Advanced Search
DSpace@MIT

Browsing Computer Science and Artificial Intelligence Lab (CSAIL) by Title

Research and Teaching Output of the MIT Community

Browsing Computer Science and Artificial Intelligence Lab (CSAIL) by Title

Sort by: Order: Results:

  • Hofstadter, Douglas (1984-01-01)
    A micro-world is described, in which many analogies involving strikingly different concepts and levels of subtlety can be made. The question "What differentiates the good ones from the bad ones?" is discussed, and ...
  • Agarwal, Anant; Miller, Jason; Beckmann, Nathan; Wentzlaff, David (2010-02-11)
    The number of cores which fit on a single chip is growing at an exponential rate while off-chip main memory bandwidth is growing at a linear rate at best. This core count to off-chip bandwidth disparity causes per-core ...
  • Levow, Gina-Anne (1998-05-27)
    The need for robust and easily extensible systems for word sense disambiguation coupled with successes in training systems for a variety of tasks using large on-line corpora has led to extensive research into corpus-based ...
  • Bicchi, Antonio; Melchiorri, Claudio (MIT Artificial Intelligence Laboratory, 1990-12)
    This paper deals with the problem of controlling the interactions of flexible manipulators with their environment. For executing a force control task, a manipulator with intrinsic (mechanical) compliance has some advantages ...
  • Shashua, Amnon (1991-12-01)
    The paper presents a simple model for recovering affine shape and correspondence from two orthographic views of a 3D object. It is shown that four corresponding points along two orthographic views, taken under similar ...
  • Lynch, Nancy; Kuhn, Fabian; Kowalski, Dariusz; Khabbazian, Majid (2010-02-09)
    We analyze greedy algorithms for broadcasting messages throughout a multi-hop wireless network, using a slot-based model that includes message collisions without collision detection. Our algorithms are split formally into ...
  • Marill, Thomas (MIT Artificial Intelligence Laboratory, 1988-11)
    The problem of three-dimensional vision is generally formulated as the problem of recovering the three-dimensional scene that caused the image. Here we present a certain line-drawing and show that it has the following ...
  • Harris, John G. (1986-06-01)
    Reconstructing a surface from sparse sensory data is a well known problem in computer vision. Early vision modules typically supply sparse depth, orientation and discontinuity information. The surface reconstruction ...
  • Keckler, Stephen W. (1992-09-01)
    This report describes Processor Coupling, a mechanism for controlling multiple ALUs on a single integrated circuit to exploit both instruction-level and inter-thread parallelism. A compiler statically schedules individual ...
  • Metreveli, Zviad; Zeldovich, Nickolai; Kaashoek, M. Frans (2011-11-26)
    CPHash is a concurrent hash table for multicore processors. CPHash partitions its table across the caches of cores and uses message passing to transfer lookups/inserts to a partition. CPHash's message passing avoids the ...
  • Kahn, Kenneth Michael (1979-08-01)
    This report describes a computer system that creates simple computer animation in response to high-level, vague, and incomplete descriptions of films. It makes its films by collecting and evaluating suggestions from ...
  • Pitman, Kent M. (1985-02-01)
    This paper reports work in progress on an experimental text editor called CREF, the Cross Referenced Editing Facility. CREF deals with chunks of text, called segments, which may have associated features such as keywords ...
  • Bicchi, Antionio (1990-10-01)
    This paper deals with the design of multi-axis force (also known as force/torque) sensors, as considered within the framework of optimal design theory. The principal goal of this paper is to identify a mathematical ...
  • Cudhea, Peter (MIT Artificial Intelligence Laboratory, 1986-12)
    Programming in societies of behavior-agents is emerging as a promising method for creating mobile robot control systems that are responsive both to internal priorities for action and to external world constraints. It is ...
  • Popa, Raluca Ada; Zeldovich, Nickolai; Balakrishnan, Hari (2011-01-26)
    CryptDB is a DBMS that provides provable and practical privacy in the face of a compromised database server or curious database administrators. CryptDB works by executing SQL queries over encrypted data. At its core are ...
  • Popa, Raluca Ada; Zeldovich, Nickolai (2012-03-25)
    In this document, we provide a cryptographic treatment of the adjustable join protocol from CryptDB. We also discuss how our scheme could be used outside of CryptDB because it provides a simple functionality that may be ...
  • Waters, Richard C. (MIT Artificial Intelligence Laboratory, 1976-12)
    This paper is divided into two parts. The first part deals with cryptosystems and cryptanalysis. It surveys the basic information about cryptosystems and then addresses two specific questions. Are cryptosystems such as ...
  • Hart, T. (1964-12-01)
    The LISP system (command version) has been updated. Bugs are corrected include: 1. out of pushdown list in compiled function will not transfer to 77777. 2. with compiler printing turned off by comprint, it is truly off. ...
  • Asada, Haruo; Brady, Michael (1984-02-01)
    In this paper we introduce a novel representation of the significant changes in curvature along the bounding contour of planar shape. We call the representation the curvature primal sketch. We describe an implemented ...
  • Subirana-Vilanova, J. Brian (1991-10-01)
    In this paper we present an approach to perceptual organization and attention based on Curved Inertia Frames (C.I.F.), a novel definition of "curved axis of inertia'' tolerant to noisy and spurious data. The definition ...
MIT-Mirage