151 - 175 of 937
Number of results to display per page
151 On synthesizing systolic arrays from recurrence equations with linear dependenciesWe present a technique for synthesizing systolic architectures from Recurrence Equations. A class of such equations (Recurrence Equations with Linear Dependencies) is defined and and the problem of mapping such equations onto a two dimensional architecture is studied. We show that such a mapping is ...Recurrence equations1986
152 A systolic array implementation of discrete relaxation algorithmDiscrete Relaxation techniques have proven useful in solving a wide range of problems in digital signal processing, artificial intelligence, machine vision, and VLSI engineering, etc. A conventional hardware design for an 8-label 8-object Discrete Relaxation Algorithm (DRA) requires three 4K memory...Discrete Relaxation algorithm; Systolic array1986
153 User's manual for the sisyphus simulation environmentThis report describes how to create and simulate a design with Sisyphus. Inasmuch as Sisyphus is written in Symbolics-Lisp, some familiarity with both Lisp and with Symbolics computers is presumed. In addition, the concepts presented here presume an acquaintance with [3]. First, a disclaimer ? this...Sisyphus; Simulation environment; Symbolics-Lisp; Symbolics computers1986
154 CAGD-based computer visionThree-dimensional model-based computer vision uses geometric models of objects and sensed data to recognize objects in a scene. Likewise, Computer Aided Geometric Design (CAGD) systems are used to interactively generate three-dimensional models during the design process. Despite this similarity, t...Computer Aided Geometric Design; CAGD1987
155 High-level planning for dextrous manipulationThe development of mechanical end effectors capable of dextrous manipulation is a rapidly growing and quite successful field of research. It has in some sense put the focus on control issues, in particular, how to control these remarkably anthropomorphic manipulators to perform the deft movement tha...Mechanical end effectors; Dextrous manipulation1987
156 Set operations on sculptured solidsA general method is presented for performing Boolean set operations on solids represented by a sculptured surface boundary model. The method is developed first for solids with closed boundary surfaces. It is then shown to apply also to "partially bounded" solids, which have incompletely specified b...Set operations; Sculptured solids; Sculptured surface; Boundary model1987
157 Apparent symmetries in range dataA procedure for extracting symmetrical features from the output of a range scanner is described which is insensitive to sensor noise and robust with respect to object surface complexity. The acquisition of symmetry descriptors for rigid bodies from a range image was in this case motivated by the ne...Symmetry descriptors; Range data; Range scanner; Dextrous manipulation systems1987
158 Implementing functional programs using mutable abstract data typesWe study the following problem in this paper. Suppose we have a purely functional program that uses a set of abstract data types by invoking their operations. Is there an order of evaluation of the operations in the program that preserves the applicative order of evaluation semantics of the program...Functional programs; Mutable abstract data; Abstract data types1987
159 An approach to three-dimensional scene databasesCurrent image database research is concerned for the most part with the encoding and processing of two-dimensional images. However, the most successful approach to computer vision is based on 3-dimensional information, organized as either stacks of 2-D images (e.g., the intrinsic images of Barrow an...Image databases; Three-dimensional; Scene databases1987
160 Workshop on multisensor integration in manufacturing automationMany people helped make the Workshop a success, but special thanks must be given to Howard Moraff for his support, and to Vicky Jackson for her efforts in making things run smoothly. Finally, thanks to Jake Aggarwal for helping to start the ball rolling.multisensor integration; manufacturing automation1987
161 Efficient instruction level simulation of computersA technique for creating efficient, yet highly accurate, instruction level simulation models of computers is described. In contrast to traditional approaches that use a software interpreter, this technique employs direct execution of application programs on the host computer. An assembly language pr...Simulation models1987
162 A shared memory algorithm and proof for the alternative construct in CSPCommunicating Sequential Processes (CSP) is a paradigm for communication and synchronization among distributed processes. The alternative construct is a key feature of CSP that allows nondeterministic selection of one among several possible communicants. Previous algorithms for this construct assume...Shared memory algorithm; Communicating Sequential Processes; CSP1987
163 The roll back chip: hardware support for distributed simulation using time warpDistributed simulation offers an attractive means of meeting the high computational demands of discrete event simulation programs. The Time Warp mechanism has been proposed to ensure correct sequencing of events in distributed simulation programs without blocking processes unnecessarily. However, th...Roll back chip; Distributed simulation; Discrete event; Simulation programs; Time Warp mechanism1987
164 Implementation of a hierarchical control system on a BBN butterfly multiprocessor: initial studies and resultsThis report discusses the introductory work with implementing a parallel version of a hierarchical control system named CAOS (Control using Action Oriented Schemata) on the BBN Butterfly Multiprocessor. First, an overview of the BBN Butterfly and how the control system can utilize the parallel pro...Hierarchical control system; BBN Butterfly Multiprocessor; CAOS1987
165 CAD-based roboticsWe describe an approach which facilitates and makes explicit the organization of the knowledge necessary to map robotic system requirements onto an appropriate assembly of algorithms, processors, sensor, and actuators. In order to achieve this mapping, several kinds of knowledge are needed. In this ...CAD-based robotics; CAD-based vision; CAGD System1987
166 Performance of arc consistency algorithms on the CRAYThe consistent labeling problem arises in high level computer vision when assigning semantic meaning to the regions of a n image. One of the drawbacks of this method is that it is rather slow. By using the consistency tests, node, arc and path consistency [9], the search space is drastically reduced...Arc consistency algorithms; CRAY supercomputer; Consistent labeling problem1987
167 CAOS an approach to robot controlControl systems which enable robots to behave intelligently is a major issue in todays process of automating factories. This thesis presents a hierarchical robot control system, a programming language for goal achievement, termed CAOS for Control using Action Oriented Schemata, with ideas taken fro...Robot control system; CAOS; Control using Action Oriented Schemata1987
168 A compositional model for synchronous VLSI systemsCurrently available hardware specification languages have two serious deficiencies: (i) inadequate protocol definition capabilities; (ii) lack of a compositional model. We now explain these in more detail.Very large scale integration; VLSI systems1987
169 Knowledge-based 2-D vision system synthesisA knowledge-based approach to computer vision provides the needed flexibility for performing recognition and inspection of objects in a complex environment. A system is described which uses knowledge about the environment, sensors, and performance requirements to construct a functional configuratio...2-D vision system1987
170 Combinator evaluation of functional programs with logical variablesA technique is presented that brings logical variables into the scope of the well known Turner method for evaluating normal order functioned programs by S, K, I combinator graph reduction. This extension is illustrated by SASL+LV, an extension of Turner's language SASL in which general expressions s...Functional programs; Logical variables; SASL+LV; Turner's language1987
171 CAGD-based computer visionThree-dimensional model-based computer vision uses geometric models of objects and sensed data to recognize objects in a scene. Likewise, Computer Aided Geometric Design (CAGD) systems are used to interactively generate three-dimensional models during the design process. Despite this similarity, the...Computer Aided Geometric Design (CAGD); CAD-based vision; Model based vision; Strategy trees; Geometric knowledge representation; Automatic feature selection1987
172 Performance measurements of distributed simulation strategiesA multiprocessor-based, distributed simulation testbed is described that facilitates controlled experimentation with distributed simulation algorithms. The performance of simulation strategies using deadlock avoidance and deadlock detection and recovery techniques are examined using various syntheti...Performance; Distributed simulation; Discrete simulation; Event-oriented; Queueing models1987
173 Optimal performance of distributed simulation programsThis paper describes a technique to analyze the potential speedup of distributed simulation programs. A distributed simulation strategy is proposed which minimizes execution time through the use of an oracle to control the simulation. Because the strategy relies on an oracle, it cannot be used for ...Distributed simulation programs1987
174 A control paradigm for general purpose manipulation systemsMechanical end effectors capable of dextrous manipulation are now a reality. Solutions to the high level control issues, however, have so far proved difficult to formulate. We propose a methodology for control which produces the functionality required for a general purpose manipulation system. It is...Manipulation systems1987
175 Managing large address spaces effectively on the ButterflyThe BBN Butterfly? Parallel Processor is a commercially-available multiprocessor which uses a memory management strategy based on a segmentation of the available memory. Using all of the memory of the machine efficiently is difficult because of the need to change the memory mapping dynamically. This...BBN Butterfly Parallel Processor; Large address spaces1987
151 - 175 of 937