Advanced Search
DSpace@MIT

Browsing Computer Science and Artificial Intelligence Lab (CSAIL) by Title

Research and Teaching Output of the MIT Community

Browsing Computer Science and Artificial Intelligence Lab (CSAIL) by Title

Sort by: Order: Results:

  • Bicchi, Antonio; Melchiorri, Claudio (MIT Artificial Intelligence Laboratory, 1990-12)
    This paper deals with the problem of controlling the interactions of flexible manipulators with their environment. For executing a force control task, a manipulator with intrinsic (mechanical) compliance has some advantages ...
  • Shashua, Amnon (1991-12-01)
    The paper presents a simple model for recovering affine shape and correspondence from two orthographic views of a 3D object. It is shown that four corresponding points along two orthographic views, taken under similar ...
  • Lynch, Nancy; Kuhn, Fabian; Kowalski, Dariusz; Khabbazian, Majid (2010-02-09)
    We analyze greedy algorithms for broadcasting messages throughout a multi-hop wireless network, using a slot-based model that includes message collisions without collision detection. Our algorithms are split formally into ...
  • Marill, Thomas (MIT Artificial Intelligence Laboratory, 1988-11)
    The problem of three-dimensional vision is generally formulated as the problem of recovering the three-dimensional scene that caused the image. Here we present a certain line-drawing and show that it has the following ...
  • Harris, John G. (1986-06-01)
    Reconstructing a surface from sparse sensory data is a well known problem in computer vision. Early vision modules typically supply sparse depth, orientation and discontinuity information. The surface reconstruction ...
  • Keckler, Stephen W. (1992-09-01)
    This report describes Processor Coupling, a mechanism for controlling multiple ALUs on a single integrated circuit to exploit both instruction-level and inter-thread parallelism. A compiler statically schedules individual ...
  • Metreveli, Zviad; Zeldovich, Nickolai; Kaashoek, M. Frans (2011-11-26)
    CPHash is a concurrent hash table for multicore processors. CPHash partitions its table across the caches of cores and uses message passing to transfer lookups/inserts to a partition. CPHash's message passing avoids the ...
  • Kahn, Kenneth Michael (1979-08-01)
    This report describes a computer system that creates simple computer animation in response to high-level, vague, and incomplete descriptions of films. It makes its films by collecting and evaluating suggestions from ...
  • Pitman, Kent M. (1985-02-01)
    This paper reports work in progress on an experimental text editor called CREF, the Cross Referenced Editing Facility. CREF deals with chunks of text, called segments, which may have associated features such as keywords ...
  • Bicchi, Antionio (1990-10-01)
    This paper deals with the design of multi-axis force (also known as force/torque) sensors, as considered within the framework of optimal design theory. The principal goal of this paper is to identify a mathematical ...
  • Cudhea, Peter (MIT Artificial Intelligence Laboratory, 1986-12)
    Programming in societies of behavior-agents is emerging as a promising method for creating mobile robot control systems that are responsive both to internal priorities for action and to external world constraints. It is ...
  • Popa, Raluca Ada; Zeldovich, Nickolai; Balakrishnan, Hari (2011-01-26)
    CryptDB is a DBMS that provides provable and practical privacy in the face of a compromised database server or curious database administrators. CryptDB works by executing SQL queries over encrypted data. At its core are ...
  • Popa, Raluca Ada; Zeldovich, Nickolai (2012-03-25)
    In this document, we provide a cryptographic treatment of the adjustable join protocol from CryptDB. We also discuss how our scheme could be used outside of CryptDB because it provides a simple functionality that may be ...
  • Waters, Richard C. (MIT Artificial Intelligence Laboratory, 1976-12)
    This paper is divided into two parts. The first part deals with cryptosystems and cryptanalysis. It surveys the basic information about cryptosystems and then addresses two specific questions. Are cryptosystems such as ...
  • Hart, T. (1964-12-01)
    The LISP system (command version) has been updated. Bugs are corrected include: 1. out of pushdown list in compiled function will not transfer to 77777. 2. with compiler printing turned off by comprint, it is truly off. ...
  • Asada, Haruo; Brady, Michael (1984-02-01)
    In this paper we introduce a novel representation of the significant changes in curvature along the bounding contour of planar shape. We call the representation the curvature primal sketch. We describe an implemented ...
  • Subirana-Vilanova, J. Brian (1991-10-01)
    In this paper we present an approach to perceptual organization and attention based on Curved Inertia Frames (C.I.F.), a novel definition of "curved axis of inertia'' tolerant to noisy and spurious data. The definition ...
  • Horn, B.K.P. (1981-01-01)
    Here we search for the curve which has the smallest integral of the square of curvature, while passing through two given points with given orientation. This is the true shape of a spline used in lofting. In computer-aided ...
  • Eisenberg, Joshua D.; Finlayson, Mark A. (2016-11-09)
    This archive contains the code and data for the workshop article "Automatic Identification of Narrative Diegesis and Point of View," published in 2016 in the 2nd Workshop for Computing News Storylines (CNewsStory 2016), ...
  • Syeda-Mahmood, Tanveer Fathima (1992-02-01)
    A key problem in model-based object recognition is selection, namely, the problem of determining which regions in the image are likely to come from a single object. In this paper we present an approach that extracts ...
MIT-Mirage