Now showing items 245-264 of 775

    • Energy Scalability of On-Chip Interconnection Networks in Multicore Architectures 

      Agarwal, Anant; Psota, James; Eastep, Jonathan; Konstantakopoulos, Theodoros (2008-11-11)
      On-chip interconnection networks (OCNs) such as point-to-point networks and buses form the communication backbone in systems-on-a-chip, multicore processors, and tiled processors. OCNs can consume significant portions of ...
    • Energy-Efficient Approximate Computation in Topaz 

      Achour, Sara; Rinard, Martin (2014-08-19)
      We present Topaz, a new task-based language for computations that execute on approximate computing platforms that may occasionally produce arbitrarily inaccurate results. The Topaz implementation maps approximate tasks ...
    • Energy-efficient Control of a Smart Grid with Sustainable Homes based on Distributing Risk 

      Ono, Masahiro (2012-01-20)
      The goal of this thesis is to develop a distributed control system for a smart grid with sustainable homes. A central challenge is how to enhance energy efficiency in the presence of uncertainty. A major source of uncertainty ...
    • Enhanced Visual Authoring Using Operation History 

      Su, Sara L. (2009-06-24)
      Graphical editors have introduced great flexibility to the designer's workflow, providing powerful digital tools and enabling the creation of complex and compelling designs. This thesis presents methods for improving these ...
    • Enhancing Availability and Security Through Failure-Oblivious Computing 

      Rinard, Martin; Cadar, Cristian; Dumitran, Daniel; Roy, Daniel M.; Jr., William S. Beebee (2004-02-06)
      We present a new technique, failure-oblivious computing,that enables programs to continue to execute through memoryerrors without memory corruption. Our safe compilerfor C inserts checks that dynamically detect invalid ...
    • EpiChord: Parallelizing the Chord Lookup Algorithm with Reactive Routing State Management 

      Leong, Ben; Liskov, Barbara; Demaine, Erik D. (2004-08-13)
      EpiChord is a DHT lookup algorithm that demonstrates that we canremove the O(log n)-state-per-node restriction on existing DHTtopologies to achieve significantly better lookup performance andresilience using a novel reactive ...
    • Epistemic Implementation and The Arbitrary-Belief Auction 

      Chen, Jing; Micali, Silvio; Pass, Rafael (2012-06-22)
      In settings of incomplete information we put forward an epistemic framework for designing mechanisms that successfully leverage the players' arbitrary higher-order beliefs, even when such beliefs are totally wrong, and ...
    • Error weighted classifier combination for multi-modal human identification 

      Ivanov, Yuri; Serre, Thomas; Bouvrie, Jacob (2005-12-14)
      In this paper we describe a technique of classifier combination used in a human identification system. The system integrates all available features from multi-modal sources within a Bayesian framework. The framework allows ...
    • Etna: a Fault-tolerant Algorithm for Atomic Mutable DHT Data 

      Muthitacharoen, Athicha; Gilbert, Seth; Morris, Robert (2005-06-15)
      This paper presents Etna, an algorithm for atomic reads and writes of replicated data stored in a distributed hash table. Etna correctly handles dynamically changing sets of replica hosts, and is optimized for reads, writes, ...
    • Evaluating Caching Mechanisms In Future Internet Architectures 

      Jing, Yuxin (2016-06-28)
      This thesis seeks to test and evaluate the effects of in-­network storage in novel proposed Internet architectures in terms of their performance. In a world where more and more people are mobile and connected to the Internet, ...
    • Evaluation of sets of oriented and non-oriented receptive fields as local descriptors 

      Yokono, Jerry Jun; Poggio, Tomaso (2004-03-24)
      Local descriptors are increasingly used for the task of object recognition because of their perceived robustness with respect to occlusions and to global geometrical deformations. We propose a performance criterion for a ...
    • Event Order Abstraction for Parametric Real-Time System Verification 

      Umeno, Shinya (2008-07-28)
      We present a new abstraction technique, event order abstraction (EOA), for parametric safety verification of real-time systems in which ``correct orderings of events'' needed for system correctness are maintained by timing ...
    • Evolving Robocode Tank Fighters 

      Eisenstein, Jacob (2003-10-28)
      In this paper, I describe the application of genetic programming to evolve a controller for a robotic tank in a simulated environment.The purpose is to explore how genetic techniques can best be applied to produce controllers ...
    • Exact Algorithms for the Canadian Traveller Problem on Paths and Trees 

      Karger, David; Nikolova, Evdokia (2008-01-28)
      The Canadian Traveller problem is a stochastic shortest paths problem in which one learns the cost of an edge only when arriving at one of its endpoints. The goal is to find an adaptive policy (adjusting as one learns more ...
    • Examining high level neural representations of cluttered scenes 

      Meyers, Ethan; Embark, Hamdy; Freiwald, Winrich; Serre, Thomas; Kreiman, Gabriel; e.a. (2010-07-29)
      Humans and other primates can rapidly categorize objects even when they are embedded in complex visual scenes (Thorpe et al., 1996; Fabre-Thorpe et al., 1998). Studies by Serre et al., 2007 have shown that the ability of ...
    • Examining Key Mobility Resources through Denial of Service Attacks on proposed Global Name Resolution Services 

      Rock, Colleen T. (2016-09-26)
      The problem we address in this thesis is to uncover the design elements in a network architecture design that may open it up to denial of service (DoS) attacks and to expose the tradeoffs in mitigating those DoS opportunities. ...
    • Exploiting Transport-Level Characteristics of Spam 

      Beverly, Robert; Sollins, Karen (2008-02-15)
      In the arms race to secure electronic mail users and servers fromunsolicited messages (spam), the most successful solutions employtechniques that are difficult for spammers to circumvent. Thisresearch investigates the ...
    • Exploiting Vector Parallelism in Software Pipelined Loops 

      Larsen, Sam; Rabbah, Rodric; Amarasinghe, Saman (2005-06-03)
      An emerging trend in processor design is the incorporation of short vector instructions into the ISA. In fact, vector extensions have appeared in most general-purpose microprocessors. To utilize these instructions, ...
    • Explorations in Low-Cost Compliant Robotics 

      Kumpf, Adam (2007-01-30)
      This thesis presents the findings of exploratory research in low-cost compliant robotics. The most heavily leveraged trade-off is that of mechanical precision for computational power, with the hope that the price of future ...
    • Extending a MOOS-IvP Autonomy System and Users Guide to the IvPBuild Toolbox 

      Benjamin, Michael R.; Newman, Paul M.; Schmidt, Henrik; Leonard, John J. (2009-08-20)
      This document describes how to extend the suite of MOOS applications and IvP Helm behaviors distributed with the MOOS-IvP software bundle from www.moos-ivp.org. It covers (a) a straw-man repository with a place-holder MOOS ...