Now showing items 1-20 of 3805

    • 11SIM Reference Manual 

      Eastlake, Donald (1971-12-01)
      A program that simulates a Digital Equipment Corporation PDP-11 computer and many of its peripherals on the AI Laboratory Time Sharing System (ITS) is described from a user's reference point of view. This simulator has ...
    • 11SIM Reference Manual 

      Eastlake, Donald E. (1972-02-01)
      A program that simulates a Digital Equipment Corporation PDP-11 computer and many of its peripherals on the AI Laboratory Time Sharing System (ITS) is described from a user's reference point of view. This simulator has ...
    • 1968-1969 Progress Report 

      Minsky, Marvin; Papert, Seymour A. (1970-01-01)
      This report mainly summarizes the Project MAC A.I. Group work between July 1968 and June 1969 but covers some work up to February 1970. The work on computer vision is described in detail. This summary should be read ...
    • The 1990 AI Fair 

      Flynn, Anita M. (1990-08-01)
      This year, as the finale to the Artificial Intelligence Laboratory's annual Winter Olympics, the Lab staged an AI Fair ??night devoted to displaying the wide variety of talents and interests within the laboratory. The ...
    • 2D-3D Rigid-Body Registration of X-Ray Fluoroscopy and CT Images 

      Zollei, Lilla (2001-08-01)
      The registration of pre-operative volumetric datasets to intra- operative two-dimensional images provides an improved way of verifying patient position and medical instrument loca- tion. In applications from orthopedics ...
    • 2RegionRED: a Congestion Control Mechanism for the High Speed Internet 

      Wang, Karen (2001-12)
      This thesis proposes a new Active Queue Management (AQM) scheme called 2RegionRED. It is superior to the classic Random Early Detection (RED) algorithm in that there is an intuitive way to set its parameters and it is ...
    • 3D Object Recognition: Symmetry and Virtual Views 

      Vetter, Thomas; Poggio, Tomaso; B'ulthoff, Heinrich (1992-12-01)
      Many 3D objects in the world around us are strongly constrained. For instance, not only cultural artifacts but also many natural objects are bilaterally symmetric. Thoretical arguments suggest and psychophysical ...
    • 3D Pose from Three Corresponding Points Under Weak-Perspective Projection 

      Alter, T.D. (1992-07-01)
      Model-based object recognition commonly involves using a minimal set of matched model and image points to compute the pose of the model in image coordinates. Furthermore, recognition systems often rely on the ...
    • 3D Tracking via Body Radio Reflections 

      Adib, Fadel; Kabelac, Zach; Katabi, Dina; Miller, Robert C. (2013-12-11)
      This paper introduces WiTrack, a system that tracks the 3D motion of a user from the radio signals reflected off her body. It works even if the person is occluded from the WiTrack device or in a different room. WiTrack ...
    • 4D Frequency Analysis of Computational Cameras for Depth of Field Extension 

      Levin, Anat; Hasinoff, Samuel W.; Freeman, William T.; Green, Paul; Durand, Fredo (2009-05-08)
      Depth of field (DOF), the range of scene depths that appear sharp in a photograph, poses a fundamental tradeoff in photography---wide apertures are important to reduce imaging noise, but they also increase defocus blur. ...
    • 5D Covariance Tracing for Efficient Defocus and Motion Blur 

      Belcour, Laurent; Soler, Cyril; Subr, Kartic; Holzschuch, Nicolas; Durand, Fredo (2012-11-16)
      The rendering of effects such as motion blur and depth-of-field requires costly 5D integrals. We dramatically accelerate their computation through adaptive sampling and reconstruction based on the prediction of the anisotropy ...
    • A 1020-Node Modular Microphone Array and Beamformer for Intelligent Computing Spaces 

      Weinstein, Eugene; Steele, Kenneth; Agarwal, Anant; Glass, James (2004-04-14)
      Ubiquitous computing environments are characterized by an unboundedamount of noise and crosstalk. In these environments, traditionalmethods of sound capture are insufficient, and array microphones areneeded in order to ...
    • A Combined Pointer and Purity Analysis for Java Programs 

      Salcianu, Alexandru; Rinard, Martin (2004-05-17)
      We present a new method purity analysis for Java programs.A method is pure if it does not mutate any location that exists in the program state right before method invocation.Our analysis is built on top of a combined pointer ...
    • A Combined Stochastic and Greedy Hybrid Estimation Capability for Concurrent Hybrid Models with Autonomous Mode Transitions 

      Blackmore, Lars; Funiak, Stanislav; Williams, Brian (2006-04-28)
      Robotic and embedded systems have become increasingly pervasive in applicationsranging from space probes and life support systems to robot assistants. In order to act robustly in the physical world, robotic systems must ...
    • A Consistency Management Layer for Inter-Domain Routing 

      Kushman, Nate; Katabi, Dina; Wroclawski, John (2006-01-27)
      This paper proposes an isolation layer -- a shim -- betweeninter-domain routing and packet forwarding. The job of this layer isto coordinate between Autonomous Systems (AS's) on when and how tomodify the forwarding state ...
    • A Constant-Factor Approximation Algorithm for Embedding Unweighted Graphs into Trees 

      Badoiu, Mihai; Indyk, Piotr; Sidiropoulos, Anastasios (2004-07-05)
      We present a constant-factor approximation algorithm for computing anembedding of the shortest path metric of an unweighted graph into atree, that minimizes the multiplicative distortion.
    • A Correctness Proof for a Byzantine-Fault-Tolerant Read/Write Atomic Memory with Dynamic Replica Membership 

      Rodrigues, Rodrigo; Liskov, Barbara (2003-09-25)
      We prove correctness of a Byzantine-fault-tolerant replication algorithm for a read/writeatomic memory that supports a dynamic replica set.
    • A Dynamic Data Structure for Checking Hyperacyclicity 

      Liang, Percy; Srebro, Nati (2005-01-03)
      We present a dynamic data structure that keeps track of an acyclic hypergraph (equivalently, a triangulated graph) and enables verifying that adding a candidate hyperedge (clique) will not break the acyclicity of the ...
    • A Fast Approximation of the Bilateral Filter using a Signal Processing Approach 

      Paris, Sylvain; Durand, Fredo (2006-11-09)
      The bilateral filter is a nonlinear filter that smoothes a signal while preserving strong edges. It has demonstrated great effectiveness for a variety of problems in computer vision and computer graphics, and fast versions ...
    • A Few Days of A Robot's Life in the Human's World: Toward Incremental Individual Recognition 

      Aryananda, Lijin (2007-04-03)
      This thesis presents an integrated framework and implementation for Mertz, an expressive robotic creature for exploring the task of face recognition through natural interaction in an incremental and unsupervised fashion. ...