This paper proposes a technique for planar trajectory following for an autonomous aerial robot. A trajectory is modeled as a planar spline. A behavior-based control system which stabilizes the robot and enforces traje...
详细信息
The paper introduces the concept of regression benchmarking as a variant of regression testing focused at detecting performance regressions. Applying the regression benchmarking in the area of middleware development, ...
详细信息
The paper introduces the concept of regression benchmarking as a variant of regression testing focused at detecting performance regressions. Applying the regression benchmarking in the area of middleware development, the paper explains how regression benchmarking differs from middleware benchmarking in general. On a real-world example of TAO, the paper shows why the existing benchmarks do not give results sufficient for regression benchmarking, and proposes techniques for detecting performance regressions using simple benchmarks.
We describe a sensor network deployment method using autonomous flying robots. Such networks are suitable for tasks such as large-scale environmental monitoring or for command and control in emergency situations. We d...
详细信息
We describe a sensor network deployment method using autonomous flying robots. Such networks are suitable for tasks such as large-scale environmental monitoring or for command and control in emergency situations. We describe in detail the algorithms used for deployment and for measuring network connectivity and provide experimental data we collected from field trials. A particular focus is on determining gaps in connectivity of the deployed network and generating a plan for a second, repair, pass to complete the connectivity. This project is the result of a collaboration between three robotics labs (CSIRO, USC, and Dartmouth.).
In this paper we argue in favor of remote data access based on the principle of abstract data types. This paradigm has inherent advantages over the traditional file-oriented approach, especially when used in a ubiquit...
详细信息
Architectural erosion in software systems results due to the drifting of code from the existing design. This drifting happens because the changes in code supporting evolving requirements, are not reflected back in the...
详细信息
An Early Quantum Task (EQT) is a Quantum EDF task that has shrunk its first period into one quantum time slot. Its purpose is to be executed as soon as possible, without causing deadline overflow of other tasks. We de...
详细信息
An Early Quantum Task (EQT) is a Quantum EDF task that has shrunk its first period into one quantum time slot. Its purpose is to be executed as soon as possible, without causing deadline overflow of other tasks. We derive the conditions under which an EQT can be admitted and can have an immediate start. The advantage of scheduling EQTs is shown by its use in a buffered multimedia server. The EQT is associated with a multimedia stream and it will use its first invocation to fill the buffer, such that a client can start receiving data immediately.
The "tangible file system"/sup 1/ is a document management and access infrastructure for the ubiquitous computing era. It provides a transparent user interface which takes advantage of physical user actions ...
详细信息
The "tangible file system"/sup 1/ is a document management and access infrastructure for the ubiquitous computing era. It provides a transparent user interface which takes advantage of physical user actions for the purpose of directory management, data sharing and document location tracking. This is achieved by digitally augmenting both documents and document containers to detect the location of physical information and to trigger corresponding update actions in the electronic world. The system is built using the Datlet [9] architecture to allow any 'tool-objects' to be applied to 'data-objects', thereby enabling an even more natural user interaction based on affordances.
The introduction of third generation mobile communication systems allows the service providers to offer a large variety of services which are in the Universal Mobile Telecommunication System subsumed under the categor...
详细信息
The introduction of third generation mobile communication systems allows the service providers to offer a large variety of services which are in the Universal Mobile Telecommunication System subsumed under the categories conversational, streaming, interactive and background class. While the conversational and streaming classes have a guaranteed bandwidth and delay, the interactive and background class consume the remaining system capacity. On the downlink this system capacity is limited by the base station transmit power and on the uplink by the interference. In our analysis we approximate the capacity which the services with quality of service leave for best-effort services belonging to the interactive class. The background class is neglected. We focus our analysis on the downlink since for UMTS the expected traffic is assumed to be asymmetric with the bulk of it towards the mobile station and derive the distribution of the bandwidth available for best-effort users according to a spatial user distribution.
作者:
Giovanni AdagioDistributed Programming Laboratory
School of Computer Science and Communication Systems Swiss Federal Institute of Technology in Lausanne (EPFL) Institute of Mathematics School of Basic Sciences Swiss Federal Institute of Technology in Lausanne (EPFL) Switzerland
This paper contributes to the characterization of synchronous models of distributed computing using topological techniques. We consider a generic synchronous model with send-omission failures and use a topological str...
This paper contributes to the characterization of synchronous models of distributed computing using topological techniques. We consider a generic synchronous model with send-omission failures and use a topological structure corresponding to a bounded number of rounds of the model. We observe some nice properties of the structure and derive from these properties necessary and sufficient conditions to solve consensus in this model.
This paper surveys and investigates the strengths and weaknesses of a number of recent approaches to advanced workflow modelling. Rather than inventing just another workflow language, we briefly describe recent workfl...
详细信息
暂无评论