MIT Libraries homeMIT Libraries logoDSpace@MIT

MIT
Search 
  • DSpace@MIT Home
  • Computer Science and Artificial Intelligence Lab (CSAIL)
  • Search
  • DSpace@MIT Home
  • Computer Science and Artificial Intelligence Lab (CSAIL)
  • Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Search

Show Advanced FiltersHide Advanced Filters

Filters

Use filters to refine the search results.

Now showing items 1-10 of 65

  • Sort Options:
  • Relevance
  • Title Asc
  • Title Desc
  • Issue Date Asc
  • Issue Date Desc
  • Results Per Page:
  • 5
  • 10
  • 20
  • 40
  • 60
  • 80
  • 100
Thumbnail

Automatic Class-Specific 3D Reconstruction from a Single Image 

Lozano-Perez, Tomas; Kaelbling, Leslie Pack; Chiu, Han-Pang (2009-02-18)
Our goal is to automatically reconstruct 3D objects from a single image, by using prior 3D shape models of classes. The shape models, defined as a collection of oriented primitive shapes centered at fixed 3D positions, can ...
Thumbnail

Overcoming the Antennas-Per-Node Throughput Limit in MIMO LANs 

Perli, Samuel David; Gollakota, Shyamnath; Katabi, Dina (2009-02-18)
Today, the number of concurrent packets in a MIMO LAN is limited by the number of antennas on the AP. This paper shows how to overcome this limit. It presents a new design where multiple client-AP pairs can communicate ...
Thumbnail

Oblivious Routing in On-Chip Bandwidth-Adaptive Networks 

Kinsy, Michel; Wen, Tina; Shim, Keun Sup; Lis, Mieszko; Cho, Myong Hyon; e.a. (2009-03-27)
Oblivious routing can be implemented on simple router hardware, but network performance suffers when routes become congested. Adaptive routing attempts to avoid hot spots by re-routing flows, but requires more complex ...
Thumbnail

Modeling Radio Networks 

Lynch, Nancy; Newport, Calvin (2009-06-04)
We describe a modeling framework and collection of foundational composition results for the study of probabilistic distributed algorithms in synchronous radio networks. Existing results in this setting rely on informal ...
Thumbnail

Rational Robustness for Mechanism Design 

Micali, Silvio; Chen, Jing (2009-11-10)
The currently prevailing equilibrium-based approach to mechanism design suffers from a plurality of fundamental problems, and new conceptual frameworks are needed to solve or sufficiently alleviate them. In this paper, we ...
Thumbnail

A Unified Operating System for Clouds and Manycore: fos 

Modzelewski, Kevin; Miller, Jason; Belay, Adam; Beckmann, Nathan; Gruenwald, Charles, III; e.a. (2009-11-20)
Single chip processors with thousands of cores will be available in the next ten years and clouds of multicore processors afford the operating system designer thousands of cores today. Constructing operating systems for ...
Thumbnail

Sufficient Conditions for Uniform Stability of Regularization Algorithms 

Poggio, Tomaso; Rosasco, Lorenzo; Wibisono, Andre (2009-12-01)
In this paper, we study the stability and generalization properties of penalized empirical-risk minimization algorithms. We propose a set of properties of the penalty term that is sufficient to ensure uniform ?-stability: ...
Thumbnail

The Video Mesh: A Data Structure for Image-based Video Editing 

Durand, Fredo; Cohen, Michael; Chen, Jiawen; Paris, Sylvain; Wang, Jue; e.a. (2009-12-16)
This paper introduces the video mesh, a data structure for representing video as 2.5D "paper cutouts." The video mesh allows interactive editing of moving objects and modeling of depth, which enables 3D effects and ...
Thumbnail

Selective Vectorization for Short-Vector Instructions 

Amarasinghe, Saman; Rabbah, Rodric; Larsen, Samuel (2009-12-18)
Multimedia extensions are nearly ubiquitous in today's general-purpose processors. These extensions consist primarily of a set of short-vector instructions that apply the same opcode to a vector of operands. Vector ...
Thumbnail

HAMPI: A Solver for String Constraints 

Ernst, Michael D.; Kiezun, Adam; Ganesh, Vijay; Guo, Philip J.; Hooimeijer, Pieter (2009-02-04)
Many automatic testing, analysis, and verification techniques for programs can be effectively reduced to a constraint-generation phase followed by a constraint-solving phase. This separation of concerns often leads to more ...
  • 1
  • 2
  • 3
  • 4
  • . . .
  • 7

Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CommunityBy Issue DateAuthorsTitlesSubjects

My Account

Login

Discover

AuthorAgarwal, Anant (8)Lynch, Nancy (6)Kuhn, Fabian (5)Poggio, Tomaso (5)Durand, Fredo (4)Eastep, Jonathan (4)Hoffmann, Henry (4)Serre, Thomas (4)Beckmann, Nathan (3)Benjamin, Michael R. (3)... View MoreDepartmentMassachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science (2)Electrical Engineering and Computer Science (1)Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science (1)DegreeDoctor of Philosophy (1)M.Eng. (1)Ph.D. (1)Ph.D. in Computer Science (1)Subjectcomputation (3)MOOS (3)MOOSDB (3)USV (3)UUV (3)Action Selection (2)Arbitration (2)Artificial Intelligence (2)artificial intelligence (2)Autonomous Decision Making (2)... View MoreDate Issued
2009 (65)
Has File(s)Yes (65)

Statistics

OA StatisticsStatistics by CountryStatistics by Department
MIT Libraries homeMIT Libraries logo

Find us on

Twitter Facebook Instagram YouTube RSS

MIT Libraries navigation

SearchHours & locationsBorrow & requestResearch supportAbout us
PrivacyPermissionsAccessibility
MIT
Massachusetts Institute of Technology
Content created by the MIT Libraries, CC BY-NC unless otherwise noted. Notify us about copyright concerns.