The exciting thing here is that you create this device that has embedded computation in the flat printed version says Daniela Rus the Andrew
and Erna Viterbi Professor of Electrical engineering and Computer science at MIT and one of the Science paper s co-authors.
Rus is joined on the paper by Erik Demaine an MIT professor of computer science and engineering and by three researchers at Harvard s Wyss Institute for Biologically Inspired Engineering and School of Engineering and Applied sciences:
In prior work Rus Demaine and Wood developed an algorithm that could automatically convert any digitally specified 3-D shape into an origami folding pattern.
but that s probably tolerable for many applications In the meantime Demaine is planning to revisit the theoretical analysis that was the basis of the researchers original folding algorithm to determine
and computer science at the University of California at Berkeley who has been following the MIT and Harvard researchers work.
#Extracting audio from visual information Algorithm recovers speech from the vibrations of a potato-chip bag filmed through soundproof glass.
and Adobe have developed an algorithm that can reconstruct an audio signal by analyzing minute vibrations of objects depicted in video.
a graduate student in electrical engineering and computer science at MIT and first author on the new paper. he motion of this vibration creates a very subtle visual signal that usually invisible to the naked eye.
Joining Davis on the Siggraph paper are Frédo Durand and Bill Freeman, both MIT professors of computer science and engineering;
So the researchers borrowed a technique from earlier work on algorithms that amplify minuscule variations in video
The researchers developed an algorithm that combines the output of the filters to infer the motions of an object as a whole
so the algorithm first aligns all the measurements so that they won cancel each other out. And it gives greater weight to measurements made at very distinct edges clear boundaries between different color values.
The researchers also produced a variation on the algorithm for analyzing conventional video. The sensor of a digital camera consists of an array of photodetectors millions of them, even in commodity devices.
says Alexei Efros, an associate professor of electrical engineering and computer science at the University of California at Berkeley. ee scientists,
The algorithm that computes the image to be displayed onscreen can exploit that redundancy allowing individual screen pixels to participate simultaneously in the projection of different viewing angles.
The MIT and Berkeley researchers were able to adapt that algorithm to the problem of vision correction so the new display incurs only a modest loss in resolution.
Machine learning algorithms track facial cues focusing prominently on the eyes eyebrows and mouth. A smile for instance would mean the corners of the lips curl upward and outward teeth flash and the skin around their eyes wrinkles.
Years of data-gathering have trained the algorithms to be very discerning. As a Phd student at Cambridge university in the early 2000s el Kaliouby began developing facial-coding software.
and Affectiva cofounder Rosalind Picard an MIT professor who pioneered the field of affective computing where machines can recognize interpret process
and training the algorithms by collecting vast stores of data. Coming from a traditional research background the Media Lab was completely different el Kaliouby says.
Kaliouby says training its software s algorithms to discern expressions from all different face types and skin colors.
A novel control algorithm enables it to move in sync with the wearer s fingers to grasp objects of various shapes and sizes.
To develop an algorithm to coordinate the robotic fingers with a human hand the researchers first looked to the physiology of hand gestures learning that a hand s five fingers are highly coordinated.
The researchers used this information to develop a control algorithm to correlate the postures of the two robotic fingers with those of the five human fingers.
Asada explains that the algorithm essentially teaches the robot to assume a certain posture that the human expects the robot to take.
Last month Witricity signed a licensing agreement with Intel to integrate Witricity technology into computing devices powered by Intel.
and Computer science when the research was done. After an initial deployment involving 21 people who used openpds to regulate access to their medical records the researchers are now testing the system with several telecommunications companies in Italy and Denmark.
For years, Li-Shiuan Peh, the Singapore Research Professor of Electrical engineering and Computer science at MIT, has argued that the massively multicore chips of the future will need to resemble little Internets,
This week, at the International Symposium on Computer architecture, Peh group unveiled a 36-core chip that features just such a etwork-on-Chip in addition to implementing many of the group earlier ideas
Cores will spend all their time waiting for the bus to free up, rather than performing computations.
says Bhavya Daya, an MIT graduate student in electrical engineering and computer science, and first author on the new paper. ou can also have multiple paths to your destination.
As it performs computations, it updates the data in its cache, and every so often, it undertakes the relatively time-consuming chore of shipping the data back to main memory.
a professor of electrical engineering and computer science at the University of Michigan. heir contribution is an interesting one:
Researchers in the Decentralized Information Group (DIG) at MIT s Computer science and Artificial intelligence Laboratory (CSAIL) believe the solution may be transparency rather than obscurity.
At the IEEE s Conference on Privacy Security and Trust in July Oshani Seneviratne an MIT graduate student in electrical engineering and computer science and Lalana Kagal a principal research scientist at CSAIL will present a paper
and computer science students who were excited to start a company. Around 2010, their interests merged in MIT Sloan 15.390 (New Enterprises),
The team used a combination of computation and experimental analysis to derive the structure of the material,
which can then be recombined using a computer algorithm to recreate the 3-D structure. f you have one light-emitting molecule in your sample,
They also hope to speed up the computing process, which currently takes a few minutes to analyze one second of imaging data.
but by tailoring their algorithm to the architecture of the graphics processing units designed for video games,
Again, the researchers have developed an algorithm that can calculate those patterns on the fly. As content creators move to so-called uad HD, video with four times the resolution of today high-definition video, the combination of higher contrast and higher resolution could make a commercial version of the researcherstechnology appealing to theater owners,
and project through it and use this software algorithm, and you end up with a 4k image.
Spreading pixels Oliver Cossairt, an assistant professor of electrical engineering and computer science at Northwestern University, once worked for a company that was attempting to commercialize glasses-free 3-D projectors. hat
When the anemometers detect optimal wind speed a custom algorithm adjusts the system s tethers to extend
and design build electronics and circuit boards develop algorithms and test winches and cables Looking back Glass credits his undergraduate years on MIT s Solar Electrical Vehicle Team a student organization that builds and races solar
Among the tools that computer scientists are developing to make the profusion of video more useful are algorithms for activity recognition or determining
-recognition algorithm that has several advantages over its predecessors. One is that the algorithm s execution time scales linearly with the size of the video file it s searching.
That means that if one file is 10 times the size of another the new algorithm will take 10 times as long to search it not 1000 times
as long as some earlier algorithms would. Another is that the algorithm is able to make good guesses about partially completed actions
so it can handle streaming video. Partway through an action it will issue a probability that the action is of the type that it s looking for.
It may revise that probability as the video continues but it doesn t have to wait until the action is complete to assess it.
Finally the amount of memory the algorithm requires is fixed regardless of how many frames of video it s already reviewed.
The grammar of actionenabling all of these advances is the appropriation of a type of algorithm used in natural language processing the computer science discipline that seeks techniques for interpreting sentences written in natural language.
For any given action Pirsiavash and Ramanan s algorithm must thus learn a new grammar.
Pirsiavash and Ramanan feed their algorithm training examples of videos depicting a particular action and specify the number of subactions that the algorithm should look for.
But they don t give it any information about what those subactions are or what the transitions between them look like.
Pruning possibilitiesthe rules relating subactions are the key to the algorithm s efficiency. As a video plays the algorithm constructs a set of hypotheses about
which subactions are being depicted where and it ranks them according to probability. It can t limit itself to a single hypothesis as each new frame could require it to revise its probabilities.
The researchers tested their algorithm on eight different types of athletic endeavor such as weightlifting and bowling with training videos culled from Youtube.
They found that according to metrics standard in the field of computer vision their algorithm identified new instances of the same activities more accurately than its predecessors.
Action-detection algorithms could also help determine whether for instance elderly patients remembered to take their medication
if they didn t. We ve known for a very long time that the things that people do are made up of subactivities says David Forsyth a professor of computer science at the University of Illinois at Urbana-Champaign.
and Computer science and a co-author on the new paper. There s actually not that much at five feet around you.
The researchers also developed an algorithm that determines the optimal pattern for the sensors distribution.
In essence the algorithm maximizes the number of different distances between arbitrary pairs of sensors. With his new colleagues at Lincoln Lab Krieger has performed experiments at radar frequencies using a one-dimensional array of sensors deployed in a parking lot
#Computer system automatically solves word problems Researchers in MIT Computer science and Artificial intelligence Laboratory, working with colleagues at the University of Washington, have developed a new computer system that can automatically solve the type of word problems common in introductory algebra classes.
an MIT graduate student in electrical engineering and computer science and lead author on the new paper, the new work is in the field of emantic parsing,
or translating natural language into a formal language such as arithmetic or formal logic. Most previous work on semantic parsing including his own has focused on individual sentences,
a professor of computer science and engineering and one of his two thesis advisors, and by the University of Washington Yoav Artzi and Luke Zettlemoyer.
a professor of computer science of the University of Southern California. he approach of building a generative story of how people get from text to answers is a great idea.
The researchers also developed an algorithm that lets them calculate the precise amount of dopamine present in each fraction of a cubic millimeter of the ventral striatum.
an MIT Phd student in electrical engineering and computer science (EECS) who invented the technology. With the prize money, the team including students from MIT, the California Institute of technology,
Then algorithms generate fluctuating power depending on terrain to propel a wearer up and forward. When fitting the prosthesis to patients prosthetists can program appropriate stiffness
Using a computer algorithm that traces the shapes of neurons and groups them based on structural similarity,
Using a computer algorithm, they traced along the many branches, known as dendrites, that extend from each cell to connect with other cells.
By programming cells to produce different types of curli fibers under certain conditions the researchers were able to control the biofilms properties
We re excited about soft robots for a variety of reasons says Daniela Rus a professor of computer science
and engineering director of MIT s Computer science and Artificial intelligence Laboratory and one of the researchers who designed
and Computer science and lead author on the new paper where he s joined by Rus and postdoc Cagdas D. Onal.
Video Melanie Gonick All of our algorithms and control theory are designed pretty much with the idea that we ve got rigid systems with defined joints says Barry Trimmer a biology professor at Tufts University who specializes in biomimetic soft robots.
When we invented this new class of synthetic biomarker we used a highly specialized instrument to do the analysis says Bhatia the John and Dorothy Wilson Professor of Health Sciences and Technology and Electrical engineering and Computer science.
both in MIT Department of Electrical engineering and Computer science, will also exhibit a prototype charger that plugs into an ordinary cell phone
It a window into processes happening at the millisecond and millimeter scale, says Aude Oliva, a principal research scientist in MIT Computer science and Artificial intelligence Laboratory (CSAIL.
This is so the computer can switch to the modified source code. Imagine however having to update
But Ksplice s novelty is that it constructs hot patches using the object code binary that a computer can understand instead of the source code computer instructions written
and modified as text by a programmer (such as in C++ or Java). Hot patching a program without Ksplice requires a programmer to construct replacement source code
or manually inspect the code to create an update. Programmers might also need to resolve ambiguity in the code say choosing the correct location in computer memory
The second technique called run-pre matching computes the address in computer memory of ambiguous code by using custom computation to compare the pre code with the finalized running kernel (run code.
Under the tutelage of Frans Kaashoek the Charles A. Piper Professor of Computer science and Engineering Arnold started developing Ksplice for his graduate thesis
and accounting challenging for people with strictly computer science backgrounds Daher says. For help they turned to MIT s Venture Mentoring Service (VMS)
Now your face could be transformed instantly into a more memorable one without the need for an expensive makeover thanks to an algorithm developed by researchers in MIT s Computer science and Artificial intelligence Laboratory (CSAIL.
The algorithm which makes subtle changes to various points on the face to make it more memorable without changing a person s overall appearance was unveiled earlier this month at the International Conference on Computer Vision in Sydney.
It could also be used for job applications to create a digital version of an applicant s face that will more readily stick in the minds of potential employers says Khosla who developed the algorithm with CSAIL principal research scientist Aude Oliva the senior author of the paper Antonio
Torralba an associate professor of electrical engineering and computer science and graduate student Wilma Bainbridge. Conversely it could also be used to make faces appear less memorable
To develop the memorability algorithm the team first fed the software a database of more than 2000 images.
The researchers then programmed the algorithm with a set of objectives to make the face as memorable as possible
and so would fail to meet the algorithm s objectives. When the system has a new face to modify it first takes the image
The algorithm then analyzes how well each of these samples meets its objectives. Once the algorithm finds a sample that succeeds in making the face look more memorable without significantly altering the person s appearance it makes yet more copies of this new image with each containing further alterations.
It then keeps repeating this process until it finds a version that best meets its objectives.
When they tested these images on a group of volunteers they found that the algorithm succeeded in making the faces more or less memorable as required in around 75 percent of cases.
We all wish to use a photo that makes us more visible to our audience says Aleix Martinez an associate professor of electrical and computer engineering at Ohio State university.
Now Oliva and her team have developed a computational algorithm that can do this for us he says.
and Computer science and lead author on the new paper explains the very idea of forming an image with only a single photon detected at each pixel location is counterintuitive.
much like the human eye, says James Davis, an associate professor of computer science at the University of California at Santa cruz. In contrast,
and apply sophisticated computation to the resulting data, Davis says. ormally the computer scientists who could invent the processing on this data can build the devices,
and the people who can build the devices cannot really do the computation, he says. his combination of skills
You can know something about the identity of a person from the sound of their voice so this technology is keying in to that type of information says Jim Glass a senior research scientist at MIT s Computer science and Artificial intelligence Laboratory (CSAIL) and head
A new algorithm that determines who speaks when in audio recordings represents every second of speech as a point in a three-dimensional space.
Stephen Shum a graduate student in MIT s Department of Electrical engineering and Computer science and lead author on the new paper found that a 100-variable i-vector a 100-dimension approximation of the 120000-dimension space was an adequate
It s really an order of magnitude less than the recordings that are used in text-dependent speech recognition. What was completely not obvious
Compilers are computer programs that translate high-level instructions written in human-readable languages like Java or C into low-level instructions that machines can execute.
Most compilers also streamline the code they produce, modifying algorithms specified by programmers so that theyl run more efficiently.
Sometimes that means simply discarding lines of code that appear to serve no purpose. But as it turns out,
compilers can be overaggressive, dispensing not only with functional code but also with code that actually performs vital security checks.
that automatically combs through programmerscode, identifying just those lines that compilers might discard but which could, in fact, be functional.
and compilers should remove it. Problems arise when compilers also remove code that leads to ndefined behavior
. or some things this is obvious, says Frans Kaashoek, the Charles A. Piper Professor in the Department of Electrical engineering and Computer science (EECS).
f youe a programmer, you should not write a statement where you take some number and divide it by zero.
So the compiler will just remove that. It pointless to execute it anyway, because there not going to be any sensible result.
Kaashoek says. t turns out that the C programming language has a lot of subtle corners to the language specification,
according to the C language specification, undefined for signed integers integers that can be either positive or negative.
The fine print Complicating things further is the fact that different compilers will dispense with different undefined behaviors:
but prohibit other programming shortcuts; some might impose exactly the opposite restrictions. So Wang combed through the C language specifications
and identified every undefined behavior that he and his coauthors Kaashoek and his fellow EECS professors Nickolai Zeldovich and Armando Solar-Lezama imagined that a programmer might ever inadvertently invoke.
i sent them a one-line SQL statement that basically crashed their application, by exploiting their orrectcode,
Such a system could be used to monitor patients who are at high risk for blood clots says Sangeeta Bhatia senior author of the paper and the John and Dorothy Wilson Professor of Health Sciences and Technology and Electrical engineering and Computer science.
and Computer science is exploiting a statistical construct called the Bingham distribution. In a paper they re presenting in November at the International Conference on Intelligent Robots
and Systems Glover and MIT alumna Sanja Popovic 12 MENG 13 who is now at Google describes a new robot-vision algorithm based on the Bingham distribution that is 15 percent better than its best
That algorithm however is for analyzing high-quality visual data in familiar settings. Because the Bingham distribution is a tool for reasoning probabilistically it promises even greater advantages in contexts where information is patchy or unreliable.
In cases where visual information is particularly poor his algorithm offers an improvement of more than 50 percent over the best alternatives.
because it allows the algorithm to get more information out of each ambiguous local feature.
Most algorithms Glover s included will take a first stab at aligning the points. In the case of the tetrahedron assume that after that provisional alignment every point in the model is near a point in the object but not perfectly coincident with it.
and Popovic s algorithm to explore possible rotations in a principled way quickly converging on the one that provides the best fit between points.
The current version of Glover and Popovic s algorithm integrates point-rotation probabilities with several other such probabilities.
In experiments involving visual data about particularly cluttered scenes depicting the kinds of environments in which a household robot would operate Glover s algorithm had about the same false positive-rate rate as the best existing algorithm:
Glover argues that that difference is because of his algorithm s better ability to determine object orientations.
He also believes that additional sources of information could improve the algorithm s performance even further.
In November, Romanishin now a research scientist in MIT Computer science and Artificial intelligence Laboratory (CSAIL) Rus,
a professor of electrical engineering and computer science and director of CSAIL. e just needed a creative insight
The sliding-cube model simplifies the development of self-assembly algorithms, but the robots that implement them tend to be much more complex devices.
and designing algorithms to guide them. e want hundreds of cubes, scattered randomly across the floor,
an associate professor of electrical engineering and computer science at the University of Illinois at Urbana-Champaign who was not part of the research team. he possibilities are endless:
On the software side, computer vision and machine-learning algorithms stitch together the images, extract features,
Among other things, this included an algorithm called Kinetic Super Resolution co-invented with Sarma and MIT postdoc Jonathan Jesneck that computationally combines many different images taken with an inexpensive low-resolution
Many researchers see improved interconnection of optical and electronic components as a path to more efficient computation and imaging systems.
#Toward tiny, solar-powered sensors The latest buzz in the information technology industry regards he Internet of thingsthe idea that vehicles, appliances, civil-engineering structures, manufacturing equipment,
an MIT graduate student in electrical engineering and computer science and first author on the new paper. e need to regulate the input to extract the maximum power,
The software algorithms, Aguilar says, vastly reduce computational load and work around noise and other image-quality problems.
Processes now used to upgrade and desulfurize heavy crude oil are expensive and energy-intensive, and they require hydrogen,
an MIT associate professor of electrical engineering and computer science who co-invented the technology. Other cofounders and co-inventors are Anantha Chandrakasan, the Joseph F. and Nancy P. Keithley Professor in Electrical engineering, now chair of CEI technical advisory board;
a workshop hosted by the Department of Electrical engineering and Computer science, where entrepreneurial engineering students are guided through the startup process with group discussions and talks from seasoned entrepreneurs.
Post deposition silver nanowire tracks can be sintered photonically using a camera flash to reduce sheet resistance similar to thermal sintering approaches.
Coe-Sullivan, then a Phd student in electrical engineering and computer science, was working with Bulovic and students of Moungi Bawendi, the Lester Wolfe Professor in Chemistry,
which are only one atom thick onto arbitrary substrates paving the way for flexible computing or photonic devices.
but the fundamentals of computation, mixing two inputs into a single output, currently require too much space and power when done with light.
"Mixing two input signals to get a new output is the basis of computation, "Agarwal said."
U. of I. professor of electrical and computer engineering who co-led the study along with UW-Madison professor Justin Williams."We can guide,
's National Energy Research Scientific Computing Center (NERSC) he conducted large molecular dynamics simulations of the gold-water interface
because its two-dimensional structure and unique chemical properties made it a promising candidate for new applications such as energy storage material composites as well as computing
The UNSW teams which are affiliated also with the ARC Centre of Excellence for Quantum Computation
Currently plasmonic absorbers used in biosensors have a resonant bandwidth of 50 nanometers said Koray Aydin assistant professor of electrical engineering and computer science at Northwestern University's Mccormick School of engineering and Applied science.
As the main enabling technology of the semiconductor industry CMOS fabrication of silicon chips approaches fundamental limits, the TUM researchers and collaborators at the University of Notre dame are exploring"magnetic computing"as an alternative.
"The 3d majority gate demonstrates that magnetic computing can be exploited in all three dimensions, in order to realize monolithic, sequentially stacked magnetic circuits promising better scalability and improved packing density.""
touted as a transformational replacement for current hard drive technologies such as Flash, SSD and DRAM. Memristors have potential to be fashioned into nonvolatile solid-state memory
which can consume a great deal of energy particularly in computing applications. Researchers are therefore searching for ways to harness other properties of electrons such as the'spin'of an electron as data carriers in the hope that this will lead to devices that consume less power.
Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011