Now showing items 2007-2026 of 3804

    • Meta-evaluation of Actors with Side-effects 

      Yonezawa, Akinori (MIT Artificial Intelligence Laboratory, 1975-06)
      Meta-evaluation is a process which symbolically evaluates an actor and checks to see whether the actor fulfills its contract (specification). A formalism for writing contracts for actors with side-effects is presented. ...
    • Meta-Rules: Reasoning About Control 

      Davis; Randall (1980-03-01)
      How can we insure that knowledge embedded in a program is applied effectively? Traditionally the answer to this question has been sought in different problem solving paradigms and in different approaches to encoding ...
    • Metal Poker 

      Shamir, Adi; Rivest, Ronald L.; Adleman, Leonard M. (1979-02)
      Can two potentially dishonest players play a fair game of poker without using any cards (e.g. over the phone)? This paper provides the following answers: 1. No. (Rigorous mathematical proof supplied. 2. Yes. (Correct & ...
    • METEOR: A LISP Interpreter for String Transformations 

      Bobrow, Daniel G. (1963-04-01)
      Conditional expressions, composition and recursion are the basic operations used in LISP to define functions on list structures. Any computable function of arbitrarily complex list structures may be described using these ...
    • A Method for Computing Spectral Reflectance 

      Yuille, A. (1984-12-01)
      Psychophysical experiments show that the perceived colour of an object is relatively independent of the spectrum of the incident illumination and depends only on the surface reflectance. We demonstrate a possible ...
    • A Method for Eliminating Skew Introduced by Non-Uniform Buffer Delay and Wire Lengths in Clock Distribution Trees 

      Wu, Henry M. (1993-04-01)
      The computation of a piecewise smooth function that approximates a finite set of data points is decomposed into two decoupled tasks: first, the computation of the locally smooth models, and hence, the segmentation of ...
    • A Method for Fast, High-Precision Characterization of Synthetic Biology Devices 

      Beal, Jacob; Weiss, Ron; Yaman, Fusun; Davidsohn, Noah; Adler, Aaron (2012-04-07)
      Engineering biological systems with predictable behavior is a foundational goal of synthetic biology. To accomplish this, it is important to accurately characterize the behavior of biological devices. Prior characterization ...
    • A Method for Obtaining Digital Signatures and Public-key Cryptosystems 

      Rivest, Ronald L.; Shamir, Adi; Adleman, Len (1977-04)
      We present an encryption method with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important consequences. 1. Couriers or other secure ...
    • A Method for Skew-free Distribution of Digital Signals Using Matched Variable Delay Lines 

      Knight, Thomas; Wu, Henry M. (1992-03-01)
      The ability to distribute signals everywhere in a circuit with controlled and known delays is essential in large, high-speed digital systems. We present a technique by which a signal driver can adjust the arrival time ...
    • A Method, Based on Plans, for Understanding How a Loop Implements a Computation 

      Waters, Richard C. (MIT Artificial Intelligence Laboratory, 1977-07)
      The plan method analyzes the structure of a program. The plan which results from applying the method represents this structure by specifying how the parts of the program interact. This paper demonstrates the utility of the ...
    • Methods and Experiments With Bounded Tree-width Markov Networks 

      Liang, Percy; Srebro, Nathan (2004-12-30)
      Markov trees generalize naturally to bounded tree-width Markov networks, onwhich exact computations can still be done efficiently. However, learning themaximum likelihood Markov network with tree-width greater than 1 is ...
    • Methods for Parallelizing Search Paths in Phrasing 

      Marcken, Carl de (1994-01-01)
      Many search problems are commonly solved with combinatoric algorithms that unnecessarily duplicate and serialize work at considerable computational expense. There are techniques available that can eliminate redundant ...
    • Micro-Planner Reference Manual 

      Sussman, Gerald; Winograd, Terry (1970-07-01)
      Micro-Planner is an implementation of a subset of Cal Hewitt's language, PLANNER by Gerald Jay Sussman, Terry Winograd, and Eugene Charniak on the AI group computer in LISP. Micro-Planner is now a publically accessible ...
    • Micro-Planner Reference Manual (Update) 

      Sussman, Gerald Jay; Winograd, Terry; Charniak, Eugene (1971-12-01)
      This is a manual for the use of the Micro Planner interpreter, which implements a subset of Carl Hewitt's language, PLANNER and is now available for use by the Artificial Intelligence Group.
    • A Microcomputer Network Simulation System 

      Krizan, Brock Collins (1979-02)
      The design, development and use of cost-effective computer networks require information about system behavior given a variety of network structures and operational policies. Because computer networks are complex systems ...
    • Microelectronics In Nerve Cells: Dendritic Morphology and Information Processing 

      Poggio, T.; Torre, V. (1981-10-01)
      The electrical properties of the different anatomical types of retinal ganglion cells in the cat were calculated on the basis of passive cable theory from measurements made on histological material provided by Boycott ...
    • Mid-Level Vision and Recognition of Non-Rigid Objects 

      Subirana-Vilanova, J. Brian (1995-04-01)
      We address mid-level vision for the recognition of non-rigid objects. We align model and image using frame curves - which are object or "figure/ground" skeletons. Frame curves are computed, without discontinuities, ...
    • MIDAS 

      Samson, Peter (1968-10-01)
      The MIDAS linking loader is a PDP-6 program to load relocatable-format output from the MIDAS assemblers, with facilities to handle symbolic cross-reference between independently assembled programs. Although it is arranged ...
    • Middleboxes No Longer Considered Harmful 

      Walfish, Michael; Stribling, Jeremy; Krohn, Maxwell; Balakrishnan, Hari; Morris, Robert; e.a. (2004-06-24)
      Intermediate network elements, such as network address translators (NATs), firewalls, and transparent caches are now commonplace. The usual reaction in the network architecture community to these so-called middleboxes is ...
    • Mini-Robot Group User's Guide 

      Billmers, Meyer A. (MIT Artificial Intelligence Laboratory, 1974-03)
      This working paper describes the facilities of the mini-robot group and the software available to persons using those facilities.