As an emerging data modal with precise distance sensing, LiDAR point clouds have been placed great expectations on 3D scene understanding. However, point clouds are always sparsely distributed in the 3D space, and wit...
详细信息
Constructive Interference (CI) proposed in the existing work (e.g., A-MAC [1], Glossy [2]) may degrade the packet reception performance in terms of Packet Reception Ratio (PRR) and Received Signal Strength Indication ...
详细信息
Constructive Interference (CI) proposed in the existing work (e.g., A-MAC [1], Glossy [2]) may degrade the packet reception performance in terms of Packet Reception Ratio (PRR) and Received Signal Strength Indication (RSSI). The packet reception performance of a set of nodes transmitting simultaneously might be no better than that of any single node transmitting individually. In this paper, we redefine CI and propose TriggerCast, a practical wireless architecture which ensures concurrent transmissions of an identical packet to interfere constructively rather than to interfere non-destructively. CI potentially allows orders of magnitude reductions in energy consumption and improvements in link quality. Moreover, we for the first time present a theoretical sufficient condition for generating CI with IEEE 802.15.4 radio: concurrent transmissions with an identical packet should be synchronized at chip level. Meanwhile, co-senders participating in concurrent transmissions should be carefully selected, and the starting instants for the concurrent transmissions should be aligned. Based on the sufficient condition, we propose practical techniques to effectively compensate propagation and radio processing delays. TriggerCast has 95 th percentile synchronization errors of at most 250ns. Extensive experiments in practical testbeds reveal that TriggerCast significantly improves PRR (from 5% to 70% with 7 concurrent senders, from 50% to 98.3% with 6 senders) and RSSI (about 6dB with 5 senders).
Accurately synthesizing talking face videos and capturing fine facial features for individuals with long hair presents a significant challenge. To tackle these challenges in existing methods, we propose a decomposed p...
详细信息
Model checking is one of the most important technology for automatically verification. So this paper generally proposed a method of combining CCS and Z language, to perform model checking. It combines the advantage of...
详细信息
Model checking is one of the most important technology for automatically verification. So this paper generally proposed a method of combining CCS and Z language, to perform model checking. It combines the advantage of current CCS and Z systems, where CCS is good at describing concurrent systems, also Z is a good tool for data structure. As a result, form the new system CCS-Z. Then we give the syntax and semantics of it, at last give the model checking *** advantage of this paper is combined data stucture on the famous system CCS, and increase the capacity of system description.
Several aspects of the multidimensional problem of providing monitoring support for the debugging and performance analysis of distributed and parallelsystems and parallel applications are presented. The key elements ...
详细信息
Several aspects of the multidimensional problem of providing monitoring support for the debugging and performance analysis of distributed and parallelsystems and parallel applications are presented. The key elements of the solution to the problem are a formal event-action model at the process level and a layered architectural model. The application of the event-action model to the development of the abstract layered architectural model is shown, as well as a proposed implementation sketch of a nonintrusive monitor for the PASM parallelprocessingsystem.< >
Real-world data ubiquitously exhibit long-tailed distribution, which sparks the increasing interest in long-tailed object detection (LTOD). However, existing methods neglect that a lack of diverse data in tail classes...
Real-world data ubiquitously exhibit long-tailed distribution, which sparks the increasing interest in long-tailed object detection (LTOD). However, existing methods neglect that a lack of diverse data in tail classes will cause underrepresented tail class features, making their efforts for balancing foreground classes tend to over-fit tail classes and be less effective. In this paper, we propose a multi-class co-attention generation network to increase data diversity of tail classes by generating augmented samples. To alleviate imbalance, we develop a distribution-aware up-sampling strategy, performing differential up-sampling for different classes and design a bi-directional regulation loss to adjust both positive and negative gradients. Moreover, we construct a new dataset LVIS-X with more rare classes based on existing LTOD benchmark dataset LVIS. Experiments on LVIS and LVIS-X demonstrate the superiority of the proposed method.
In this paper, we investigate the problem of planning an optimal infinite path for a single robot to achieve a linear temporal logic (LTL) task with security guarantee. We assume that the external behavior of the robo...
详细信息
In this paper, we investigate the problem of Model Predictive Control (MPC) of dynamic systems for high-level specifications described by Signal Temporal Logic (STL) formulae. Recent works show that MPC has the great ...
In this paper, we investigate the problem of Model Predictive Control (MPC) of dynamic systems for high-level specifications described by Signal Temporal Logic (STL) formulae. Recent works show that MPC has the great potential in handling logical tasks in reactive environments. However, existing approaches suffer from the heavy computational burden, especially for tasks with large horizons. In this work, we propose a computationally more efficient MPC framework for STL tasks based on time interval decomposition. Specifically, we still use the standard shrink horizon MPC framework with Mixed Integer Linear Programming (MILP) techniques for open-loop optimization problems. However, instead of applying MPC directly for the entire task horizon, we decompose the STL formula into several sub-tasks with disjoint time horizons, and shrinking horizon MPC is applied for each short-horizon sub-task iteratively. To guarantee the satisfaction of the entire STL formula and to ensure the recursive feasibility of the iterative process, we introduce new terminal constraints to connect each sub-task. We show how these terminal constraints can be computed by an effective inner-approximation approach. The computational efficiency of our approach is illustrated by a case study.
In time-critical systems, such as air traffic control systems, it is crucial to design control policies that are robust to timing uncertainty. Recently, the notion of Asynchronous Temporal Robustness (ATR) was propose...
In time-critical systems, such as air traffic control systems, it is crucial to design control policies that are robust to timing uncertainty. Recently, the notion of Asynchronous Temporal Robustness (ATR) was proposed to capture the robustness of a system trajectory against individual time shifts in its sub-trajectories. In a multi-robot system, this may correspond to individual robots being delayed or early. Control synthesis under ATR constraints is challenging and has not yet been addressed. In this paper, we propose an efficient control synthesis method under ATR constraints which are defined with respect to simple safety or complex signal temporal logic specifications. Given an ATR bound, we compute a sequence of control inputs so that the specification is satisfied by the system as long as each sub-trajectory is shifted not more than the ATR bound. We avoid combinatorially exploring all shifted sub-trajectories by first identifying redundancy between them. We capture this insight by the notion of instant-shift pair sets, and then propose an optimization program that enforces the specification only over the instant-shift pair sets. We show soundness and completeness of our method and analyze its computational complexity. Finally, we present various illustrative case studies.
A complete method to create a panoramic video mosaic is proposed in this paper. This method includes three principal processes: real-time frame selection, feature based estimation of an eight-parameter projective coor...
详细信息
A complete method to create a panoramic video mosaic is proposed in this paper. This method includes three principal processes: real-time frame selection, feature based estimation of an eight-parameter projective coordinate transformation, and image mosaic composing. This proposed method works well on many video sequences captured from a PC camera to generate both 360 degree and planar panoramas. Experimental results demonstrate the validity and superior quality of this proposed method.
暂无评论