Browsing Computer Science and Artificial Intelligence Lab (CSAIL) by Title
Now showing items 1092-1111 of 3804
-
The Emptiness Problem for Automata on Infinite Trees
(1972-06)The purpose of this paper is to give an alternative proof to the decidability of the emptiness problem for tree automata, as shown in Rabin [4]. The proof reduces the emptiness problem for automata on infinite trees to ... -
Encapsulated Key Escrow
(1996-04) -
An Enciphering Module for Multics
(1974-07)Recently IBM Corporation has declassified an algorithm for encryption usable for computer-to-computer or computer-to-terminal communications. Their algorithm was implemented in a hardware device called Lucifer. A software ... -
Encrypted Keyword Search in a Distributed Storage System
(2006-02-23)Encrypted keyword search allows a server to perform a search over a set of encrypted documents on behalf of a client without learning the contents of the documents or the words being searched for. Designing a practical ... -
Encryption Schemes for Computer Confidentiality
(1975-05) -
Encryption-based Protection Protocols for Interactive User-computer Communication
(1976-06)This thesis develops a complete set of protocols, which utilize a block cipher, e.g., the NBS data encryption standard, for protection interactive user-computer communication over physically unsecured channels. The use ... -
Energy Functions for Early Vision and Analog Networks
(1987-11-01)This paper describes attempts to model the modules of early vision in terms of minimizing energy functions, in particular energy functions allowing discontinuities in the solution. It examines the success of using ... -
Energy Scalability of On-Chip Interconnection Networks in Multicore Architectures
(2008-11-11)On-chip interconnection networks (OCNs) such as point-to-point networks and buses form the communication backbone in systems-on-a-chip, multicore processors, and tiled processors. OCNs can consume significant portions of ... -
Energy-Efficient Approximate Computation in Topaz
(2014-08-19)We present Topaz, a new task-based language for computations that execute on approximate computing platforms that may occasionally produce arbitrarily inaccurate results. The Topaz implementation maps approximate tasks ... -
Energy-efficient Control of a Smart Grid with Sustainable Homes based on Distributing Risk
(2012-01-20)The goal of this thesis is to develop a distributed control system for a smart grid with sustainable homes. A central challenge is how to enhance energy efficiency in the presence of uncertainty. A major source of uncertainty ... -
Engineering a Global Resolution Service
(1997-06)As the World Wide Web continues to balloon in size the issue of a robust information infrastructure has become increasingly important. Currently, Web links are based on fragile names that have limited life due to semantic ... -
Enhanced Certificate Revocation
(1996-03)We apply off-line/on-line signatures to provide an alternative solution to the problem of certificate revocation. The new systems dismiss with traditional CRLs (Certificate Revocation Lists) and yield public-key infrastructures ... -
Enhanced Certificate Revocation System
We apply off-linne digital signatures to provide a novel approach to certificate revocation. Our approach dismisses with traditional CRLs and yields pubilc-key infrastructures that are several-hundred times cheaper to run ... -
Enhanced Reality Visualization in a Surgical Environment
(1995-01-01)Enhanced reality visualization is the process of enhancing an image by adding to it information which is not present in the original image. A wide variety of information can be added to an image ranging from hidden ... -
Enhanced Visual Authoring Using Operation History
(2009-06-24)Graphical editors have introduced great flexibility to the designer's workflow, providing powerful digital tools and enabling the creation of complex and compelling designs. This thesis presents methods for improving these ... -
Enhancing Availability and Security Through Failure-Oblivious Computing
(2004-02-06)We present a new technique, failure-oblivious computing,that enables programs to continue to execute through memoryerrors without memory corruption. Our safe compilerfor C inserts checks that dynamically detect invalid ... -
Enhancing the Dexterity of a Robot Hand Using Controlled Slip
(1987-05-01)Humans can effortlessly manipulate objects in their hands, dexterously sliding and twisting them within their grasp. Robots, however, have none of these capabilities, they simply grasp objects rigidly in their end ... -
EpiChord: Parallelizing the Chord Lookup Algorithm with Reactive Routing State Management
(2004-08-13)EpiChord is a DHT lookup algorithm that demonstrates that we canremove the O(log n)-state-per-node restriction on existing DHTtopologies to achieve significantly better lookup performance andresilience using a novel reactive ... -
Epistemic Implementation and The Arbitrary-Belief Auction
(2012-06-22)In settings of incomplete information we put forward an epistemic framework for designing mechanisms that successfully leverage the players' arbitrary higher-order beliefs, even when such beliefs are totally wrong, and ... -
EPS: An Interactive System for Solving Elliptic Boundary-Value Problems with Facilities for Data Manipulation
(1969-06)This appendix for the author's forthcoming thesis, "On-Line Solution of Elliptic Boundary-Value Problems," is a user's guide for EPS. EPS solves two-dimensional boundary-value problems for elliptic systems of second-order ...