Search
Now showing items 281-290 of 2403
Compiler techniques for scalable performance of stream programs on multicore architectures
(Massachusetts Institute of Technology, 2010)
Given the ubiquity of multicore processors, there is an acute need to enable the development of scalable parallel applications without unduly burdening programmers. Currently, programmers are asked not only to explicitly ...
Electropermanent magnetic connectors and actuators : devices and their application in programmable matter
(Massachusetts Institute of Technology, 2010)
Programmable matter is a digital material having computation, sensing, and actuation capabilities as continuous properties active over its whole extent. To make programmable matter economical to fabricate, we want to use ...
Parallel algorithms and architectures for low power video decoding
(Massachusetts Institute of Technology, 2010)
Parallelism coupled with voltage scaling is an effective approach to achieve high processing performance with low power consumption. This thesis presents parallel architectures and algorithms designed to deliver the power ...
Motion blur removal from photographs
(Massachusetts Institute of Technology, 2010)
One of the long-standing challenges in photography is motion blur. Blur artifacts are generated from relative motion between a camera and a scene during exposure. While blur can be reduced by using a shorter exposure, this ...
Learning noisy characters, multiplication codes, and cryptographic hardcore predicates
(Massachusetts Institute of Technology, 2008)
We present results in cryptography, coding theory and sublinear algorithms. In cryptography, we introduce a unifying framework for proving that a Boolean predicate is hardcore for a one-way function and apply it to a broad ...
Reducing exception management overhead with software restart markers
(Massachusetts Institute of Technology, 2008)
Modern processors rely on exception handling mechanisms to detect errors and to implement various features such as virtual memory. However, these mechanisms are typically hardware-intensive because of the need to buffer ...
Defending networked resources against floods of unwelcome requests
(Massachusetts Institute of Technology, 2008)
The Internet is afflicted by "unwelcome requests'" defined broadly as spurious claims on scarce resources. For example, the CPU and other resources at a server are targets of denial-of-service (DOS) attacks. Another example ...
Charge-carrier transport in amorphous organic semiconductors
(Massachusetts Institute of Technology, 2008)
Since the first reports of efficient luminescence and absorption in organic semiconductors, organic light-emitting devices (OLEDs) and photovoltaics (OPVs) have attracted increasing interest. Organic semiconductors have ...
Measuring nanometer, three-dimensional motions with light microscopy
(Massachusetts Institute of Technology, 1997)
Characterizing and recognizing spoken corrections in human-computer dialog
(Massachusetts Institute of Technology, 1998)
Miscommunication in human-computer spoken language systems is unavoidable. Recognition failures on the part of the system necessitate frequent correction attempts by the user. Unfortunately and counterintuitively, users' ...