Sciweavers

AROBOTS
2016
66views Hardware» more  AROBOTS 2016»
8 years 8 months ago
Learning to plan for constrained manipulation from demonstrations
—Motion planning in high dimensional state spaces, such as for mobile manipulation, is a challenging problem. Constrained manipulation, e.g. opening articulated objects like door...
Mike Phillips, Victor Hwang, Sachin Chitta, Maxim ...
TEI
2014
ACM
26views Hardware» more  TEI 2014»
8 years 8 months ago
Tangible autonomous interfaces (TAIs): exploring autonomous behaviours in TUIs
The use of autonomous behaviour in Tangible User Interfaces can potentially create a compelling and new kind of interaction between humans and computers. We motivate this argument...
Diana Nowacka, David Kirk
ISCAS
2013
IEEE
191views Hardware» more  ISCAS 2013»
9 years 6 months ago
Image search reranking with multi-latent topical graph
— Image search reranking has attracted extensive attention. However, existing image reranking approaches deal with different features independently while ignoring the latent topi...
Junge Shen, Tao Mei, Qi Tian, Xinbo Gao
DSD
2013
IEEE
106views Hardware» more  DSD 2013»
9 years 6 months ago
Transient Fault Tolerant QDI Interconnects Using Redundant Check Code
—Asynchronous logic is a promising technology for building the chip-level interconnect of multi-core systems. However, asynchronous circuits are vulnerable to faults. This paper ...
Guangda Zhang, Wei Song, Jim D. Garside, Javier Na...
ECMDAFA
2013
Springer
113views Hardware» more  ECMDAFA 2013»
10 years 7 months ago
Employing the Object Constraint Language in Model-Based Engineering
Abstract. MBE (Model-Based Engineering) proposes to develop software by taking advantage of models, in contrast to traditional codecentric development approaches. If models play a ...
Martin Gogolla
CAV
2013
Springer
138views Hardware» more  CAV 2013»
10 years 7 months ago
First-Order Theorem Proving and Vampire
Laura Kovács, Andrei Voronkov
CARDIS
2013
Springer
129views Hardware» more  CARDIS 2013»
10 years 7 months ago
Towards the Hardware Accelerated Defensive Virtual Machine - Type and Bound Protection
Abstract. Currently, security checks on Java Card applets are performed by a static verification process before executing an applet. A verified and later unmodified applet is no...
Michael Lackner, Reinhard Berlach, Johannes Loinig...
AT
2013
115views Hardware» more  AT 2013»
10 years 7 months ago
Reasoning about Choice
We present a logic for reasoning about choice. Choice CTL (C-CTL) extends the well-known branching-time temporal logic CTL with choice modalities, “3” and “2”. An example C...
Wiebe van der Hoek, Nicolas Troquard, Michael Wool...
SIGMETRICS
2012
ACM
271views Hardware» more  SIGMETRICS 2012»
12 years 1 months ago
An empirical comparison of Java remote communication primitives for intra-node data transmission
This paper presents a benchmarking suite that measures the performance of using sockets and eXtensible Markup Language remote procedure calls (XML-RPC) to exchange intra-node mess...
Philip F. Burdette, William F. Jones, Brian C. Blo...
SIGMETRICS
2012
ACM
290views Hardware» more  SIGMETRICS 2012»
12 years 1 months ago
Power and energy containers for multicore servers
Energy efficiency and power capping remain growing concerns in server systems. Online applications continue to evolve with new features and dynamic clientdirected processing, res...
Kai Shen, Arrvindh Shriraman, Sandhya Dwarkadas, X...