3,363 research outputs found

    Safety Barrier Certificates for Heterogeneous Multi-Robot Systems

    Get PDF
    This paper presents a formal framework for collision avoidance in multi-robot systems, wherein an existing controller is modified in a minimally invasive fashion to ensure safety. We build this framework through the use of control barrier functions (CBFs) which guarantee forward invariance of a safe set; these yield safety barrier certificates in the context of heterogeneous robot dynamics subject to acceleration bounds. Moreover, safety barrier certificates are extended to a distributed control framework, wherein neighboring agent dynamics are unknown, through local parameter identification. The end result is an optimization-based controller that formally guarantees collision free behavior in heterogeneous multi-agent systems by minimally modifying the desired controller via safety barrier constraints. This formal result is verified in simulation on a multi-robot system consisting of both cumbersome and agile robots, is demonstrated experimentally on a system with a Magellan Pro robot and three Khepera III robots.Comment: 8 pages version of 2016ACC conference paper, experimental results adde

    Priority-based intersection management with kinodynamic constraints

    Get PDF
    We consider the problem of coordinating a collection of robots at an intersection area taking into account dynamical constraints due to actuator limitations. We adopt the coordination space approach, which is standard in multiple robot motion planning. Assuming the priorities between robots are assigned in advance and the existence of a collision-free trajectory respecting those priorities, we propose a provably safe trajectory planner satisfying kinodynamic constraints. The algorithm is shown to run in real time and to return safe (collision-free) trajectories. Simulation results on synthetic data illustrate the benefits of the approach.Comment: to be presented at ECC2014; 6 page

    Coordination game in bidirectional flow

    Get PDF
    We have introduced evolutionary game dynamics to a one-dimensional cellular-automaton to investigate evolution and maintenance of cooperative avoiding behavior of self-driven particles in bidirectional flow. In our model, there are two kinds of particles, which are right-going particles and left-going particles. They often face opponent particles, so that they swerve to the right or left stochastically in order to avoid conflicts. The particles reinforce their preferences of the swerving direction after their successful avoidance. The preference is also weakened by memory-loss effect. Result of our simulation indicates that cooperative avoiding behavior is achieved, i.e., swerving directions of the particles are unified, when the density of particles is close to 1/2 and the memory-loss rate is small. Furthermore, when the right-going particles occupy the majority of the system, we observe that their flow increases when the number of left-going particles, which prevent the smooth movement of right-going particles, becomes large. It is also investigated that the critical memory-loss rate of the cooperative avoiding behavior strongly depends on the size of the system. Small system can prolong the cooperative avoiding behavior in wider range of memory-loss rate than large system

    Efficient routing mechanisms for Dragonfly networks

    Get PDF
    High-radix hierarchical networks are cost-effective topologies for large scale computers. In such networks, routers are organized in super nodes, with local and global interconnections. These networks, known as Dragonflies, outperform traditional topologies such as multi-trees or tori, in cost and scalability. However, depending on the traffic pattern, network congestion can lead to degraded performance. Misrouting (non-minimal routing) can be employed to avoid saturated global or local links. Nevertheless, with the current deadlock avoidance mechanisms used for these networks, supporting misrouting implies routers with a larger number of virtual channels. This exacerbates the buffer memory requirements that constitute one of the main constraints in high-radix switches. In this paper we introduce two novel deadlock-free routing mechanisms for Dragonfly networks that support on-the-fly adaptive routing. Using these schemes both global and local misrouting are allowed employing the same number of virtual channels as in previous proposals. Opportunistic Local Misrouting obtains the best performance by providing the highest routing freedom, and relying on a deadlock-free escape path to the destination for every packet. However, it requires Virtual Cut-Through flow-control. By contrast, Restricted Local Misrouting prevents the appearance of cycles thanks to a restriction of the possible routes within super nodes. This makes this mechanism suitable for both Virtual Cut-Through and Wormhole networks. Evaluations show that the proposed deadlock-free routing mechanisms prevent the most frequent pathological issues of Dragonfly networks. As a result, they provide higher performance than previous schemes, while requiring the same area devoted to router buffers.This work has been supported by the Spanish Ministry of Science under contracts TIN2010-21291-C02-02, TIN2012-34557, and by the European HiPEAC Network of Excellence. The research leading to these results has received funding from the European Research Council under the European Union’s Seventh Framework Programme (FP/2007-2013) / ERC Grant Agreement n. ERC-2012-Adg-321253-RoMoL. M. Garc´ıa and M. Odriozola participated in this research work while they were affiliated with the University of Cantabria.Peer ReviewedPostprint (author's final draft

    Resonances of the Unknown

    Get PDF
    Purpose – The purpose of this paper is to discuss the relevance of second-order cybernetics for a theory of architectural design and related discourse. Design/methodology/approach – First, the relation of architectural design to the concept of “poiesis” is clarified. Subsequently, selected findings of Gotthard Günther are revisited and related to an architectural poetics. The last part of the paper consists of revisiting ideas mentioned previously, however, on the level of a discourse that has incorporated the ideas and offers a poetic way of understanding them

    Efficient Trace Encodings of Bounded Synthesis for Asynchronous Distributed Systems

    Get PDF
    The manual implementation of distributed systems is an error-prone task because of the asynchronous interplay of components and the environment. Bounded synthesis automatically generates an implementation for the specification of the distributed system if one exists. So far, bounded synthesis for distributed systems does not utilize their asynchronous nature. Instead, concurrent behavior of components is encoded by all interleavings and only then checked against the specification. We close this gap by identifying true concurrency in synthesis of asynchronous distributed systems represented as Petri games. This defines when several interleavings can be subsumed by one true concurrent trace. Thereby, fewer and shorter verification problems have to be solved in each iteration of the bounded synthesis algorithm. For Petri games, experimental results show that our implementation using true concurrency outperforms the implementation based on checking all interleavings

    Topological Characterization of Hamming and Dragonfly Networks and its Implications on Routing

    Get PDF
    Current HPC and datacenter networks rely on large-radix routers. Hamming graphs (Cartesian products of complete graphs) and dragonflies (two-level direct networks with nodes organized in groups) are some direct topologies proposed for such networks. The original definition of the dragonfly topology is very loose, with several degrees of freedom such as the inter- and intra-group topology, the specific global connectivity and the number of parallel links between groups (or trunking level). This work provides a comprehensive analysis of the topological properties of the dragonfly network, providing balancing conditions for network dimensioning, as well as introducing and classifying several alternatives for the global connectivity and trunking level. From a topological study of the network, it is noted that a Hamming graph can be seen as a canonical dragonfly topology with a large level of trunking. Based on this observation and by carefully selecting the global connectivity, the Dimension Order Routing (DOR) mechanism safely used in Hamming graphs is adapted to dragonfly networks with trunking. The resulting routing algorithms approximate the performance of minimal, non-minimal and adaptive routings typically used in dragonflies, but without requiring virtual channels to avoid packet deadlock, thus allowing for lower-cost router implementations. This is obtained by selecting properly the link to route between groups, based on a graph coloring of the network routers. Evaluations show that the proposed mechanisms are competitive to traditional solutions when using the same number of virtual channels, and enable for simpler implementations with lower cost. Finally, multilevel dragonflies are discussed, considering how the proposed mechanisms could be adapted to them
    • …
    corecore