Search
Now showing items 1511-1520 of 1850
Throwing Down the Visual Intelligence Gauntlet
(2012)
In recent years, scientific and technological advances have produced artificial systems that have matched or surpassed human capabilities in narrow domains such as face detection and optical character recognition. However, ...
Integrated robot task and motion planning in belief space
(2012-07-03)
In this paper, we describe an integrated strategy for planning, perception, state-estimation and action in complex mobile manipulation domains. The strategy is based on planning in the belief space of probability distribution ...
Viewstamped Replication Revisited
(2012-07-23)
This paper presents an updated version of Viewstamped Replication, a replication technique that handles failures in which nodes crash. It describes how client requests are handled, how the group reorganizes when a replica ...
The Levels of Understanding framework, revised
(2012-05-31)
I discuss the "levels of understanding" framework described in Marr's Vision and propose a revised and updated version of it to capture the changes in computation and neuroscience over the last 30 years.
Cicada: Predictive Guarantees for Cloud Network Bandwidth
(2014-03-24)
In cloud-computing systems, network-bandwidth guarantees have been shown to improve predictability of application performance and cost. Most previous work on cloud-bandwidth guarantees has assumed that cloud tenants know ...
One Clock to Rule Them All: A Primitive for Distributed Wireless Protocols at the Physical Layer
(2014-04-27)
Implementing distributed wireless protocols at the physical layer today is challenging because different nodes have different clocks, each of which has slightly different frequencies. This causes the nodes to have frequency ...
Symbolic Execution for (Almost) Free: Hijacking an Existing Implementation to Perform Symbolic Execution
(2014-04-22)
Symbolic execution of a language is traditionally achieved by replacing the language s interpreter with an entirely new interpreter. This may be an unnecessary burden, and it is tempting instead to try to use as much of ...
Sloth: Being Lazy is a Virtue (When Issuing Database Queries)
(2014-04-14)
Many web applications store persistent data in databases. During execution, such applications spend a significant amount of time communicating with the database for retrieval and storing of persistent data over the network. ...
PIKA: A Network Service for Multikernel Operating Systems
(2014-01-28)
PIKA is a network stack designed for multikernel operating systems that target potential future architectures lacking cache-coherent shared memory but supporting message passing. PIKA splits the network stack into several ...
An Architecture for Online Affordance-based Perception and Whole-body Planning
(2014-03-16)
The DARPA Robotics Challenge Trials held in December 2013 provided a landmark demonstration of dexterous mobile robots executing a variety of tasks aided by a remote human operator using only data from the robot's sensor ...