Browsing CSAIL Digital Archive by Title
Now showing items 1-20 of 807
-
3D Tracking via Body Radio Reflections
(2013-12-11)This paper introduces WiTrack, a system that tracks the 3D motion of a user from the radio signals reflected off her body. It works even if the person is occluded from the WiTrack device or in a different room. WiTrack ... -
4D Frequency Analysis of Computational Cameras for Depth of Field Extension
(2009-05-08)Depth of field (DOF), the range of scene depths that appear sharp in a photograph, poses a fundamental tradeoff in photography---wide apertures are important to reduce imaging noise, but they also increase defocus blur. ... -
5D Covariance Tracing for Efficient Defocus and Motion Blur
(2012-11-16)The rendering of effects such as motion blur and depth-of-field requires costly 5D integrals. We dramatically accelerate their computation through adaptive sampling and reconstruction based on the prediction of the anisotropy ... -
A 1020-Node Modular Microphone Array and Beamformer for Intelligent Computing Spaces
(2004-04-14)Ubiquitous computing environments are characterized by an unboundedamount of noise and crosstalk. In these environments, traditionalmethods of sound capture are insufficient, and array microphones areneeded in order to ... -
A Combined Pointer and Purity Analysis for Java Programs
(2004-05-17)We present a new method purity analysis for Java programs.A method is pure if it does not mutate any location that exists in the program state right before method invocation.Our analysis is built on top of a combined pointer ... -
A Combined Stochastic and Greedy Hybrid Estimation Capability for Concurrent Hybrid Models with Autonomous Mode Transitions
(2006-04-28)Robotic and embedded systems have become increasingly pervasive in applicationsranging from space probes and life support systems to robot assistants. In order to act robustly in the physical world, robotic systems must ... -
A Consistency Management Layer for Inter-Domain Routing
(2006-01-27)This paper proposes an isolation layer -- a shim -- betweeninter-domain routing and packet forwarding. The job of this layer isto coordinate between Autonomous Systems (AS's) on when and how tomodify the forwarding state ... -
A Constant-Factor Approximation Algorithm for Embedding Unweighted Graphs into Trees
(2004-07-05)We present a constant-factor approximation algorithm for computing anembedding of the shortest path metric of an unweighted graph into atree, that minimizes the multiplicative distortion. -
A Correctness Proof for a Byzantine-Fault-Tolerant Read/Write Atomic Memory with Dynamic Replica Membership
(2003-09-25)We prove correctness of a Byzantine-fault-tolerant replication algorithm for a read/writeatomic memory that supports a dynamic replica set. -
A Dynamic Data Structure for Checking Hyperacyclicity
(2005-01-03)We present a dynamic data structure that keeps track of an acyclic hypergraph (equivalently, a triangulated graph) and enables verifying that adding a candidate hyperedge (clique) will not break the acyclicity of the ... -
A Fast Approximation of the Bilateral Filter using a Signal Processing Approach
(2006-11-09)The bilateral filter is a nonlinear filter that smoothes a signal while preserving strong edges. It has demonstrated great effectiveness for a variety of problems in computer vision and computer graphics, and fast versions ... -
A Few Days of A Robot's Life in the Human's World: Toward Incremental Individual Recognition
(2007-04-03)This thesis presents an integrated framework and implementation for Mertz, an expressive robotic creature for exploring the task of face recognition through natural interaction in an incremental and unsupervised fashion. ... -
A general mechanism for tuning: Gain control circuits and synapses underlie tuning of cortical neurons
(2004-12-31)Tuning to an optimal stimulus is a widespread property of neurons in cortex. We propose that such tuning is a consequence of normalization or gain control circuits. We also present a biologically plausible neural circuitry ... -
A Machine-Checked Safety Proof for a CISC-Compatible SFI Technique
(2006-05-11)Executing untrusted code while preserving security requires that thecode be prevented from modifying memory or executing instructionsexcept as explicitly allowed. Software-based fault isolation (SFI) or"sandboxing" enforces ... -
A new biologically motivated framework for robust object recognition
(2004-11-14)In this paper, we introduce a novel set of features for robust object recognition, which exhibits outstanding performances on a variety ofobject categories while being capable of learning from only a fewtraining examples. ... -
A Novel Active Contour Framework. Multi-component Level Set Evolution under Topology Control
(2005-06-01)We present a novel framework to exert a topology control over a level set evolution. Level set methods offer several advantages over parametric active contours, in particular automated topological changes. In some applications, ... -
A Probabilistic Particle Control Approach to Optimal, Robust Predictive Control
(2006-04-28)Autonomous vehicles need to be able to plan trajectories to a specified goal that avoid obstacles, and are robust to the inherent uncertainty in the problem. This uncertainty arises due to uncertain state estimation, ... -
A Quantitative Comparison of Reconfigurable, Tiled, and Conventional Architectures on Bit-level Computation
(2004-04-13)General purpose computing architectures are being called on to work on amore diverse application mix every day. This has been fueled by the needfor reduced time to market and economies of scale that are the hallmarksof ... -
A Region-based Architecture for Service-Providing Distributed Systems
(2005-05-17)A service-providing system consists of hosts that provide services such as data, content, computational and memory resources and data-based services to other entities in the system. Consumers that wish to use services ... -
A Reliable Broadcast Scheme for Sensor Networks
(2003-08-11)In this short technical report, we present a simple yet effective reliable broadcast protocol for sensor networks. This protocol disseminates packets throughout the sensor network by flooding and recovers from losses ...