632 research outputs found

    11. Looking Back

    Get PDF
    From Alumni Views, Robert H. Bluestein (’67), “ILR addressed the social and economic issues of the times and sought to provide students with the tools to find solutions to many of the problems confronting society in the mid-to late-sixties. This was a period easily described as volatile, evolutionary, and sometimes revolutionary. As would have been the case at any vibrant institution, the curriculum and the students at ILR reflected those times.” Includes: Alumni Views of ILR; The Creation of the Alpern Scholarship and Prize; and A Professor’s Perspective

    The change in color matches with retinal angle of incidence of the colorimeter beams

    Full text link
    Differences between W.D.W. chromaticities of monochromatic lights obtained with all colorimeter beams incident on the retina "off-axis" and those found for lights striking the retina normally have been studied throughout the visible spectrum on 4 normal trichromats. The results are inconsistent with: 1. (i) the assumption in Weale's theories of the Stiles-Crawford hue shift that the sets of absorption spectra of the visual pigments catching normally and obliquely incident photons are identical, and2. (ii) "self-screening" explanations for the change in color with angle of incidence on the retina. The color matching functions of a protanomalous trichromat are inconsistent with the hypothesis that the absorption spectra of the visual pigments catching normally incident photons in his retina are those catching obliquely incident photons in the normal retina.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/27010/1/0000577.pd

    Grouping based feature attribution in metacontrast masking

    Get PDF
    The visibility of a target can be strongly suppressed by metacontrast masking. Still, some features of the target can be perceived within the mask. Usually, these rare cases of feature mis-localizations are assumed to reflect errors of the visual system. To the contrary, I will show that feature "mis-localizations" in metacontrast masking follow rules of motion grouping and, hence, should be viewed as part of a systematic feature attribution process

    Fast Two-Robot Disk Evacuation with Wireless Communication

    Get PDF
    In the fast evacuation problem, we study the path planning problem for two robots who want to minimize the worst-case evacuation time on the unit disk. The robots are initially placed at the center of the disk. In order to evacuate, they need to reach an unknown point, the exit, on the boundary of the disk. Once one of the robots finds the exit, it will instantaneously notify the other agent, who will make a beeline to it. The problem has been studied for robots with the same speed~\cite{s1}. We study a more general case where one robot has speed 11 and the other has speed s1s \geq 1. We provide optimal evacuation strategies in the case that sc2.752.75s \geq c_{2.75} \approx 2.75 by showing matching upper and lower bounds on the worst-case evacuation time. For 1s<c2.751\leq s < c_{2.75}, we show (non-matching) upper and lower bounds on the evacuation time with a ratio less than 1.221.22. Moreover, we demonstrate that a generalization of the two-robot search strategy from~\cite{s1} is outperformed by our proposed strategies for any sc1.711.71s \geq c_{1.71} \approx 1.71.Comment: 18 pages, 10 figure

    Time-Energy Tradeoffs for Evacuation by Two Robots in the Wireless Model

    Full text link
    Two robots stand at the origin of the infinite line and are tasked with searching collaboratively for an exit at an unknown location on the line. They can travel at maximum speed bb and can change speed or direction at any time. The two robots can communicate with each other at any distance and at any time. The task is completed when the last robot arrives at the exit and evacuates. We study time-energy tradeoffs for the above evacuation problem. The evacuation time is the time it takes the last robot to reach the exit. The energy it takes for a robot to travel a distance xx at speed ss is measured as xs2xs^2. The total and makespan evacuation energies are respectively the sum and maximum of the energy consumption of the two robots while executing the evacuation algorithm. Assuming that the maximum speed is bb, and the evacuation time is at most cdcd, where dd is the distance of the exit from the origin, we study the problem of minimizing the total energy consumption of the robots. We prove that the problem is solvable only for bc3bc \geq 3. For the case bc=3bc=3, we give an optimal algorithm, and give upper bounds on the energy for the case bc>3bc>3. We also consider the problem of minimizing the evacuation time when the available energy is bounded by Δ\Delta. Surprisingly, when Δ\Delta is a constant, independent of the distance dd of the exit from the origin, we prove that evacuation is possible in time O(d3/2logd)O(d^{3/2}\log d), and this is optimal up to a logarithmic factor. When Δ\Delta is linear in dd, we give upper bounds on the evacuation time.Comment: This is the full version of the paper with the same title which will appear in the proceedings of the 26th International Colloquium on Structural Information and Communication Complexity (SIROCCO'19) L'Aquila, Italy during July 1-4, 201

    Power of Randomization in Automata on Infinite Strings

    Full text link
    Probabilistic B\"uchi Automata (PBA) are randomized, finite state automata that process input strings of infinite length. Based on the threshold chosen for the acceptance probability, different classes of languages can be defined. In this paper, we present a number of results that clarify the power of such machines and properties of the languages they define. The broad themes we focus on are as follows. We present results on the decidability and precise complexity of the emptiness, universality and language containment problems for such machines, thus answering questions central to the use of these models in formal verification. Next, we characterize the languages recognized by PBAs topologically, demonstrating that though general PBAs can recognize languages that are not regular, topologically the languages are as simple as \omega-regular languages. Finally, we introduce Hierarchical PBAs, which are syntactically restricted forms of PBAs that are tractable and capture exactly the class of \omega-regular languages

    Safety-Liveness Exclusion in Distributed Computing

    Get PDF
    The history of distributed computing is full of trade-offs between safety and liveness. For instance, one of the most celebrated results in the field, namely the impossibility of consensus in an asynchronous system basically says that we cannot devise an algorithm that deterministically ensures consensus agreement and validity (i.e., safety) on the one hand, and consensus wait-freedom (i.e., liveness) on the other hand. The motivation of this work is to study the extent to which safety and liveness properties inherently exclude each other. More specifically, we ask, given any safety property S, whether we can determine the strongest (resp. weakest) liveness property that can (resp. cannot) be achieved with S. We show that, maybe surprisingly, the answers to these safety-liveness exclusion questions are in general negative. This has several ramifications in various distributed computing contexts. In the context of consensus for example, this means that it is impossible to determine the strongest (resp. the weakest) liveness property that can (resp. cannot) be ensured with linearizability. However, we present a way to circumvent these impossibilities and answer positively the safety-liveness question by considering a restricted form of liveness. We consider a definition that gathers generalized forms of obstruction-freedom and lock-freedom while enabling to determine the strongest (resp. weakest) liveness property that can (resp. cannot) be implemented in the context of consensus and transactional memory
    corecore