Results 1 - 10
of
1,909
The Dynamic Window Approach to Collision Avoidance
"... This paper describes the dynamic window approach to reactive collision avoidance for mobile robots equipped with synchro-drives. The approach is derived directly from the motion dynamics of the robot and is therefore particularly well-suited for robots operating at high speed. It differs from previo ..."
Abstract
-
Cited by 433 (32 self)
- Add to MetaCart
This paper describes the dynamic window approach to reactive collision avoidance for mobile robots equipped with synchro-drives. The approach is derived directly from the motion dynamics of the robot and is therefore particularly well-suited for robots operating at high speed. It differs from
Local Reasoning about Programs that Alter Data Structures
, 2001
"... We describe an extension of Hoare's logic for reasoning about programs that alter data structures. We consider a low-level storage model based on a heap with associated lookup, update, allocation and deallocation operations, and unrestricted address arithmetic. The assertion language is ba ..."
Abstract
-
Cited by 324 (28 self)
- Add to MetaCart
by a particular command. Through these and a number of examples we show that the formalism supports local reasoning: A speci- cation and proof can concentrate on only those cells in memory that a program accesses. This paper builds on earlier work by Burstall, Reynolds, Ishtiaq and O
Tcl: An Embeddable Command Language
, 1990
"... Tcl is an interpreter for a tool command language. It consists of a library package that is embedded in tools (such as editors, debuggers, etc.) as the basic command interpreter. Tcl provides (a) a parser for a simple textual command language, (b) a collection of built-in utility commands, and (c) a ..."
Abstract
-
Cited by 222 (2 self)
- Add to MetaCart
) a C interface that tools use to augment the built-in commands with tool-specific commands. Tcl is particularly attractive when integrated with the widget library of a window system: it increases the programmability of the widgets by providing mechanisms for variables, procedures, expressions, etc
A Unified Framework for Hybrid Control: Model and Optimal Control Theory
- IEEE TRANSACTIONS ON AUTOMATIC CONTROL
, 1998
"... Complex natural and engineered systems typically possess a hierarchical structure, characterized by continuousvariable dynamics at the lowest level and logical decision-making at the highest. Virtually all control systems today---from flight control to the factory floor---perform computer-coded chec ..."
Abstract
-
Cited by 305 (9 self)
- Add to MetaCart
-coded checks and issue logical as well as continuous-variable control commands. The interaction of these different types of dynamics and information leads to a challenging set of "hybrid" control problems. We propose a very general framework that systematizes the notion of a hybrid system, combining
Remote Agent: To Boldly Go Where No AI System Has Gone Before
, 1998
"... Renewed motives for space exploration have inspired NASA to work toward the goal of establishing a virtual presence in space, through heterogeneous effets of robotic explorers. Information technology, and Artificial Intelligence in particular, will play a central role in this endeavor by endowing th ..."
Abstract
-
Cited by 231 (16 self)
- Add to MetaCart
Renewed motives for space exploration have inspired NASA to work toward the goal of establishing a virtual presence in space, through heterogeneous effets of robotic explorers. Information technology, and Artificial Intelligence in particular, will play a central role in this endeavor by endowing
Debugging operating systems with time-traveling virtual machines
- In USENIX
, 2005
"... Operating systems are among the most difcult of soft-ware systems to debug with traditional cyclic debugging. They are non-deterministic; they run for long periods of time; their state and code is large and complex; and their state is easily perturbed by the act of debugging. This pa-per describes a ..."
Abstract
-
Cited by 209 (11 self)
- Add to MetaCart
a time-traveling virtual machine that over-comes many of the difculties associated with debugging operating systems. By time travel, we mean the ability to navigate backward and forward arbitrarily through the execution history of a particular run and to replay arbi-trary segments of the past
Command Economy
"... A command economy is one in which the coordination of economic activity, so essential to the viability and functioning of a complex social economy 1, is undertaken through administrative means — commands, directives, targets and regulations — rather than by a market mechanism. Economic agents in a c ..."
Abstract
- Add to MetaCart
command economy, and in particular production organizations, operate primarily by virtue of specific directives from higher authority in an administrative/political hierarchy, i.e. under the ‘command principle’. Thus the life-cycle and activity of enterprises and firms, their production of output
Command Economy
, 2006
"... A command economy is one in which the coordination of economic activity, so essential to the viability and functioning of a complex social economy 1, is undertaken through administrative means — commands, directives, targets and regulations — rather than by a market mechanism. Economic agents in a c ..."
Abstract
- Add to MetaCart
command economy, and in particular production organizations, operate primarily by virtue of specific directives from higher authority in an administrative/political hierarchy, i.e. under the ‘command principle’. Thus the life-cycle and activity of enterprises and firms, their production of output
Your Botnet is My Botnet: Analysis of a Botnet Takeover
"... Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophisticated and insidious type of bot is Torpig, a malware program that is designed to harvest sensitive information (such a ..."
Abstract
-
Cited by 171 (28 self)
- Add to MetaCart
Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophisticated and insidious type of bot is Torpig, a malware program that is designed to harvest sensitive information (such
Mathematical Aspects of Command Relations
"... In GB, the importance of phrase-structure rules has dwindled in favour of nearness conditions. Today, nearness conditions play a major role in defining the correct linguistic representations. They are expressed in terms of special binary relations on trees called command relations. Yet, while ..."
Abstract
-
Cited by 18 (7 self)
- Add to MetaCart
the formal theory of phrase-structure grammars is quite advanced, no formal investigation into the properties of command relations has been done. We will try to close this gap. In particular, we will study the intrinsic properties of command relations as relations on trees as well as the possibility
Results 1 - 10
of
1,909