Advanced Search
DSpace@MIT

Browsing Computer Science and Artificial Intelligence Lab (CSAIL) by Title

Research and Teaching Output of the MIT Community

Browsing Computer Science and Artificial Intelligence Lab (CSAIL) by Title

Sort by: Order: Results:

  • McCamant, Stephen; Morrisett, Greg (2005-05-02)
    Executing untrusted code while preserving security requiresenforcement of memory and control-flow safety policies:untrusted code must be prevented from modifying memory orexecuting code except as explicitly allowed. ...
  • Donald, Bruce R. (MIT Artificial Intelligence Laboratory, 1984-08)
    We describe a simple geometric modelling system called Eight which supports interactive creation, editing, and display of three-dimensional polyhedral solids. Perspective views of a polyhedral environment may be generated, ...
  • De Mol, Christine; Rosasco, Lorenzo; De Vito, Ernesto (2008-07-24)
    Within the framework of statistical learning theory we analyze in detail the so-called elastic-net regularization scheme proposed by Zou and Hastie ["Regularization and variable selection via the elastic net" J. R. Stat. ...
  • Sussman, Gerald Jay (1977-06-01)
    This report outlines the problem of intelligent failure recovery in a problem-solver for electrical design. We want our problem solver to learn as much as it can from its mistakes. Thus we cast the engineering design ...
  • Liskov, Moses (2003-10-14)
    Electronic cash schemes in which the bank authenticates many coins at once suffer from the problem that coins that are authenticated together can be linked to one another. Unfortunately, unless a user spends coins in a ...
  • Chan, Nicholas Tung; Shelton, Christian (2001-04-17)
    This paper presents an adaptive learning model for market-making under the reinforcement learning framework. Reinforcement learning is a learning technique in which agents aim to maximize the long-term accumulated rewards. ...
  • Goldstein, Ira (1973-04-01)
    An elementary theorem prover for a small part of plane Euclidean geometry is presented. The purpose is to illustrate important problem solving concepts that naturally arise in building procedural models for mathematics.
  • Khan, Omer; Lis, Mieszko; Devadas, Srini (2010-06-12)
    We introduce the Execution Migration Machine (EM2), a novel, scalable shared-memory architecture for large-scale multicores constrained by off-chip memory bandwidth. EM2 reduces cache miss rates, and consequently off-chip ...
  • Birkholz, Matthew (1993-09-01)
    The MIT-Scheme program development environment includes a general-purpose text editor, Edwin, that has an extension language, Edwin Scheme. Edwin is very similar to another general-purpose text editor, GNU Emacs, which ...
  • Stallman, Richard M. (1981-10-01)
    A reference manual for the extensible, customizable, self-documenting real-time display editor. This manual corresponds to EMACS version 162.
  • Stallman, Richard M. (1983-03-01)
    A reference manual for the extensible, customizable, self-documenting real-time display editor. This manual corresponds to EMACS version 162.
  • Stallman, Richard M. (1981-03-01)
    EMACS is a display editor which is implemented in an interpreted high level language. This allows users to extend the editor by replacing parts of it, to experiment with alternative command languages, and to share ...
  • Matsuoka, Yoky (1995-05-01)
    Babies are born with simple manipulation capabilities such as reflexes to perceived stimuli. Initial discoveries by babies are accidental until they become coordinated and curious enough to actively investigate their ...
  • Katti, Sachin; Gollakota, Shyamnath; Katabi, Dina (2007-02-23)
    Traditionally, interference is considered harmful.Wireless networks strive to avoid scheduling multiple transmissions at the same time in order to prevent interference. This paper adopts the opposite approach; it encourages ...
  • Alvira, Mariano; Rifkin, Ryan (2001-01-01)
    Impressive claims have been made for the performance of the SNoW algorithm on face detection tasks by Yang et. al. [7]. In particular, by looking at both their results and those of Heisele et. al. [3], one could infer that ...
  • Caponnetto, Andrea; Rosasco, Lorenzo; Vito, Ernesto De; Verri, Alessandro (2005-05-27)
    This paper presents an approach to model selection for regularized least-squares on reproducing kernel Hilbert spaces in the semi-supervised setting. The role of effective dimension was recently shown to be crucial in the ...
  • Zelinka, Linda M. (MIT Artificial Intelligence Laboratory, 1983-03)
    Large programs undergo many changes before they run in a satisfactory manner. For many large programs, modification histories are kept which record every change that is made to the program. By studying these records, ...
  • Artzi, Shay; Kiezun, Adam; Newport, Calvin; Schultz, David (2006-02-23)
    Encrypted keyword search allows a server to perform a search over a set of encrypted documents on behalf of a client without learning the contents of the documents or the words being searched for. Designing a practical ...
  • Achour, Sara; Rinard, Martin (2014-08-19)
    We present Topaz, a new task-based language for computations that execute on approximate computing platforms that may occasionally produce arbitrarily inaccurate results. The Topaz implementation maps approximate tasks ...
  • Yuille, Alan (1987-11-01)
    This paper describes attempts to model the modules of early vision in terms of minimizing energy functions, in particular energy functions allowing discontinuities in the solution. It examines the success of using ...
MIT-Mirage