This research documents our inital experiences of using a new type of collaborative, industrial robot in the area of architecture, design, and construction. The KUKA LBR-iiwa differs from common robotc configurations ...
详细信息
One approach to decrease the gap between memory latency and processor speed is improving locality of data. Data layout optimization is a way to increase locality by reordering data elements in memory. Unfortunately, f...
详细信息
The purpose of this work is developing the software for debugging and demonstration of tasks of motion control of robots group and monitoring a robots group using multiple cameras using javalanguage in the OS «E...
详细信息
Work stealing can be implemented in either a cooperative or a coordinated way. We compared the two approaches for lifelinebased global load balancing, which is the algorithm used by X10's Global Load Balancing fra...
详细信息
Packed objects are an experimental feature in the IBM J9 Virtual Machine. Packed objects can be used to gain greater control over the layout of objects in memory and greater flexibility of memory structures that are n...
详细信息
The concept of nanopublications was first proposed about six years ago, but it lacked openly available implementations. The library presented here is the first one that has become an official implementation of the nan...
详细信息
The concept of nanopublications was first proposed about six years ago, but it lacked openly available implementations. The library presented here is the first one that has become an official implementation of the nanopublication community. Its core features are stable, but it also contains unofficial and experimental extensions: for publishing to a decentralized server network, for defining sets of nanopublications with indexes, for informal assertions, and for digitally signing nanopublications. Most of the features of the library can also be accessed via an online validator interface.
Exception mechanisms help to ensure that a program satisfles the important robustness criterion of dependency safety: if an operation fails, no code that depends on the operation's successful completion is execute...
详细信息
Developing software from reusable libraries lets developers face a security dilemma: Either be efficient and reuse libraries as they are or inspect them, know about their resource usage, but possibly miss deadlines as...
详细信息
ISBN:
(纸本)9783885796466
Developing software from reusable libraries lets developers face a security dilemma: Either be efficient and reuse libraries as they are or inspect them, know about their resource usage, but possibly miss deadlines as reviews are a time consuming process. In this paper, we propose a novel capability inference mechanism for libraries written in java. It uses a coarse-grained capability model for system resources that can be presented to developers. We found that the capability inference agrees by 86.81% on expectations towards capabilities that can be derived from project documentation. Moreover, our approach can find capabilities that cannot be discovered using project documentation. It is thus a helpful tool for developers mitigating the aforementioned dilemma.
Software clones are introduced to source code by copying and slightly modifying code fragments for reuse. Thus, the problem of finding software clones is essentially the detection of strings that partially match. This...
详细信息
Today, everything has gone distributed for so many types o server applications. We have Web servers, applicatio servers, database servers, file servers, and mail servers tha maintain worker queues and thread pools to ...
详细信息
暂无评论