作者:
Vasak, ThomasPotter, JohnUniv of New South Wales
Sch of Electrical Engineering & Computer Science Kensington Aust Univ of New South Wales Sch of Electrical Engineering & Computer Science Kensington Aust
An alternative computational 'model' for logic programs is proposed which is based upon control annotations written in first-order predicate calculus. These annotations are used to generate runtime environment...
详细信息
An alternative computational 'model' for logic programs is proposed which is based upon control annotations written in first-order predicate calculus. These annotations are used to generate runtime environments within which it is possible to exclude infinite computations. The major advantage of such a model is that it is possible to write conceptually transparent programs which otherwise would not have terminated under an existing naive control mechanism.
Recent research has shown the vulnerability of Spiking Neural Networks (SNNs) under adversarial examples that are nearly indistinguishable from clean data in the context of frame-based and event-based information. The...
详细信息
To facilitate responsive and cost-effective computing resource scheduling and service delivery over edge-assisted mobile networks, this paper investigates a novel two-stage double auction methodology via utilizing an ...
详细信息
In this paper,a deadlock prevention policy for robotic manufacturing cells with uncontrollable and unobservable events is proposed based on a Petri net ***,a Petri net for the deadlock control of such systems is *** a...
详细信息
In this paper,a deadlock prevention policy for robotic manufacturing cells with uncontrollable and unobservable events is proposed based on a Petri net ***,a Petri net for the deadlock control of such systems is *** admissible markings and first-met inadmissible markings(FIMs)are ***,place invariants are designed via an integer linear program(ILP)to survive all admissible markings and prohibit all FIMs,keeping the underlying system from reaching deadlocks,livelocks,bad markings,and the markings that may evolve into them by firing uncontrollable *** also ensures that the obtained deadlock-free supervisor does not observe any unobservable *** addition,the supervisor is guaranteed to be admissible and structurally minimal in terms of both control places and added *** condition under which the supervisor is maximally permissive in behavior is ***,experimental results with the proposed method and existing ones are given to show its effectiveness.
Due to the advantages of flexible deployment and strong environmental adaptability of an unmanned aerial vehicle (UAV), UAVs serve as aerial base stations (BSs) to meet Quality of Services (QoSs) of ground users in in...
详细信息
This paper is concerned with broadcasting on 2-dimensional tonus and mesh networks using circuit-switched, half-duplex, and link-bound communication. It is assumed that there are alpha and beta physical channels in th...
详细信息
This paper is concerned with broadcasting on 2-dimensional tonus and mesh networks using circuit-switched, half-duplex, and link-bound communication. It is assumed that there are alpha and beta physical channels in the X- and Y-dimensions, respectively, and path selection between any two nodes is done using row-column routing. Given an n X n mesh or torus, we first discuss the lower bounds of broadcasting time;any broadcasting algorithm requires at least [log((2 alpha+2 beta+1))n(2)] time steps and no broadcasting algorithm achieves this lower bound if alpha < beta(2 beta + 1) We then show that broadcasting on a (2 alpha + 2 beta + 1)(p) X (2 alpha + 2 beta + 1)(p) torus can be done in 2p time steps, which is optimum, for any alpha greater than or equal to 3 and beta = 1. We also present approximation algorithms for the cases of mesh when alpha greater than or equal to 1 and beta = 1 and torus when alpha less than or equal to 2 and beta = 1. (C) 1996 John Wiley & Sons, Inc.
Discriminator detection of Gaussian minimum shift keying in a land mobile radio environment is analyzed. Simple closed-form expressions for the average probability of error are presented and evaluated for cases of pra...
详细信息
Discriminator detection of Gaussian minimum shift keying in a land mobile radio environment is analyzed. Simple closed-form expressions for the average probability of error are presented and evaluated for cases of practical interest.
Chip-scale integration of optoelectronic devices such as lasers, waveguides, and modulators on silicon is prevailing as a promising approach to realize future ultrahigh speed optical interconnects. We review recent pr...
详细信息
Chip-scale integration of optoelectronic devices such as lasers, waveguides, and modulators on silicon is prevailing as a promising approach to realize future ultrahigh speed optical interconnects. We review recent progress of the direct epitaxy and fabrication of quantum dot (QD) lasers and integrated guided-wave devices on silicon. This approach involves the development of molecular beam epitaxial growth of self- organized QD lasers directly on silicon substrates and their monolithic integration with amorphous silicon waveguides and quantum well electroabsorption modulators. Additionally, we report a preliminary study of long-wavelength (〉 1.3 μm) QD lasers grown on silicon and integrated crystalline silicon waveguides using membrane transfer technology.
We demonstrate efficient on-chip green light generation via frequency upconversion in silicon nitride–thin-film lithium niobate (SiN-TFLN) hybrid waveguides, obtained by transfer printing LN coupons on selected areas...
详细信息
Non-volatile memory(NVM)provides a scalable and power-efficient solution to replace dynamic random access memory(DRAM)as main ***,because of the relatively high latency and low bandwidth of NVM,NVM is often paired wit...
详细信息
Non-volatile memory(NVM)provides a scalable and power-efficient solution to replace dynamic random access memory(DRAM)as main ***,because of the relatively high latency and low bandwidth of NVM,NVM is often paired with DRAM to build a heterogeneous memory system(HMS).As a result,data objects of the application must be carefully placed to NVM and DRAM for the best *** this paper,we introduce a lightweight runtime solution that automatically and transparently manages data placement on HMS without the requirement of hardware modifications and disruptive change to *** online profiling and performance models,the runtime solution characterizes memory access patterns associated with data objects,and minimizes unnecessary data *** runtime solution effectively bridges the performance gap between NVM and *** demonstrate that using NVM to replace the majority of DRAM can be a feasible solution for future HPC systems with the assistance of a software-based data management.
暂无评论