Browsing Computer Science and Artificial Intelligence Lab (CSAIL) by Title
Now showing items 2992-3011 of 3804
-
Safe Distributed Coordination of Heterogeneous Robots through Dynamic Simple Temporal Networks
(2003-05-30)Research on autonomous intelligent systems has focused on how robots can robustly carry out missions in uncertain and harsh environments with very little or no human intervention. Robotic execution languages such as RAPs, ... -
Safe Open-Nested Transactions Through Ownership
(2008-02-20)Researchers in transactional memory (TM) have proposed open nesting asa methodology for increasing the concurrency of a program. The ideais to ignore certain "low-level" memory operations of anopen-nested transaction when ... -
Safe Runtime Downcasts With Ownership Types
(2002-06) -
A Safe, Efficient Object Database Interface Using Batched Futures
(1994-07)For many systems such as operating systems and databases it is important to run client code in a separate protection domain so that it cannot interfere with the correct operation of the system. Clients communicate with ... -
Safety and Optimization Transformations for Data Flow Programs
(1980-07)The data flow concept of computation seeks to achieve high performance by allowing concurrent execution of instructions based on the availability of data. This thesis explores the translation of a subset of the high level ... -
SARGE: A Program for Drilling Students in Freshman Calculus Integration Problems
(1968-03-01)The SARGE program is a prototype of a program which is intended to be used as an adjacent to regular classroom work in freshman calculus. Using SARGE, students can type their step-by-step solution to an indefinite ... -
Scalable directoryless shared memory coherence using execution migration
(2010-11-22)We introduce the concept of deadlock-free migration-based coherent shared memory to the NUCA family of architectures. Migration-based architectures move threads among cores to guarantee sequential semantics in large ... -
A Scalable Information Theoretic Approach to Distributed Robot Coordination
(2011-09-25)This paper presents a scalable information theoretic approach to infer the state of an environment by distributively controlling robots equipped with sensors. The robots iteratively estimate the environment state using a ... -
Scalable Information-Sharing Network Management
(2011-06-07)This thesis analyzes scalable information-sharing network management. It looks into one of the large problems in network management today: finding information across different network domains. Information-sharing network ... -
Scalable Inter-Cluster Communications Systems for Clustered Microprocessors
(1998-06)As workstation clusters move away from uniprocessors in favor of multiprocessors to support the increasing computational needs of distributed applications, greater demands are placed on the communication interfaces that ... -
Scalable Internet Routing on Topology-Independent Node Identities
(2003-10-31)Unmanaged Internet Protocol (UIP) is a fully selforganizingnetwork-layer protocol that implements scalableidentity-based routing. In contrast with addressbasedrouting protocols, which depend for scalability oncentralized ... -
Scalable Packet Classification Using Bit Vector Aggregating and Folding
(2003-04)Packet classification is a central function for a number of network applications, such as routing and firewalls. Most existing algorithms for packet classification scale poorly in either time or space when the database ... -
Scalable Reader-writer Locks for Parallel Systems
(1991-11)Current algorithms for reader-writer synchronization exhibit poor scalability because they do not allow readers to acquire locks independently. We describe two new algorithms for reader-writer synchronization that allow ... -
Scalable, Controlled Imagery Capture in Urban Environments
(2001-09)We describe the design considerations underlying a system for scalable, automated capture of precisely controlled imagery in urban scenes. The system operates for architectural scenes in which, from every camera position, ... -
Scalar Operand Networks: Design, Implementation, and Analysis
(2004-06-08)The bypass paths and multiported register files in microprocessors serve as an implicit interconnect tocommunicate operand values among pipeline stages and multiple ALUs. Previous superscalar designs implementedthis ... -
Scale Control Processor Test-Chip
(2007-01-12)We are investigating vector-thread architectures which provide competitive performance and efficiency across a broad class of application domains. Vector-thread architectures unify data-level, thread-level, and instruction-level ... -
Scaling Theorems for Zero-Crossings
(1983-06-01)We characterize some properties of the zero-crossings of the laplacian of signals - in particular images - filtered with linear filters, as a function of the scale of the filter (following recent work by A. Witkin, 1983). ...