A dual-arm robotic simulation system is described. It can simulate dual-arm kinematics and dynamics, multi-manipulator cooperative control systems, trajectory planning, and typical tasks of robots. The package provide...
详细信息
ISBN:
(纸本)0780305469
A dual-arm robotic simulation system is described. It can simulate dual-arm kinematics and dynamics, multi-manipulator cooperative control systems, trajectory planning, and typical tasks of robots. The package provides a dual-arm robotic language and a 3-D graphic display. To study the multi-manipulator cooperative control method more efficiently, it also provides a general user interface and an automatic programming system. The overall structure and a general simulation algorithm are outlined.
This paper presents a method to teach a robot to play Ping Pong from failed demonstrations in a highly noisy and uncertain setting. To infer useful information from failed demonstrations, we use a MultiDonut Algorithm...
详细信息
ISBN:
(纸本)9781479926190
This paper presents a method to teach a robot to play Ping Pong from failed demonstrations in a highly noisy and uncertain setting. To infer useful information from failed demonstrations, we use a MultiDonut Algorithm [7] that minimises the probability of repeating a failed demonstration and generates new attempts similar but not quite the same as the demonstration. We compare human demonstrations against a random strategy and show that human demonstrations provide useful information and hence yield faster learning, especially in higher dimensions. We show that learning from observing failed attempts allows the robot to perform the task more reliably than any individual demonstrator did. We also show how this algorithm adapts to gradual deterioration in the system and increases the chances of success when interacting with an unreliable system.
Recent work in avoiding the state explosion problem in hardware verification during breath-first symbolic traversal (BFST) based on Binary Decision Diagrams (BDDs) applies hints to constrain the transition relation of...
详细信息
ISBN:
(纸本)3540291059
Recent work in avoiding the state explosion problem in hardware verification during breath-first symbolic traversal (BFST) based on Binary Decision Diagrams (BDDs) applies hints to constrain the transition relation of the circuit being verified [14]. Hints are expressed as constraints on the primary inputs and states of a circuit modeled as a finite transition system and can often be found with the help of simple heuristics by someone who understands the circuit well enough to devise simulation stimuli or verification properties for it. However, finding good hints requires one to constrain the transition system so that small intermediate BDDs arise during computations that produce large numbers of reachable states. Thus, the ease of finding good hints is limited by the user's ability to predict their usefulness. In this paper we present a method to statically and automatically determine good hints. Working on the control flow graph(s) of a behavioral model of the circuit being analyzed, our algorithm extracts sets of related execution paths. Each set has a corresponding enabling predicate which is a candidate hint. Program slicing is employed to identify execution paths. Abstract interpretation and model checking are used to ascertain properties along these paths. Hints generated automatically using our technique result in orders-of-magnitude reductions in time and space requirements during state space exploration compared to BFST and are usually as good as those produced by someone who understands the circuit.
The goal of this presentation is to illustrate the benefits of using an automated, model-based approach for improving system test design and generation. Our approach, TDE/UML, automatically generates system tests from...
详细信息
ISBN:
(纸本)3540290109
The goal of this presentation is to illustrate the benefits of using an automated, model-based approach for improving system test design and generation. Our approach, TDE/UML, automatically generates system tests from behavioral models of an application using the Unified Modeling Language (UML.). TDE/UML builds on and combines existing techniques for data coverage and graph coverage. We focus here on the results of applying TDE/UML in diverse Siemens projects: its cost benefits and its fault detection capabilities.
In this paper we present ShieldGen, a system for automatically generating a data patch or a vulnerability signature for an unknown vulnerability, given a zero-day attack instance. The key novelty in our work is that w...
详细信息
ISBN:
(纸本)9780769528489
In this paper we present ShieldGen, a system for automatically generating a data patch or a vulnerability signature for an unknown vulnerability, given a zero-day attack instance. The key novelty in our work is that we leverage knowledge of the data format to generate new potential attack instances, which we call probes, and use a zero-day detector as an oracle to determine if an instance can still exploit the vulnerability;the feed back of the oracle guides our search for the vulnerability signature. We have implemented a ShieldGen prototype and experimented with three known vulnerabilities. The generated signatures have no false positives and a low rate of false negatives due to imperfect data format specifications and the sampling technique used in our probe generation. Overall, they are significantly more precise than the signatures generated by existing schemes. We have also conducted a detailed study of 25 vulnerabilities for which Microsoft has issued security bulletins between 2003 and 2006. We estimate that ShieldGen can produce high quality signatures for a large portion of those vulnerabilities and that the signatures are superior to the signatures generated by existing schemes.
The key technology for aspheric machining offers exact machining path and machining aspheric lens with high accuracy and efficiency, in spite of the development of traditional manual manufacturing into nowadays numeri...
详细信息
ISBN:
(纸本)0819461881
The key technology for aspheric machining offers exact machining path and machining aspheric lens with high accuracy and efficiency, in spite of the development of traditional manual manufacturing into nowadays numerical control (NC) machining. This paper presents a mathematical model between virtual cone and aspheric surface equations, and discusses the technology of uniform wear of grinding wheel and error compensation in aspheric machining. Finally, a software system for high precision aspheric surface manufacturing is designed and realized, based on the mentioned above. This software system can work out grinding wheel path according to input parameters and generate machining NC programs of aspheric surfaces.
With this talk we want to pay tribute to the late Professor Gerd Veenker who deserves the historic credit of initiating the formation of the German AI community. We present a summary of his scientific contributions in...
详细信息
ISBN:
(纸本)9783540745648
With this talk we want to pay tribute to the late Professor Gerd Veenker who deserves the historic credit of initiating the formation of the German AI community. We present a summary of his scientific contributions in the context of the early approaches to theorem proving and, against this background, we point out future perspectives of Automated Deduction.
automatic Design ofAlgorithms through Evolution (ADATE) is a system for fully automatic programming that has the ability to either generate algorithms from scratch or improve existing ones. In this paper, we employ AD...
详细信息
ISBN:
(纸本)9783642331916
automatic Design ofAlgorithms through Evolution (ADATE) is a system for fully automatic programming that has the ability to either generate algorithms from scratch or improve existing ones. In this paper, we employ ADATE to improve a standard image processing algorithm, namely graph based segmentation (GBS), which has emerged as one of the very most popular methods for image segmentation, that is partitioning an image into regions. The key contribution of the paper is to show that a proven and well-known computer vision code is easy to improve through automatic programming. This may presage a change to the entire field of computer vision where automatic programming becomes a routine way of improving standard as well as state-of-the art image processing and pattern analysis algorithms. GBS was mostly chosen as case study to investigate how useful the ADATE automatic programming system may be in computer vision. Numerous other algorithms in the field could have been chosen instead.
We trace the roots of ontology-drive information systems (ODIS) back to early work in artificial intelligence and software engineering. We examine the lofty goals of the Knowledge-Based Software Assistant project from...
详细信息
ISBN:
(纸本)9781586039233
We trace the roots of ontology-drive information systems (ODIS) back to early work in artificial intelligence and software engineering. We examine the lofty goals of the Knowledge-Based Software Assistant project from the 80s, and pose some questions. Why didn't it work? What do we have today instead? What is on the horizon? We examine two critical ideas in software engineering: raising the level of abstraction, and the use of formal methods. We examine several other key technologies and show how they paved the way for today's ODIS. We identify two companies with Surprising capabilities that are on the bleeding edge of today's ODIS, and are pointing the way to a bright future. In that future, application development will be opened up to the masses, who will require no computer science background. People will create models in visual environments and the models will be the applications, self-documenting and executing as they are being built. Neither humans nor computers will be writing application code. Most functionality will be created by reusing and combining pre-coded functionality. All application software will be ontology-driven.
暂无评论