Browsing CSAIL Technical Reports (July 1, 2003  present) by Title
Now showing items 464483 of 765

Object and Reference Immutability using Java Generics
(20070316)A compilerchecked immutability guarantee provides useful documentation, facilitates reasoning, and enables optimizations. This paper presents Immutability Generic Java (IGJ), a novel language extension that expresses ... 
Oblivious Routing in OnChip BandwidthAdaptive Networks
(20090327)Oblivious routing can be implemented on simple router hardware, but network performance suffers when routes become congested. Adaptive routing attempts to avoid hot spots by rerouting flows, but requires more complex ... 
Of Malicious Motes and Suspicious Sensors
(20060419)How much damage can a malicious tiny device cause in a singlehopwireless network? Imagine two players, Alice and Bob, who want toexchange information. Collin, a malicious adversary, wants to preventthem from communicating. ... 
An $\Omega(n \log n)$ Lower Bound on the Cost of Mutual Exclusion
(20060723)We prove an $\Omega(n \log n)$ lower bound on the number ofnonbusywaiting memory accesses by any deterministic algorithm solving$n$ process mutual exclusion that communicates via shared registers.The cost of the algorithm ... 
On a model of visual cortex: learning invariance and selectivity
(20080404)In this paper we present a class of algorithms for similarity learning on spaces of images. The general framework that we introduce is motivated by some wellknown hierarchical preprocessing architectures for object ... 
On Algorithms and Complexity for Sets with Cardinality Constraints
(20050803)Typestate systems ensure many desirable properties of imperativeprograms, including initialization of object fields and correct use ofstateful library interfaces. Abstract sets with cardinalityconstraints naturally ... 
On Decision Procedures for SetValue Fields
(20041130)An important feature of objectoriented programming languages is the ability todynamically instantiate userdefined container data structures such as lists, trees,and hash tables. Programs implement such data structures ... 
On Field Constraint Analysis
(20051103)We introduce field constraint analysis, a new technique for verifying data structure invariants. A field constraint for a field is a formula specifying a set of objects to which the field can point. Field constraints ... 
On Generalized Records and Spatial Conjunction in Role Logic
(20040406)We have previously introduced role logic as a notation fordescribing properties of relational structures in shapeanalysis, databases and knowledge bases. A natural fragmentof role logic corresponds to twovariable logic ... 
On Modular Pluggable Analyses Using Set Interfaces
(20031218)We present a technique that enables the focused applicationof multiple analyses to different modules in the same program. Our researchhas two goals: 1) to address the scalability limitations of preciseanalyses by focusing ... 
On Our Experience with Modular Pluggable Analyses
(20041004)We present a technique that enables the focused applicationof multiple analyses to di erent modules in thesame program. In our approach, each module encapsulatesone or more data structures and uses membershipin abstract ... 
On Randomized Path Coverage of Configuration Spaces
(20131118)We present a samplingbased algorithm that generates a set of locallyoptimal paths that differ in visibility. 
On Relational Analysis of Algebraic Datatypes
(20050405)We present a technique that enables the use of finite modelfinding to check the satisfiability of certain formulaswhose intended models are infinite. Such formulas arisewhen using the language of sets and relations to ... 
On Role Logic
(20031024)We present role logic, a notation for describing propertiesof relational structures in shape analysis, databases, andknowledge bases. We construct role logic using the ideas ofde Bruijn's notation for lambda calculus, an ... 
On Spatial Conjunction as SecondOrder Logic
(20041025)Spatial conjunction is a powerful construct for reasoning about dynamically allocateddata structures, as well as concurrent, distributed and mobile computation. Whileresearchers have identified many uses of spatial ... 
On the Adaptive RealTime Detection of FastPropagating Network Worms
(20061110)We present two lightweight worm detection algorithms thatoffer significant advantages over fixedthreshold methods.The first algorithm, RBS (ratebased sequential hypothesis testing)aims at the large class of worms that ... 
On The Boolean Algebra of Shape Analysis Constraints
(20030822)Shape analysis is a promising technique for statically verifyingand extracting properties of programs that manipulatecomplex data structures. We introduce a new characterizationof constraints that arise in parametric ... 
On the difficulty of featurebased attentional modulations in visual object recognition: A modeling study.
(20040114)Numerous psychophysical experiments have shown an important role for attentional modulations in vision. Behaviorally, allocation of attention can improve performance in object detection and recognition tasks. At the neural ... 
On the Formal Semantics of the Cognitive Middleware AWDRAT
(20150303)The purpose of this work is two fold: on one hand we want to formalize the behavior of critical components of the self generating and adapting cognitive middleware AWDRAT such that the formalism not only helps to understand ... 
On the MaxFlow MinCut Ratio for Directed Multicommodity Flows
(20030705)We give a pure combinatorial problem whose solution determines maxflow mincut ratio for directed multicommodity flows. In addition, this combinatorial problem has applications in improving the approximation factor of ...