Advanced Search
DSpace@MIT

Browsing AI Memos (1959 - 2004) by Title

Research and Teaching Output of the MIT Community

Browsing AI Memos (1959 - 2004) by Title

Sort by: Order: Results:

  • Huang, Andrew "bunnie" (2002-05-26)
    This paper discusses the hardware foundations of the cryptosystem employed by the Xbox(TM) video game console from Microsoft. A secret boot block overlay is buried within a system ASIC. This secret boot block decrypts and ...
  • Atkeson, Christopher G.; Hollerback, John M. (1984-07-01)
    Unrestrained human arm trajectories between point targets have been investigated using a three dimensional tracking apparatus, the Selspot system. Movements were executed between different points in a vertical plane ...
  • Minsky, Marvin (1979-06-01)
    Most theories of memory suggest that when we learn or memorize something, some "representation" of that something is constructed, stored and later retrieved. This raises questions like: How is information represented? ...
  • Lee, Jintae (1988-01-01)
    This paper examines the issues and the solutions that have been studied in database (DB) integration research and tries to draw lessons from them for knowledge base (KB) integration.
  • Horn, Berthold K.P.; Winston, Patrick H. (1976-05-01)
    This report is a brief summary guide to work done in the M.I.T. Artificial Intelligence Laboratory directed at the production of tools for productivity technology research. For detailed coverage of the work, readers ...
  • Steele, Guy Lewis, Jr. (1976-11-01)
    In this paper, a sequel to "LAMBDA: The U ltimate Imperative", a new view of LAMBDA as a renaming operator is presented and contrasted with the usual functional view taken by L ISP. This view, combined with the view of ...
  • Steele, Guy Lewis, Jr.; Sussman, Gerald Jay (1976-03-01)
    We demonstrate how to model the following common programmingsconstructs in terms of an applicative order language similar to LISP: Simple Recursion, Iteration, Compound Statements and Expressions, GO TO and Assignment, ...
  • Horn, Berthold K.P.; Woodham, Robert J. (1978-02-01)
    A number of image analysis tasks require the registration of a surface model with an image. In the case of satellite images, the surface model may be a map or digital terrain model in the form of surface elevations on ...
  • Beal, Jacob (2002-12-01)
    I present a system for robust leaderless organization of an amorphous network into hierarchical clusters. This system, which assumes that nodes are spatially embedded and can only talk to neighbors within a given radius, ...
  • Solomon, Cynthia J. (1975-12-01)
    "LOGO" is sometimes used as the name of a programming language. It is also used as the name of...what shall I call it?... an environment, a culture, a way of thinking about computers and about learning and about putting ...
  • Hurlbert, Anya; Poggio, Tomaso (1987-06-01)
    We show that a color algorithm capable of separating illumination from reflectance in a Mondrian world can be learned from a set of examples. The learned algorithm is equivalent to filtering the image data---in which ...
  • Winston, Patrick H. (1979-04-01)
    We use analogy when we say something is a Cinderella story and when we learn about resistors by thinking about water pipes. We also use analogy when we learn subjects like Economics, Medicine and Law. This paper ...
  • Kumar, Vinay; Poggio, Tomaso (2000-09-01)
    We describe the key role played by partial evaluation in the Supercomputing Toolkit, a parallel computing system for scientific applications that effectively exploits the vast amount of parallelism exposed by partial ...
  • Kumar, Vinay P.; Poggio, Tomaso (1999-09-23)
    This paper describes a trainable system capable of tracking faces and facialsfeatures like eyes and nostrils and estimating basic mouth features such as sdegrees of openness and smile in real time. In developing this ...
  • Winston, Patrick H. (1982-05-01)
    This paper is a synthesis of several sets of ideas: ideas about learning from precedents and exercises, ideas about learning using near misses, ideas about generalizing if-then rules, and ideas about using censors to ...
  • Winston, Patrick H. (1978-01-01)
    In the particular kind of learning discussed in this paper, the teacher names a destination and a source. In the sentence, "Robbie is like a fox," Robbie is the destination and fox is the source. The student, on analyzing ...
  • Winston, Patrick H. (1977-01-01)
    Learning is defined to be the computation done by a student when there is a transfer of information to him from a teacher. In the particular kind of learning discussed, the teacher names a source and destination. In ...
  • Shih, Lawrence; Karger, David (2003-05-01)
    Trees are a common way of organizing large amounts of information by placing items with similar characteristics near one another in the tree. We introduce a classification problem where a given tree structure gives us ...
  • Iba, Glenn A. (1979-09-01)
    This work proposes a theory for machine learning of disjunctive concepts. The paradigm followed is one of teaching and testing, where the teaching is accomplished by presenting a sequence of positive and negative ...
  • Meila, Marina; Jordan, Michael I. (1995-11-01)
    Compliant control is a standard method for performing fine manipulation tasks, like grasping and assembly, but it requires estimation of the state of contact between the robot arm and the objects involved. Here we present ...
MIT-Mirage