4,622 research outputs found

    Computable queries for relational data bases

    Get PDF
    AbstractThe concept of “reasonable” queries on relational data bases is investigated. We provide an abstract characterization of the class of queries which are computable, and define the completeness of a query language as the property of being precisely powerful enough to express the queries in this class. This definition is then compared with other proposals for measuring the power of query languages. Our main result is the completeness of a simple programming language which can be thought of as consisting of the relational algebra augmented with the power of iteration

    RAFCON: a Graphical Tool for Task Programming and Mission Control

    Full text link
    There are many application fields for robotic systems including service robotics, search and rescue missions, industry and space robotics. As the scenarios in these areas grow more and more complex, there is a high demand for powerful tools to efficiently program heterogeneous robotic systems. Therefore, we created RAFCON, a graphical tool to develop robotic tasks and to be used for mission control by remotely monitoring the execution of the tasks. To define the tasks, we use state machines which support hierarchies and concurrency. Together with a library concept, even complex scenarios can be handled gracefully. RAFCON supports sophisticated debugging functionality and tightly integrates error handling and recovery mechanisms. A GUI with a powerful state machine editor makes intuitive, visual programming and fast prototyping possible. We demonstrated the capabilities of our tool in the SpaceBotCamp national robotic competition, in which our mobile robot solved all exploration and assembly challenges fully autonomously. It is therefore also a promising tool for various RoboCup leagues.Comment: 8 pages, 5 figure

    Maximal-entropy random walk unifies centrality measures

    Full text link
    In this paper analogies between different (dis)similarity matrices are derived. These matrices, which are connected to path enumeration and random walks, are used in community detection methods or in computation of centrality measures for complex networks. The focus is on a number of known centrality measures, which inherit the connections established for similarity matrices. These measures are based on the principal eigenvector of the adjacency matrix, path enumeration, as well as on the stationary state, stochastic matrix or mean first-passage times of a random walk. Particular attention is paid to the maximal-entropy random walk, which serves as a very distinct alternative to the ordinary random walk used in network analysis. The various importance measures, defined both with the use of ordinary random walk and the maximal-entropy random walk, are compared numerically on a set of benchmark graphs. It is shown that groups of centrality measures defined with the two random walks cluster into two separate families. In particular, the group of centralities for the maximal-entropy random walk, connected to the eigenvector centrality and path enumeration, is strongly distinct from all the other measures and produces largely equivalent results.Comment: 7 pages, 2 figure

    Goal-conflict detection based on temporal satisfiability checking

    Get PDF
    Goal-oriented requirements engineering approaches propose capturing how a system should behave through the speci ca- tion of high-level goals, from which requirements can then be systematically derived. Goals may however admit subtle situations that make them diverge, i.e., not be satis able as a whole under speci c circumstances feasible within the domain, called boundary conditions . While previous work al- lows one to identify boundary conditions for con icting goals written in LTL, it does so through a pattern-based approach, that supports a limited set of patterns, and only produces pre-determined formulations of boundary conditions. We present a novel automated approach to compute bound- ary conditions for general classes of con icting goals expressed in LTL, using a tableaux-based LTL satis ability procedure. A tableau for an LTL formula is a nite representation of all its satisfying models, which we process to produce boundary conditions that violate the formula, indicating divergence situations. We show that our technique can automatically produce boundary conditions that are more general than those obtainable through existing previous pattern-based approaches, and can also generate boundary conditions for goals that are not captured by these patterns

    Optimized preparation of quantum states by conditional measurements

    Get PDF
    We introduce a general strategy for preparation of arbitrary quantum states via optimal control of repeated conditional measurements. The effectiveness of this strategy in generating finite Fock-state superpositions with a high level of confidence from experimentally accessible coherent states is demonstrated for the simple and well known Jaynes-Cummings model dynamics

    Proton exchange membrane fuel cell operation and degradation in short-circuit.

    Get PDF
    International audienceThis paper presents an experimental study dealing with operation and degradation during an electrical short circuit of a proton exchange membrane fuel cell stack. The physical quantities in the fuel cell (electrical voltage and current, gas stoichiometry, pressures, temperatures and gas humidity) are studied before, during and after the failure. After a short circuit occurs, a high peak of current appears but decreases to stabilize in a much lower value. The voltage drops in all the cells and even some cells presents reversal potentials. The degradation is quantified by using electrochemical impedance spectroscopy

    Long-lived quantum coherence in photosynthetic complexes at physiological temperature

    Full text link
    Photosynthetic antenna complexes capture and concentrate solar radiation by transferring the excitation to the reaction center which stores energy from the photon in chemical bonds. This process occurs with near-perfect quantum efficiency. Recent experiments at cryogenic temperatures have revealed that coherent energy transfer - a wavelike transfer mechanism - occurs in many photosynthetic pigment-protein complexes (1-4). Using the Fenna-Matthews-Olson antenna complex (FMO) as a model system, theoretical studies incorporating both incoherent and coherent transfer as well as thermal dephasing predict that environmentally assisted quantum transfer efficiency peaks near physiological temperature; these studies further show that this process is equivalent to a quantum random walk algorithm (5-8). This theory requires long-lived quantum coherence at room temperature, which never has been observed in FMO. Here we present the first evidence that quantum coherence survives in FMO at physiological temperature for at least 300 fs, long enough to perform a rudimentary quantum computational operation. This data proves that the wave-like energy transfer process discovered at 77 K is directly relevant to biological function. Microscopically, we attribute this long coherence lifetime to correlated motions within the protein matrix encapsulating the chromophores, and we find that the degree of protection afforded by the protein appears constant between 77 K and 277 K. The protein shapes the energy landscape and mediates an efficient energy transfer despite thermal fluctuations. The persistence of quantum coherence in a dynamic, disordered system under these conditions suggests a new biomimetic strategy for designing dedicated quantum computational devices that can operate at high temperature.Comment: PDF files, 15 pages, 3 figures (included in the PDF file

    A classical Over Barrier Model to compute charge exchange between ions and one-optical-electron atoms

    Get PDF
    In this paper we study theoretically the process of electron capture between one-optical-electron atoms (e.g. hydrogenlike or alkali atoms) and ions at low-to-medium impact velocities (v/v_e <= 1) working on a modification of an already developed classical Over Barrier Model (OBM) [V. Ostrovsky, J. Phys. B: At. Mol. Opt. Phys. {\bf 28} 3901 (1995)], which allows to give a semianalytical formula for the cross sections. The model is discussed and then applied to a number of test cases including experimental data as well as data coming from other sophisticated numerical simulations. It is found that the accuracy of the model, with the suggested corrections and applied to quite different situations, is rather high.Comment: 12 pages REVTEX, 5 EPSF figures, submitted to Phys Rev

    String Indexing for Patterns with Wildcards

    Get PDF
    We consider the problem of indexing a string tt of length nn to report the occurrences of a query pattern pp containing mm characters and jj wildcards. Let occocc be the number of occurrences of pp in tt, and σ\sigma the size of the alphabet. We obtain the following results. - A linear space index with query time O(m+σjlog⁥log⁥n+occ)O(m+\sigma^j \log \log n + occ). This significantly improves the previously best known linear space index by Lam et al. [ISAAC 2007], which requires query time Θ(jn)\Theta(jn) in the worst case. - An index with query time O(m+j+occ)O(m+j+occ) using space O(σk2nlog⁥klog⁥n)O(\sigma^{k^2} n \log^k \log n), where kk is the maximum number of wildcards allowed in the pattern. This is the first non-trivial bound with this query time. - A time-space trade-off, generalizing the index by Cole et al. [STOC 2004]. We also show that these indexes can be generalized to allow variable length gaps in the pattern. Our results are obtained using a novel combination of well-known and new techniques, which could be of independent interest

    Revisiting Semantics of Interactions for Trace Validity Analysis

    Full text link
    Interaction languages such as MSC are often associated with formal semantics by means of translations into distinct behavioral formalisms such as automatas or Petri nets. In contrast to translational approaches we propose an operational approach. Its principle is to identify which elementary communication actions can be immediately executed, and then to compute, for every such action, a new interaction representing the possible continuations to its execution. We also define an algorithm for checking the validity of execution traces (i.e. whether or not they belong to an interaction's semantics). Algorithms for semantic computation and trace validity are analyzed by means of experiments.Comment: 18 pages of contents and 2 pages for references, 10 figures. Published in ETAPS-FASE2020 : "23rd International Conference on Fundamental Approaches to Software Engineering" in the "research papers" categor
    • 

    corecore