|
|
Creator | Title | Description | Subject | Date |
1 |
|
Nelson, Donald | Constraint Jacobians for constant-time inverse kinematics and assembly optimization | An algorithm for the constant-time solution of systems of geometric constraint equations is presented in this work. constraint equations and their Jacobians may be used in conjunction with other numerical methods to solve for a variety of kinematics, dynamics, and assembly optimization problems. The... | Constant-time; Inverse kinematics; Constraint Jacobians | 1998 |
2 |
|
Henderson, Thomas C. | Zo: A framework for autonomous agent behavior specification and analysis | We describe a framework for the specification and analysis of autonomous agents1 . In general, such agents require several levels of behavioral specifications, including: low-level reflex actions, mid-level controllers to deal with the physical aspects of the world, and highlevel representations for... | Z-Infinity; Autonomous agents; Behavior | 1990 |
3 |
|
Henderson, Thomas C.; Sikorski, Christopher | Symmetry: a basis for sensorimotor reconstruction | Given a set of unknown sensors and actuators, sensorimotor reconstruction is achieved by exploiting relations between the sensor data and the actuator control data to determine sets of similar sensors, sets of similar actuators, necessary relations between them, as well as sensorimotor relations ... | sensorimotor reconstruction; sensor data; actuator control data | 2011 |
4 |
|
Sobh, Tarek M. | A survey on sensor classifications for industrial applications | The importance of sensors in industrial applications is a result of the introduction of many robotics, automation, and intelligent control techniques into factory floors. Research and improvements need to be continuously performed to meet the challenges in automation and manufacturing applications i... | Sensor classifications; Industrial applications; Sensors | 1995 |
5 |
|
Henderson, Thomas C. | A survey of dextrous manipulation | The development of mechanical end effectors capable of dextrous manipulation is a rapidly growing and quite successful field of research. It has in some sense put the focus on control issues, in particular, how to control these remarkably humanlike manipulators to perform the deft movement that we t... | Dextrous manipulation | 1986 |
6 |
|
Henderson, Thomas C. | Monte Carlo sensor networks | Biswas et al. [1] introduced a probabilistic approach to inference with limited information in sensor networks. They represented the sensor network as a Bayesian network and performed approximate inference using Markov Chain Monte Carlo (MCMC). The goal is to robustly answer queries even under no... | Monte Carlo sensor networks; Markov Chain Monte Carlo; MCMC | 2005-01-20 |
7 |
|
Hansen, Mark S.; Healy, Lindsey J.; Johnson, Christopher R.; Capecchi, Mario R.; Keller, Charles; Jones, Greg M. | Virtual histology of transgenic mouse embryos for high-throughput phenotyping. | A bold new effort to disrupt every gene in the mouse genome necessitates systematic, interdisciplinary approaches to analyzing patterning defects in the mouse embryo. We present a novel, rapid, and inexpensive method for obtaining high-resolution virtual histology for phenotypic assessment of mouse ... | Forkhead Transcription Factors; Paired Box Transcription Factors | 2006 |
8 |
|
Henderson, Thomas C. | Reverse engineering of pipe layouts and 3D point set damage models | This paper focuses on obtaining pipe layout information from depth images, and on the development of damage models for 3D shapes. Techniques are given for recognizing various pipes and pipe features. Methods for generating compact geometric descriptions of pipes and pipe features are discussed. T... | Pipe layouts | 2004-12-27 |
9 |
|
Evans, David | Graphical man/machine communications: June 1971 | Semi-Annual Technical Report for period 1 January 1971 to 31 May 1971. This document includes a summary of research activities and facilities at the University of Utah under Contract F30602-70-C-0300. Information conveys important research milestones attained during this period by each of the fo... | Curved surfaces; Digital waveform processing | 1971 |
10 |
|
Evans, David | Graphical man/machine communications: February 1968 | Technical report No. RADC - TR - 68 - 90 for the period ending 30 November, 1967. Two classes of research activities are being conducted. One is research in information processsing system technology. The other is researach in application of interactive computing technology to the solution of severa... | Fluid flow problems | 1968-02 |
11 |
|
Brunvand, Erik L. | The NSR processor | The NSR (Non-Synchronous RISC) processor is a general-purpose computer structured (IS U collection of self-timed blocks that operate concurrently and communicate over bundled data channels in the style of micropipelines [3, 16]. These blocks correspond to standard synchronous pipeline stages such ... | | 1993 |
12 |
|
Gopalakrishnan, Ganesh | Formal methods for surviving the jungle of heterogeneous parallelism | The parallel programming community will soon be entering the ‘jungle' of heterogeneous hardware and software. Unfortunately, we are not adequately preparing future programmers (today's students) to cope with the many challenges of heterogeneous concurrency, especially in their ability to rigorousl... | | 2012-01-01 |
13 |
|
Brunvand, Erik L. | Peephole optimization of asynchronous macromodule networks | Most high level synthesis tools for asynchronous circuits take descriptions in concurrent hardware description languages and generate networks of macromodules or handshake components. In this paper we describe a peephole optimizer for such macromodule networks that often effects area and/or time im... | | 1994 |
14 |
|
Riloff, Ellen M. | Toward completeness in concept extraction and classification | Many algorithms extract terms from text together with some kind of taxonomic classification (is-a) link. However, the general approaches used today, and specifically the methods of evaluating results, exhibit serious shortcomings. Harvesting without focusing on a specific conceptual area may deliv... | Concept extraction; Concept classification | 2009 |
15 |
|
Henderson, Thomas C. | RobotShare: a framework for robot knowledge sharing | Knowledge representation is a traditional field in artificial intelligence. Researchers have developed various ways to represent and share information among intelligent agents. Agents that share resources, data, information, and knowledge perform better than agents working alone. However, previou... | RobotShare; Robot knowledge sharing | 2007 |
16 |
|
Keller, Robert M. | Semantics of parallel program graphs | A denotational model for networks of parallel processes is presented which generalizes the work of Kahn by using alternative data types, e.g. Lisp-like operators on trees. It is shown that the ordering aspect of data types plays a central role in determining how much parallelism can be present. It i... | Parallel program graphs; Computer semantics; Denotational model | 1977 |
17 |
|
Brunvand, Erik L. | Peephole optimization of asynchronous macromodule networks | Abstract- Most high-level synthesis tools for asynchronous circuits take descriptions in concurrent hardware description languages and generate networks of macromodules or handshake components. In this paper, we propose a peephole optimizer for these networks. Our peephole optimizer first deduces an... | | 1999 |
18 |
|
Gopalakrishnan, Ganesh | Peephole optimization of asynchronous networks through process composition and burst-mode machine generation | In this paper we discuss the problem of improving the e ciency of macromodule networks generated through asynchronous high level synthesis We compose the behaviors of the modules in the sub network being optimized using Dill s trace theoretic operators to get a single behavioral description for ... | Macromodule networks; Peephole; Asynchronous networks | 1993 |
19 |
|
Riloff, Ellen M. | Identifying sources of opinions with conditional random fields and extraction patterns | Recent systems have been developed for sentiment classification, opinion recognition, and opinion analysis (e.g., detecting polarity and strength). We pursue another aspect of opinion analysis: identifying the sources of opinions, emotions, and sentiments. We view this problem as an information ext... | Sentiment classification; Opinion recognition; Opinion analysis; Conditional random fields; AutoSlog; Sources of opinions | 2005 |
20 |
|
Henderson, Thomas C. | Logical behaviors | In this paper we describe an approach to high-level multisensor integration in t h e context of an autonomous mobile robot. Previous papers have described the development of t h e INRIA mobile robot subsystems: 1. sensor and actuator systems 2. distance and range analysis 3. feature extraction ... | Multisensor integration; 3-D environment descriptions | 1989 |
21 |
|
Riloff, Ellen M. | Learning and evaluating the content and structure of a term taxonomy | In this paper, we describe a weakly supervised bootstrapping algorithm that reads Web texts and learns taxonomy terms. The bootstrapping algorithm starts with two seed words (a seed hypernym (Root concept) and a seed hyponym) that are inserted into a doubly anchored hyponym pattern. In alternatin... | Weakly supervised; Bootstrapping algorithm; Seed hypernym; Seed hyponym; Root concept; Term taxonomy; Learning by reading systems | 2009 |
22 |
|
Evans, David | Display of complex three dimensional finite element models | Complex three dimensional models can be displayed after an automatic generation of a finite element (panel) mapping. although this automatic generation algorithm fails at certain levels of model complexity, the elimination of these failures can be accomplished through user interaction. This report p... | Three dimensional models; Finite element models | 1978 |
23 |
|
Gopalakrishnan, Ganesh | Peephole optimization of asynchronous networks through process composition and burst-mode machine generation | In this paper, we discuss the problem of improving the efficiency of macromodule networks generated through asynchronous high level synthesis. We compose the behaviors of the modules in the sub-network being optimized using Dill's trace-theoretic operators to get a single behavioral description for ... | Peephole optimization; Macromodule networks; Process composition; Burst-mode | 1993 |
24 |
|
Logan, Nelson Stanley | Master schedule building and the flexibly scheduled school | This paper contains a model of a technique for increasing the quality of educational and instructional opportunity for all students. This model is developed around the flexible or modularly scheduled secondary school. Also included is a procedure containing a computer program, with which the adminis... | Flexible scheduling; Flexibly scheduled school; Modularly scheduled school | 1970 |
25 |
|
Vickers, Donald Lee | Sorcerer's apprentice: head-mounted display and wand | Sorcerer's Apprentice is an interactive computer graphics system utilizing a head-mounted display and at three-dimensional wand. The system allows three-dimensional interaction with line drawings which are displayed in real time, that is about 20 frames per second. The display, worn like a pair of e... | Sorcerer's apprentice; Head-mounted display; Three-dimensional wand | 1974 |