Search
Now showing items 1-10 of 30
Generating Communications Systems Through Shared Context
(2002-01-01)
In a distributed model of intelligence, peer components need to communicate with one another. I present a system which enables two agents connected by a thick twisted bundle of wires to bootstrap a simple communication ...
Amorphous Computing
(2007)
The goal of amorphous computing is to identify organizationalprinciples and create programming technologies for obtainingintentional, pre-specified behavior from the cooperation of myriadunreliable parts that are arranged ...
What the Assassin's Guild Taught Me About Distributed Computing
(2006-05-27)
Distributed computing and live-action roleplaying share many of thesame fundamental problems, as live-action roleplaying games commonly include simulations carried out by their players.Games run by the MIT Assassin's Guild ...
Infrastructure for Engineered Emergence on Sensor/Actuator Networks
(2006-03)
The ability to control emergent phenomena depends on decomposingthem into aspects susceptible to independent engineering. Forspatial self-managing systems, the amorphous-medium abstraction lets youseparate the systemÂs ...
Code for LOLCAT Method (Variant of Gillespie Algorithm)
(2009-09-04)
This code and data is publicly listed code for the LOLCAT Method developed by Sagar Indurkhya and Jacob Beal, in the paper: "Reaction factoring and bipartite update graphs accelerate the Gillespie algorithm for large-scale ...
CogSci to AI: It's the Brainware, Stupid!
(2006-03)
Current modularization techniques fail when applied to hard AI problems.But cognitive science shows that the mind has modules specialized for particular functions.Unlike current engineered modules, the modules of themind ...
Learning by Learning To Communicate
(2007-08-23)
Human intelligence is a product of cooperation among many different specialists. Much of this cooperation must be learned, but we do not yet have a mechanism that explains how this might happen for the "high-level" agile ...
Cognitive Security for Personal Devices
(2008-03-17)
Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human minds---for example, computers authenticate ...
Programming a Sensor Network as an Amorphous Medium
(2006-06)
In many sensor network applications, the network is deployedto approximate a physical space. The network itself is not ofinterest: rather, we are interested in measuring the propertiesof the space it fills, and of establishing ...
Leaderless Distributed Hierarchy Formation
(2002-12-01)
I present a system for robust leaderless organization of an amorphous network into hierarchical clusters. This system, which assumes that nodes are spatially embedded and can only talk to neighbors within a given radius, ...