Search
Now showing items 1-10 of 295
Harvesting Application Information for Industry-Scale Relational Schema Matching
(2013-09-10)
Consider the problem of migrating a company's CRM or ERP database from one application to another, or integrating two such databases as a result of a merger. This problem requires matching two large relational schemas with ...
Power-Aware Computing with Dynamic Knobs
(2010-05-14)
We present PowerDial, a system for dynamically adapting application behavior to execute successfully in the face of load and power fluctuations. PowerDial transforms static configuration parameters into dynamic knobs that ...
The Cost of Global Broadcast Using Abstract MAC Layers
(2010-02-09)
We analyze greedy algorithms for broadcasting messages throughout a multi-hop wireless network, using a slot-based model that includes message collisions without collision detection. Our algorithms are split formally into ...
Queueing Theory Analysis of Labor & Delivery at a Tertiary Care Center
(MIT CSAIL, 2014-12-16)
Labor and Delivery is a complex clinical service requiring the support of highly trained healthcare professionals from Obstetrics, Anesthesiology, and Neonatology and the access to a finite set of valuable resources. In ...
Supplementary Materials for "A Survey of Corpora in Computational and Cognitive Narrative Science"
(2014-12-30)
This archive contains supplementary materials for the article titled "A Survey of Corpora in Computational and Cognitive Narrative Science" by Mark A. Finlayson, published in the journal *Sprache und Datenverarbeitung*. ...
A hypothesis-based algorithm for planning and control in non-Gaussian belief spaces
(2011-08-27)
We consider the partially observable control problem where it is potentially necessary to perform complex information-gathering operations in order to localize state. One approach to solving these problems is to create ...
Verifying Quantitative Reliability of Programs That Execute on Unreliable Hardware
(2013-06-19)
Emerging high-performance architectures are anticipated to contain unreliable components that may exhibit soft errors, which silently corrupt the results of computations. Full detection and recovery from soft errors is ...
A Suite of Techniques for Describing Activity in Terms of Events
(2015-03-30)
This report presents a set of software techniques that support the tasks of event recognition, summarization of event sequences, explanation of recognized events, explanation of non-recognized events, prediction of event ...
Bridging Utility Maximization and Regret Minimization
(2013-12-03)
We relate the strategies obtained by (1) utility maximizers who use regret to refine their set of undominated strategies, and (2) regret minimizers who use weak domination to refine their sets of regret-minimizing strategies.
An Analysis of Patch Plausibility and Correctness for Generate-And-Validate Patch Generation Systems
(2015-05-26)
We analyze reported patches for three existing generate-and-validate patch generation systems (GenProg, RSRepair, and AE). The basic principle behind generate-and-validate systems is to accept only plausible patches that ...