - 1, for p prime, n natural number. These matrices have dimension ...
  • Andreae, Peter Merrett (1985-01-01)
    This thesis describes an implemented system called NODDY for acquiring procedures from examples presented by a teacher. Acquiring procedures form examples involves several different generalization tasks. Generalization ...
  • Yip, Kenneth Man-Kam (1989-08-01)
    KAM is a computer program that can automatically plan, monitor, and interpret numerical experiments with Hamiltonian systems with two degrees of freedom. The program has recently helped solve an open problem in ...
  • Waters, Richard C. (1985-05-01)
    The Knowledge-Based Editor in Emacs (KBEmacs) is the current demonstration system implemented as part of the Programmer's Apprentice project. KBEmacs is capable of acting as a semi-expert assistant to a person who is ...
  • Lynch, Nancy; Ley-Wild, Ruy; Kuhn, Fabian; Cornejo, Alejandro (2009-06-17)
    Designing robust algorithms for mobile agents with reliable communication is difficult due to the distributed nature of computation, in mobile ad hoc networks (MANETs) the matter is exacerbated by the need to ensure ...
  • Huang, Andrew "bunnie" (2002-05-26)
    This paper discusses the hardware foundations of the cryptosystem employed by the Xbox(TM) video game console from Microsoft. A secret boot block overlay is buried within a system ASIC. This secret boot block decrypts and ...
  • Alvarez, Mauricio A.; Rosasco, Lorenzo; Lawrence, Neil D. (2011-06-30)
    Kernel methods are among the most popular techniques in machine learning. From a frequentist/discriminative perspective they play a central role in regularization theory as they provide a natural choice for the hypotheses ...
  • Atkeson, Christopher G.; Hollerback, John M. (1984-07-01)
    Unrestrained human arm trajectories between point targets have been investigated using a three dimensional tracking apparatus, the Selspot system. Movements were executed between different points in a vertical plane ...
  • Horn, Berthold K.P.; Inoue, Hirochika (MIT Artificial Intelligence Laboratory, 1974-05)
    This paper describes the basic geometry of the electric manipulator designed for the Artificial Intelligence Laboratory by Victor Scheinman while on leave from Stanford University. The procedure for finding a set of joint ...
  • Horn, Berthold K.P. (MIT Artificial Intelligence Laboratory, 1975-06)
    In order to get some feeling for the kinematics, statics, and dynamics of manipulators, it is useful to separate the problem of visualizing linkages in three-space from the basic mechanics. The general-purpose two-dimensional ...
MIT-Mirage