Advanced Search
DSpace@MIT

Browsing Computer Science and Artificial Intelligence Lab (CSAIL) by Title

Research and Teaching Output of the MIT Community

Browsing Computer Science and Artificial Intelligence Lab (CSAIL) by Title

Sort by: Order: Results:

  • Minsky, Marvin (1980-11-01)
    Freud's theory of jokes explains how they overcome the mental "censors" that make it hard for us to think "forbidden" thoughts. But his theory did not work so well for humorous nonsense as for other comical subjects. ...
  • Strauss, Nicholas (MIT Artificial Intelligence Laboratory, 1985-07)
    The Jordan Form over field Z[subscript p] of J[superscript p][subscript p]n is diagonal for p > 3 with characteristic polynomial, ϕ(x) = x[superscript 3] - 1, for p prime, n natural number. These matrices have dimension ...
  • Andreae, Peter Merrett (1985-01-01)
    This thesis describes an implemented system called NODDY for acquiring procedures from examples presented by a teacher. Acquiring procedures form examples involves several different generalization tasks. Generalization ...
  • Yip, Kenneth Man-Kam (1989-08-01)
    KAM is a computer program that can automatically plan, monitor, and interpret numerical experiments with Hamiltonian systems with two degrees of freedom. The program has recently helped solve an open problem in ...
  • Waters, Richard C. (1985-05-01)
    The Knowledge-Based Editor in Emacs (KBEmacs) is the current demonstration system implemented as part of the Programmer's Apprentice project. KBEmacs is capable of acting as a semi-expert assistant to a person who is ...
  • Lynch, Nancy; Ley-Wild, Ruy; Kuhn, Fabian; Cornejo, Alejandro (2009-06-17)
    Designing robust algorithms for mobile agents with reliable communication is difficult due to the distributed nature of computation, in mobile ad hoc networks (MANETs) the matter is exacerbated by the need to ensure ...
  • Huang, Andrew "bunnie" (2002-05-26)
    This paper discusses the hardware foundations of the cryptosystem employed by the Xbox(TM) video game console from Microsoft. A secret boot block overlay is buried within a system ASIC. This secret boot block decrypts and ...
  • Alvarez, Mauricio A.; Rosasco, Lorenzo; Lawrence, Neil D. (2011-06-30)
    Kernel methods are among the most popular techniques in machine learning. From a frequentist/discriminative perspective they play a central role in regularization theory as they provide a natural choice for the hypotheses ...
  • Atkeson, Christopher G.; Hollerback, John M. (1984-07-01)
    Unrestrained human arm trajectories between point targets have been investigated using a three dimensional tracking apparatus, the Selspot system. Movements were executed between different points in a vertical plane ...
  • Horn, Berthold K.P.; Inoue, Hirochika (MIT Artificial Intelligence Laboratory, 1974-05)
    This paper describes the basic geometry of the electric manipulator designed for the Artificial Intelligence Laboratory by Victor Scheinman while on leave from Stanford University. The procedure for finding a set of joint ...
  • Horn, Berthold K.P. (MIT Artificial Intelligence Laboratory, 1975-06)
    In order to get some feeling for the kinematics, statics, and dynamics of manipulators, it is useful to separate the problem of visualizing linkages in three-space from the basic mechanics. The general-purpose two-dimensional ...
  • Eisenberg, Michael A. (1991-05-01)
    The Kineticist's Workbench is a program that simulates chemical reaction mechanisms by predicting, generating, and interpreting numerical data. Prior to simulation, it analyzes a given mechanism to predict that ...
  • Whelan, Thomas; Kaess, Michael; Fallon, Maurice; Johannsson, Hordur; Leonard, John; McDonald, John (2012-07-19)
    In this paper we present an extension to the KinectFusion algorithm that permits dense mesh-based mapping of extended scale environments in real-time. This is achieved through (i) altering the original algorithm such that ...
  • Minsky, Marvin (1979-06-01)
    Most theories of memory suggest that when we learn or memorize something, some "representation" of that something is constructed, stored and later retrieved. This raises questions like: How is information represented? ...
  • Dunlavey, Michael R. (MIT Artificial Intelligence Laboratory, 1974-03)
    This concentrates on interactions between knowledge stated in diverse representations. It proposes a vision program that classifies any complicated object as an elaborated instance of a simple on it already understands. ...
  • Kahn, Kenneth M. (MIT Artificial Intelligence Laboratory, 1976-02)
    This paper reproduces part of a doctoral thesis proposal describing the design of a system capable of generating animated drawings in response to a simple story. The representation and interaction of the various sources ...
  • Valdes-Perez, Raul E. (MIT Artificial Intelligence Laboratory, 1987-01)
    Depicting an electrical circuit by a schematic is a tedious task that is a good candidate for automation. Programs that draft schematics with the usual algorithmic approach do not fully exploit knowledge of circuit function, ...
  • Lee, Jintae (1988-01-01)
    This paper examines the issues and the solutions that have been studied in database (DB) integration research and tries to draw lessons from them for knowledge base (KB) integration.
  • Chen, Jing; Micali, Silvio (2008-06)
    We put forward new benchmarks and solution concepts for Adversarial Mechanism Design, as defined by [MV07.a], and we exemplify them in the case of truly combinatorial auctions.We benchmark the combined performance (the sum ...
  • Chen, Jing; Micali, Silvio (2008-07)
    We put forward new benchmarks and solution concepts for Adversarial Mechanism Design, as defined by [MV07.a], and we exemplify them in the case of truly combinatorial auctions.We benchmark the combined performance (the sum ...
MIT-Mirage