Now showing items 1989-2008 of 3804

    • Mean Field Theory for Sigmoid Belief Networks 

      Saul, Lawrence K.; Jaakkola, Tommi; Jordan, Michael I. (1996-08-01)
      We develop a mean field theory for sigmoid belief networks based on ideas from statistical mechanics. Our mean field theory provides a tractable approximation to the true probability distribution in these networks; it ...
    • Measure Fields for Function Approximation 

      Marroquin, Jose L. (1993-06-01)
      The computation of a piecewise smooth function that approximates a finite set of data points may be decomposed into two decoupled tasks: first, the computation of the locally smooth models, and hence, the segmentation ...
    • The Measurement of Visual Motion 

      Hildreth, Ellen C.; Ullman, Shimon (1982-12-01)
      The analysis of visual motion divides naturally into two stages: the first is the measurement of motion, for example, the assignment of direction and magnitude of velocity to elements in the image, on the basis of the ...
    • The Measurement of Visual Motion 

      Hildreth, Ellen C.; Ullman, Shimon (1982-12-01)
      The analysis of visual motion divides naturally into two stages: the first is the measurement of motion, for example, the assignment of direction and magnitude of velocity to elements in the image, on the basis of the ...
    • Measuring User Characteristics on the MILTICS System 

      Rodriguez, Humberto, Jr. (1977-08)
      One of the problems in measuring the performance of a computer system is in defining its normal workload. In the case of timesharing systems, it is necessary to develop a behavioral model of the average user. This thesis ...
    • Mechanical Arm Control 

      Waters, Richard C. (MIT Artificial Intelligence Laboratory, 1973-03-19)
      This paper discusses three main problems associated with the control of the motion of a mechanical arm. 1) Transformation between different coordinate systems used to describe the state of the arm. 2) Calculation of ...
    • Mechanical Arm Control 

      Waters, Richard C. (1979-10-01)
      This paper discusses three main problems associated with the control of the motion of a mechanical arm. 1) Transformation between different coordinate systems associated with the arm. 2) Calculation of detailed ...
    • A Mechanical Arm Control System 

      Waters, Richard C. (1974-01-01)
      This paper describes a proposed mechanical arm control system and some of the lines of thought which led to this design. In particular, the paper discusses the basic systme required in order for the arm to control its ...
    • Mechanism Design With Approximate Player Types 

      Chiesa, Alessandro; Micali, Silvio; Zhu, Zeyuan Allen (2011-02-16)
      We investigate mechanism design when the players do not exactly know their types, but have instead only partial information about them.
    • Mechanism Design with Approximate Valuations 

      Chiesa, Alessandro; Micali, Silvio; Zhu, Zeyuan Allen (2011-02-16)
      In mechanism design, we replace the strong assumption that each player knows his own payoff type EXACTLY with the more realistic assumption that he knows it only APPROXIMATELY. Specifically, we study the classical problem ...
    • Mechanisms and Interfaces for Software-Extended Coherent Shared Memory 

      Chaiken, David L. (1995-01)
      Software-extended systems use a combination of hardware and software to implement shared memory on large-scale multiprocessors. Hardware mechanisms accelerate common-case accesses, while software handles exceptional events. ...
    • Mechanization of Temporal Knowledge 

      Kahn, Kenneth M. (1975-09)
      The design and implementation of a collection of computer programs knowledgeable about time "in general," called the time specialist, is described. The thesis that this time specialist can be placed in the service of ...
    • Memoization Attacks and Copy Protection in Partitioned Applications 

      O'Donnell, Charles W.; Suh,, G. Edward; Dijk, Marten vn; Devadas, Srinivas (2006-12-08)
      Application source code protection is a major concern for software architects today. Secure platforms have been proposed that protect the secrecy of application algorithms and enforce copy protection assurances. Unfortunately, ...
    • Memory Assignment for Multiprocessor Caches Through Graph Coloring 

      Agarwal, Anant; Guttag, John; Papaefthymiou, Marios (1992-02)
      It has become apparent that the achieved performance of multiprocessors is heavily dependent upon the quality of the availabel compilers. In this paper we are concerned with compile-time techniques that can be used to ...
    • Merging Illustrations and Printing on Big Paper 

      Roylance, Gerald (MIT Artificial Intelligence Laboratory, 1987-07)
      How to guide for some of the printing utilities in the AI lab. Describes how TEX tiles are processed and how some illustrations may be merged into the final copy. Also describes how to use TEX to print on 8.5x14 (legal) ...
    • Message-Driven Dynamics 

      Lethin, Richard Anton (1997-07)
    • Message-Driven Processor Architecture: Verson 11 

      Dally, William; Chien, Andrew; Fiske, Stuart; Horwat, Waldemar; Keen, John; e.a. (1988-08-01)
      The Message-Driven Processor is a node of a large-scale multiprocessor being developed by the Concurrent VLSI Architecture Group. It is intended to support fine-grained, message passing, parallel computation. It contains ...
    • Meta-evaluation of Actors with Side-effects 

      Yonezawa, Akinori (MIT Artificial Intelligence Laboratory, 1975-06)
      Meta-evaluation is a process which symbolically evaluates an actor and checks to see whether the actor fulfills its contract (specification). A formalism for writing contracts for actors with side-effects which allow sharing ...
    • Meta-evaluation of Actors with Side-effects 

      Yonezawa, Akinori (MIT Artificial Intelligence Laboratory, 1975-06)
      Meta-evaluation is a process which symbolically evaluates an actor and checks to see whether the actor fulfills its contract (specification). A formalism for writing contracts for actors with side-effects is presented. ...
    • Meta-Rules: Reasoning About Control 

      Davis; Randall (1980-03-01)
      How can we insure that knowledge embedded in a program is applied effectively? Traditionally the answer to this question has been sought in different problem solving paradigms and in different approaches to encoding ...