1 - 25 of 48
Number of results to display per page
CreatorTitleDescriptionSubjectDate
1 Nelson, DonaldConstraint Jacobians for constant-time inverse kinematics and assembly optimizationAn algorithm for the constant-time solution of systems of geometric constraint equations is presented in this work. constraint equations and their Jacobians may be used in conjunction with other numerical methods to solve for a variety of kinematics, dynamics, and assembly optimization problems. The...Constant-time; Inverse kinematics; Constraint Jacobians1998
2 Henderson, Thomas C.Zo: A framework for autonomous agent behavior specification and analysisWe describe a framework for the specification and analysis of autonomous agents1 . In general, such agents require several levels of behavioral specifications, including: low-level reflex actions, mid-level controllers to deal with the physical aspects of the world, and highlevel representations for...Z-Infinity; Autonomous agents; Behavior1990
3 Henderson, Thomas C.; Sikorski, ChristopherSymmetry: a basis for sensorimotor reconstructionGiven a set of unknown sensors and actuators, sensorimotor reconstruction is achieved by exploiting relations between the sensor data and the actuator control data to determine sets of similar sensors, sets of similar actuators, necessary relations between them, as well as sensorimotor relations ...sensorimotor reconstruction; sensor data; actuator control data2011
4 Sobh, Tarek M.A survey on sensor classifications for industrial applicationsThe importance of sensors in industrial applications is a result of the introduction of many robotics, automation, and intelligent control techniques into factory floors. Research and improvements need to be continuously performed to meet the challenges in automation and manufacturing applications i...Sensor classifications; Industrial applications; Sensors1995
5 Henderson, Thomas C.A survey of dextrous manipulationThe development of mechanical end effectors capable of dextrous manipulation is a rapidly growing and quite successful field of research. It has in some sense put the focus on control issues, in particular, how to control these remarkably humanlike manipulators to perform the deft movement that we t...Dextrous manipulation1986
6 Henderson, Thomas C.Monte Carlo sensor networksBiswas et al. [1] introduced a probabilistic approach to inference with limited information in sensor networks. They represented the sensor network as a Bayesian network and performed approximate inference using Markov Chain Monte Carlo (MCMC). The goal is to robustly answer queries even under no...Monte Carlo sensor networks; Markov Chain Monte Carlo; MCMC2005-01-20
7 Hansen, Mark S.; Healy, Lindsey J.; Johnson, Christopher R.; Capecchi, Mario R.; Keller, Charles; Jones, Greg M.Virtual histology of transgenic mouse embryos for high-throughput phenotyping.A bold new effort to disrupt every gene in the mouse genome necessitates systematic, interdisciplinary approaches to analyzing patterning defects in the mouse embryo. We present a novel, rapid, and inexpensive method for obtaining high-resolution virtual histology for phenotypic assessment of mouse ...Forkhead Transcription Factors; Paired Box Transcription Factors2006
8 Henderson, Thomas C.Reverse engineering of pipe layouts and 3D point set damage modelsThis paper focuses on obtaining pipe layout information from depth images, and on the development of damage models for 3D shapes. Techniques are given for recognizing various pipes and pipe features. Methods for generating compact geometric descriptions of pipes and pipe features are discussed. T...Pipe layouts2004-12-27
9 Evans, DavidGraphical man/machine communications: June 1971Semi-Annual Technical Report for period 1 January 1971 to 31 May 1971. This document includes a summary of research activities and facilities at the University of Utah under Contract F30602-70-C-0300. Information conveys important research milestones attained during this period by each of the fo...Curved surfaces; Digital waveform processing1971
10 Evans, DavidGraphical man/machine communications: February 1968Technical report No. RADC - TR - 68 - 90 for the period ending 30 November, 1967. Two classes of research activities are being conducted. One is research in information processsing system technology. The other is researach in application of interactive computing technology to the solution of severa...Fluid flow problems1968-02
11 Brunvand, Erik L.The NSR processorThe NSR (Non-Synchronous RISC) processor is a general-purpose computer structured (IS U collection of self-timed blocks that operate concurrently and communicate over bundled data channels in the style of micropipelines [3, 16]. These blocks correspond to standard synchronous pipeline stages such ...1993
12 Gopalakrishnan, GaneshFormal methods for surviving the jungle of heterogeneous parallelismThe parallel programming community will soon be entering the ‘jungle' of heterogeneous hardware and software. Unfortunately, we are not adequately preparing future programmers (today's students) to cope with the many challenges of heterogeneous concurrency, especially in their ability to rigorousl...2012-01-01
13 Riloff, Ellen M.Toward completeness in concept extraction and classificationMany algorithms extract terms from text together with some kind of taxonomic classification (is-a) link. However, the general approaches used today, and specifically the methods of evaluating results, exhibit serious shortcomings. Harvesting without focusing on a specific conceptual area may deliv...Concept extraction; Concept classification2009
14 Brunvand, Erik L.Peephole optimization of asynchronous macromodule networksMost high level synthesis tools for asynchronous circuits take descriptions in concurrent hardware description languages and generate networks of macromodules or handshake components. In this paper we describe a peephole optimizer for such macromodule networks that often effects area and/or time im...1994
15 Henderson, Thomas C.RobotShare: a framework for robot knowledge sharingKnowledge representation is a traditional field in artificial intelligence. Researchers have developed various ways to represent and share information among intelligent agents. Agents that share resources, data, information, and knowledge perform better than agents working alone. However, previou...RobotShare; Robot knowledge sharing2007
16 Keller, Robert M.Semantics of parallel program graphsA denotational model for networks of parallel processes is presented which generalizes the work of Kahn by using alternative data types, e.g. Lisp-like operators on trees. It is shown that the ordering aspect of data types plays a central role in determining how much parallelism can be present. It i...Parallel program graphs; Computer semantics; Denotational model1977
17 Brunvand, Erik L.Peephole optimization of asynchronous macromodule networksAbstract- Most high-level synthesis tools for asynchronous circuits take descriptions in concurrent hardware description languages and generate networks of macromodules or handshake components. In this paper, we propose a peephole optimizer for these networks. Our peephole optimizer first deduces an...1999
18 Riloff, Ellen M.Identifying sources of opinions with conditional random fields and extraction patternsRecent systems have been developed for sentiment classification, opinion recognition, and opinion analysis (e.g., detecting polarity and strength). We pursue another aspect of opinion analysis: identifying the sources of opinions, emotions, and sentiments. We view this problem as an information ext...Sentiment classification; Opinion recognition; Opinion analysis; Conditional random fields; AutoSlog; Sources of opinions2005
19 Henderson, Thomas C.Logical behaviorsIn this paper we describe an approach to high-level multisensor integration in t h e context of an autonomous mobile robot. Previous papers have described the development of t h e INRIA mobile robot subsystems: 1. sensor and actuator systems 2. distance and range analysis 3. feature extraction ...Multisensor integration; 3-D environment descriptions1989
20 Gopalakrishnan, GaneshPeephole optimization of asynchronous networks through process composition and burst-mode machine generationIn this paper we discuss the problem of improving the e ciency of macromodule networks generated through asynchronous high level synthesis We compose the behaviors of the modules in the sub network being optimized using Dill s trace theoretic operators to get a single behavioral description for ...Macromodule networks; Peephole; Asynchronous networks1993
21 Riloff, Ellen M.Learning and evaluating the content and structure of a term taxonomyIn this paper, we describe a weakly supervised bootstrapping algorithm that reads Web texts and learns taxonomy terms. The bootstrapping algorithm starts with two seed words (a seed hypernym (Root concept) and a seed hyponym) that are inserted into a doubly anchored hyponym pattern. In alternatin...Weakly supervised; Bootstrapping algorithm; Seed hypernym; Seed hyponym; Root concept; Term taxonomy; Learning by reading systems2009
22 Evans, DavidDisplay of complex three dimensional finite element modelsComplex three dimensional models can be displayed after an automatic generation of a finite element (panel) mapping. although this automatic generation algorithm fails at certain levels of model complexity, the elimination of these failures can be accomplished through user interaction. This report p...Three dimensional models; Finite element models1978
23 Gopalakrishnan, GaneshPeephole optimization of asynchronous networks through process composition and burst-mode machine generationIn this paper, we discuss the problem of improving the efficiency of macromodule networks generated through asynchronous high level synthesis. We compose the behaviors of the modules in the sub-network being optimized using Dill's trace-theoretic operators to get a single behavioral description for ...Peephole optimization; Macromodule networks; Process composition; Burst-mode1993
24 Fujimoto, Richard M.Efficient instruction level simulation of computersA technique for creating efficient, yet highly accurate, instruction level simulation models of computers is described. In contrast to traditional approaches that use a software interpreter, this technique employs direct execution of application programs on the host computer. An assembly language pr...Simulation models1987
25 Logan, Nelson StanleyMaster schedule building and the flexibly scheduled schoolThis paper contains a model of a technique for increasing the quality of educational and instructional opportunity for all students. This model is developed around the flexible or modularly scheduled secondary school. Also included is a procedure containing a computer program, with which the adminis...Flexible scheduling; Flexibly scheduled school; Modularly scheduled school1970
1 - 25 of 48