8,108 research outputs found
Online Distributed Sensor Selection
A key problem in sensor networks is to decide which sensors to query when, in
order to obtain the most useful information (e.g., for performing accurate
prediction), subject to constraints (e.g., on power and bandwidth). In many
applications the utility function is not known a priori, must be learned from
data, and can even change over time. Furthermore for large sensor networks
solving a centralized optimization problem to select sensors is not feasible,
and thus we seek a fully distributed solution. In this paper, we present
Distributed Online Greedy (DOG), an efficient, distributed algorithm for
repeatedly selecting sensors online, only receiving feedback about the utility
of the selected sensors. We prove very strong theoretical no-regret guarantees
that apply whenever the (unknown) utility function satisfies a natural
diminishing returns property called submodularity. Our algorithm has extremely
low communication requirements, and scales well to large sensor deployments. We
extend DOG to allow observation-dependent sensor selection. We empirically
demonstrate the effectiveness of our algorithm on several real-world sensing
tasks
Aerobrake assembly with minimum Space Station accommodation
The minimum Space Station Freedom accommodations required for initial assembly, repair, and refurbishment of the Lunar aerobrake were investigated. Baseline Space Station Freedom support services were assumed, as well as reasonable earth-to-orbit possibilities. A set of three aerobrake configurations representative of the major themes in aerobraking were developed. Structural assembly concepts, along with on-orbit assembly and refurbishment scenarios were created. The scenarios were exercised to identify required Space Station Freedom accommodations. Finally, important areas for follow-on study were also identified
Deterministic Symmetry Breaking in Ring Networks
We study a distributed coordination mechanism for uniform agents located on a
circle. The agents perform their actions in synchronised rounds. At the
beginning of each round an agent chooses the direction of its movement from
clockwise, anticlockwise, or idle, and moves at unit speed during this round.
Agents are not allowed to overpass, i.e., when an agent collides with another
it instantly starts moving with the same speed in the opposite direction
(without exchanging any information with the other agent). However, at the end
of each round each agent has access to limited information regarding its
trajectory of movement during this round.
We assume that mobile agents are initially located on a circle unit
circumference at arbitrary but distinct positions unknown to other agents. The
agents are equipped with unique identifiers from a fixed range. The {\em
location discovery} task to be performed by each agent is to determine the
initial position of every other agent.
Our main result states that, if the only available information about movement
in a round is limited to %information about distance between the initial and
the final position, then there is a superlinear lower bound on time needed to
solve the location discovery problem. Interestingly, this result corresponds to
a combinatorial symmetry breaking problem, which might be of independent
interest. If, on the other hand, an agent has access to the distance to its
first collision with another agent in a round, we design an asymptotically
efficient and close to optimal solution for the location discovery problem.Comment: Conference version accepted to ICDCS 201
Symbolic Reachability Analysis of B through ProB and LTSmin
We present a symbolic reachability analysis approach for B that can provide a
significant speedup over traditional explicit state model checking. The
symbolic analysis is implemented by linking ProB to LTSmin, a high-performance
language independent model checker. The link is achieved via LTSmin's PINS
interface, allowing ProB to benefit from LTSmin's analysis algorithms, while
only writing a few hundred lines of glue-code, along with a bridge between ProB
and C using ZeroMQ. ProB supports model checking of several formal
specification languages such as B, Event-B, Z and TLA. Our experiments are
based on a wide variety of B-Method and Event-B models to demonstrate the
efficiency of the new link. Among the tested categories are state space
generation and deadlock detection; but action detection and invariant checking
are also feasible in principle. In many cases we observe speedups of several
orders of magnitude. We also compare the results with other approaches for
improving model checking, such as partial order reduction or symmetry
reduction. We thus provide a new scalable, symbolic analysis algorithm for the
B-Method and Event-B, along with a platform to integrate other model checking
improvements via LTSmin in the future
Shaping the Breast in Aesthetic and Reconstructive Breast Surgery: An Easy Three-Step Principle. Part II - Breast Reconstruction after Total Mastectomy
This is Part II of four parts describing the three-step principle being applied in reconstructive and aesthetic breast surgery. Part I explains how to analyze a problematic breast by understanding the main anatomical features of a breast and how they interact: the footprint, the conus of the breast, and the skin envelope. This part describes how one can optimize results with breast reconstructions after complete mastectomy. For both primary and secondary reconstructions, the authors explain how to analyze the mastectomized breast and the deformed chest wall, before giving step-by-step guidelines for rebuilding the entire breast with either autologous tissue or implants. The differences in shaping unilateral or bilateral breast reconstructions with autologous tissue are clarified. Regardless of timing or method of reconstruction, it is shown that by breaking down the surgical strategy into three easy (anatomical) steps, the reconstructive surgeon will be able to provide more aesthetically pleasing and reproducible results. Throughout these four parts, the three-step principle will be the red line on which to fall back to define the problem and to propose a solution
Specific "scientific" data structures, and their processing
Programming physicists use, as all programmers, arrays, lists, tuples,
records, etc., and this requires some change in their thought patterns while
converting their formulae into some code, since the "data structures" operated
upon, while elaborating some theory and its consequences, are rather: power
series and Pad\'e approximants, differential forms and other instances of
differential algebras, functionals (for the variational calculus), trajectories
(solutions of differential equations), Young diagrams and Feynman graphs, etc.
Such data is often used in a [semi-]numerical setting, not necessarily
"symbolic", appropriate for the computer algebra packages. Modules adapted to
such data may be "just libraries", but often they become specific, embedded
sub-languages, typically mapped into object-oriented frameworks, with
overloaded mathematical operations. Here we present a functional approach to
this philosophy. We show how the usage of Haskell datatypes and - fundamental
for our tutorial - the application of lazy evaluation makes it possible to
operate upon such data (in particular: the "infinite" sequences) in a natural
and comfortable manner.Comment: In Proceedings DSL 2011, arXiv:1109.032
Software Model Checking with Explicit Scheduler and Symbolic Threads
In many practical application domains, the software is organized into a set
of threads, whose activation is exclusive and controlled by a cooperative
scheduling policy: threads execute, without any interruption, until they either
terminate or yield the control explicitly to the scheduler. The formal
verification of such software poses significant challenges. On the one side,
each thread may have infinite state space, and might call for abstraction. On
the other side, the scheduling policy is often important for correctness, and
an approach based on abstracting the scheduler may result in loss of precision
and false positives. Unfortunately, the translation of the problem into a
purely sequential software model checking problem turns out to be highly
inefficient for the available technologies. We propose a software model
checking technique that exploits the intrinsic structure of these programs.
Each thread is translated into a separate sequential program and explored
symbolically with lazy abstraction, while the overall verification is
orchestrated by the direct execution of the scheduler. The approach is
optimized by filtering the exploration of the scheduler with the integration of
partial-order reduction. The technique, called ESST (Explicit Scheduler,
Symbolic Threads) has been implemented and experimentally evaluated on a
significant set of benchmarks. The results demonstrate that ESST technique is
way more effective than software model checking applied to the sequentialized
programs, and that partial-order reduction can lead to further performance
improvements.Comment: 40 pages, 10 figures, accepted for publication in journal of logical
methods in computer scienc
- …