Now showing items 754-773 of 775

    • Versatility and VersaBench: A New Metric and a Benchmark Suite for Flexible Architectures 

      Rabbah, Rodric M.; Bratt, Ian; Asanovic, Krste; Agarwal, Anant (2004-06-14)
      For the last several decades, computer architecture research has largely benefited from, and continues to be driven by ad-hoc benchmarking. Often the benchmarks are selected to represent workloads that architects believe ...
    • Victim Migration: Dynamically Adapting Between Private and Shared CMP Caches 

      Zhang, MIchael; Asanovic, Krste (2005-10-10)
      Future CMPs will have more cores and greater onchip cache capacity. The on-chip cache can either be divided into separate private L2 caches for each core, or treated as a large shared L2 cache. Private caches provide low ...
    • Video Matching 

      Sand, Peter; Teller, Seth (2004-05-11)
      This paper describes a method for bringing two videos (recorded at different times) into spatiotemporal alignment, then comparing and combining corresponding pixels for applications such as background subtraction, compositing, ...
    • The Video Mesh: A Data Structure for Image-based Video Editing 

      Durand, Fredo; Cohen, Michael; Chen, Jiawen; Paris, Sylvain; Wang, Jue; e.a. (2009-12-16)
      This paper introduces the video mesh, a data structure for representing video as 2.5D "paper cutouts." The video mesh allows interactive editing of moving objects and modeling of depth, which enables 3D effects and ...
    • Viewstamped Replication Revisited 

      Liskov, Barbara; Cowling, James (2012-07-23)
      This paper presents an updated version of Viewstamped Replication, a replication technique that handles failures in which nodes crash. It describes how client requests are handled, how the group reorganizes when a replica ...
    • Virtual Mobile Nodes for Mobile Ad Hoc Networks 

      Dolev, Shlomi; Gilbert, Seth; Lynch, Nancy A.; Schiller, Elad; Shvarstman, Alex A.; e.a. (2004-02-26)
      One of the most significant challenges introduced by mobile networks is the difficulty in coping withthe unpredictable movement of mobile nodes. If, instead, the mobile nodes could be programmed totravel through the world ...
    • Virtual Monotonic Counters and Count-Limited Objects using a TPM without a Trusted OS (Extended Version) 

      Sarmenta, Luis F. G.; van Dijk, Marten; O'Donnell, Charles W.; Rhodes, Jonathan; Devadas, Srinivas (2006-09-11)
      A trusted monotonic counter is a valuable primitive thatenables a wide variety of highly scalable offlineand decentralized applications that would otherwise be prone to replay attacks, including offline payment, e-wallets, ...
    • Virtual Stationary Automata for Mobile Networks 

      Dolev, Shlomi; Gilbert, Seth; Lahiani, Limor; Lynch, Nancy; Nolte, Tina (2005-01-21)
      We define a programming abstraction formobile networks called the Virtual Stationary Automataprogramming layer, consisting of real mobile clients, virtualtimed I/O automata called virtual stationary automata(VSAs), and a ...
    • Virtual Visual Hulls: Example-Based 3D Shape Estimation from a Single Silhouette 

      Grauman, Kristen; Shakhnarovich, Gregory; Darrell, Trevor (2004-01-28)
      Recovering a volumetric model of a person, car, or other objectof interest from a single snapshot would be useful for many computergraphics applications. 3D model estimation in general is hard, andcurrently requires active ...
    • Vote the OS off your Core 

      Belay, Adam; Wentzlaff, David; Agarwal, Anant (2011-07-27)
      Recent trends in OS research have shown evidence that there are performance benefits to running OS services on different cores than the user applications that rely on them. We quantitatively evaluate this claim in terms ...
    • Wait-free Regular Storage from Byzantine Components 

      Abraham, Ittai; Chockler, Gregory; Keidar, Idit; Malkhi, Dahlia (2005-04-05)
      We present a simple, efficient, and self-contained construction of a wait-free regular register from Byzantine storage components. Our construction utilizes a novel building block, called 1-regular register, which can be ...
    • Was the Patient Cured? Understanding Semantic Categories and Their Relationships in Patient Records 

      Sibanda, Tawanda Carleton (2006-06-28)
      In this thesis, we detail an approach to extracting key information in medical discharge summaries. Starting with a narrative patient report, we first identify and remove information that compromises privacy (de-identifi ...
    • WaveScript: A Case-Study in Applying a Distributed Stream-Processing Language 

      Newton, Ryan; Girod, Lewis; Craig, Michael; Madden, Sam; Morrisett, Greg (2008-01-31)
      Applications that combine live data streams with embedded, parallel,and distributed processing are becoming more commonplace. WaveScriptis a domain-specific language that brings high-level, type-safe,garbage-collected ...
    • Werner Reichardt: the man and his scientific legacy 

      Poggio, Tomaso (2011-03-04)
      Excerpts from a talk given by Tomaso Poggio in Tübingen on the opening ofthe Werner Reichardt Centrun für Integrative Neurowissenschaften, December 8, 2008.
    • Whanaungatanga: Sybil-proof routing with social networks 

      Lesniewski-Laas, Chris; Kaashoek, M. Frans (2009-09-24)
      Decentralized systems, such as distributed hash tables, are subject to the Sybil attack, in which an adversary creates many false identities to increase its influence. This paper proposes a routing protocol for a distributed ...
    • What is Decidable about Strings? 

      Ganesh, Vijay; Minnes, Mia; Solar-Lezama, Armando; Rinard, Martin (2011-02-01)
      We prove several decidability and undecidability results for the satisfiability/validity problem of formulas over a language of finite-length strings and integers (interpreted as lengths of strings). The atomic formulas ...
    • What the Assassin's Guild Taught Me About Distributed Computing 

      Beal, Jacob (2006-05-27)
      Distributed computing and live-action roleplaying share many of thesame fundamental problems, as live-action roleplaying games commonly include simulations carried out by their players.Games run by the MIT Assassin's Guild ...
    • Wicked Problems and Gnarly Results: Reflecting on Design and Evaluation Methods for Idiosyncratic Personal Information Management Tasks 

      Bernstein, Michael; Van Kleek, Max; Khushraj, Deepali; Nayak, Rajeev; Liu, Curtis; e.a. (2008-02-10)
      This paper is a case study of an artifact design and evaluation process; it is a reflection on how right thinking about design methods may at times result in sub-optimal results. Our goal has been to assess our decision ...
    • Wide-Area Egomotion Estimation from Known 3D Structure 

      Koch, Olivier; Teller, Seth (2006-01-09)
      We describe an algorithm that takes as inputs a coarse3D model of an environment, and a video sequence acquiredwithin the environment, and produces as output an estimateof the cameraÂ’s 6-DOF egomotion expressed in the ...
    • World Wide Web Without Walls 

      Brodsky, Micah Z. (Micah Zev); Krohn, Maxwell; Morris, Robert; Walfish, Michael; Yip, Alexander (2007-08-24)
      Today's Web is built upon a particular symbiotic relationship betweensites and users: the sites invest capital to create and market a setof features, and users gain access to the sites often in exchange fortheir data (e.g., ...