Now showing items 788-807 of 3804

    • Creating and Rendering Image-Based Visual Hulls 

      Buehler, Chris; Matusik, Wojciech; McMillan, Leonard (1999-05)
      In this paper, we present efficient algorithms for creating and rendering image-based visual hulls. These algorithms are motivated by our desire to render real-time views of dynamic, real-world scenes. We first describe ...
    • Creation of Computer Animation from Story Descriptions 

      Kahn, Kenneth Michael (1979-08-01)
      This report describes a computer system that creates simple computer animation in response to high-level, vague, and incomplete descriptions of films. It makes its films by collecting and evaluating suggestions from ...
    • Credible Compilers 

      Rinard, Martin C. (1999-03)
      This paper presents a new concept in compiler correctness: instead of proving that the compiler performs all of its transformations correctly, the compiler generates a proof that the transformed program correctly implements ...
    • CREF: An Editing Facility for Managing Structured Text 

      Pitman, Kent M. (1985-02-01)
      This paper reports work in progress on an experimental text editor called CREF, the Cross Referenced Editing Facility. CREF deals with chunks of text, called segments, which may have associated features such as keywords ...
    • A Criterion for the Optimal Design of Multiaxis Force Sensors 

      Bicchi, Antionio (1990-10-01)
      This paper deals with the design of multi-axis force (also known as force/torque) sensors, as considered within the framework of optimal design theory. The principal goal of this paper is to identify a mathematical ...
    • Critical Analysis of Programming in Societies of Behaviors 

      Cudhea, Peter (MIT Artificial Intelligence Laboratory, 1986-12)
      Programming in societies of behavior-agents is emerging as a promising method for creating mobile robot control systems that are responsive both to internal priorities for action and to external world constraints. It is ...
    • Critical Path Scheduling of Task Systems with Resource and Processor Constraints 

      Lloyd, Error Lynn (1980-03)
      Several papers over the past few years have investigated minimum execution time scheduling of unit execution time (UET) task systems with resources. Because such scheduling problems are, in general, NP-hard, a variety of ...
    • CRL: High - Performance All-Software Distributed Shared Memory* 

      Johnson, Kirk L.; Kaashoek, M. Frans; Wallach, Deborah A. (1995-03)
      This paper introduces the C Region Library (CRL), a new all-software distributed shared memory (DSM) system. CRL requires no special compiler, hardware , or operating system support beyond the ability to send and receive ...
    • CryptDB: A Practical Encrypted Relational DBMS 

      Popa, Raluca Ada; Zeldovich, Nickolai; Balakrishnan, Hari (2011-01-26)
      CryptDB is a DBMS that provides provable and practical privacy in the face of a compromised database server or curious database administrators. CryptDB works by executing SQL queries over encrypted data. At its core are ...
    • The Cryptographic Security of Compact Knapsacks (Preliminary Report) 

      Shamir, Adi (1980-04)
      In 1978, Merkle and Hellman introduced a knapsack-based public-key cryptosystem, which received widespread attention. The two major open problems concerning this cryptosystem are: (i) Security: How difficult are the ...
    • Cryptographic Treatment of CryptDB's Adjustable Join 

      Popa, Raluca Ada; Zeldovich, Nickolai (2012-03-25)
      In this document, we provide a cryptographic treatment of the adjustable join protocol from CryptDB. We also discuss how our scheme could be used outside of CryptDB because it provides a simple functionality that may be ...
    • Cryptology and Data Communications 

      Waters, Richard C. (MIT Artificial Intelligence Laboratory, 1976-12)
      This paper is divided into two parts. The first part deals with cryptosystems and cryptanalysis. It surveys the basic information about cryptosystems and then addresses two specific questions. Are cryptosystems such as ...
    • CTSS LISP Notice-Supplement to A.I. Memo No. 67 

      Hart, T. (1964-12-01)
      The LISP system (command version) has been updated. Bugs are corrected include: 1. out of pushdown list in compiled function will not transfer to 77777. 2. with compiler printing turned off by comprint, it is truly off. ...
    • CTSS Technical Notes 

      Saltzer, Jerome H. (1965-03)
      This report is a technical description of the 7094 Compatible Time-Sharing System in use at Project MAC and the M.I.T. Computation Center. It is designed to acquaint a system programmer with the techniques of construction ...
    • The Curvature Primal Sketch 

      Asada, Haruo; Brady, Michael (1984-02-01)
      In this paper we introduce a novel representation of the significant changes in curvature along the bounding contour of planar shape. We call the representation the curvature primal sketch. We describe an implemented ...
    • The Curve of Least Energy 

      Horn, B.K.P. (1981-01-01)
      Here we search for the curve which has the smallest integral of the square of curvature, while passing through two given points with given orientation. This is the true shape of a spline used in lofting. In computer-aided ...
    • Curved Inertia Frames: Visual Attention and Perceptual Organization Using Convexity and Symmetry 

      Subirana-Vilanova, J. Brian (1991-10-01)
      In this paper we present an approach to perceptual organization and attention based on Curved Inertia Frames (C.I.F.), a novel definition of "curved axis of inertia'' tolerant to noisy and spurious data. The definition ...
    • D-SCRIPT: A Computational Theory of Descriptions 

      Moore, Robert C. (1973-02-01)
      This paper descries D-SCRIPT, a language for representing knowledge in artificial intelligence programs. D-SCRIPT contains a powerful formalism for descriptions, which permits the representation of statements that are ...
    • Data and Code for "A New Approach to Animacy Detection" 

      Labiba, Jahan,; Geeticka, Chauhan,; A., Finlayson, Mark (2018-06-07)
      This archive contains the code and data for the workshop article "A New Approach to Animacy Detection," published in 2018 in the the 27th International Conference on Computational Linguistics (COLING 2018), in Santa Fe, ...
    • Data and Code for "Automatic Identification of Narrative Diegesis and Point of View" 

      Eisenberg, Joshua D.; Finlayson, Mark A. (2016-11-09)
      This archive contains the code and data for the workshop article "Automatic Identification of Narrative Diegesis and Point of View," published in 2016 in the 2nd Workshop for Computing News Storylines (CNewsStory 2016), ...