Advanced Search
DSpace@MIT

Browsing Computer Science and Artificial Intelligence Lab (CSAIL) by Title

Research and Teaching Output of the MIT Community

Browsing Computer Science and Artificial Intelligence Lab (CSAIL) by Title

Sort by: Order: Results:

  • Kahn, Kenneth Michael (1979-08-01)
    This report describes a computer system that creates simple computer animation in response to high-level, vague, and incomplete descriptions of films. It makes its films by collecting and evaluating suggestions from ...
  • Pitman, Kent M. (1985-02-01)
    This paper reports work in progress on an experimental text editor called CREF, the Cross Referenced Editing Facility. CREF deals with chunks of text, called segments, which may have associated features such as keywords ...
  • Bicchi, Antionio (1990-10-01)
    This paper deals with the design of multi-axis force (also known as force/torque) sensors, as considered within the framework of optimal design theory. The principal goal of this paper is to identify a mathematical ...
  • Cudhea, Peter (MIT Artificial Intelligence Laboratory, 1986-12)
    Programming in societies of behavior-agents is emerging as a promising method for creating mobile robot control systems that are responsive both to internal priorities for action and to external world constraints. It is ...
  • Popa, Raluca Ada; Zeldovich, Nickolai; Balakrishnan, Hari (2011-01-26)
    CryptDB is a DBMS that provides provable and practical privacy in the face of a compromised database server or curious database administrators. CryptDB works by executing SQL queries over encrypted data. At its core are ...
  • Popa, Raluca Ada; Zeldovich, Nickolai (2012-03-25)
    In this document, we provide a cryptographic treatment of the adjustable join protocol from CryptDB. We also discuss how our scheme could be used outside of CryptDB because it provides a simple functionality that may be ...
  • Waters, Richard C. (MIT Artificial Intelligence Laboratory, 1976-12)
    This paper is divided into two parts. The first part deals with cryptosystems and cryptanalysis. It surveys the basic information about cryptosystems and then addresses two specific questions. Are cryptosystems such as ...
  • Hart, T. (1964-12-01)
    The LISP system (command version) has been updated. Bugs are corrected include: 1. out of pushdown list in compiled function will not transfer to 77777. 2. with compiler printing turned off by comprint, it is truly off. ...
  • Asada, Haruo; Brady, Michael (1984-02-01)
    In this paper we introduce a novel representation of the significant changes in curvature along the bounding contour of planar shape. We call the representation the curvature primal sketch. We describe an implemented ...
  • Subirana-Vilanova, J. Brian (1991-10-01)
    In this paper we present an approach to perceptual organization and attention based on Curved Inertia Frames (C.I.F.), a novel definition of "curved axis of inertia'' tolerant to noisy and spurious data. The definition ...
  • Horn, B.K.P. (1981-01-01)
    Here we search for the curve which has the smallest integral of the square of curvature, while passing through two given points with given orientation. This is the true shape of a spline used in lofting. In computer-aided ...
  • Syeda-Mahmood, Tanveer Fathima (1992-02-01)
    A key problem in model-based object recognition is selection, namely, the problem of determining which regions in the image are likely to come from a single object. In this paper we present an approach that extracts ...
  • Tanveer, S.; Mahmood, F. (1993-05-01)
    A key problem in model-based object recognition is selection, namely, the problem of isolating regions in an image that are likely to come from a single object. This isolation can be either based solely on image data ...
  • Spertus, Ellen (1990-05-01)
    The dataflow model of computation exposes and exploits parallelism in programs without requiring programmer annotation; however, instruction- level dataflow is too fine-grained to be efficient on general-purpose ...
  • Steele, Guy Lewis, Jr. (1977-09-01)
    The internal representations of the various MacLISP data types are presented and discussed. Certain implementation tradeoffs are considered. The ultimate decisions on these tradeoffs are discussed in the light of ...
  • Demsky, Brian; Rinard, Martin (2004-05-18)
    Model-based data structure repair is a promising techniquefor enabling programs to continue to execute successfullyin the face of otherwise fatal data structure corruption errors.Previous research in this eld relied on ...
  • Horn, Berthold K.P. (MIT Artificial Intelligence Laboratory, 1973-03-08)
    This paper presents a solution to the problem of determining the distribution of an absorbing substance inside a non-opaque non-scattering body from images or ray samplings. It simultaneously solves the problem of determining ...
  • Osman, Eric (1971-09-01)
    This memo describes the version of DDT used as the command level of the A.I. Laboratory Time Sharing System (ITS). Besides the usual program control, examination, and modification features, this DDT provides many ...
  • Das, Sanmay (2006-07-12)
    This thesis seeks to contribute to the understanding of markets populated by boundedly rational agents who learn from experience. Bounded rationality and learning have both been the focus of much research in computer ...
  • Steele, Guy Lewis, Jr. (1977-10-01)
    Folklore states that GOTO statements are 'cheap', while procedure calls are 'expensive'. This myth is largely a result of poorly designed language implementations. The historical growth of this myth is considered. Both ...
MIT-Mirage