632 research outputs found
11. Looking Back
From Alumni Views, Robert H. Bluestein (’67), “ILR addressed the social and economic issues of the times and sought to provide students with the tools to find solutions to many of the problems confronting society in the mid-to late-sixties. This was a period easily described as volatile, evolutionary, and sometimes revolutionary. As would have been the case at any vibrant institution, the curriculum and the students at ILR reflected those times.” Includes: Alumni Views of ILR; The Creation of the Alpern Scholarship and Prize; and A Professor’s Perspective
Chromosomal rearrangement segregating with adrenoleukodystrophy: associated changes in color vision.
The change in color matches with retinal angle of incidence of the colorimeter beams
Differences between W.D.W. chromaticities of monochromatic lights obtained with all colorimeter beams incident on the retina "off-axis" and those found for lights striking the retina normally have been studied throughout the visible spectrum on 4 normal trichromats. The results are inconsistent with: 1. (i) the assumption in Weale's theories of the Stiles-Crawford hue shift that the sets of absorption spectra of the visual pigments catching normally and obliquely incident photons are identical, and2. (ii) "self-screening" explanations for the change in color with angle of incidence on the retina. The color matching functions of a protanomalous trichromat are inconsistent with the hypothesis that the absorption spectra of the visual pigments catching normally incident photons in his retina are those catching obliquely incident photons in the normal retina.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/27010/1/0000577.pd
Grouping based feature attribution in metacontrast masking
The visibility of a target can be strongly suppressed by metacontrast masking.
Still, some features of the target can be perceived within the mask. Usually,
these rare cases of feature mis-localizations are assumed to reflect errors of
the visual system. To the contrary, I will show that feature
"mis-localizations" in metacontrast masking follow rules of
motion grouping and, hence, should be viewed as part of a systematic feature
attribution process
Fast Two-Robot Disk Evacuation with Wireless Communication
In the fast evacuation problem, we study the path planning problem for two
robots who want to minimize the worst-case evacuation time on the unit disk.
The robots are initially placed at the center of the disk. In order to
evacuate, they need to reach an unknown point, the exit, on the boundary of the
disk. Once one of the robots finds the exit, it will instantaneously notify the
other agent, who will make a beeline to it.
The problem has been studied for robots with the same speed~\cite{s1}. We
study a more general case where one robot has speed and the other has speed
. We provide optimal evacuation strategies in the case that by showing matching upper and lower bounds on the
worst-case evacuation time. For , we show (non-matching)
upper and lower bounds on the evacuation time with a ratio less than .
Moreover, we demonstrate that a generalization of the two-robot search strategy
from~\cite{s1} is outperformed by our proposed strategies for any .Comment: 18 pages, 10 figure
Time-Energy Tradeoffs for Evacuation by Two Robots in the Wireless Model
Two robots stand at the origin of the infinite line and are tasked with
searching collaboratively for an exit at an unknown location on the line. They
can travel at maximum speed and can change speed or direction at any time.
The two robots can communicate with each other at any distance and at any time.
The task is completed when the last robot arrives at the exit and evacuates. We
study time-energy tradeoffs for the above evacuation problem. The evacuation
time is the time it takes the last robot to reach the exit. The energy it takes
for a robot to travel a distance at speed is measured as . The
total and makespan evacuation energies are respectively the sum and maximum of
the energy consumption of the two robots while executing the evacuation
algorithm.
Assuming that the maximum speed is , and the evacuation time is at most
, where is the distance of the exit from the origin, we study the
problem of minimizing the total energy consumption of the robots. We prove that
the problem is solvable only for . For the case , we give an
optimal algorithm, and give upper bounds on the energy for the case .
We also consider the problem of minimizing the evacuation time when the
available energy is bounded by . Surprisingly, when is a
constant, independent of the distance of the exit from the origin, we prove
that evacuation is possible in time , and this is optimal up
to a logarithmic factor. When is linear in , we give upper bounds
on the evacuation time.Comment: This is the full version of the paper with the same title which will
appear in the proceedings of the 26th International Colloquium on Structural
Information and Communication Complexity (SIROCCO'19) L'Aquila, Italy during
July 1-4, 201
Lack of Agreement in Pediatric Emergency Department Discharge Diagnoses from Clinical and Administrative Data Sources
Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/75409/1/j.1553-2712.2007.tb01852.x.pd
Power of Randomization in Automata on Infinite Strings
Probabilistic B\"uchi Automata (PBA) are randomized, finite state automata
that process input strings of infinite length. Based on the threshold chosen
for the acceptance probability, different classes of languages can be defined.
In this paper, we present a number of results that clarify the power of such
machines and properties of the languages they define. The broad themes we focus
on are as follows. We present results on the decidability and precise
complexity of the emptiness, universality and language containment problems for
such machines, thus answering questions central to the use of these models in
formal verification. Next, we characterize the languages recognized by PBAs
topologically, demonstrating that though general PBAs can recognize languages
that are not regular, topologically the languages are as simple as
\omega-regular languages. Finally, we introduce Hierarchical PBAs, which are
syntactically restricted forms of PBAs that are tractable and capture exactly
the class of \omega-regular languages
Safety-Liveness Exclusion in Distributed Computing
The history of distributed computing is full of trade-offs between safety and liveness. For instance, one of the most celebrated results in the field, namely the impossibility of consensus in an asynchronous system basically says that we cannot devise an algorithm that deterministically ensures consensus agreement and validity (i.e., safety) on the one hand, and consensus wait-freedom (i.e., liveness) on the other hand. The motivation of this work is to study the extent to which safety and liveness properties inherently exclude each other. More specifically, we ask, given any safety property S, whether we can determine the strongest (resp. weakest) liveness property that can (resp. cannot) be achieved with S. We show that, maybe surprisingly, the answers to these safety-liveness exclusion questions are in general negative. This has several ramifications in various distributed computing contexts. In the context of consensus for example, this means that it is impossible to determine the strongest (resp. the weakest) liveness property that can (resp. cannot) be ensured with linearizability. However, we present a way to circumvent these impossibilities and answer positively the safety-liveness question by considering a restricted form of liveness. We consider a definition that gathers generalized forms of obstruction-freedom and lock-freedom while enabling to determine the strongest (resp. weakest) liveness property that can (resp. cannot) be implemented in the context of consensus and transactional memory
- …